0 | -- | 0 | Leah Hoffmann. Bringing stability to wireless connections |
5 | -- | 0 | Andrew A. Chien. Driving the cloud to true zero carbon |
7 | -- | 0 | Vinton G. Cerf. Half-baked high-resolution referencing |
8 | -- | 9 | CACM Staff. Salary disputes |
10 | -- | 11 | Robin K. Hill. Issues arise when time goes digital |
12 | -- | 14 | Chris Edwards. Moore's Law: what comes next? |
15 | -- | 16 | Logan Kugler. The state of virtual reality hardware |
17 | -- | 19 | Keith Kirkpatrick. Technological responses to COVID-19 |
20 | -- | 22 | Yannis Bakos, Hanna Halaburda, Christoph Müller-Bloch. When permissioned blockchains deliver more decentralization than permissionless |
23 | -- | 25 | Carol L. Fletcher, Jayce R. Warner. CAPE: a framework for assessing equity throughout the computer science education ecosystem |
26 | -- | 27 | George V. Neville-Neil. Kabin fever |
28 | -- | 30 | Chris Maurer, Kevin Kim, Dan J. Kim, Leon A. Kappelman. Cybersecurity: is it worse than we think? |
31 | -- | 32 | Subbarao Kambhampati. Polanyi's revenge and AI's new romance with tacit knowledge |
33 | -- | 35 | Donald E. Knuth, Len Shustek. Let's not dumb down the history of computer science |
36 | -- | 43 | CACM Staff. Differential privacy: the pursuit of protections by default |
44 | -- | 46 | Thomas A. Limoncelli. The time I stole $10, 000 from Bell Labs |
48 | -- | 58 | Anna Maria Feit, Mathieu Nancel, Maximilian John, Andreas Karrenbauer, Daryl Weir, Antti Oulasvirta. AZERTY amélioré: computational design on a national scale |
59 | -- | 65 | Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram. GDPR anti-patterns |
66 | -- | 74 | Dong H. Ahn, Allison H. Baker, Michael Bentley, Ian Briggs, Ganesh Gopalakrishnan, Dorit M. Hammerling, Ignacio Laguna, Gregory L. Lee, Daniel J. Milroy, Mariana Vertenstein. Keeping science on keel when software moves |
76 | -- | 83 | Pascal Hitzler. A review of the semantic web field |
84 | -- | 93 | Sameer Wagh, Xi He 0001, Ashwin Machanavajjhala, Prateek Mittal. DP-cryptography: marrying differential privacy and cryptography in emerging applications |
96 | -- | 0 | Nada Amin. Technical perspective: Programming microfluidics to execute biological protocols |
97 | -- | 104 | Jason Ott, Tyson Loveless, Christopher Curtis, Mohsen Lesani, Philip Brisk. BioScript: programming safe chemistry on laboratories-on-a-chip |
105 | -- | 0 | Zachary G. Ives. Technical perspective: Solving the signal reconstruction problem at scale |
106 | -- | 115 | Abolfazl Asudeh, Jees Augustine, Saravanan Thirumuruganathan, Azade Nazi, Nan Zhang 0004, Gautam Das 0001, Divesh Srivastava. Scalable signal reconstruction for a broad range of applications |