Journal: Communications of the ACM

Volume 57, Issue 9

5 -- 0Moshe Y. Vardi. Would Turing have passed the Turing Test?
7 -- 0Vinton G. Cerf. Augmented reality
8 -- 9. Provenance of British computing
10 -- 11Philip Guo. Refining students' coding and reviewing skills
12 -- 14Samuel Greengard. Weathering a new era of big data
15 -- 17Neil Savage. The power of memory
18 -- 20Gregory Mone. The new digital medicine
21 -- 23Stefan Bechtold, Adrian Perrig. Accountability in future internet architectures
24 -- 28Thomas Haigh. We have never been digital
29 -- 31Peter J. Denning. Learning for the new digital age
32 -- 34Luke Muehlhauser, Bill Hibbard. Exploratory engineering in artificial intelligence
35 -- 37John Leslie King, Paul F. Uhlir. Soft infrastructure challenges to scientific knowledge discovery
38 -- 47Christoph Kern. Securing the tangled web
48 -- 55Peter Bailis, Kyle Kingsbury. The network is reliable
56 -- 63Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Ho, Daniel T. Seaton, Isaac Chuang. Privacy, anonymity, and big data in the social sciences
64 -- 71Cormac Herley. Security, cybercrime, and scale
72 -- 80Michail Tsikerdekis, Sherali Zeadally. Online deception in social media
82 -- 89Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre. Optimality in robot motion: optimal versus optimized motion
92 -- 0Alexei A. Efros. Portraiture in the age of big data: technical perspective
93 -- 99Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz. Moving portraits
102 -- 0Peter Winkler. Puzzled: Solutions and sources
104 -- 0Marina Krakovsky. Q&A: Finding themes

Volume 57, Issue 8

5 -- 0Moshe Y. Vardi. Openism, IPism, fundamentalism, and pragmatism
7 -- 0Vinton G. Cerf. ACM and the professional programmer
8 -- 9Mark Guzdial. Why the U.S. is not ready for mandatory CS education
11 -- 13Chris Edwards. Researchers probe security through obscurity
14 -- 16Keith Kirkpatrick. Surgical robots deliver care more precisely
17 -- 19Erica Klarreich. Hello, my name is..
20 -- 23Seda F. Gürses. Can you engineer privacy?
24 -- 28Uri Wilensky, Corey E. Brady, Michael S. Horn. Fostering computational literacy in science classrooms
29 -- 30Chris Coward. Private then shared?
31 -- 32George V. Neville-Neil. Forked over
33 -- 35Frank Levy, Richard J. Murnane. Researching the robot revolution
36 -- 38Jaime Teevan, Kevyn Collins-Thompson, Ryen W. White, Susan T. Dumais. Slow search
40 -- 48Mark Cavage, David Pacheco. Bringing arbitrary compute to authoritative data
49 -- 51Poul-Henning Kamp. Quality software costs money - heartbleed was free
52 -- 58Michael J. Lutz, J. Fernando Naveda, James R. Vallino. Undergraduate software engineering
60 -- 69Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes. Reshaping terrorist networks
70 -- 80Sumit Gulwani. Example-based learning in computer-aided STEM education
82 -- 89Andrew V. Goldberg, Robert Endre Tarjan. Efficient maximum flow algorithms
92 -- 0Philip A. Bernstein. Getting consensus for data replication: technical perspective
93 -- 102Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica. Quantifying eventual consistency with PBS
104 -- 0Peter Winkler. Puzzled: Paths and Matchings

Volume 57, Issue 7

5 -- 0Vicki L. Hanson, Reyyan Ayfer, Bev Bachmayer. European women in computing
7 -- 0Vinton G. Cerf. Responsible programming
8 -- 9. Snowden weak link: copying to USB device
10 -- 11Mark Guzdial, Philip Guo. The difficulty of teaching programming languages, and the benefits of hands-on learning
13 -- 15Alex Wright. Big data meets big science
16 -- 18Logan Kugler. Robots compete in disaster scenarios
19 -- 21Esther Shein. Holographic projection systems provide eternal life
22 -- 24Pamela Samuelson. Watching TV on internet-connected devices
25 -- 27Chuck Huff, Almut Furchert. Toward a pedagogy of ethical practice
28 -- 30Mari Sako. The business of the state
31 -- 33Jane Margolis, Joanna Goode, Gail Chapman, Jean J. Ryoo. That classroom 'magic'
34 -- 37Batya Friedman. Structural challenges and the need to adapt
38 -- 40Phillip A. Laplante. Licensing professional software engineers: seize the opportunity
42 -- 49Thomas Wadlow. Who must you trust?
50 -- 57Michael Donat, Jafar Husain, Terry Coatta. Automated QA testing at electronic arts
58 -- 64Mike Bland. Finding more than one worm in the apple
66 -- 75Matthew Faulkner, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian J. Bunn, Richard Guy, Annie H. Liu, Michael Olson, MingHei Cheng, Andreas Krause. Community sense and response systems: your phone as quake detector
76 -- 84Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir. The rise of RaaS: the resource-as-a-service cloud
86 -- 94H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi. Big data and its technical challenges
96 -- 0Konstantina Papagiannaki. The power of joint multiuser beamforming: technical perspective
97 -- 106Hariharan Rahul, Swarun Kumar, Dina Katabi. JMB: scaling wireless capacity with user demands
112 -- 0Geoffrey A. Landis. Future tense

Volume 57, Issue 6

5 -- 0Mehran Sahami, Steve Roach. Computer science curricula 2013 released
7 -- 0Vinton G. Cerf. The house elves of ACM
9 -- 0. Efficient code to counter dying Moore's Law
10 -- 11Daniel Reed, Chris Stephenson. First impressions, unexpected benefits
13 -- 15Don Monroe. Neuromorphic computing gets ready for the (really) big time
16 -- 18Neil Savage. Time for a change
19 -- 21. Visualizations make big data meaningful
22 -- 23Neil Savage. General agreement
24 -- 28Ross J. Anderson, Steven J. Murdoch. EMV: why payment systems fail
29 -- 30Phillip G. Armour. Owning and using
31 -- 33Dinei Florêncio, Cormac Herley, Adam Shostack. FUD: a plea for intolerance
34 -- 36Peter J. Denning. Avalanches are coming
37 -- 38George V. Neville-Neil. The logic of logging
39 -- 41Charles K. Davis. Beyond data and analysis
42 -- 49Andy Gill. Domain-specific languages and code synthesis using Haskell
50 -- 55Erik Meijer. The curse of the excluded middle
56 -- 63Bo Joel Svensson, Mary Sheeran, Ryan R. Newton. Design exploration through code-generating DSLs
64 -- 73Christos Siaterlis, Béla Genge. Cyber-physical testbeds
74 -- 81Weiguo Fan, Michael D. Gordon. The power of social media analytics
82 -- 87Daniela Rosner, Marco Roccetti, Gustavo Marfia. The digitization of cultural practices
88 -- 98Peter M. Musial, Nicolas C. Nicolaou, Alexander A. Shvartsman. Implementing distributed shared memory for dynamic networks
100 -- 0Michiel van de Panne. Motion fields for interactive character animation: technical perspective
101 -- 108Yongjoon Lee, Kevin Wampler, Gilbert Bernstein, Jovan Popovic, Zoran Popovic. Motion fields for interactive character locomotion
110 -- 0Peter Winkler. Puzzled: Solutions and sources
112 -- 0Leah Hoffmann. Q&A: Divide and conquer

Volume 57, Issue 5

5 -- 0Moshe Y. Vardi. Moore's law and the sand-heap paradox
7 -- 0Vinton G. Cerf. Sometimes it takes some time!
8 -- 0. Know your steganographic enemy
9 -- 17. ACM's 2014 general election: please take this opportunity to vote
18 -- 19Judy Robertson. Rethinking how to teach programming to newcomers
21 -- 23Samuel Greengard. How computers are changing biology
24 -- 26Tom Geller. The forever disc
27 -- 29Keith Kirkpatrick. Technology confounds the courts
30 -- 32Marshall W. van Alstyne. Why Bitcoin has value
33 -- 34Ben Depoorter. What happened to video game piracy?
35 -- 38David Anderson. Tom Kilburn: a tale of five computers
39 -- 41Steve Cooper, Shuchi Grover, Beth Simon. Building a virtual community of practice for K-12 CS teachers
42 -- 43Ruzena Bajcsy. Robots are coming
44 -- 51Bob Toxen. The NSA and Snowden: securing the all-seeing eye
52 -- 60Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Selter, Andy Hopper. A primer on provenance
61 -- 68Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen. Don't settle for eventual consistency
70 -- 79Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield. Cloud security: a gathering storm
80 -- 87Shimeon Pass, Boaz Ronen. Reducing the software value gap
88 -- 96Manlu Liu, Sean Hansen, Qiang Tu. The community source approach to software development and the Kuali experience
98 -- 107Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu. NP-complete problems
109 -- 0Ari Juels, Bonnie Wong. The interplay of neuroscience and cryptography: technical perspective
110 -- 118Hristo Bojinov, Daniel Sanchez, Paul J. Reber, Dan Boneh, Patrick Lincoln. Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks
120 -- 0Peter Winkler. Puzzled: A Sort, of Sorts

Volume 57, Issue 4

5 -- 0Alfred V. Aho, Georg Gottlob. Communications' editorial transformation
7 -- 0Vinton G. Cerf. The internet governance ecosystem
9 -- 0. Code that missed Mars
10 -- 11Mark Guzdial, Daniel Reed. Eyes forward
13 -- 15Chris Edwards. Using patient data for personalized cancer treatments
16 -- 19Paul Hyman. Speech-to-speech translations stutter, but researchers see mellifluous future
20 -- 21Gregory Mone. New models in cosmetics replacing animal testing
24 -- 26Michael A. Cusumano. MOOCs revisited, with some policy suggestions
27 -- 29Michael L. Best. Thinking outside the continent
30 -- 31George V. Neville-Neil. This is the foo field
32 -- 34Deborah Estrin. Small data, where n = me
35 -- 39Uzi Vishkin. Is multicore hardware for general-purpose parallel processing broken?
40 -- 43Paul Vixie. Rate-limiting state
44 -- 50Ivar Jacobson, Pan Wei Ng, Ian Spence, Paul McMahon. Major-league SEMAT: why should an executive care?
51 -- 57Christoph Paasch, Olivier Bonaventure. Multipath TCP
58 -- 65Daniel T. Seaton, Yoav Bergner, Isaac Chuang, Piotr Mitros, David E. Pritchard. Who does what in a massive open online course?
66 -- 75Jeremy Avigad, John Harrison. Formally verified mathematics
76 -- 86Martin Odersky, Tiark Rompf. Unifying functional and object-oriented programming with Scala
88 -- 96Franziska Roesner, Tadayoshi Kohno, David Molnar. Security and privacy for augmented reality systems
98 -- 0Joe Warren. A 'reasonable' solution to deformation methods: technical perspective
99 -- 106Alec Jacobson, Ilya Baran, Jovan Popovic, Olga Sorkine-Hornung. Bounded biharmonic weights for real-time deformation
112 -- 0Ken MacLeod. Future Tense: Re: Search

Volume 57, Issue 3

5 -- 0Moshe Y. Vardi. Boolean satisfiability: theory and engineering
7 -- 0Vinton G. Cerf. What if it's us?
9 -- 0. Develop research culture in the Arab Middle East
10 -- 11Kate Matsudaira. Capturing and structuring data mined from the web
12 -- 14Erica Klarreich. Reading brains
15 -- 17Keith Kirkpatrick. World without wires
18 -- 19Neil Savage. Playing at health
20 -- 22Pamela Samuelson. Mass digitization as fair use
23 -- 25Arvind Narayanan, Shannon Vallor. Why software engineering courses should include ethics coverage
26 -- 29Peter J. Denning. 'Surfing toward the future'
30 -- 32Richard E. Ladner. The impact of the United Nations convention on the rights of persons with disabilities
33 -- 36David Patterson. How to build a bad research center
38 -- 44Wojciech M. Golab, Muntasir Raihan Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li. Eventually consistent: not what you were expecting?
45 -- 51Robert F. Sproull, Jim Waldo. The API performance contract
52 -- 56Andi Kleen. Scaling existing lock-based applications with lock elision
58 -- 69Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu. Making parallel programs reliable with stable multithreading
70 -- 77Christine Alvarado, Eugene Judson. Using targeted conferences to recruit women into computer science
78 -- 85Gang-hoon Kim, Silvana Trimi, Ji-Hyong Chung. Big-data applications in the government sector
86 -- 95Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski. Trends in steganography
98 -- 0Dan Wallach. Smartphone security 'taint' what it used to be: technical perspective
99 -- 106William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol Sheth. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones
109 -- 0Peter Winkler. Puzzled: Solutions and sources
112 -- 0Leah Hoffmann. Q&A: RISC and reward

Volume 57, Issue 2

5 -- 0Andrew D. McGettrick. Education, always
7 -- 0Vinton G. Cerf. Cognitive implants
9 -- 0. Contribute more than algorithmic speculation
10 -- 11Philip Guo. Clarifying human-computer interaction
13 -- 15Don Monroe. A new type of mathematics?
16 -- 18Esther Shein. everybody learn to code?
19 -- 21Samuel Greengard. Computational photography comes into focus
22 -- 0. ACM fellows inducted
24 -- 27Diana L. Burley, Jon Eisenberg, Seymour E. Goodman. Would cybersecurity professionalization help address the cybersecurity crisis?
28 -- 30Tim Bell. Establishing a nationwide CS curriculum in New Zealand high schools
31 -- 35William Young, Nancy G. Leveson. An integrated approach to safety and security based on systems theory
36 -- 37George V. Neville-Neil. Bugs and bragging rights
38 -- 39Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu. Digital platforms: when is participation valuable?
40 -- 42Stephen J. Andriole. Ready technology
44 -- 51Kiran Prasad, Kelly Norton, Terry Coatta. Node at LinkedIn: the pursuit of thinner, lighter, faster
52 -- 54Poul-Henning Kamp. Center wheel for success
55 -- 62Zachary Hensley, Jibonananda Sanyal, Joshua R. New. Provenance in sensor data management
64 -- 73Gerard J. Holzmann. Mars code
74 -- 84Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley. Automatic exploit generation
85 -- 93Silvio Micali, Michael O. Rabin. Cryptography miracles, secure auctions, matching problem verification
94 -- 103Reinhard Wilhelm, Daniel Grund. Computation takes time, but how much?
106 -- 0Michael W. Mahoney. A new spin on an old algorithm: technical perspective
107 -- 114Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz. Communication costs of Strassen's matrix multiplication
120 -- 0Peter Winkler. Puzzled: Lowest Number Wins

Volume 57, Issue 12

5 -- 0Bobby Schnabel, John White. Pathways to computing careers
7 -- 0Vinton G. Cerf. Does innovation create or destroy jobs?
8 -- 9. On the significance of Turing's test
10 -- 11Mark Guzdial. Meeting student and teacher needs in computing education
12 -- 14Chris Edwards. Decoding the language of human movement
15 -- 16Gregory Mone. Intelligent living
17 -- 19Keith Kirkpatrick. Sensors for seniors
20 -- 0. ACM's Turing Award prize raised to $1 million
21 -- 23Michael L. Best. The internet that Facebook built
24 -- 27Peter J. Denning. The whole professional
28 -- 30Telle Whitney, Elizabeth Ames. Innovation and inclusion
31 -- 32George V. Neville-Neil. Port squatting
33 -- 36Martin Naedele, Rick Kazman, Yuanfang Cai. Making the case for a "manufacturing execution system" for software development
38 -- 43Erik Meijer, Vikram Kapoor. The responsive enterprise: embracing the hacker way
44 -- 48David Chisnall. No such thing as a general-purpose processor
49 -- 54Ivar Jacobson, Ed Seidewitz. A new software engineering
56 -- 67Stacy Marsella, Jonathan Gratch. Computationally modeling human emotion
68 -- 79Mark Silberstein, Bryan Ford, Emmett Witchel. GPUfs: the case for operating system services on GPUs
80 -- 88Nicholas R. Jennings, Luc Moreau, David Nicholson, Sarvapali D. Ramchurn, Stephen J. Roberts, Tom Rodden, Alex Rogers. Human-agent collectives
90 -- 0Stephen W. Keckler. Rethinking caches for throughput processors: technical perspective
91 -- 98Timothy G. Rogers, Mike O'Connor, Tor M. Aamodt. Learning your limit: managing massively multithreaded caches through scheduling
120 -- 0Gregory Mone. Q&A: From Esterel to HipHop

Volume 57, Issue 11

5 -- 0Alexander L. Wolf. Dealing with the deep, long-term challenges facing ACM (part I)
7 -- 0Vinton G. Cerf. Heidelberg Laureate Forum II
9 -- 0. Accountability is no excuse for surveillance
10 -- 11Mark Guzdial, Lawrence M. Fisher. Teach the teachers, and contribute to humanity
13 -- 15Gary Anthes. Researchers simplify parallel programming
16 -- 19Esther Shein. Computing what fits
20 -- 23Logan Kugler. Keeping online reviews honest
24 -- 27Arvind Malhotra, Marshall Van Alstyne. The dark side of the sharing economy ... and how to lighten it
28 -- 30Pamela Samuelson. Updates on the intellectual property front
31 -- 33Solon Barocas, Helen Nissenbaum. Big data's end run around procedural privacy protections
34 -- 36Steve Cooper, Shuchi Grover, Mark Guzdial, Beth Simon. A future for computing education research
37 -- 39Susan Landau. Summing up
40 -- 42Mark Klein, Gregorio Convertino. An embarrassment of riches
43 -- 46Terrence August, Robert August, Hyoduk Shin. Designing user incentives for cybersecurity
48 -- 52Ellen Chisa. Evolution of the product manager
53 -- 59Alex Liu. JavaScript and the Netflix user interface
60 -- 66John T. Richards, Jonathan P. Brezin, Calvin Swart, Christine A. Halverson. A decade of progress in parallel programming productivity
68 -- 77Stephen Gould, Xuming He. Scene understanding by labeling pixels
78 -- 84Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti. On Facebook, most ties are weak
86 -- 95Beryl Nelson. The data on diversity
97 -- 0Szymon Rusinkiewicz. The intricate dance of fabric and light: technical perspective
98 -- 105Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita Bala. Building volumetric appearance models of fabric using micro CT imaging
120 -- 0Dennis Shasha. Upstart Puzzles: Proving without Teaching/Teaching without Proving

Volume 57, Issue 10

5 -- 0John White. ACM's challenges and opportunities
7 -- 0Vinton G. Cerf. Unconventional computing
8 -- 9. Responsible programming not a technical issue
10 -- 11John Langford, Mark Guzdial. Finding a research job, and teaching CS in high school
13 -- 15Don Monroe. Still seeking the optical transistor
16 -- 18Neil Savage. Gradual evolution
19 -- 21Nidhi Subbaraman. Museums go high-tech with digital forensics
22 -- 24Michael A. Cusumano. The Bitcoin ecosystem
25 -- 27Peter G. Neumann. Risks and myths of cloud computing and cloud storage
28 -- 29George V. Neville-Neil. Outsourcing responsibility
30 -- 31Phillip G. Armour. Vendor: vidi, vici
32 -- 35Henry Lucas. Disrupting and transforming the university
36 -- 38Edgar G. Daylight. A Turing tale
40 -- 46Ben Laurie. Certificate transparency
47 -- 55Axel Arnbak, Hadi Asghari, Michel van Eeten, Nico Van Eijk. Security collapse in the HTTPS market
56 -- 63Sharon Goldberg. Why is it taking so long to secure internet routing?
64 -- 77Hanan Samet, Jagan Sankaranarayanan, Michael D. Lieberman, Marco D. Adelfio, Brendan C. Fruin, Jack M. Lotkowski, Daniele Panozzo, Jon Sperling, Benjamin E. Teitler. Reading news with maps by exploiting spatial synonyms
78 -- 85Denny Vrandecic, Markus Krötzsch. Wikidata: a free collaborative knowledgebase
86 -- 95Martin Casado, Nate Foster, Arjun Guha. Abstractions for software-defined networks
97 -- 0Bart Preneel. Attacking a problem from the middle: technical perspective
98 -- 105Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Dissection: a new paradigm for solving bicomposite search problems
112 -- 0Daniel H. Wilson. Future tense

Volume 57, Issue 1

5 -- 0Moshe Y. Vardi. Scalable conferences
7 -- 0Vinton G. Cerf. Virtual reality redux
8 -- 0. Nominees for elections and report of the ACM nominating committee
9 -- 14. ACM's FY13 annual report
16 -- 17. U.S. does not control the internet
18 -- 19Mark Guzdial, Joel C. Adams. MOOCs need more work; so do CS graduates
21 -- 23Gary Anthes. French team invents faster code-breaking algorithm
24 -- 26Tom Geller. How do you feel?: your computer knows
27 -- 29Paul Hyman. 'Peace technologies' enable eyewitness reporting when disasters strike
30 -- 32Michael A. Cusumano. The legacy of Steve Ballmer
33 -- 35Christopher S. Yoo. Toward a closer integration of law and computer science
36 -- 41Thomas Haigh. Actually, Turing did not invent the computer
42 -- 43Phillip G. Armour. Estimation is not evil
44 -- 46Doug Terry. Publish now, judge later
48 -- 53Alex E. Bell. The software inferno
54 -- 60Jason Lango. Toward software-defined SLAs
61 -- 69Anil Madhavapeddy, David J. Scott. Unikernels: the rise of the virtual library operating system
70 -- 77Kenton O'Hara, Gerardo Gonzalez, Abigail Sellen, Graeme P. Penney, Andreas Varnavas, Helena M. Mentis, Antonio Criminisi, Robert Corish, Mark Rouncefield, Neville Dastur, Tom Carrell. Touchless interaction in surgery
78 -- 85Jessica Pu Li, Arun Vishwanath, H. Raghav Rao. Retweeting the Fukushima nuclear radiation disaster
86 -- 93Vincent Gramoli, Rachid Guerraoui. Democratizing transactional programming
94 -- 103Xuedong Huang, James Baker, Raj Reddy. A historical perspective of speech recognition
106 -- 0Subramanian S. Iyer. Silicon stress: technical perspective
107 -- 115Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim. TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC
128 -- 0G. Seth Shostak. Future tense