Journal: Communications of the ACM

Volume 59, Issue 9

5 -- 0Moshe Y. Vardi. Academic rankings considered harmful!
7 -- 0Vinton G. Cerf. Keeping the internet open
8 -- 9. Election auditing and verifiability
11 -- 13Chris Edwards. Reconciling quantum physics with math
14 -- 16Samuel Greengard. GPUs reshape computing
17 -- 19Gregory Mone. The edge of the uncanny
20 -- 22Felix Wu. No easy answers in the fight over iPhone decryption
23 -- 25Peter J. Denning. Software quality
26 -- 28Richard E. Ladner, Maya Israel. "For all" in "computer science for all"
29 -- 31Amitai Etzioni, Oren Etzioni. Designing AI systems that obey our laws and values
32 -- 34Ethan Katz-Bassett, Justine Sherry, Te-Yuan Huang, Maria A. Kazandjieva, Craig Partridge, Fahad R. Dogar. Helping conference attendees better understand research presentations
35 -- 37Abraham Bernstein, James A. Hendler, Fridman Natalya Noy. A new look at the semantic web
38 -- 41Peter Bailis, Simon Peter, Justine Sherry. Introducing research for practice
42 -- 43Kate Matsudaira. Bad software architecture is a people problem
44 -- 48Thomas A. Limoncelli. 10 optimizations on linear search
50 -- 57Peter Buneman, Susan B. Davidson, James Frew. Why data citation is a computational problem
58 -- 67Hanan Samet, Sarana Nutanong, Brendan C. Fruin. Dynamic presentation consistency issues in smartphone mapping apps
68 -- 76Percy Liang. Learning executable semantic parsers for natural language understanding
78 -- 0Kyros Kutulakos. Technical Perspective: The dawn of computational light transport
79 -- 86Andreas Velten, Di Wu, Belen Masia, Adrian Jarabo, Christopher Barsi, Chinmaya Joshi, Everett Lawson, Moungi Bawendi, Diego Gutierrez, Ramesh Raskar. Imaging the propagation of light through scenes at picosecond resolution
87 -- 0Andrew W. Moore. Technical Perspective: Jupiter rising
88 -- 97Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Hong Liu, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat. Jupiter rising: a decade of clos topologies and centralized control in Google's datacenter network
104 -- 0Leah Hoffmann. Q&A: Hello, Underworld

Volume 59, Issue 8

5 -- 0Vicki L. Hanson. From the new ACM president
7 -- 0Vinton G. Cerf. Star struck in Lindau
8 -- 9. Future cyberdefenses will defeat cyberattacks on PCs
10 -- 11Jason Hong. Inside the great wall
12 -- 14Marina Krakovsky. Reinforcement renaissance
15 -- 17Gary Anthes. Open source software no longer optional
18 -- 20Logan Kugler. Smartphone apps for social good
22 -- 25Paul Kocher. Computer security is broken: can better hardware help fix it?
26 -- 27Yasmin B. Kafai. From computational thinking to computational participation in K-12 education
28 -- 29George V. Neville-Neil. Chilling the messenger
30 -- 31Ben Shneiderman. Teamwork in computing research
32 -- 37Ivan Beschastnikh, Patty Wang, Yuriy Brun, Michael D. Ernst. Debugging distributed systems
38 -- 41Pat Helland. The singular success of SQL
42 -- 45Tom Killalea. The hidden dividends of microservices
46 -- 57Rida Khatoun, Sherali Zeadally. Smart cities: concepts, architectures, research opportunities
58 -- 63Stephanie Forrest, Melanie Mitchell. Adaptive computation: the multidisciplinary legacy of John H. Holland
64 -- 70Leon A. Kappelman, Mary C. Jones, Vess Johnson, Ephraim R. McLean. Skills for success at different stages of an IT professional's career
72 -- 80Bonnie Berger, Noah M. Daniels. Computational biology in the 21st century: scaling with compressive algorithms
82 -- 0Todd D. Millstein. Technical Perspective: Toward reliable programming for unreliable hardware
83 -- 91Michael Carbin, Sasa Misailovic, Martin C. Rinard. Verifying quantitative reliability for programs that execute on unreliable hardware
92 -- 0Philip Wadler. Technical Perspective: Why didn't I think of that?
93 -- 100Adam Chlipala. Ur/Web: a simple model for programming the web
104 -- 0Ken MacLeod. Future Tense: Gut Feelings

Volume 59, Issue 7

5 -- 0Moshe Y. Vardi. The ritual of academic-unit review
7 -- 0Vinton G. Cerf. The power of big ideas
8 -- 0. Rethinking computational thinking
10 -- 11Jeannette M. Wing, Dan Stanzione. Progress in computational thinking, and expanding the HPC community
12 -- 14Neil Savage. Graph matching in theory and practice
15 -- 16Marina Krakovsky. Accelerating search
17 -- 18Lawrence M. Fisher. Booming enrollments
19 -- 21Keith Kirkpatrick. Legal advice on the smartphone
22 -- 24Pamela Samuelson. Apple v. Samsung and the upcoming design patent wars?
25 -- 30Thomas Haigh. How Charles Bachman invented the DBMS, a foundation of our digital world
31 -- 33Jacob Metcalf. Big data analytics and revision of the common rule
34 -- 37Toby Walsh. Turing's red flag
38 -- 42Yuri Gurevich, Jeannette M. Wing. Inverse privacy
44 -- 51Sachin Date. Should you upload or ship big data to the cloud?
52 -- 57Thomas A. Limoncelli. The small batches principle
58 -- 66Heinrich Hartmann. Statistics for engineers
68 -- 77Abhik Roychoudhury, Satish Chandra. Formula-based software debugging
78 -- 87Josh Levenberg. Why Google stores billions of lines of code in a single repository
88 -- 95Gill Barequet, Günter Rote, Mira Shalah. λ > 4: : an improved lower bound on the growth constant of polyominoes
96 -- 104Emilio Ferrara, Onur Varol, Clayton A. Davis, Filippo Menczer, Alessandro Flammini. The rise of social bots
106 -- 0Henry A. Kautz, Parag Singla. Technical Perspective: Combining logic and probability
107 -- 115Vibhav Gogate, Pedro M. Domingos. Probabilistic theorem proving
116 -- 0Sam Madden. Technical Perspective: Mesa takes data warehousing to new heights
117 -- 125Ashish Gupta, Fan Yang, Jason Govig, Adam Kirsch, Kelvin Chan, Kevin Lai, Shuo Wu, Sandeep Govind Dhoot, Abhilash Rajesh Kumar, Ankur Agiwal, Sanjay Bhansali, Mingsheng Hong, Jamie Cameron, Masood Siddiqi, David Jones, Jeff Shute, Andrey Gubarev, Shivakumar Venkataraman, Divyakant Agrawal. Mesa: a geo-replicated online data warehouse for Google's advertising system
128 -- 0Dennis Shasha. Upstart Puzzles: Chair Games

Volume 59, Issue 6

5 -- 0Alexander L. Wolf. Moving forward
7 -- 0Vinton G. Cerf. Celebrations!
8 -- 9. No backdoor required or expected
10 -- 11John Langford, Mark Guzdial. The solution to AI, what real researchers do, and expectations for CS classrooms
12 -- 14Neil Savage. The key to privacy
15 -- 16Logan Kugler. What happens when big data blunders?
17 -- 19Alex Wright. Reimagining search
20 -- 21Gregory Mone. What's next for digital humanities?
22 -- 25Rebecca T. Mercuri, Peter G. Neumann. The risks of self-auditing systems
26 -- 27George V. Neville-Neil. What are you trying to pull?
28 -- 30Peter J. Denning. How to produce innovations
31 -- 36Derek Chiou. An interview with Yale Patt
37 -- 38Boaz Barak. Computer science should stay young
39 -- 41Jean-Pierre Hubaux, Ari Juels. Privacy is dead, long live privacy
42 -- 44Ankita Mitra. A byte is all we need
45 -- 47Kate Matsudaira. Nine things I didn't know I would learn being an engineer manager
48 -- 57Brendan Gregg. The flame graph
58 -- 61Pat Helland. Standing on distributed shoulders of giants
62 -- 69Brad A. Myers, Jeffrey Stylos. Improving API usability
70 -- 79Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer. Physical key extraction attacks on PCs
80 -- 90Petros Drineas, Michael W. Mahoney. RandNLA: randomized numerical linear algebra
92 -- 0Koushik Sen. Technical Perspective: Veritesting tackles path-explosion problem
93 -- 100Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley. Enhancing symbolic execution with veritesting
101 -- 0Siddharth Suri. Technical Perspective: Computing with the crowd
102 -- 109Daniel W. Barowy, Charlie Curtsinger, Emery D. Berger, Andrew McGregor. AutoMan: a platform for integrating human-based and digital computation
112 -- 0Leah Hoffmann. Q&A: Finding New Directions in Cryptography

Volume 59, Issue 5

5 -- 0Moshe Y. Vardi. The moral imperative of artificial intelligence
7 -- 0Vinton G. Cerf. The IANA transition
8 -- 9. Why All Writs is a trojan horse
11 -- 22. ACM's 2016 general election: please take this opportunity to vote
24 -- 25Mark Guzdial. Bringing computer science to U.S. schools, state by state
26 -- 28Don Monroe. Silicon photonics: ready to go the distance?
29 -- 31Samuel Greengard. Cybersecurity gets smart
32 -- 33Keith Kirkpatrick. Coding as sport
36 -- 38Jason Schultz. The internet of things we don't own?
39 -- 41R. Benjamin Shapiro, Matthew P. Ahrens. Beyond blocks: syntax and semantics
42 -- 43Wen Wen, Chris Forman. Do patent commons and standards-setting organizations help navigate patent thickets?
44 -- 46David P. Anderson. Preserving hybrid objects
47 -- 49Steffen Wendzel. How to increase the security of smart buildings?
50 -- 57Brendan Burns, Brian Grant, David Oppenheimer, Eric Brewer, John Wilkes. Borg, Omega, and Kubernetes
58 -- 60Kate Matsudaira. Delegation as art
61 -- 69Ivar Jacobson. Use-case 2.0
70 -- 77Stephen M. Casner, Edwin L. Hutchins, Don Norman. The challenges of partially automated driving
78 -- 87Andrew Lenharth, Donald Nguyen, Keshav Pingali. Parallel graph analytics
88 -- 98Hanan Samet, Sarana Nutanong, Brendan C. Fruin. Static presentation consistency issues in smartphone mapping apps
100 -- 109Mason Bretan, Gil Weinberg. A survey of robotic musicianship
112 -- 0Boaz Barak. A breakthrough in software obfuscation: technical perspective
113 -- 120Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova 0001, Amit Sahai, Brent Waters. Hiding secrets in software: a cryptographic approach to program obfuscation
121 -- 0Gail C. Murphy. Software is natural: technical perspective
122 -- 131Abram Hindle, Earl T. Barr, Mark Gabel, Zhendong Su, Premkumar T. Devanbu. On the naturalness of software
136 -- 0Louis Friedman. Future tense

Volume 59, Issue 4

5 -- 0Moshe Y. Vardi. Are we headed toward another global tech bust?
7 -- 0Vinton G. Cerf, Maggie Johnson. Enrollments explode! but diversity students are leaving..
8 -- 9. Chaos is no catastrophe
10 -- 11Mark Guzdial, John Arquilla. Sampling bias in CS education, and where's the cyber strategy?
13 -- 15Chris Edwards. Automating proofs
16 -- 18Keith Kirkpatrick. Existing technologies can assist the disabled
19 -- 21Gary Anthes. Search engine agendas
22 -- 24Lawrence M. Fisher. Marvin Minsky: 1927-2016
25 -- 27Lawrence M. Fisher. A decade of ACM efforts contribute to computer science for all
28 -- 30Kentaro Toyama. The internet and inequality
31 -- 32George V. Neville-Neil. GNL is not Linux
33 -- 35Mari Sako. The need for corporate diplomacy
36 -- 39Manuel Cebrián, Iyad Rahwan, Alex Pentland. Beyond viral
40 -- 42Poul-Henning Kamp. More encryption means less privacy
43 -- 47Carlos Baquero, Nuno M. Preguiça. Why logical clocks are easy
48 -- 49Thomas A. Limoncelli. How SysAdmins devalue themselves
50 -- 57Palash Bera. How colors in business dashboards affect users' decision making
58 -- 65Mikhail I. Gofman, Sinjini Mitra. Multimodal biometrics for enhanced mobile device security
66 -- 73Alberto Apostolico, Maxime Crochemore, Martin Farach-Colton, Zvi Galil, S. Muthukrishnan. 40 years of suffix trees
75 -- 0David Wagner. Fairness and the coin flip: technical perspective
76 -- 84Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek. Secure multiparty computations on Bitcoin
85 -- 0Emin Gün Sirer. The state (and security) of the Bitcoin economy: technical perspective
86 -- 93Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. A fistful of Bitcoins: characterizing payments among men with no names
96 -- 0Dennis Shasha. Upstart puzzles

Volume 59, Issue 3

5 -- 0Eugene H. Spafford. The strength of encryption
7 -- 0Vinton G. Cerf. Computer science in the curriculum
8 -- 9. ACM moral imperatives vs. lethal autonomous weapons
10 -- 11Valerie Barr. The value of Ada
13 -- 16Gregory Goth. Deep or shallow, NLP is breaking out
17 -- 18Tom Geller. Rich data, poor fields
19 -- 21Neil Savage. When computers stand in the schoolhouse door
22 -- 23. Peter Naur: 1928-2016
24 -- 26Pamela Samuelson. New exemptions to anti-circumvention rules
27 -- 29Jeffrey Johnson. The question of information justice
30 -- 32Peter J. Denning. Fifty years of operating systems
33 -- 34Tiffany Barnes, George K. Thiruvathukal. The need for research in broadening participation
35 -- 37Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculín, Wei Tan, Vijay K. Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch. Riding and thriving on the API hype cycle
38 -- 39H. V. Jagadish. Paper presentation at conferences: time for a reset
40 -- 45David Patterson. An interview with Stanford University president John Hennessy
46 -- 54. A purpose-built global network: Google's move to SDN
55 -- 57Kate Matsudaira. The paradox of autonomy and recognition
58 -- 61Tom Limoncelli. Automation should be like Iron Man, not Ultron
62 -- 69Christian S. Collberg, Todd A. Proebsting. Repeatability in computer systems research
70 -- 78Andrew S. Tanenbaum. Lessons learned from 30 years of MINIX
79 -- 86Antonio De Nicola 0001, Michele Missikoff. A lightweight methodology for rapid ontology engineering
88 -- 96Boaz Barak. Hopes, fears, and software obfuscation
98 -- 0John Regehr. STACKing up undefined behaviors: technical perspective
99 -- 106Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama. A differential approach to undefined behavior detection
107 -- 0David Forsyth. Taming the name game: technical perspective
108 -- 115Vicente Ordonez, Wei Liu, Jia Deng, Yejin Choi, Alexander C. Berg, Tamara L. Berg. Learning to name objects
120 -- 0Leah Hoffmann. Q&A

Volume 59, Issue 2

5 -- 0Moshe Y. Vardi. The moral hazard of complexity-theoretic assumptions
7 -- 0Vinton G. Cerf. Apps and the web
8 -- 9. Expect 'ungoverned actors' to use AI-supported weapons, too
12 -- 13Mark Guzdial. Drumming up support for AP CS principles
15 -- 17Chris Edwards. Self-repair techniques point to robots that design themselves
18 -- 20Logan Kugler. How a supervillain (or a hacker in his basement) could destroy the internet
21 -- 23Tom Geller. In privacy law, it's the U.S. vs. the world
24 -- 0. ACM inducts fellows
26 -- 28Peter C. Evans, Rahul C. Basole. Revealing the API ecosystem and enterprise strategy via visual analytics
29 -- 31Carl E. Landwehr. Privacy research directions
32 -- 34Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial. Broadening access to computing education state by state
35 -- 36George V. Neville-Neil. Code hoarding
37 -- 39Satish Chandra, Suresh Thummalapenta, Saurabh Sinha. Lessons from the tech transfer trenches
40 -- 42Herbert Lin. Having a conversation about bulk surveillance
44 -- 51Ramanathan V. Guha, Dan Brickley, Steve Macbeth. Schema.org: evolution of structured data on the web
52 -- 55Caitie McCaffrey. The verification of a distributed system
56 -- 62Nicholas Diakopoulos. Accountability in algorithmic decision making
64 -- 73Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li. YFCC100M: the new data in multimedia research
74 -- 83Michael Stonebraker. The land sharks are on the squawk box
84 -- 90J. P. Shim, J. Koh, S. Fister, H. Y. Seo. Phonetic analytics technology and big data: real-world cases
92 -- 99Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom. The Beckman report on database research
102 -- 0Michael Mitzenmacher, Justin Thaler. Technical Perspective: Catching lies (and mistakes) in offloaded computation
103 -- 112Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova 0001. Pinocchio: nearly practical verifiable computation
113 -- 0Sumit Gulwani. Technical Perspective: Program synthesis using stochastic techniques
114 -- 122Eric Schkufza, Rahul Sharma 0001, Alex Aiken. Stochastic program optimization
128 -- 0Ken MacLeod. Future Tense: Chatterbox

Volume 59, Issue 12

0 -- 0Leah Hoffmann. A view to the future
6 -- 0Marty J. Wolf. The ACM code of ethics: a call to action
7 -- 13Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf. Making a positive impact: updating the ACM code of ethics
15 -- 0Vinton G. Cerf. When email isn't private
17 -- 0. Reclaim the lost promise of the semantic web
18 -- 19Mark Guzdial, Daniel Reed. ICER 2016, and Star Trek at 50
21 -- 23Samuel Greengard. Cracking the code on biology
24 -- 26Chris Edwards. Containers push toward the mayfly server
27 -- 29Keith Kirkpatrick. Can we trust autonomous weapons?
32 -- 36Peter J. Denning, Gloria Flores. Learning to learn
37 -- 39David P. Anderson. Nailing smoke
40 -- 42Yan Chen. Mentoring female assistant professors enhances their success
43 -- 45Orit Hazzan, Jeff Kramer. Assessing abstraction skills
46 -- 48Jesper Larsson Träff. (Mis)managing parallel computing research through EU project funding
50 -- 55Marius Eriksen. Functional at scale
56 -- 62. React: Facebook's functional turn on writing Javascript
63 -- 71Ivar Jacobson, Ian Spence, Ed Seidewitz. Industrial-scale agile: from craft to engineering
72 -- 81Anders Ynnerman, Thomas Rydell, Daniel Antoine, David Hughes, Anders Persson, Patric Ljung. Interactive visualization of 3d scanned mummies at public venues
82 -- 91Mark Sagar, Mike Seymour, Annette Henderson. Creating connection with autonomous facial animation
92 -- 101Katie Shilton, Jeffrey Burke, Kimberly C. Claffy, Lixia Zhang. Anticipating policy and social implications of named data networking
102 -- 108Yiling Chen, Arpita Ghosh, Michael Kearns, Tim Roughgarden, Jennifer Wortman Vaughan. Mathematical foundations for social computing
110 -- 0Srinivasan Keshav. Technical Perspective: The chemistry of software-defined batteries
111 -- 119Anirudh Badam, Ranveer Chandra, Jon Dutra, Anthony Ferrese, Steve Hodges, Pan Hu, Julia Meinershagen, Thomas Moscibroda, Bodhi Priyantha, Evangelia D. Skiani. Software-defined batteries
120 -- 0Takeo Igarashi. Technical Perspective: 3D image editing made easy
121 -- 129Tao Chen, Zhe Zhu, Shi-Min Hu, Daniel Cohen-Or, Ariel Shamir. Extracting 3D objects from photographs using 3-sweep

Volume 59, Issue 11

5 -- 0Moshe Y. Vardi. Globalization, computing, and their political impact
7 -- 0Vinton G. Cerf. Heidelberg anew
8 -- 9. Learn to live with academic rankings
10 -- 11Valerie Barr, Mark Guzdial. Introducing CS to newcomers, and JES as a teaching tool
12 -- 14Erica Klarreich. Learning securely
15 -- 17Sarah Underwood. Blockchain beyond bitcoin
18 -- 19Tom Geller. Farm automation gets smarter
20 -- 23Roger R. Schell. Cyber defense triad for where security matters
24 -- 28Pamela Samuelson. Oracle v. Google
27 -- 30Bala R. Iyer, Rahul C. Basole. Visualization to understand ecosystems
31 -- 33Mark Guzdial, Briana Morrison. Growing computer science education into a STEM education discipline
34 -- 38B. Jack Copeland, Eli Dresner, Diane Proudfoot, Oron Shagrir. Time to reinspect the foundations?
37 -- 39Jonathan Grudin. Technology and academic lives
40 -- 43Pat Helland. The power of babble
44 -- 51Adam Morrison. Scaling synchronization in multicore programs
52 -- 55Peter Bailis, Joy Arulraj, Andrew Pavlo. Research for practice: distributed consensus and implications of NVM on database management systems
56 -- 65Matei Zaharia, Reynold S. Xin, Patrick Wendell, Tathagata Das, Michael Armbrust, Ankur Dave, Xiangrui Meng, Josh Rosen, Shivaram Venkataraman, Ali Ghodsi, Joseph Gonzalez, Scott Shenker, Ion Stoica. Apache Spark: a unified engine for big data processing
66 -- 74Dinei Florêncio, Cormac Herley, Paul C. van Oorschot. Pushing on string: the 'don't care' region of password strength
75 -- 83Enrico Bozzo, Massimo Franceschet. A theory on power in networks
84 -- 93Adi Livnat, Christos H. Papadimitriou. Sex as an algorithm: the theory of evolution under the lens of computation
94 -- 102Dietmar Jannach, Paul Resnick, Alexander Tuzhilin, Markus Zanker. Recommender systems - : beyond matrix completion
104 -- 0Kurt Keutzer. If I could only design one circuit ...: technical perspective
105 -- 112Yunji Chen, Tianshi Chen, Zhiwei Xu, Ninghui Sun, Olivier Temam. DianNao family: energy-efficient hardware accelerators for machine learning
113 -- 0James C. Hoe. FPGA compute acceleration is first about energy efficiency: technical perspective
114 -- 122Andrew Putnam, Adrian M. Caulfield, Eric S. Chung, Derek Chiou, Kypros Constantinides, John Demme, Hadi Esmaeilzadeh, Jeremy Fowers, Gopi Prashanth Gopal, Jan Gray, Michael Haselman, Scott Hauck, Stephen Heil, Amir Hormati, Joo-Young Kim, Sitaram Lanka, James R. Larus, Eric Peterson, Simon Pope, Aaron Smith, Jason Thong, Phillip Yi Xiao, Doug Burger. A reconfigurable fabric for accelerating large-scale datacenter services
136 -- 0Brian Clegg. The candidate

Volume 59, Issue 10

5 -- 0Ronald F. Boisvert. Incentivizing reproducibility
7 -- 0Vinton G. Cerf. 'We're going backward!'
8 -- 9Perry R. Cook. Adding art to STEM
10 -- 12Don Monroe. Optical fibers getting full
13 -- 15Marina Krakovsky. Bringing holography to light
16 -- 17Keith Kirkpatrick. Battling algorithmic bias: how do we ensure algorithms treat us fairly?
18 -- 20Michael A. Cusumano. The puzzle of Japanese innovation and entrepreneurship
21 -- 23Michael L. Best. Mobile computing and political transformation
24 -- 25George V. Neville-Neil. Cloud calipers
26 -- 30Peter G. Neumann. Risks of automation: a cautionary total-system perspective of our cyberfuture
31 -- 33Reinhard Pichler, Hannes Werthner. Universities and computer science in the European crisis of refugees
34 -- 39Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross McIlroy, Hannes Payer. Idle-time garbage-collection scheduling
40 -- 41Kate Matsudaira. Fresh starts
42 -- 46André Medeiros. Dynamics of change: why reactivity matters
48 -- 57Robert Lychev, Michael Schapira, Sharon Goldberg. Rethinking security for internet routing
58 -- 64Craig Partridge, Mark Allman. Ethical considerations in network measurement papers
66 -- 72A. J. Burns, M. Eric Johnson, Peter Honeyman. A brief chronology of medical device security
74 -- 0Johannes Gehrke. Technical Perspective: Naiad
75 -- 83Derek Gordon Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martín Abadi. Incremental, iterative data processing with timely dataflow
84 -- 0James R. Larus. Technical Perspective: The power of parallelizing computations
85 -- 92Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz. Efficient parallelization using rank convergence in dynamic programming algorithms
96 -- 0Dennis E. Shasha. Find me quickly

Volume 59, Issue 1

5 -- 0Mark R. Nelson. Focusing on teacher needs in K-12 CS education
7 -- 0Vinton G. Cerf. On the road in Latin America
8 -- 9. Let the liable pay
10 -- 0Vinton G. Cerf. ACM's 2016 general election
11 -- 16Alexander L. Wolf. ACM's annual report for FY15
18 -- 19John Arquilla, Joel C. Adams. Controlling cyber arms, and creating new LEGOs
20 -- 22Neil Savage. Seeing more clearly
23 -- 25Samuel Greengard. Better memory
26 -- 28Esther Shein. Preserving the internet
29 -- 0. Gene Amdahl, 1922-2015
30 -- 32Jonathan T. Weinberg. Biometric identity
33 -- 35Michael A. Cusumano, David B. Yoffie. Extrapolating from Moore's law
36 -- 38Phillip G. Armour. The chaos machine
39 -- 44Thomas Haigh, Mark Priestley. Where code comes from: architectures of automatic control from Babbage to Algol
45 -- 46Gio Wiederhold. Unbalanced data leads to obsolete economic advice
47 -- 49Yoav Shoham. Why knowledge representation matters
50 -- 55George V. Neville-Neil. Time is an illusion lunchtime doubly so
56 -- 63Mihir Nanavati, Malte Schwarzkopf, Jake Wires, Andrew Warfield. Non-volatile storage
64 -- 70Pat Helland. Immutability changes everything
72 -- 81Shashi Shekhar, Steven K. Feiner, Walid G. Aref. Spatial computing
82 -- 89Esteve Almirall, Jonathan Wareham. Open data and civic apps: first-generation failures, second-generation improvements
90 -- 97Juliana Sutanto. The building blocks of a cloud strategy: evidence from three SaaS providers
98 -- 105Ioannis Koutis, Ryan Williams. Algebraic fingerprints for faster algorithms
107 -- 0Steve Hand. Technical Perspective: High-performance virtualization: are we done?
108 -- 116Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir. Bare-metal performance for virtual machines with exitless interrupts
117 -- 0Tova Milo. Technical Perspective: Enlisting the power of the crowd
118 -- 127Beth Trushkowsky, Tim Kraska, Purnamrita Sarkar. Answering enumeration queries with the crowd
136 -- 0Dennis Shasha. Upstart Puzzles: Ice Trap