Journal: Communications of the ACM

Volume 60, Issue 9

5 -- 0Simson L. Garfinkel, Jeanna Matthews, Stuart S. Shapiro, Jonathan M. Smith. Toward algorithmic transparency and accountability
6 -- 0Vinton G. Cerf. Take two aspirin and call me in the morning
7 -- 0Moshe Y. Vardi. Divination by program committee
8 -- 9. Computational thinking is not necessarily computational
10 -- 11Robin K. Hill. Assuring software quality by preventing neglect
13 -- 15Samuel Greengard. It's all about image
16 -- 17Gregory Mone. Broadband to Mars
18 -- 19Logan Kugler. Why GPS spoofing is a threat to companies, countries
20 -- 23Lawrence M. Fisher. th anniversary
24 -- 25Lawrence M. Fisher. Charles W. Bachman: 1924-2017
26 -- 28Joel R. Reidenberg. Digitocracy
29 -- 31Carolina Alves de Lima Salge, Nicholas Berente. Is that social bot behaving unethically?
32 -- 34Peter J. Denning. Multitasking without thrashing
35 -- 37Gregorio Convertino, Nancy Frishberg. Why agile teams fail without UX research
38 -- 40Andrew Conway, Peter Eckersley. When does law enforcement's demand to read your data become a demand to read your mind?
42 -- 47Benjamin Treynor Sloss, Mike Dahlin, Vivek Rau, Betsy Beyer. The calculus of service availability
48 -- 55Graham Cormode. Data sketching
56 -- 58Kate Matsudaira. 10 ways to be a better interviewer
60 -- 64Carissa Schoenick, Peter Clark, Oyvind Tafjord, Peter D. Turney, Oren Etzioni. Moving beyond the Turing Test with the Allen AI Science Challenge
65 -- 71Petter Bae Brandtzæg, Asbjørn Følstad. Trust and distrust in online fact-checking services
72 -- 80Sean Peisert. Security in high-performance computing environments
82 -- 0Charles (Chuck) Thacker. Technical perspective: A gloomy look at the integrity of hardware
83 -- 91Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester. Exploiting the analog properties of digital circuits for malicious hardware
92 -- 0Ed H. Chi. Technical perspective: Humans and computers working together on hard tasks
93 -- 100Walter S. Lasecki, Christopher D. Miller, Iftekhar Naim, Raja S. Kushalnagar, Adam Sadilek, Daniel Gildea, Jeffrey P. Bigham. Scribe: deep integration of human and machine intelligence to caption speech in real time
104 -- 0Leah Hoffmann. All the pretty pictures

Volume 60, Issue 8

5 -- 0Andrew A. Chien. Communications of the ACM
7 -- 0Vinton G. Cerf. In praise of under-specification?
8 -- 9. Embed ethical guidelines in autonomous weapons
10 -- 11Philip Guo. How adults ages 60+ are learning to code
12 -- 14Esther Shein. Hacker-proof coding
15 -- 17Logan Kugler. Why virtual reality will transform a workplace near you
18 -- 19Keith Kirkpatrick. AI in contact centers
20 -- 21Lawrence M. Fisher. Charles P. 'Chuck' Thacker: 1943-2017
22 -- 25David P. Anderson. Prophets, seers, and pioneers
26 -- 28Jennifer Wang. Is the U.S. education system ready for CS for all?
29 -- 30George V. Neville-Neil. The observer effect
31 -- 34Dominic Horsman, Vivien M. Kendon, Susan Stepney. The natural science of computing
36 -- 43Ricardo Olenewa, Gary M. Olson, Judith S. Olson, Daniel M. Russell. simultaneously, how do we use that to our advantage?
44 -- 49Hans-J. Boehm. Small-data computing: correct calculator arithmetic
50 -- 58Leo Corry. Turing's pre-war analog computers: the fatherhood of the modern computer revisited
59 -- 68Longbing Cao. Data science: challenges and directions
70 -- 79Marijn J. H. Heule, Oliver Kullmann. The science of brute force
82 -- 0Marc Shapiro. Technical Perspective: Unexpected connections
83 -- 90Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert Tappan Morris, Nickolai Zeldovich. The scalable commutativity rule: designing scalable software for multicore processors
91 -- 0Helmut Pottmann. Technical Perspective: Linking form, function, and fabrication
92 -- 99Moritz Bächer, Bernd Bickel, Emily Whiting, Olga Sorkine-Hornung. Spin-it: optimizing moment of inertia for spinnable objects
104 -- 0Brian Clegg. Turing's taxi

Volume 60, Issue 7

5 -- 0Andrew A. Chien. Communications of the ACM
7 -- 0Vinton G. Cerf. A brittle and fragile future
10 -- 11Mark Guzdial. 'Generation CS' drives growth in enrollments
13 -- 15Neil Savage. Building a brain may mean going analog
16 -- 18Samuel Greengard. Cracking the code on DNA storage
19 -- 21Gary Anthes. Artificial intelligence poised to ride a new wave
22 -- 0Lawrence M. Fisher. Jean E. Sammet 1928-2017
24 -- 26Adam L. Young, Moti Yung. Cryptovirology: the birth, neglect, and explosion of ransomware
27 -- 29Brad Greenwood, Gordon Burtch. Unknowns of the gig-economy
30 -- 31Peter J. Denning. The beginner's creed
32 -- 34Marc Snir. The informal guide to ACM fellow nominations
36 -- 39Pat Helland. Side effects, front and center
40 -- 45Mark Overton. The IDAR graph
46 -- 49Peter Bailis, Peter Alvaro, Sumit Gulwani. Research for practice: tracing and debugging distributed systems; programming by examples
50 -- 61D. Fox Harrell, Chong-U Lim. Reimagining the avatar dream: modeling social identity in digital media
62 -- 68Pantelis Koutroumpis, Aija Leiponen, Llewellyn D. W. Thomas. How important is IT?
70 -- 79Denis Nekipelov. Inference and auction design in online advertising
82 -- 0Fred B. Schneider. Technical Perspective: IronFleet simplifies proving safety and liveness properties
83 -- 92Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath T. V. Setty, Brian Zill. IronFleet: proving safety and liveness of practical distributed systems
93 -- 0Michael Mitzenmacher. Technical Perspective: Building a better hash function
94 -- 101Mikkel Thorup. Fast and powerful hashing using tabulation
104 -- 0Dennis E. Shasha. Ruby risks

Volume 60, Issue 6

5 -- 0Moshe Y. Vardi. communications of the ACM
7 -- 0Vinton G. Cerf. Open access to academic research
8 -- 9. do have ethics
10 -- 11Mark Guzdial. Balancing teaching CS efficiently with motivating students
12 -- 14Don Monroe. Deep learning takes on translation
15 -- 16Chris Edwards. Optimization search finds a heart of glass
17 -- 19Sarah Underwood. Potential and peril
20 -- 22Neil Savage. Weaving the web
24 -- 25. Big data
26 -- 28Peter G. Neumann. Trustworthiness and truthfulness are essential
29 -- 30Leslie Goodyear, Gary Silverstein, Linda P. Thurston. The influence and promise of alliances
31 -- 32George V. Neville-Neil. Forced exception handling
33 -- 39Peter J. Denning. Remaining trouble spots with computational thinking
40 -- 45Devon H. O'Dell. The debugging mind-set
46 -- 50Pat Helland, Simon Weaver, Ed Harris. Too big NOT to fail
51 -- 54Kate Matsudaira, Erik Meijer. Conversations with technology leaders: Erik Meijer
56 -- 65David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski. The SCION internet architecture
66 -- 70Yili Liu, Lina Zhou. The dynamics of work-family conflict
72 -- 80David Bau, Jeff Gray, Caitlin Kelleher, Josh Sheldon, Franklyn Turbak. Learnable programming: blocks and beyond
82 -- 83Jitendra Malik. Technical Perspective: What led computer vision to deep learning?
84 -- 90Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton. ImageNet classification with deep convolutional neural networks
91 -- 0Avi Wigderson. Technical Perspective: Low-depth arithmetic circuits
93 -- 100Ankit Gupta 0001, Pritish Kamath, Neeraj Kayal, Ramprasad Saptharishi. Unexpected power of low-depth arithmetic circuits
104 -- 0Leah Hoffmann. This is for everyone

Volume 60, Issue 5

5 -- 0Moshe Y. Vardi. Cyber insecurity and cyber libertarianism
7 -- 0Vinton G. Cerf. Can liberty survive the digital age?
8 -- 9Bertrand Meyer. Ending null pointer crashes
10 -- 12Esther Shein. Combating cancer with data
13 -- 15Samuel Greengard. Making chips smarter
16 -- 17Keith Kirkpatrick. Bionics in competition
18 -- 19. The internet of things
22 -- 24Woodrow Hartzog. The anonymization debate should be about risk, not perfection
25 -- 27Leo Porter, Cynthia Bailey Lee, Beth Simon, Mark Guzdial. Preparing tomorrow's faculty to address challenges in teaching computer science
28 -- 34Wendell Wallach. Toward a ban on lethal autonomous weapons: surmounting the obstacles
36 -- 42Erik Meijer. Making money using math
43 -- 47Robert Guo. MongoDB's JavaScript fuzzer
48 -- 51Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han. Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning
52 -- 61Catherine C. Marshall, Frank M. Shipman III. Who owns the social web?
62 -- 68Marina Jirotka, Barbara Grimpe, Bernd Carsten Stahl, Grace Eden, Mark Hartswood. Responsible research and innovation in the digital age
70 -- 80Milan Vojnovic. Contest theory
82 -- 0Guy E. Blelloch. Technical Perspective: Functional compilers
83 -- 91Geoffrey Mainland, Roman Leshchinskiy, Simon L. Peyton Jones. Exploiting vector instructions with generalized stream fusion
92 -- 0Alon Y. Halevy. Technical Perspective: Building knowledge bases from messy data
93 -- 102Ce Zhang, Christopher Ré, Michael J. Cafarella, Jaeho Shin 0001, Feiran Wang, Sen Wu 0002. DeepDive: declarative knowledge base construction
104 -- 0David Allen Batchelor. Beyond 'Star Trek'
105 -- 111Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf. Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct

Volume 60, Issue 4

5 -- 0Valerie Barr. Gender diversity in computing: are we making any progress?
7 -- 0Vinton G. Cerf. A genetic theory of the Silicon Valley phenomenon
8 -- 9. Consider indirect threats of AI, too
10 -- 11John Arquilla, Mark Guzdial. Crafting a national cyberdefense, and preparing to support computational literacy
12 -- 14Gregory Mone. Sensors on the brain
15 -- 16Chris Edwards. Digitizing the world
17 -- 19Esther Shein. Computing the arts
20 -- 21. Cybersecurity
22 -- 23Ineke Buskens. Online social networks and global women's empowerment
24 -- 25George V. Neville-Neil. The chess player who couldn't pass the salt
26 -- 28William Regli. Wanted: toolsmiths
29 -- 31Yancey Strickler. What it means to be an entrepreneur today
32 -- 39Meng-Day (Mandel) Yu, Srinivas Devadas. Pervasive, dynamic authentication of physical items
40 -- 44Robert C. Seacord. Uninitialized reads
45 -- 46Kate Matsudaira. Does anybody listen to you?
48 -- 54Luiz André Barroso, Mike Marty, David Patterson, Parthasarathy Ranganathan. Attack of the killer microseconds
55 -- 62Aman Yadav, Chris Stephenson, Hai Hong. Computational thinking for teacher education
64 -- 72Athman Bouguettaya, Munindar P. Singh, Michael N. Huhns, Quan Z. Sheng, Hai Dong, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry, Boualem Benatallah, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos, Liang Chen, Surya Nepal, Zaki Malik, Abdelkarim Erradi, Yan Wang, M. Brian Blake, Schahram Dustdar, Frank Leymann, Michael P. Papazoglou. A service computing manifesto: the next 10 years
74 -- 0Gernot Heiser. Technical Perspective: Proving file systems meet expectations
75 -- 84Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler. Certifying a file system using crash hoare logic: correctness in the presence of crashes
85 -- 0Jonathan Ullman. Technical Perspective: Building a safety net for data reuse
86 -- 93Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth. Guilt-free data reuse
96 -- 0Dennis E. Shasha. Stacking the deck

Volume 60, Issue 3

5 -- 0Moshe Y. Vardi. ACM's open-conference principle and political reality
7 -- 0Vicki L. Hanson. ACM's commitment to accessibility
9 -- 0Vinton G. Cerf. Grumpy old cells
10 -- 11. Address the consequences of AI in advance
12 -- 13Mark Guzdial, Robin K. Hill. The slow evolution of CS for all, the beauty of programs
15 -- 17Neil Savage. Thinking deeply to make better speech
18 -- 20Samuel Greengard. The future of semiconductors
21 -- 22Keith Kirkpatrick. Financing the dark web
23 -- 0. ACM recognizes new fellows
26 -- 28Pamela Samuelson. Samsung v. Apple
29 -- 30Elizabeth Varki. Where review goes wrong
31 -- 33Peter J. Denning, Matti Tedre, Pat Yongpradit. Misconceptions about computer science
34 -- 36Thomas M. Philip. Learning with mobile technologies
38 -- 41Theo Schlossnagle. Time, but faster
42 -- 45Mohamed Zahran. Heterogeneous computing: here to stay
46 -- 49Peter Bailis, Irene Zhang, Fadel Adib. Research for practice: distributed transactions and networks as physical sensors
50 -- 59Jonathan Lazar, Elizabeth F. Churchill, Tovi Grossman, Gerrit C. van der Veer, Philippe A. Palanque, John Morris, Jennifer Mankoff. Making the field of computing more inclusive
60 -- 68Daniel J. Mazzola, Robert D. St. Louis, Mohan Tanniru. The path to the top: insights from career histories of top CIOs
70 -- 79Simon Price, Peter A. Flach. Computational support for academic peer review: a perspective from artificial intelligence
82 -- 0Srinivasan Keshav. Technical Perspective: The power of wi-fi to deliver power
83 -- 91Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Joshua R. Smith, Shyamnath Gollakota. Powering the next Billion devices with wi-fi
92 -- 0Leonid Libkin. Technical Perspective: Data distribution for fast joins
93 -- 100Tom J. Ameloot, Gaetano Geck, Bas Ketsman, Frank Neven, Thomas Schwentick. Reasoning on data partitioning for single-round multi-join evaluation in massively parallel systems
104 -- 0Leah Hoffmann. Out of bounds

Volume 60, Issue 2

5 -- 0Vicki L. Hanson. Celebrating 50 years of the Turing award
6 -- 7Francine Berman, Vinton G. Cerf. Social and ethical behavior in the internet of things
8 -- 9. Use the scientific method in computer science
10 -- 11. Artificial intelligence
12 -- 13Janet Davis. Liberal arts academia wants YOU!
15 -- 17Chris Edwards. Secure quantum communications
18 -- 19Samuel Greengard. Are computer chips the new security threat?
21 -- 23Keith Kirkpatrick. It's not the algorithm, it's the data
26 -- 30Ulf Lindqvist, Peter G. Neumann. The future of the internet of things
31 -- 33Aman Yadav, Steve Cooper. Fostering creativity through computing
34 -- 36George V. Neville-Neil. The unholy trinity of software development
37 -- 39Azer Bestavros, Andrei Lapets, Mayank Varia. User-centric distributed solutions for privacy-preserving analytics
40 -- 42Alan Bundy. Smart machines are not a threat to humanity
43 -- 45Devdatt P. Dubhashi, Shalom Lappin. AI dangers: imagined and real
46 -- 54Pat Helland. Life beyond distributed transactions
55 -- 57Thomas A. Limoncelli. Are you load balancing wrong?
58 -- 66Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson. BBR: congestion-based congestion control
68 -- 75Brett Danaher, Michael D. Smith 0002, Rahul Telang. Copyright enforcement in the digital age: empirical evidence and policy implications
76 -- 84Herbert E. Bruderer. Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe
86 -- 95Frits W. Vaandrager. Model learning
98 -- 0Eric Rescorla. Technical Perspective: Cleaning up flaws in TLS implementations
99 -- 107Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue. A messy state of the union: taming the composite state machines of TLS
108 -- 115Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik. Authentication using pulse-response biometrics
120 -- 0William Sims Bainbridge. Fatal guidance

Volume 60, Issue 12

5 -- 0Andrew A. Chien. Computing is the secret ingredient (well, not so secret)
6 -- 0. Start CS students off with industry best practices
7 -- 0Vinton G. Cerf. Now for something entirely different
8 -- 9Philip Guo. Building tools to help students learn to program
11 -- 13Don Monroe. Perovskites boost solar-cell potential
14 -- 16Samuel Greengard. Gaming machine learning
17 -- 19Keith Kirkpatrick. Parallel computational thinking
20 -- 23Peter J. Denning. The forgotten engineer
24 -- 26Louise Ann Lyon, Jill Denner. Community colleges: a resource for increasing equity and inclusion in computer science education
27 -- 28George V. Neville-Neil. Cold, hard cache
29 -- 32Stephen J. Andriole. The death of big software
33 -- 35Ernest Davis. Lousy advice to the lovelorn
36 -- 45Arvind Narayanan, Jeremy Clark. Bitcoin's academic pedigree
46 -- 47Pat Helland. XML and JSON are like cardboard
48 -- 50John Regehr, Peter Bailis. Research for practice: vigorous public debates in academic computer science
52 -- 59Martin E. Hellman. Cybersecurity, nuclear security, alan turing, and illogical logic
60 -- 67Ramiro Montealegre, Wayne F. Cascio. Technology-driven changes in work and employment
68 -- 75Gustavo Pinto, Fernando Castor. Energy efficiency: a new concern for application software developers
78 -- 0Aaron Roth. Pricing information (and its implications): technical perspective
79 -- 86Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu. A theory of pricing private data
87 -- 0James R. Larus. A simple, elegant approach to non-numeric parallelization: technical perspective
88 -- 97Simone Campanoni, Kevin Brownell, Svilen Kanev, Timothy M. Jones 0001, Gu-Yeon Wei, David M. Brooks. Automatically accelerating non-numerical programs by architecture-compiler co-design
112 -- 0Leah Hoffmann. Grooming the leaders of tomorrow

Volume 60, Issue 11

5 -- 0Laurie Williams, Doug Baldwin. Highlights of the ACM student research competition
6 -- 0Vinton G. Cerf. Heidelberg laureate forum
7 -- 0Moshe Y. Vardi. Would Turing have won the Turing award?
8 -- 9. They see what you see
10 -- 11Mei Kobayashi. Opportunities for women, minorities in information retrieval
12 -- 14Neil Savage. A block on the old chip
15 -- 16Alex Wright. Censoring sensors
17 -- 19Esther Shein. Overcoming disabilities
20 -- 22Pamela Samuelson. Disgorging profits in design patent cases
23 -- 25Solon Barocas, Danah Boyd. Engaging the ethics of data science in practice
26 -- 28Richard C. H. Connor, Quintin I. Cutts, Judy Robertson. Keeping the machinery in computing education
29 -- 31Martin Spann, Lucas Stich, Klaus M. Schmidt. Pay what you want as a pricing model for open access publishing?
32 -- 34Virginia Dignum. Social agents: bridging simulation and engineering
36 -- 43. Hootsuite: in pursuit of reactive systems
44 -- 45Kate Matsudaira. Breadth and depth
46 -- 53Ivar Jacobson, Ian Spence, Pan Wei Ng. Is there a single method for the internet of things?
54 -- 61Makoto Odamaki, Shree K. Nayar. Cambits: a reconfigurable camera system
62 -- 67Stuart Mcilroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan. User reviews of top mobile apps in Apple and Google app stores
68 -- 78Laurel D. Riek. Healthcare robotics
80 -- 0David Silver. Technical perspective: Solving imperfect information games
81 -- 88Michael Bowling, Neil Burch, Michael Johanson, Oskari Tammelin. Heads-up limit hold'em poker is solved
89 -- 0Marc Alexa. Technical perspective: Exploring a kingdom by geodesic measures
90 -- 99Keenan Crane, Clarisse Weischedel, Max Wardetzky. The heat method for distance computation
112 -- 0G. Seth Shostak. Butterfly effect

Volume 60, Issue 10

5 -- 0Andrew A. Chien. Computing is a profession
7 -- 0Vinton G. Cerf. Six education
8 -- 9. Beyond brute force
12 -- 13Robin K. Hill, Mark Guzdial. Manipulating word representations, and preparing students for coding jobs?
15 -- 17Keith Kirkpatrick. 3D-printing human body parts
18 -- 20Don Monroe. Digital hearing
21 -- 22Chris Edwards. Portable device fears show power of social development
24 -- 26Michael A. Cusumano. Amazon and whole foods: follow the strategy (and the money)
27 -- 31David Lorge Parnas. The real risks of artificial intelligence
32 -- 35Vasant Dhar, Roger M. Stein. FinTech platforms and strategy
36 -- 37George V. Neville-Neil. IoT: the internet of terror
38 -- 41Roderick Chapman, Neil White, Jim Woodcock. What can agile methods bring to high-integrity software development?
42 -- 45Alvaro Videla. Metaphors we compute by
46 -- 49Peter Bailis, Tawanna Dillahunt, Stefanie Mueller, Patrick Baudisch. Research for practice: technology for underserved communities; personal fabrication
50 -- 52Thomas A. Limoncelli. Four ways to make CS and IT more immersive
54 -- 61Ewan D. Tempero, Tony Gorschek, Lefteris Angelis. Barriers to refactoring
62 -- 69Heiko Gewald, Xuequn Wang, Andy Weeger, Mahesh S. Raisinghani, Gerald Grant, Otavio Sanchez, Siddhi Pittayachawan. Millennials' attitudes toward IT consumerization in the workplace
70 -- 79Stephen B. Wicker, Kolbeinn Karlsson. Internet advertising: technology, ethics, and a serious difference of opinion
80 -- 0Jeffrey F. Naughton. Technical Perspective: Broadening and deepening query optimization yet still making progress
81 -- 89Immanuel Trummer, Christoph Koch 0001. Multi-objective parametric query optimization
90 -- 0Jeffrey S. Foster. Technical Perspective: Shedding new light on an old language debate
91 -- 100Baishakhi Ray, Daryl Posnett, Premkumar T. Devanbu, Vladimir Filkov. A large-scale study of programming languages and code quality in GitHub
112 -- 0Dennis E. Shasha. Partitioned peace

Volume 60, Issue 1

5 -- 0Moshe Y. Vardi. Technology for the most effective use of mankind
7 -- 0Vicki L. Hanson. The ACM future of computing academy
9 -- 0Vinton G. Cerf. Information and misinformation on the internet
10 -- 11Valerie Barr, Michael Stonebraker, Raul Castro Fernandez, Dong Deng, Michael L. Brodie. How we teach CS2All, and what to do about database decay
11 -- 0Michael Stonebraker, Raul Castro Fernandez, Dong Deng, Michael L. Brodie. What to do about database decay
13 -- 15Don Monroe. Pure randomness extracted from two poor sources
16 -- 18Alex Wright. Mapping the internet of things
19 -- 20Gregory Mone. Bias in technology
22 -- 25Michael A. Cusumano. Is Google's alphabet a good bet?
26 -- 28Michael Geist. Why less is more when it comes to internet jurisdiction
29 -- 35Thomas Haigh. Colossal genius: Tutte, Flowers, and a bad imitation of Turing
36 -- 38Jerry Kaplan. Artificial intelligence: think again
39 -- 41Jeremy Straub. Effects of international trafficking in arms regulations changes
42 -- 44Kate Matsudaira. Resolving conflict
45 -- 49Josh Bailey, Stephen Stuart. Faucet: deploying SDN in the enterprise
50 -- 53Peter Bailis, Jean Yang, Vijay Janapa Reddi, Yuhao Zhu. Research for practice: web security and mobile web computing
54 -- 65Peter J. Denning, Ted G. Lewis. Exponential laws of computing growth
66 -- 72Cecil Eng Huang Chua, Veda C. Storey. Bottom-up enterprise information systems: rethinking the roles of central IT departments
74 -- 84Bülent Yener. Cell-graphs: image-driven modeling of structure-function relationship
86 -- 0Richard Szeliski. Magnifying motions the right way: technical perspective
87 -- 95Neal Wadhwa, Hao-Yu Wu, Abe Davis, Michael Rubinstein, Eugene Shih, Gautham J. Mysore, Justin G. Chen, Oral Büyüköztürk, John V. Guttag, William T. Freeman, Frédo Durand. Eulerian video magnification and analysis
96 -- 0Valentina Salapura. Technical Perspective: Mapping the universe
97 -- 104Salman Habib, Vitali A. Morozov, Nicholas Frontiere, Hal Finkel, Adrian Pope, Katrin Heitmann, Kalyan Kumaran, Venkatram Vishwanath, Tom Peterka, Joseph A. Insley, David Daniel, Patricia K. Fasel, Zarija Lukic. HACC: extreme scaling and performance across diverse architectures
112 -- 0Dennis E. Shasha. Open field tic-tac-toe