Journal: Communications of the ACM

Volume 54, Issue 9

5 -- 0Moshe Y. Vardi. Are you talking to me?
10 -- 11Jeannette M. Wing, Valerie Barr. Jeannette M. Wing @ PCAST; Barbara Liskov keynote
13 -- 15Kirk L. Kroeker. A breakthrough in algorithm design
16 -- 18Gary Anthes. Invasion of the mobile apps
19 -- 21Neil Savage. Remaking American medicine
25 -- 27Martin Campbell-Kelly. In praise of Wilkes, Wheeler, and Gill
28 -- 30Ron Babin, Steve Briggs, Brian Nicholson. Corporate social responsibility and global IT outsourcing
31 -- 33Peter J. Denning, Ritu Raj. Managing time, part 2
34 -- 37Ben Shneiderman, Jennifer Preece, Peter Pirolli. Realizing the value of social media requires innovative computing research
38 -- 41Paul Vixie. Arrogance in business planning
42 -- 44Poul-Henning Kamp. The most expensive one-byte mistake
45 -- 53Mache Creeger. ACM CTO roundtable on mobile devices in the enterprise
54 -- 61Stephen J. Lukasik. Protecting users of the cyber commons
62 -- 68Craig Partridge. Realizing the future of wireless data communications
69 -- 77Leonardo Mendonça de Moura, Nikolaj Bjørner. Satisfiability modulo theories: introduction and applications
78 -- 87Patricia Bouyer, Uli Fahrenberg, Kim G. Larsen, Nicolas Markey. Quantitative analysis of real-time systems using priced timed automata
90 -- 0Christopher Kruegel. Making browser extensions secure: technical perspective
91 -- 99Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett. Vetting browser extensions for security vulnerabilities with VEX
100 -- 0Olivier Danvy, Jan Midtgaard. Abstracting abstract machines: technical perspective
101 -- 109David Van Horn, Matthew Might. Abstracting abstract machines: a systematic approach to higher-order program analysis
110 -- 0Peter Winkler. Puzzled
112 -- 0Leah Hoffmann. Q&A
121 -- 130Murray Cantor. Calculating and improving ROI in software and system programs

Volume 54, Issue 8

5 -- 0Sorel Reisman, Alain Chesnais. From the presidents of the IEEE Computer Society and ACM
10 -- 11Michael Stonebraker. Stonebraker on NoSQL and enterprises
12 -- 0Scott E. Delman. Why you should be happy to sign in!
13 -- 15Kirk L. Kroeker. A new benchmark for artificial intelligence
16 -- 18Tom Geller. Supercomputing s exaflop target
19 -- 21Samuel Greengard. Life, translated
24 -- 26Jonathon N. Cummings. Geography is alive and well in virtual teams
27 -- 29Betsy James DiSalvo, Amy Bruckman. From interests to values
30 -- 33Steven M. Bellovin, S. O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford. As simple as possible - but not more so
34 -- 35George V. Neville-Neil. Storage strife
36 -- 38Joseph Y. Halpern, David C. Parkes. Journals for certification, conferences for rapid dissemination
40 -- 45Eric Allman. The robustness principle reconsidered
46 -- 54Satnam Singh. Computing without processors
62 -- 71Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony Sherbondy, Raghavendra Singh. Cognitive computing
72 -- 80J. McGrath Cohoon, Sergey Nigai, Joseph Kaye. Gender and computing conference papers
81 -- 87Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler. Reputation systems for open collaboration
88 -- 98Surajit Chaudhuri, Umeshwar Dayal, Vivek R. Narasayya. An overview of business intelligence technology
100 -- 0Peter J. Haas. Sketches get sketchier
101 -- 109Ping Li, Arnd Christian König. Theory and applications of ::::b::::-bit minwise hashing
110 -- 0Scott R. Klemmer. Skintroducing the future
111 -- 118Chris Harrison, Desney S. Tan, Dan Morris. Skinput: appropriating the skin as an interactive canvas
120 -- 0Peter Winkler. Puzzled
121 -- 131David Wright. Should privacy impact assessments be mandatory?
132 -- 140Sanjay Goel. Cyberwarfare: connecting the dots in cyber intelligence

Volume 54, Issue 7

5 -- 0Moshe Y. Vardi. Solving the unsolvable
10 -- 11Jeannette M. Wing, Ed H. Chi. Reviewing peer review
12 -- 0Scott E. Delman. ACM aggregates publication statistics in the ACM Digital Library
13 -- 15Kirk L. Kroeker. Weighing Watson s impact
16 -- 18Alex Wright. Automotive autonomy
19 -- 21Dennis McCafferty. Brave, new social world
23 -- 25Mari Sako. Driving power in global supply chains
26 -- 28Cory P. Knobel, Geoffrey C. Bowker. Values in design
29 -- 31Pamela Samuelson. Too many copyrights?
35 -- 37Mordechai Ben-Ari. Non-myths about programming
38 -- 43Roberto Ierusalimschy, Luiz Henrique de Figueiredo, Waldemar Celes Filho. Passing a language through the eye of a needle
44 -- 50Debasish Ghosh. DSL for the uninitiated
58 -- 67Michael Edwards. Algorithmic composition: computational thinking in music
68 -- 76Thomas Ball, Vladimir Levin, Sriram K. Rajamani. A decade of software model checking with SLAM
77 -- 87Joseph M. Hellerstein, David L. Tennenhouse. Searching for Jim Gray: a technical overview
88 -- 98Stephen B. Wicker. Cellular telephony and the question of privacy
100 -- 0Luiz André Barroso. FAWN: a fast array of wimpy nodes: technical perspective
101 -- 109David G. Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan. FAWN: a fast array of wimpy nodes
110 -- 0John K. Ousterhout. Is scale your enemy, or is scale your friend?: technical perspective
111 -- 116Kinshuman Kinshumann, Kirk Glerum, Steve Greenberg, Gabriel Aul, Vince Orgovan, Greg Nichols, David Grant, Gretchen Loihle, Galen C. Hunt. Debugging in the (very) large: ten years of implementation and experience
120 -- 0Rudy Rucker. Future tense
121 -- 130John K. Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Diego Ongaro, Guru M. Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman. The case for RAMCloud
131 -- 141Gargi Dasgupta, Amit Sharma, Akshat Verma, Anindya Neogi, Ravi Kothari. Workload management for power efficiency in virtualized data centers

Volume 54, Issue 6

5 -- 0P. J. Narayanan, Anand Deshpanda. Computing and India
8 -- 9Daniel Reed, Mark Guzdial, Judy Robertson. Simple design; research vs. teaching; and quest to learn
10 -- 0Scott E. Delman. Say it with video
11 -- 13Kirk L. Kroeker. Biology-inspired networking
14 -- 15Gary Anthes. Beauty and elegance
16 -- 18Tom Geller. The promise of flexible displays
19 -- 0Gregory Goth. Unlimited possibilities
20 -- 21Marina Krakovsky. All the news that's fit for you
22 -- 24Ari Schwartz. Identity management and privacy: a rare opportunity to get it right
25 -- 27Peter J. Denning, Dennis J. Frailey. Who are we - now?
28 -- 30Phillip G. Armour. Practical application of theoretical estimation
31 -- 33David Lorge Parnas. The risks of stopping too soon
34 -- 35George V. Neville-Neil. Think before you fork
36 -- 38Clayton T. Morrison, Richard T. Snodgrass. Computer science can use more science
40 -- 47Pat Helland. If you have too much data, then good enough is good enough
54 -- 60Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling. Does deterrence work in reducing information security policy abuse by employees?
62 -- 71W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall. Advancing the state of home networking
72 -- 80Michael Stonebraker, Rick Cattell. 10 rules for scalable performance in simple operation datastores
81 -- 91Mike Barnett, Manuel Fähndrich, K. Rustan M. Leino, Peter Müller, Wolfram Schulte, Herman Venter. Specification and verification: the Spec# experience
103 -- 0Phokion G. Kolaitis. The quest for a logic for polynomial-time computation: technical perspective
113 -- 0Michael J. Franklin. Data analysis at astonishing speed: technical perspective
114 -- 123Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis. Dremel: interactive analysis of web-scale datasets
126 -- 0Peter Winkler. Puzzled
128 -- 0Leah Hoffmann. Q&A
129 -- 137Paolo Boldi, Francesco Bonchi, Carlos Castillo, Sebastiano Vigna. Viscous democracy for social networks
138 -- 143Denise Johnson McManus, Houston Hume Carr, Benjamin Adams. Wireless on the precipice: The 14:::th::: century revisited

Volume 54, Issue 5

5 -- 0Moshe Y. Vardi. Technology has social consequences
10 -- 11Michael Stonebraker. Stonebraker on data warehouses
12 -- 0Scott E. Delman. Let ACM help you find your next job online
13 -- 15Neil Savage. Sorting through photos
16 -- 17Gregory Goth. I, domestic robot
18 -- 20Leah Hoffmann. Data optimization in developing nations
22 -- 0Marina Krakovsky. Deus ex machina
23 -- 0Alex Wright. Web science meets network science
25 -- 27Avi Goldfarb, Catherine Tucker. Online advertising, behavioral targeting, and privacy
28 -- 30Brian Dorn. Reaching learners beyond our hallowed halls
31 -- 33Tim Wu. Bell labs and centralized innovation
40 -- 41Juan A. Añel. The importance of reviewing the code
44 -- 48Poul-Henning Kamp. The one-second war
60 -- 66Dennis J. McFarland, Jonathan R. Wolpaw. Brain-computer interfaces for communication and control
67 -- 77Shekhar Borkar, Andrew A. Chien. The future of microprocessors
78 -- 87Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker. Privacy-preserving network forensics
88 -- 98Byron Cook, Andreas Podelski, Andrey Rybalchenko. Proving program termination
100 -- 0David C. Parkes. Complex financial products: ::::caveat emptor::::: technical perspective
101 -- 107Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge. Computational complexity and information asymmetry in financial products
109 -- 117Antoni Buades, Bartomeu Coll, Jean-Michel Morel. Self-similarity-based image denoising
120 -- 0Peter Winkler. Puzzled
121 -- 128Subhankar Dhar, Upkar Varshney. Challenges and business models for mobile location-based services and advertising
130 -- 140Guido Schryen. Is open source security a myth?
141 -- 146Jacques Wainer, Siome Goldenstein, Cleo Zanella Billa. Invisible work in standard bibliometric evaluation of computer science

Volume 54, Issue 4

5 -- 0Robert B. Schnabel. Educating computing s next generation
10 -- 11Jason Hong. Matters of design, part II
12 -- 0Scott E. Delman. ACM on the move
13 -- 15Gary Anthes. The quest for randomness
16 -- 18Kirk L. Kroeker. Engineering sensation in artificial limbs
19 -- 22Samuel Greengard. Social games, virtual goods
23 -- 0Sarah Underwood. British computer scientists reboot
24 -- 27Fred Niederman, Felix B. Tan. Managing global IT teams: considering cultural dynamics
28 -- 30Nathan L. Ensmenger. Building castles in the air
31 -- 33Michael A. Cusumano. Platform wars come to social media
34 -- 35George V. Neville-Neil. Coder s block
36 -- 37José Luis Gómez Barroso, Claudio Feijóo. Asymmetries and shortages of the network neutrality principle
38 -- 43Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza. Returning control to the programmer: SIMD intrinsics for virtual machines
44 -- 48Thomas A. Limoncelli, Vinton G. Cerf. Successful strategies for IPv6 rollouts.: Really
49 -- 58Erik Meijer, Gavin M. Bierman. A co-relational model of data for large shared data banks
60 -- 69Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz. Design principles for visual communication
70 -- 77Aleksandar Dragojevic, Pascal Felber, Vincent Gramoli, Rachid Guerraoui. Why STM can be more than a research toy
78 -- 85John C. Tang, Manuel Cebrián, Nicklaus A. Giacobe, Hyun Woo Kim, Taemie Kim, Douglas Beaker Wickert. Reflecting on the DARPA Red Balloon Challenge
86 -- 96AnHai Doan, Raghu Ramakrishnan, Alon Y. Halevy. Crowdsourcing systems on the World-Wide Web
98 -- 0Daniel M. Berry. Liability issues in software engineering: technical perspective
99 -- 106Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin. Liability issues in software engineering: the use of formal methods to reduce legal uncertainties
107 -- 0Madhu Sudan. Patterns hidden from simple algorithms: technical perspective
108 -- 115Mark Braverman. Poly-logarithmic independence fools bounded-depth boolean circuits
120 -- 0Leah Hoffmann. Q&A
121 -- 124Patricia Morreale, David A. Joiner. Reaching future computer scientists
125 -- 132Ann Majchrzak, Philip H. B. More. Emergency! Web 2.0 to the rescue!
133 -- 141Fred Grossman, Charles C. Tappert, Joe Bergin, Susan M. Merritt. A research doctorate for computing professionals
142 -- 151Gerardo Canfora, Massimiliano Di Penta, Luigi Cerulo. Achievements and challenges in software reverse engineering

Volume 54, Issue 3

5 -- 0Moshe Y. Vardi. Fumbling the future
12 -- 13Mark Guzdial, Greg Linden. Scientists, engineers, and computer science; industry and research groups
14 -- 0David Roman. Time to change
15 -- 17Kirk L. Kroeker. Grid computing s future
18 -- 20Neil Savage. Twitter as medium and message
21 -- 0Tom Geller. Evaluating government funding
22 -- 24Gary Anthes. Memristors: pass or fail?
25 -- 0Samuel Greengard. Gary Chapman, technologist: 1952-2010
26 -- 28Pamela Samuelson. Do you own the software you buy?
35 -- 37Daryl E. Chubin, Roosevelt Y. Johnson. A program greater than the sum of its parts: the BPC alliances
38 -- 43Marc Snir. Computer and information science and engineering: one discipline, many specialties
44 -- 49Mark Burgess. Testable system administration
56 -- 58Poul-Henning Kamp. B.Y.O.C (1, 342 times and counting)
60 -- 69Katy Börner. Plug-and-play macroscopes
70 -- 75Frank Stajano, Paul Wilson. Understanding scam victims: seven principles for systems security
76 -- 84Nir Shavit. Data structures in the multicore age
86 -- 0Juan Bello, Yann LeCun, Robert Rowe. Concerto for violin and Markov model: technical perspective
87 -- 93Christopher Raphael. The informatics philharmonic
94 -- 0Jennifer Rexford. VL2: technical perspective
95 -- 104Albert G. Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta. VL2: a scalable and flexible data center network
109 -- 0Peter Winkler. Puzzled
112 -- 0Gregory Benford. Future tense
113 -- 116Frances A. Rosamond, Roswitha Bardohl, Stephan Diehl, Uwe Geisler, Gordon Bolduan, Annette Lessmöllmann, Andreas Schwill, Ulrike Stege. Reaching out to the media: become a computer science ambassador
117 -- 123R. Kelly Garrett, James N. Danziger. The Internet electorate
124 -- 130Steven De Hertogh, Stijn Viaene, Guido Dedene. Governing Web 2.0

Volume 54, Issue 2

5 -- 0Tom Rodden. ICPS offers major research venue
10 -- 11Jason Hong. Matters of design
12 -- 0David Roman. End of days for ::::Communications:::: in print?
13 -- 15Gregory Goth. Chipping away at greenhouse gases
16 -- 18Neil Savage. Information theory after Shannon
19 -- 0Leah Hoffmann. Maurice Wilkes: the last pioneer
20 -- 22Samuel Greengard. Following the crowd
23 -- 24Gary Anthes. ACM launches new Digital Library
26 -- 28Maura Conway. Against cyberterrorism
29 -- 31Gregory L. Rosston, Scott Savage, Donald Waldman. Household demand for broadband internet service
32 -- 34George Ledin Jr.. The growing harm of not teaching malware
35 -- 36George V. Neville-Neil. Forest for the trees
37 -- 39Mark Guzdial. From science to engineering
41 -- 43Jonathan Grudin. Technology, conferences, and community
44 -- 49Julian Harty. Finding usability bugs with automated tests
50 -- 51Thomas A. Limoncelli. A plea from sysadmins to software vendors: 10 do s and don ts
60 -- 71Juan P. Wachs, Mathias Kölsch, Helman Stern, Yael Edan. Vision-based hand-gesture applications
72 -- 79Michael J. Cafarella, Alon Y. Halevy, Jayant Madhavan. Structured data on the web
80 -- 88Stephen Davies. Still building the memex
90 -- 0Fernando Pereira. Markov meets Bayes: technical perspective
91 -- 98Frank Wood, Jan Gasthaus, Cédric Archambeau, Lancelot James, Yee Whye Teh. The sequence memoizer
99 -- 0Norman P. Jouppi. DRAM errors in the wild: technical perspective
100 -- 107Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber. DRAM errors in the wild: a large-scale field study
112 -- 0Peter Winkler. Puzzled
113 -- 115John K. Estell, Ken Christensen. The need for a new graduation rite of passage
116 -- 118Qinping Zhao. 10 scientific problems in virtual reality
119 -- 127David Wright, Paul De Hert, Serge Gutwirth. Are the OECD guidelines at 30 showing their age?

Volume 54, Issue 12

5 -- 0Moshe Y. Vardi. Computing for humans
7 -- 0. To boost presentation quality, ask questions
8 -- 9John Langford, Judy Robertson. Conferences and video lectures; scientific educational games
10 -- 0. Nominees for elections and report of the ACM Nominating Committee
11 -- 13Kirk L. Kroeker. The rise of molecular machines
14 -- 16Gregory Goth. Brave NUI world
17 -- 19Dennis McCafferty. Activism vs. slacktivism
20 -- 0Samuel Greengard. CSEdWeek takes hold
21 -- 0Paul Hyman. Dennis Ritchie, 1941-2011
22 -- 23Jaron Lanier. The most ancient marketing
24 -- 25Genevieve Bell. Life, death, and the iPad: cultural symbols and Steve Jobs
26 -- 28Michael A. Cusumano. The legacy of Steve Jobs
29 -- 31Kentaro Toyama. On turbocharged, heat-seeking, robotic fishing poles
32 -- 33George V. Neville-Neil. Debugging on live systems
34 -- 37Valerie E. Taylor, Richard E. Ladner. Data trends on minorities and people with disabilities in computing
38 -- 40Peter J. Denning. The grounding practice
41 -- 43Andrew P. Bernat, Eric Grimson. Doctoral program rankings for U.S. computing programs: the national research council strikes out
44 -- 51David Pacheco. Postmortem debugging in dynamic environments
52 -- 56G. Bruce Berriman, Steven L. Groom. How will astronomy archives survive the data tsunami?
57 -- 63Robert Green, Henry Ledgard. Coding guidelines: finding the art in the science
64 -- 73Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah. Visual crowd surveillance through a hydrodynamics lens
74 -- 81Manuel Sojer, Joachim Henkel. License risks from ad hoc reuse of code from the internet
82 -- 91Ganesh Gopalakrishnan, Robert M. Kirby, Stephen F. Siegel, Rajeev Thakur, William Gropp, Ewing L. Lusk, Bronis R. de Supinski, Martin Schulz, Greg Bronevetsky. Formal analysis of MPI-based parallel programs
92 -- 103Gerhard Brewka, Thomas Eiter, Miroslaw Truszczynski. Answer set programming at a glance
122 -- 0Xavier Leroy. Safety first!: technical perspective
123 -- 131Jean Yang, Chris Hawblitzel. Safe to the last instruction: automated verification of a type-safe operating system
132 -- 0Vitaly Shmatikov. Anonymity is not privacy: technical perspective
133 -- 141Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg. Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography
142 -- 0Peter Winkler. Puzzled
144 -- 0Leah Hoffmann. Q&A

Volume 54, Issue 11

5 -- 0Moshe Y. Vardi. Is Moore's Party over?
6 -- 7. Justice for Jahromi
9 -- 0. In the Virtual Extension
12 -- 13Bertrand Meyer, Greg Linden. In support of open reviews; better teaching through large-scale data mining
14 -- 0Scott E. Delman. ACM offers a new approach to self-archiving
15 -- 17Kirk L. Kroeker. Modeling chaotic storms
18 -- 19Alex Wright. Hacking cars
20 -- 22Leah Hoffmann. Risky business
23 -- 25Hannes Tschofenig. Security risks in next-generation emergency services
26 -- 28Scott Wallsten. What gets measured gets done
29 -- 31Pamela Samuelson. Why the Google book settlement failed: and what comes next?
32 -- 34Michael Davis. Will software engineering ever be engineering?
35 -- 37. Teaching-oriented faculty at research universities
38 -- 42Douglas Baumann, Susanne E. Hambrusch, Jennifer Neville. Gender demographics trends and changes in U.S. CS departments
44 -- 47Poul-Henning Kamp. is the problem
48 -- 52Li Gong. Java security architecture revisited
53 -- 58Yaron Minsky. OCaml for the masses
60 -- 67Marti A. Hearst. 'Natural' search user interfaces
68 -- 73DongBack Seo, Albert Boonstra, Marjolein van Offenbeek. Managing IS adoption in ambivalent groups
74 -- 82Ken Kennedy, Charles Koelbel, Hans P. Zima. The rise and fall of high performance Fortran
84 -- 89Ian F. Akyildiz, Josep Miquel Jornet, Massimiliano Pierobon. Nanonetworks: a new frontier in communications
92 -- 0Butler W. Lampson. Making untrusted code useful: technical perspective
93 -- 101Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières. Making information flow explicit in HiStar
102 -- 0William T. Freeman. A perfect 'match': technical perspective
103 -- 110Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein. The PatchMatch randomized matching algorithm for image manipulation
120 -- 0Peter Winkler. Puzzled
121 -- 130Hector Garcia-Molina, Georgia Koutrika, Aditya G. Parameswaran. Information seeking: convergence of search, recommendations, and advertising

Volume 54, Issue 10

5 -- 6Ronald F. Boisvert, Jack W. Davidson. ACM's copyright policy
7 -- 0. In the Virtual Extension
8 -- 9Daniel Reed, Mark Guzdial. From idea to product: how schools of education can help CS
10 -- 0Scott E. Delman. ACM TechNews now available in the Android Market
11 -- 14Kirk L. Kroeker. Improving brain-computer interfaces
15 -- 16Tom Geller. Seeing is not enough
17 -- 19Samuel Greengard. Living in a digital world
20 -- 0Marina Krakovsky. Success at 16
21 -- 24Michael A. Cusumano. The platform leader's dilemma
25 -- 26George V. Neville-Neil. File-system litter
27 -- 29Carsten Schürmann. Modernizing the Danish democratic process
30 -- 31Phillip G. Armour. Testing: failing to succeed
32 -- 35Dan S. Wallach. Rebooting the CS publication process
36 -- 44Rishiyur S. Nikhil. Abstraction in hardware system design
45 -- 51Erik Meijer. The world according to LINQ
52 -- 57B. Scott Andersen, George Romanski. Verification of safety-critical software
58 -- 65John Arquilla. From blitzkrieg to bitskrieg: the military encounter with computers
66 -- 71Sarah Cohen, James T. Hamilton, Fred Turner. Computational journalism
72 -- 82Jasmin Fisher, David Harel, Thomas A. Henzinger. Biology as reactivity
84 -- 0Charles R. Moore. Power efficiency as the #1 design constraint: technical perspective
85 -- 93Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz. Understanding sources of ineffciency in general-purpose chips
94 -- 0Geoffrey E. Hinton. A better way to learn features: technical perspective
95 -- 103Honglak Lee, Roger Grosse, Rajesh Ranganath, Andrew Y. Ng. Unsupervised learning of hierarchical representations with convolutional deep belief networks
104 -- 0Carlo Tomasi. Visual reconstruction: technical perspective
105 -- 112Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski. Building Rome in a day
120 -- 0Shumeet Baluja. Future tense
121 -- 128Daniel Gayo-Avello. Don't turn social media into another 'Literary Digest' poll
129 -- 137Zhiwei Xu, Guojie Li. Computing for the masses

Volume 54, Issue 1

9 -- 13Wendy Hall. ACM s annual report
14 -- 15Jack Rosenberger, Judy Robertson. Smart career advice; laptops as a classroom distraction
16 -- 0David Roman. Scholarly publishing model needs an update
17 -- 19Gary Anthes. Nonlinear systems made easy
20 -- 22Alex Wright. The touchy subject of haptics
23 -- 24Marina Krakovsky. India's elephantine effort
25 -- 0Jack Rosenberger. EMET prize and other awards
27 -- 29Phillip G. Armour. Don t bring me a good idea
30 -- 32Stefan Bechtold. Google AdWords and European trademark law
33 -- 35Michael A. Cusumano. Reflections on the Toyota debacle
36 -- 38Mark Dermot Ryan. Cloud computing privacy concerns on our doorstep
39 -- 45Guy L. Steele Jr.. An interview with Frances E. Allen
46 -- 53Eben M. Haber, Eser Kandogan, Paul P. Maglio. Collaboration in system administration
61 -- 65Evangelos Kotsovinos. Virtualization: blessing or curse?
66 -- 74Gio Wiederhold. Follow the intellectual property
75 -- 85Uzi Vishkin. Using simple abstraction to reinvent computing for parallelism
86 -- 95Cynthia Dwork. A firm foundation for private data analysis
98 -- 0Dina Katabi. Sora promises lasting impact: technical perspective
99 -- 107Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker. Sora: high-performance software radio using general-purpose multi-core processors
108 -- 0Damon Wischik. Multipath: a new control architecture for the internet: technical perspective
109 -- 116Peter B. Key, Laurent Massoulié, Donald F. Towsley. Path selection and multipath congestion control
128 -- 0Dennis McCafferty. Q&A
129 -- 131Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou. The ephemeral legion: producing an expert cyber-security work force from thin air
132 -- 138Peter Fröhlich, Antti Oulasvirta, Matthias Baldauf, Antti Nurminen. On the move, wirelessly connected to the world
139 -- 144Matthias Häsel. Opensocial: an enabler for social applications on the web