Journal: Communications of the ACM

Volume 56, Issue 9

5 -- 0Moshe Y. Vardi. Has the innovation cup run dry?
7 -- 0Vinton G. Cerf. Freedom and the social contract
8 -- 9. For privacy and security, use public keys everywhere
10 -- 11Michael Stonebraker, Judy Robertson. Big data is 'buzzword du jour;' CS academics 'have the best job'
13 -- 15Chris Edwards. Magnetic diversion for electronic switches
16 -- 19Keith Kirkpatrick. Software-defined networking
20 -- 22Esther Shein. Ephemeral data
24 -- 25Laura DiDio. Remembering Douglas Engelbart
28 -- 30James Grimmelmann. What to do about Google?
31 -- 34Thomas Haigh. Software and souls; programs and packages
35 -- 37Peter J. Denning. The other side of language
38 -- 40Zeljko Obrenovic. Research and practice: the curious case of 'small' researchers-practitioners
41 -- 45Lawrence Snyder. An interview with Hadi Partovi
46 -- 53Maged M. Michael. The balancing act of choosing nonblocking features
54 -- 59Sean Hull. 20 obstacles to scalability
59 -- 54Christoph Lameter. An overview of non-uniform memory access
66 -- 73Steve Benford, Chris Greenhalgh, Gabriella Giannachi, Brendan Walker, Joe Marshall, Tom Rodden. Uncomfortable user experience
74 -- 83Mark Braverman. Computing with real numbers, from Archimedes to Turing and beyond
84 -- 93Michael Fisher, Louise A. Dennis, Matthew P. Webster. Verifying autonomous systems
96 -- 0Pietro Perona. Progress in visual categorization: technical perspective
97 -- 105Pedro F. Felzenszwalb, Ross B. Girshick, David A. McAllester, Deva Ramanan. Visual object detection with deformable part models
110 -- 0Peter Winkler. Puzzled
112 -- 0Leah Hoffmann. Q&A

Volume 56, Issue 8

5 -- 0Moshe Y. Vardi, Victor Vianu. What is a flagship publication?
7 -- 0Vinton G. Cerf. Computer science education - revisited
9 -- 0. Is computing science?
10 -- 11Philip Guo. Teaching programming the way it works outside the classroom
13 -- 15Samuel Greengard. A new approach to information storage
16 -- 18Alex Wright. Patient, heal thyself
19 -- 21Paul Hyman. Software aims to ensure fairness in crowdsourcing projects
22 -- 24Richard Heeks, Andrew Robinson. Ultra-low-cost computing and developing countries
25 -- 28Chrysanthos Dellarocas, Marshall W. van Alstyne. Money models for MOOCs
29 -- 31Eric Byres. The air gap: SCADA's enduring security myth
32 -- 33George V. Neville-Neil. Cherry-picking and the scientific method
34 -- 36Leo Porter, Mark Guzdial, Charlie McDowell, Beth Simon. Success in introductory programming: what works?
37 -- 38Jean-Loup Richet. Overt censorship: a fatal mistake?
40 -- 44Ariel Tseitlin. The antifragile organization
45 -- 51Alex Nicolaou. Best practices on the move: building web apps for mobile devices
52 -- 59Tammy Everts. Rules for mobile performance optimization
60 -- 66Marc Lauritsen. Are we free to code the law?
67 -- 73Jacques Wainer, Michael Eckmann, Siome Goldenstein, Anderson Rocha. How productivity and impact differ across computer science subareas
74 -- 83Josh C. Bongard. Evolutionary robotics
86 -- 0Assaf Naor. Every graph is essentially sparse
87 -- 94Joshua D. Batson, Daniel A. Spielman, Nikhil Srivastava, Shang-Hua Teng. Spectral sparsification of graphs: theory and algorithms
96 -- 0Peter Winkler. Puzzled

Volume 56, Issue 7

5 -- 0Moshe Y. Vardi. The great robotics debate
7 -- 0Vinton G. Cerf. 'But officer, I was only programming at 100 lines per hour!'
8 -- 9. Plenty more hacker motivations
10 -- 11Jason Hong. Ph.D. students must break away from undergraduate mentality
13 -- 16Esther Shein. Keeping computers cool from the inside
17 -- 19Samuel Greengard. All the items fit to print
20 -- 21Neil Savage. Backing creativity
24 -- 26Pamela Samuelson. Statutory damages as a threat to innovation
27 -- 29Christopher S. Tang, Joshua Zimmerman. Information and communication technology for managing supply chain risks
30 -- 32Mari Sako. The business of professionals
33 -- 36Ron Eglash, Juan E. Gilbert, Ellen Foster. Toward culturally responsive computing education
37 -- 39Martin Ford. Could artificial intelligence create an unemployment crisis?
40 -- 49Paul E. McKenney. Structured deferral: synchronization via procrastination
50 -- 61Samy Al-Bahra. Nonblocking algorithms and scalable multicore programming
62 -- 69Mathieu Desnoyers. Proving the correctness of nonblocking data structures
70 -- 77Yang Tang, Di Wang, Jing Bai, Xiaoyan Zhu, Ming Li. Information distance between what I said and what it heard
78 -- 87Ariel D. Procaccia. Cake cutting: not just child's play
88 -- 96Madhav V. Marathe, Anil Kumar S. Vullikanti. Computational epidemiology
100 -- 0Peter Wonka. A fresh approach to vector graphics: technical perspective
101 -- 108Alexandrina Orzan, Adrien Bousseau, Pascal Barla, Holger Winnemöller, Joëlle Thollot, David Salesin. Diffusion curves: a vector representation for smooth-shaded images
112 -- 0Mark McClelland. Future tense

Volume 56, Issue 6

5 -- 0Erik R. Altman. SGB fortifies global SIG community
7 -- 0Vinton G. Cerf. Honoring our best
8 -- 9. How to claim your fair share in academic publishing
10 -- 11Jason Hong, Judy Robertson. Computer security needs refocus, and be nice about it
13 -- 15Gary Anthes. Deep learning comes of age
16 -- 17Gregory Mone. The future is flexible displays
18 -- 20Paul Hyman. Augmented-reality glasses bring cloud security into sharp focus
22 -- 24Neil Savage. Proofs probable
25 -- 0. ACM honors computing innovators
28 -- 30Stas Filshtinskiy. Cybercrime, cyberweapons, cyber wars: is there too much of it in the air?
31 -- 32Phillip G. Armour. What is a "good" estimate?: whether forecasting is valuable
33 -- 34George V. Neville-Neil. Swamped by automation
35 -- 37Peter J. Denning. Thumb numbers
38 -- 42Nancy G. Leveson. Learning from the past to face the risks of today
43 -- 46Stephen B. Wicker, Stephanie M. Santoso. Access to the internet is a human right
48 -- 53Dan Geer. Resolved: the internet is no place for critical infrastructure
54 -- 62Bill Hsu, Marc Sosnick-Pérez. Real-time GPU audio
63 -- 70Mark Cavage. There is no getting around it: you are building a distributed system
72 -- 82Ognjen Scekic, Hong Linh Truong, Schahram Dustdar. Incentives and rewarding in social computing
83 -- 91Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim A. Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra. Consequence analysis of complex events on critical U.S. infrastructure
92 -- 101Deepak Agarwal, Bee-Chung Chen, Pradheep Elango, Raghu Ramakrishnan. Content recommendation on web portals
104 -- 0Yao-Wen Chang. Circuit placement challenges: technical perspective
105 -- 113Myung-Chul Kim, DongJin Lee, Igor L. Markov. SimPL: an algorithm for placing VLSI circuits
117 -- 0Peter Winkler. Puzzled answers
120 -- 0Leah Hoffmann. Q&A

Volume 56, Issue 5

5 -- 0Moshe Y. Vardi. Fricative computing
7 -- 0Vinton G. Cerf. ACM president's salary increased by 300%!
9 -- 0Scott E. Delman. Communications
12 -- 13. Try old boys security network
14 -- 15Jeannette M. Wing, Mark Guzdial. Encouraging IT usage in future healthcare, quality in CS education
17 -- 19Alex Wright. Proving grounds
20 -- 22Samuel Greengard. Vanishing electronics
23 -- 25Paul Hyman. 'Small data' enabled prediction of Obama's win, say economists
26 -- 28P. Bernt Hugenholtz. Fair use in Europe
29 -- 31David Anderson. Max Newman: forgotten man of early British computing
32 -- 34Mark Guzdial. Human-centered computing: a new degree for Licklider's world
35 -- 38Peter J. Denning. The science in computer science
39 -- 42Michael J. Flynn, Oskar Mencer, Veljko M. Milutinovic, Goran Rakocevic, Per Stenström, Roman Trobec, Mateo Valero. Moving from petaflops to petadata
44 -- 54Latanya Sweeney. Discrimination in online ad delivery
55 -- 63Peter Bailis, Ali Ghodsi. Eventual consistency today: limitations, extensions, and beyond
64 -- 67Adam H. Leventhal. A file system all its own
68 -- 75Mithun George Jacob, Yu-Ting Li, George A. Akingba, Juan P. Wachs. Collaboration with a robotic scrub nurse
76 -- 82Chris F. Kemerer, Charles Zhechao Liu, Michael D. Smith. Strategies for tomorrow's 'winners-take-some' digital goods markets
84 -- 90Iris A. Junglas, Jeanne Harris. The promise of consumer technologies in emerging markets
92 -- 0Matt Pharr. The ray-tracing engine that could: technical perspective
93 -- 101Steven G. Parker, Heiko Friedrich, David P. Luebke, R. Keith Morley, James Bigler, Jared Hoberock, David K. McAllister, Austin Robison, Andreas Dietrich, Greg Humphreys, Morgan McGuire, Martin Stich. GPU ray tracing
104 -- 0Peter Winkler. Puzzled

Volume 56, Issue 4

5 -- 0Stephen R. Bourne, George Neville-Neil. Developing tools and resources for those in practice
7 -- 0Vinton G. Cerf. Open access
9 -- 0Scott E. Delman. An open access partnership
10 -- 11. A robot's roots
12 -- 13Mark Guzdial, Daniel Reed. Securing the future of computer science; reconsidering analog computing
15 -- 17Nidhi Subbaraman. Artificial connections
18 -- 20Gary Anthes. Inexact design: beyond fault-tolerance
21 -- 23Leah Hoffmann. Looking back at big data
26 -- 28Michael A. Cusumano. Are the costs of 'free' too high in online education?
30 -- 32Michael L. Best. Peacebuilding in a networked world
33 -- 34George V. Neville-Neil. Code abuse
35 -- 37Nir Kshetri. Cyber-victimization and cybersecurity in China
38 -- 40Robert Rosenberger. The problem with hands-free dashboard cellphones
42 -- 48Nicholas C. Zakas. The evolution of web development for mobile devices
49 -- 55Patrick Meenan. How fast is your website?
56 -- 63David F. Bacon, Rodric M. Rabbah, Sunil Shukla. FPGA programming for the masses
64 -- 74Zhengchuan Xu, Qing Hu, Chenghong Zhang. Why computer talents become computer hackers
75 -- 81Nishant Thorat, Arvind Raghavendran, Nigel Groves. Offline management in virtualized environments
82 -- 89Ronen Feldman. Techniques and applications for sentiment analysis
91 -- 0David A. Forsyth. Understanding pictures of rooms: technical perspective
92 -- 99Huayan Wang, Stephen Gould, Daphne Koller. Discriminative learning with latent variables for cluttered indoor scene understanding
104 -- 0Paul Di Filippo. Future tense

Volume 56, Issue 3

5 -- 0Moshe Y. Vardi. To boycott or not to boycott
7 -- 0Vinton G. Cerf. A revolution in India
8 -- 9. No place for old educational flaws in new online media
10 -- 11Jason Hong, Daniel Reed. Passwords getting painful, computing still blissful
13 -- 15Neil Savage. Decoding dementia
16 -- 17Gregory Mone. Rise of the swarm
18 -- 20Paul Hyman. Cybercrime: it's serious, but exactly how serious?
21 -- 0. ACM fellows inducted
24 -- 26Pamela Samuelson. A copyright challenge to resales of digital music
27 -- 29Denice Ward Hood, Stafford Hood, Dominica McBride. Academic careers workshop for underrepresented groups
30 -- 32Peter J. Denning. Moods, wicked problems, and learning
33 -- 34Rachelle Hollander. Ethics viewpoints efficacies
35 -- 37Jeff Johnson. Can computer professionals and digital technology engineers help reduce gun violence?
38 -- 39Mikkel Thorup. Funding successful research
40 -- 49Arun Kumar, Feng Niu, Christopher Ré. Hazy: making it easier to build and maintain big-data analytics
50 -- 55Brian Beckman, Erik Meijer. The story of the teapot in DHTML
56 -- 61Kate Matsudaira. Making the mobile web faster
62 -- 70Edwin Olson, Johannes H. Strom, Robert Goeddel, Ryan D. Morton, Pradeep Ranganathan, Andrew Richardson. Exploration and mapping with autonomous robot teams
71 -- 79Nafaâ Jabeur, Sherali Zeadally, Biju Sayed. Mobile social networking applications
80 -- 88Fedor V. Fomin, Petteri Kaski. Exact exponential algorithms
90 -- 0David Oran. Video quality assessment in the age of internet video: technical perspective
91 -- 99Florin Dobrian, Asad Awan, Dilip Antony Joseph, Aditya Ganjam, Jibin Zhan, Vyas Sekar, Ion Stoica, Hui Zhang 0001. Understanding the impact of video quality on user engagement
102 -- 0Peter Winkler. Puzzled
104 -- 0Leah Hoffmann. Q&A

Volume 56, Issue 2

5 -- 0Ronald F. Boisvert, Jack W. Davidson. Positioning ACM for an open access future
7 -- 0Vinton G. Cerf. Growing the ACM family
8 -- 9Bertrand Meyer. When reviews do more than sting
11 -- 13Neil Savage. Life in simulation
14 -- 16Alex Wright. Revving the rover
17 -- 19Samuel Greengard. A new model for healthcare
20 -- 22Eben Moglen. The tangled web we have woven
23 -- 25Peter G. Neumann. More sight on foresight
26 -- 27George V. Neville-Neil. Divided by division
28 -- 30Steve Cooper, Mehran Sahami. Reflections on Stanford's MOOCs
31 -- 32Ana Aizcorbe, Samuel Kortum, Unni Pillai. The value of microprocessor designs
33 -- 36Ali Sunyaev, Stephan Schneider. Cloud services certification
37 -- 39Anita Jones. The explosive growth of postdocs in computer science
40 -- 44William R. Cheswick. Rethinking passwords
45 -- 51Brendan Gregg. Thinking methodically about performance
52 -- 63Robert N. M. Watson. A decade of OS access-control extensibility
64 -- 73Ari Juels, Alina Oprea. New approaches to security and availability for cloud data
74 -- 80Jeffrey Dean, Luiz André Barroso. The tail at scale
82 -- 90Cristian Cadar, Koushik Sen. Symbolic execution for software testing: three decades later
92 -- 0Pradip Bose. Is dark silicon real?: technical perspective
93 -- 102Hadi Esmaeilzadeh, Emily R. Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger. Power challenges may end the multicore era
112 -- 0Peter Winkler. Puzzled

Volume 56, Issue 12

5 -- 0M. Tamer Özsu. ACM books to launch
7 -- 0Vinton G. Cerf. Software at scale
8 -- 9. Free the digital natives
10 -- 11Mark Guzdial, Valerie Barr. The lure of live coding; the attraction of small data
13 -- 15Chris Edwards. Life points the way to a new template for chipmaking
16 -- 18Samuel Greengard. Seeing the big picture
19 -- 21Karen A. Frenkel. CS enrollments rise ... at the expense of the humanities?
22 -- 25Richard Heeks. Information technology impact sourcing
26 -- 28David Anderson. Patrick Blackett: providing 'white heat' to the British computing revolution
29 -- 31Peter J. Denning. Design thinking
32 -- 33George V. Neville-Neil. A lesson in resource management
34 -- 37Wendy M. DuBow, Ruthe Farmer, Zhen Wu, Malia Fredrickson. Bringing young women into computing through the NCWIT Aspirations in Computing program
38 -- 40Armando Fox. From MOOCs to SPOCs
42 -- 49Ilya Grigorik. Making the web faster with HTTP 2.0
50 -- 56David Chisnall. The challenge of cross-language interoperability
57 -- 62Fred Chow. Intermediate representation
64 -- 73Vasant Dhar. Data science and prediction
74 -- 80Jonathan Lazar, Harry Hochheiser. Legal aspects of interface accessibility in the U.S
82 -- 89Doug Terry. Replicated data consistency explained through baseball
90 -- 98Gareth Tyson, Nishanth Sastry, Ruben Cuevas, Ivica Rimac, Andreas Mauthe. A survey of mobility in information-centric networks
100 -- 0Eliot Moss. The cleanest garbage collection: technical perspective
101 -- 109David F. Bacon, Perry Cheng, Sunil Shukla. And then there were none: a stall-free real-time garbage collector for reconfigurable hardware
126 -- 0Peter Winkler. Puzzled: Solutions and sources
128 -- 0Leah Hoffmann. Q&A: Securing the Risk

Volume 56, Issue 11

5 -- 0Moshe Y. Vardi. The end of the American network
7 -- 0Vinton G. Cerf. Heidelberg Laureate Forum
8 -- 9. Microprocessor architectures follow markets and silicon
10 -- 11Jason Hong. Considering privacy issues in the context of Google glass
12 -- 14Gregory Mone. Future-proof encryption
15 -- 16Neil Savage. More than a mouse
17 -- 19Keith Kirkpatrick. Legal issues with robots
20 -- 22Deirdre K. Mulligan, Kenneth A. Bamberger. What regulators can do to advance privacy through design
23 -- 25Pamela Samuelson. Is software patentable?
26 -- 28Katina Michael, M. G. Michael. No limits to watching?
29 -- 31Marshall W. van Alstyne. Why not immortality?
32 -- 33Cameron Wilson. Making computer science count
34 -- 36Tobias Langlotz, Jens Grubert, Raphael Grasset. Augmented reality browsers: essential products or only gadgets?
38 -- 43James Roche. Adopting DevOps practices in quality assurance
44 -- 52Neil Mitchell. Leaking space
53 -- 59Ivar Jacobson, Ian Spence, Pan Wei Ng. Agile and SEMAT: perfect partners
60 -- 67Neil A. M. Maiden, Sonali D'Souza, Sara Jones, Lars Müller, Lucia Pannese, Kristine Pitts, Michael Prilla, Kevin Pudney, Malcolm Rose, Ian Turner, Konstantinos Zachos. Computing technologies for reflective, creative care of people with dementia
68 -- 75Evgeny A. Kaganer, Gabriel A. Giordano, Sebastien Brion, Marco Tortoriello. Media tablets for mobile learning
76 -- 85Philip C. Treleaven, Michal Galas, Vidhi Lalchand. Algorithmic trading review
86 -- 93Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Maréchal. Adaptation of audiovisual contents and their delivery means
96 -- 0Shekhar Borkar. Centip3De demonstrates more than Moore...: technical perspective
97 -- 104Ronald G. Dreslinski, David Fick, Bharan Giridhar, Gyouho Kim, Sangwon Seo, Matthew Fojtik, Sudhir Satpathy, Yoonmyung Lee, Daeyeon Kim, Nurrachman Liu, Michael Wieckowski, Gregory K. Chen, Dennis Sylvester, David Blaauw, Trevor N. Mudge. Centip3De: a many-core prototype exploring 3D integration and near-threshold computing
120 -- 0Peter Winkler. Puzzled: Coin flipping

Volume 56, Issue 10

5 -- 0John White. On the future of ACM
7 -- 0Vinton G. Cerf. Revisiting the tragedy of the commons
8 -- 9. Deep accountability, beyond even liability
12 -- 13Philip Guo. Helping scientists, engineers to work up to 100 times faster
15 -- 17Alex Wright. Tuning in to graphene
18 -- 20Tom Geller. Making the internet safe for gadgets
21 -- 23Paul Hyman. Software helps linguists reconstruct, decipher ancient languages
24 -- 25Sarah Underwood. The Alan Turing Year leaves a rich legacy
26 -- 29Michael A. Cusumano. Evaluating a startup venture
30 -- 32Phillip G. Armour. When faster is slower
33 -- 34George V. Neville-Neil. The naming of hosts is a difficult matter
35 -- 37Kevin Fu, James Blum. Controlling for cybersecurity risks of medical device software
38 -- 40David H. Ackley. Beyond efficiency
42 -- 49Jacob Loveless. Barbarians at the gateways
50 -- 56Jacob Loveless, Sasha Stoikov, Rolf Waeber. Online algorithms in high-frequency trading
57 -- 64Stephen D. Strowes. Passively measuring TCP round-trip times
66 -- 73Floris Bex, John Lawrence, Mark Snaith, Chris Reed. Implementing the argument web
74 -- 83Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki. Trends in computer science research
84 -- 93Rodney Van Meter, Clare Horsman. A blueprint for building a quantum computer
96 -- 0Rajeev Alur. Can we verify cyber-physical systems?: technical perspective
97 -- 104Matthias Althoff, Akshay Rajhans, Bruce H. Krogh, Soner Yaldiz, Xin Li, Larry T. Pileggi. Formal verification of phase-locked loops using reachability analysis and continuization
112 -- 0Brian Clegg. Future tense

Volume 56, Issue 1

5 -- 0Moshe Y. Vardi. Who begat computing?
7 -- 0Vinton G. Cerf. What's a robot?
8 -- 9. Computer science is not a science
11 -- 15Alain Chesnais. ACM's annual report
16 -- 17Daniel Reed. Lost in translation
19 -- 21Neil Savage. Stopping the leaks
22 -- 24Gregory Mone. Beyond Hadoop
25 -- 27Marina Krakovsky. Just the facts
28 -- 31Michael A. Cusumano. The Apple-Samsung lawsuits
32 -- 33Phillip G. Armour. ...and why things are 90% complete.
34 -- 36Deven Desai. st century
37 -- 40Thomas Haigh. Five lessons from really good history
41 -- 43Salman Khan. What college could be like
44 -- 49Jonathan Grudin, Gloria Mark, John Riedl. Conference-journal hybrids
50 -- 59Pat Helland. Condos and clouds
60 -- 67. Browser security: appearances can be deceiving
68 -- 72Jeremiah Grossman. The web won't be safe or secure until we break it
74 -- 82Richard A. Becker, Ramón Cáceres, Karrie Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky. Human mobility characterization from cellular network data
83 -- 93Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese. Abstractions for genomics
94 -- 103Tamara Denning, Tadayoshi Kohno, Henry M. Levy. Computer security and the modern home
105 -- 0Doug DeCarlo, Matthew Stone. Visualization, understanding, and design: technical perspective
106 -- 114Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala. Illustrating how mechanical assemblies work
115 -- 0James M. Rehg. Finding people in depth: technical perspective
116 -- 124Jamie Shotton, Toby Sharp, Alex Kipman, Andrew W. Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore. Real-time human pose recognition in parts from single depth images
136 -- 0Rudy Rucker. Future tense