Journal: Communications of the ACM

Volume 61, Issue 9

5 -- 0Andrew A. Chien. Computer architecture: disruption from above
6 -- 0Vinton G. Cerf. The peace of westphalia
7 -- 0Moshe Y. Vardi. Move fast and break things
9 -- 11CACM Staff. Hippie values really did build the internet
12 -- 13Yegor Bugayenko. Discovering bugs, or ensuring success?
14 -- 16Don Monroe. AI holds the better hand
17 -- 18Gregory Mone. Robotic implants
19 -- 21Keith Kirkpatrick. Borders in the cloud
22 -- 24Alan R. Wagner, Jason Borenstein, Ayanna Howard. Overtrust in the robotic age
25 -- 27Frank Pasquale. When machine learning is facially invalid
28 -- 30Peter J. Denning. Navigating with accelerating technology change
31 -- 33Adam Barker. An academic's observations from a sabbatical at Google
34 -- 36Edward A. Lee. Is software the result of top-down intelligent design or evolution?
38 -- 42Thomas A. Limoncelli. GitOps: a path to more self-service IT
43 -- 47Noor Mubeen. Workload frequency scaling law: derivation and verification
48 -- 49Gustavo Alonso, Peter Bailis. Research for practice: FPGAs in datacenters
50 -- 59Norman P. Jouppi, Cliff Young, Nishant Patil, David A. Patterson. A domain-specific architecture for deep neural networks
60 -- 69Robert Perricone, Xiaobo Sharon Hu, Joseph Nahas, Michael T. Niemier. Can beyond-CMOS devices illuminate dark silicon?
70 -- 76Slobodan Vucetic, Ashis Kumar Chanda, Shanshan Zhang, Tian Bai, Aniruddha Maiti. Peer assessment of CS doctoral programs shows strong correlation with faculty citations
78 -- 88Daniel J. Abadi, Jose M. Faleiro. An overview of deterministic database systems
90 -- 0Romit Roy Choudhury. Technical perspective: Is your WiFi a sensor?
91 -- 100Mingmin Zhao, Fadel Adib, Dina Katabi. Emotion recognition using wireless signals
104 -- 0Dennis E. Shasha. Bounce blockchain

Volume 61, Issue 8

0 -- 0Michael L. Best. Session details: Global computing
5 -- 0James R. Larus, Chris Hankin. Regulating automated decision making
7 -- 0Vinton G. Cerf. Traceability
10 -- 11CACM Staff. Encourage ACM to address U.S. election integrity
12 -- 13Robin K. Hill. Assessing responsibility for program output
14 -- 16Chris Edwards. Animals teach robots to find their way
17 -- 18Don Monroe. Electronics are leaving the plane
19 -- 21Esther Shein. Broadening the path for women in STEM
22 -- 25Kashif Ali, Kurtis Heimerl. Designing sustainable rural infrastructure through the lens of OpenCellular
26 -- 28Mark Guzdial, Amy Bruckman. Providing equitable access to computing education
29 -- 30George V. Neville-Neil. Every silver lining has a cloud
31 -- 34Ehud Shapiro. Point: foundations of e-democracy
34 -- 36Douglas Schuler. Counterpoint: e-democracy won't save democracy. democracy will save democracy
38 -- 44Alex Petrov. Algorithms behind modern storage systems
45 -- 49Daniel Crankshaw, Joseph Gonzalez, Peter Bailis. Research for practice: prediction-serving systems
50 -- 52Pat Helland. Consistently eventual
54 -- 64Emanuelle Burton, Judy Goldsmith, Nicholas Mattei. How to teach computer ethics through science fiction
65 -- 72Christina Delimitrou, Christos Kozyrakis. Amdahl's law for tail latency
74 -- 81Jose M. Such, Natalia Criado. Multiparty privacy in social media
84 -- 0John D. Owens. Technical perspective: Graphs, betweenness centrality, and the GPU
85 -- 92Adam McLaughlin, David A. Bader. Accelerating GPU betweenness centrality
96 -- 0William Sims Bainbridge. Deadlock

Volume 61, Issue 7

0 -- 0Marshall W. van Alstyne. Session details: Economic and business dimensions
0 -- 0Richard E. Ladner. Session details: Broadening participation
5 -- 0Vicki L. Hanson. Reflections on my two years
7 -- 0Vinton G. Cerf. On neural networks
9 -- 0Moshe Y. Vardi. How the hippies destroyed the internet
10 -- 11CACM Staff. Teach the law (and the AI) 'foreseeability'
12 -- 13Yegor Bugayenko. We are done with 'hacking'
15 -- 17Logan Kugler. Why cryptocurrencies use so much energy: and what to do about it
18 -- 19Gary Anthes. You've got mail!
20 -- 21Keith Kirkpatrick. Bringing the internet to the (developing) world
24 -- 26Pamela Samuelson. Copyright blocks a news-monitoring technology
27 -- 29Hanna Halaburda. Blockchain revolution without the blockchain?
30 -- 32Alex Ahmed. Beyond diversity
33 -- 39Osman Yasar. A new perspective on computational thinking
40 -- 42Josiah Dykstra, Eugene H. Spafford. The case for disappearing cyber security
44 -- 48David Chisnall. C is not a low-level language
49 -- 51Kate Matsudaira. How to come up with great ideas
52 -- 54Deepak Vasisht, Peter Bailis. Research for practice: toward a network of connected things
56 -- 66Ian J. Goodfellow, Patrick D. McDaniel, Nicolas Papernot. Making machine learning robust against adversarial inputs
67 -- 73Christoph Schneider, Markus Weinmann, Jan vom Brocke. Digital nudging: guiding online user choices through interface design
74 -- 83John K. Ousterhout. Always measure one level deeper
84 -- 91Carlo Gabriel Porto Bellini. The ABCs of effectiveness in the digital society
94 -- 0Sharon Goldberg, Ethan Heilman. Technical perspective: The rewards of selfish mining
95 -- 102Ittay Eyal, Emin Gün Sirer. Majority is not enough: bitcoin mining is vulnerable
104 -- 0Dennis E. Shasha. String wars

Volume 61, Issue 6

5 -- 0Vinton G. Cerf. Celebrating excellence
6 -- 7CACM Staff. When to hold 'em
8 -- 9Mark Guzdial, Susan Landau. Programming programming languages, and analyzing Facebook's failure
10 -- 12Neil Savage. Rewarded for RISC
13 -- 14Chris Edwards. Deep learning hunts for signals among the noise
15 -- 17Keith Kirkpatrick. 3D sensors provide security, better games
18 -- 19Logan Kugler. Getting hooked on tech
20 -- 24Nicholas Weaver. Risks of cryptocurrencies
25 -- 27Peter J. Denning. An interview with Dave Parnas
28 -- 29George V. Neville-Neil. Watchdogs vs. snowflakes
30 -- 33Claire Le Goues, Yuriy Brun, Sven Apel, Emery D. Berger, Sarfraz Khurshid, Yannis Smaragdakis. Effectiveness of anonymization in double-blind review
34 -- 40Diptanu Gon Choudhury, Timothy Perrett. Designing cluster schedulers for internet-scale services
41 -- 47Tobias Lauinger, Abdelberi Chaabane, Christo Wilson. Thou shalt not depend on me
48 -- 53Thomas A. Limoncelli. Documentation is automation
54 -- 61Ricardo A. Baeza-Yates. Bias on the web
62 -- 71Jacob O. Wobbrock, Krzysztof Z. Gajos, Shaun K. Kane, Gregg C. Vanderheiden. Ability-based design
72 -- 77David Gefen, Jake Miller, Johnathon Kyle Armstrong, Frances H. Cornelius, Noreen Robertson, Aaron Smith-McLallen, Jennifer A. Taylor. Identifying patterns in medical records through latent semantic analysis
78 -- 88Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou. Privacy in decentralized cryptocurrencies
90 -- 0Landon P. Cox. Technical perspective: Measuring optimization potential with Coz
91 -- 99Charlie Curtsinger, Emery D. Berger. Coz: finding code that counts with causal profiling
104 -- 0Leah Hoffmann. RISC management

Volume 61, Issue 5

5 -- 0Vinton G. Cerf. Turing test 2
6 -- 7Jack W. Davidson, Joseph A. Konstan, Andrew A. Chien, Scott Delman. Toward sustainable access: where are we now?
9 -- 0Moshe Y. Vardi. How we lost the women in computing
13 -- 21CACM Staff. ACM's 2018 general election: please take this opportunity to vote
20 -- 11CACM Staff. Communications) out of politics
24 -- 25Edwin Torres, Walid Saba. Commenting on code, considering data's bottleneck
26 -- 28Gregory Mone. Shrinking machines, cellular computers
29 -- 30Neil Savage. Using functions for easier programming
31 -- 33Samuel Greengard. Finding a healthier approach to managing medical data
34 -- 36Ryan Calo. Is the law ready for driverless cars?
37 -- 39Fred B. Schneider. Putting trust in security engineering
40 -- 42Alexander Repenning. Scale or fail
43 -- 45Harold Bud Lawson. The march into the black hole of complexity
46 -- 48Margaret Martonosi. Science, policy, and service
50 -- 53Malte Schwarzkopf, Peter Bailis. Research for practice: cluster scheduling for datacenters
54 -- 62Stepán Davidovic, Betsy Beyer. Canary analysis service
63 -- 64Kate Matsudaira. How is your week going so far?
66 -- 71Josh Tenenberg, Wolff-Michael Roth, Donald Chinn, Alfredo Jornet, David Socha, Skip Walter. More than the code: learning rules of rejection in writing programs
72 -- 82Richard R. Brooks, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc. Internet freedom in West Africa: technical support for journalists and democracy advocates
83 -- 88Xiaonan Wang. Data acquisition in vehicular ad hoc networks
90 -- 99Björn W. Schuller. Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends
102 -- 0Oren Etzioni. Technical perspective: Breaking the mold of machine learning
103 -- 115Tom M. Mitchell, William W. Cohen, Estevam R. Hruschka Jr., Partha P. Talukdar, Bo Yang, Justin Betteridge, Andrew Carlson, Bhavana Dalvi Mishra, Matt Gardner 0001, Bryan Kisiel, Jayant Krishnamurthy, Ni Lao, Kathryn Mazaitis, Thahir Mohamed, Ndapandula Nakashole, Emmanouil A. Platanios, Alan Ritter, Mehdi Samadi, Burr Settles, Richard C. Wang, Derry Wijaya, Abhinav Gupta, Xinlei Chen, Abulhair Saparov, Malcolm Greaves, Joel Welling. Never-ending learning
120 -- 0Ken MacLeod. Free press

Volume 61, Issue 4

5 -- 0Andrew A. Chien. Go big!
6 -- 0Vinton G. Cerf. The sound of programming
7 -- 0Moshe Y. Vardi. Open access and ACM
8 -- 9CACM Staff. Predicting failure of the university
10 -- 11Jodi Tims, Daniel A. Reed. Fostering inclusion, keeping the net neutral
12 -- 14Neil Savage. Always out of balance
15 -- 17Don Monroe. Chips for artificial intelligence
18 -- 19Marina Krakovsky. Artificial (emotional) intelligence
20 -- 22Mari Sako. Business ecosystems: how do they matter for innovation?
23 -- 24George V. Neville-Neil. Popping kernels
25 -- 27Sheldon H. Jacobson. Push versus pull
28 -- 31Stephen B. Wicker. Smartphones, contents of the mind, and the fifth amendment
32 -- 33Nicole Forsgren. DevOps delivers
34 -- 39Jez Humble. Continuous delivery sounds great, but will it work here?
40 -- 43Bridget Kromhout. Containers will not fix your broken culture (and other hard truths)
44 -- 48Nicole Forsgren, Mik Kersten. DevOps metrics
50 -- 57Mila Gascó-Hernández. Building a smart city: lessons from Barcelona
58 -- 66Caitlin Sadowski, Edward Aftandilian, Alex Eagle, Liam Miller-Cushon, Ciera Jaspan. Lessons from building static analysis tools at Google
67 -- 72Francine Berman, Rob Rutenbar, Brent Hailpern, Henrik Christensen, Susan Davidson, Deborah Estrin, Michael J. Franklin, Margaret Martonosi, Padma Raghavan, Victoria Stodden, Alexander S. Szalay. Realizing the potential of data science
74 -- 82Mordechai Guri, Yuval Elovici. Bridgeware: the air-gap malware
84 -- 0David M. Blei. Technical perspective: Expressive probabilistic models and scalable method of moments
85 -- 93Sanjeev Arora, Rong Ge 0001, Yoni Halpern, David M. Mimno, Ankur Moitra, David Sontag, Yichen Wu, Michael Zhu. Learning topic models - provably and efficiently
96 -- 0Dennis Shasha. Finding October

Volume 61, Issue 3

5 -- 0Andrew A. Chien. Communications
7 -- 0Vinton G. Cerf. Unintended consequences
9 -- 0Moshe Y. Vardi. A declaration of the dependence of cyberspace
10 -- 11. Keep the ACM code of ethics as it is
12 -- 13Mark Guzdial, Bertrand Meyer 0001. The costs and pleasures of a computer science teacher
15 -- 17Samuel Greengard. In pursuit of virtual life
18 -- 20Keith Kirkpatrick. st century
21 -- 23Esther Shein. The state of fakery
24 -- 26Ross Anderson. Making security sustainable
27 -- 29Pamela Samuelson. Will the Supreme Court nix reviews of bad patents?
30 -- 32Simon Rogerson. Ethics omission increases gases emission
33 -- 35Peter J. Denning. The computing profession
36 -- 38Fred B. Schneider. Impediments with policy interventions to foster cybersecurity
39 -- 41M. Six Silberman, Bill Tomlinson, R. LaPlante, Joel Ross, Lilly Irani, Andrew Zaldivar. Responsible research with crowds: pay crowdworkers at least minimum wage
42 -- 44Hanna M. Wallach. Computational social science ≠ computer science + social data
46 -- 53Yonatan Sompolinsky, Aviv Zohar. Bitcoin's underlying incentives
54 -- 57Thomas A. Limoncelli. Operational excellence in April Fools' pranks
58 -- 61Theo Schlossnagle. Monitoring in a DevOps world
62 -- 71Matthias Felleisen, Robby Findler, Matthew Flatt, Shriram Krishnamurthi, Eli Barzilay, Jay A. McCarthy, Sam Tobin-Hochstadt. A programmable programming language
72 -- 77Bran Knowles, Vicki L. Hanson. The wisdom of older technology (non)users
78 -- 84Tony Gorschek. Evolution toward soft(er) products
86 -- 95Benjamin Kuipers. How can we trust a robot?
98 -- 0Nicole Immorlica. Technical perspective: A graph-theoretic framework traces task planning
99 -- 107Jon M. Kleinberg, Sigal Oren. Time-inconsistent planning: a computational problem in behavioral economics
108 -- 0Kenny Paterson. Technical perspective: On heartbleed: a hard beginnyng makth a good endyng
109 -- 116Liang Zhang, David R. Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson. Analysis of SSL certificate reissues and revocations in the wake of heartbleed
120 -- 0Leah Hoffmann. Q&A: The network effect

Volume 61, Issue 2

5 -- 0Jodi L. Tims. Achieving gender equity: ACM-W can't do it alone
7 -- 0Vinton G. Cerf. A comprehensive self-driving car test
8 -- 9. Toward an equation that anticipates AI risks
10 -- 11John Arquilla, Mark Guzdial. Protecting the power grid, and finding bias in student evaluations
12 -- 14Chris Edwards. Quantum technology forgoes unconditional security to extend its reach
15 -- 16Neil Savage. Going serverless
17 -- 19Logan Kugler. The war over the value of personal data
20 -- 23Kevin Fu, Wenyuan Xu. Risks of trusting the physics of sensors
24 -- 26Sarah Wille, Daphne Sajous-Brady. The inclusive and accessible workplace
27 -- 28George V. Neville-Neil. Reducing the attack surface
29 -- 32Jennifer Keating, Illah R. Nourbakhsh. Teaching artificial intelligence and humanity
33 -- 36Shane Greenstein. Innovation from the edges
38 -- 45Andrew Leung, Andrew Spyker, Tim Bozarth. Titus: introducing containers to the Netflix cloud
46 -- 49Albert Kwon, James R. Wilcox, Peter Bailis. Research for practice: private online communication; highlights in systems verification
50 -- 52Kate Matsudaira. Views from the top
54 -- 63John Zysman, Martin Kenney. The next phase in the digital revolution: intelligent tools, platforms, growth, employment
64 -- 71Vlasta Stavova, Lenka Dedkova, Martin Ukrop, Vashek Matyas. A large-scale comparative study of beta testers and regular users
72 -- 0Othon Michail, Paul G. Spirakis. Elements of the theory of dynamic networks
83 -- 0Steve Zdancewic. Technical perspective: Building bug-free compilers
84 -- 91Nuno P. Lopes, David Menendez, Santosh Nagarakatte, John Regehr. Practical verification of peephole optimizations with Alive
92 -- 0Vincent Conitzer. Technical perspective: Designing algorithms and the fairness criteria they should satisfy
93 -- 100Kobi Gal, Ariel D. Procaccia, Moshe Mash, Yair Zick. Which is the fairest (rent division) of them all?
104 -- 0David Allen Batchelor. Welcome to the singularity

Volume 61, Issue 12

5 -- 0Vinton G. Cerf. Self-authenticating identifiers
7 -- 8CACM Staff. Reclaim internet greatness
10 -- 11John Arquilla, Yegor Bugayenko. Securing agent 111, and the job of software architect
13 -- 15Chris Edwards. Learning to see
16 -- 18Keith Kirkpatrick. Technology for the deaf
19 -- 21Logan Kugler. AI judges and juries
24 -- 27Ted G. Lewis, Peter J. Denning. Learning machine learning
28 -- 29George V. Neville-Neil. A chance gardener
30 -- 32Oren Etzioni. Point: Should AI technology be regulated?: yes, and here's how
33 -- 35Andrea O'Sullivan, Adam Thierer. Counterpoint: Regulators should allow the greatest space for AI innovation
36 -- 38Ryen W. White. Opportunities and challenges in search interaction
40 -- 44Rich Bennett, Craig Callahan, Stacy Jones, Matt Levine, Merrill Miller, Andy Ozment. How to live in a post-meltdown and -spectre world
45 -- 51Shylaja Nukala, Vivek Rau. Why SRE documents matter
52 -- 54Kate Matsudaira. How to get things done when you don't feel like it
56 -- 61Junyeong Lee, Jaylyn Jeonghyun Oh. What motivates a citizen to take the initiative in e-participation?: the case of a South Korean parliamentary hearing
62 -- 67Bran Knowles, Alison Smith-Renner, Forough Poursabzi-Sangdeh, Di Lu, Halimat Alabi. Uncertainty in current and future health wearables
68 -- 73Barbara J. Grosz, Peter Stone. A century-long commitment to assessing artificial intelligence and its impact on society
74 -- 83Daniel McDuff, Mary Czerwinski. Designing emotionally sentient agents
84 -- 93Rajeev Alur, Rishabh Singh, Dana Fisman, Armando Solar-Lezama. Search-based program synthesis
96 -- 0Tim Harris 0001. Technical perspective: Node replication divides to conquer
97 -- 105Irina Calciu, Siddhartha Sen 0001, Mahesh Balakrishnan 0001, Marcos K. Aguilera. How to implement any concurrent data structure
106 -- 0Anders Møller. Technical perspective: WebAssembly: a quiet revolution of the web
107 -- 115Andreas Rossberg, Ben L. Titzer, Andreas Haas, Derek L. Schuff, Dan Gohman, Luke Wagner, Alon Zakai, J. F. Bastien, Michael Holman. Bringing the web up to speed with WebAssembly
128 -- 0Leah Hoffmann. Promoting common sense, reality, dependable engineering

Volume 61, Issue 11

5 -- 0Vinton G. Cerf. The upper layers of the internet
7 -- 0Moshe Y. Vardi. Self-reference and section 230
8 -- 9Carl Hewitt, Vijay Kumar. The gap in CS, mulling irrational exuberance
11 -- 13Don Monroe. AI, explain yourself
14 -- 15Neil Savage. A new movement in seismology
16 -- 18Samuel Greengard. Weighing the impact of GDPR
20 -- 23Pamela Samuelson. The EU's controversial digital single market directive
24 -- 26Steven M. Bellovin, Peter G. Neumann. The big picture
27 -- 29R. Benjamin Shapiro, Rebecca Fiebrink, Peter Norvig. How machine learning impacts the undergraduate computing curriculum
30 -- 33Christos Liaskos, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, Ian F. Akyildiz. Using any surface to realize a new paradigm for wireless communications
34 -- 35Janne Lahtiranta, Sami Hyrynsalmi. Crude and rude?
36 -- 37Andrew A. Chien. Communications' regional special sections
38 -- 0Wenguang Chen, Xiang-Yang Li. Welcome to the China region special section
40 -- 41Elliott Zaagman. China's computing ambitions
42 -- 43Chao-Yang Lu, Cheng-Zhi Peng, Jian-Wei Pan. Quantum communication at 7, 600km and beyond
44 -- 45Jun Zhu, Tiejun Huang, Wenguang Chen, Wen Gao 0001. The future of artificial intelligence in China
46 -- 47Peter Guy. Consumers, corporations, and government: computing in China
48 -- 49San Zhang. Regional computing culture and personalities
50 -- 51Xiang-Yang Li, Jianwei Qian, Xiaoyang Wang. Can China lead the development of data trading and sharing markets?
52 -- 53Luyi Xu. Exploiting psychology and social behavior for game stickiness
54 -- 59Wanli Min, Liang Yu, Lei Yu, Shubo He. People logistics in smart cities
60 -- 64Hai Jin 0001, Haibo Chen, Hong Gao, Xiang-Yang Li, Song Wu. Cloud bursting for the world's largest consumer market
65 -- 69Yuan Qi, Jing Xiao. Fintech: AI powers financial services to improve people's lives
70 -- 75Huaxia Xia, Haiming Yang. Is last-mile delivery a 'killer app' for self-driving vehicles?
76 -- 81Yue Zhuge. Video consumption, social networking, and influence
82 -- 87Yutong Lu, Depei Qian, Haohuan Fu, Wenguang Chen. Will supercomputers be super-data and super-AI machines?
88 -- 94Matt Fata, Philippe-Joseph Arida, Patrick Hahn, Betsy Beyer. Corp to cloud: Google's virtual desktops
95 -- 97Alexander Ratner, Christopher Ré, Peter Bailis. Research for practice: knowledge base construction in the machine-learning era
98 -- 104Silvia Esparrachiari, Tanya Reilly, Ashleigh Rentz. Tracking and controlling microservice dependencies
106 -- 113Ryen W. White. Skill discovery in virtual assistants
114 -- 123Roberto Ierusalimschy, Luiz Henrique de Figueiredo, Waldemar Celes Filho. A look at the design of Lua
124 -- 134Diomidis Spinellis. Modern debugging: the art of finding a needle in a haystack
136 -- 145Daniel G. Waddington, Jim Harris. Software challenges for the changing storage landscape
147 -- 0Markus G. Kuhn. Technical perspective: Backdoor engineering
148 -- 155Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green 0001, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham. Where did I leave my keys?: lessons from the Juniper Dual EC incident
156 -- 0Tanzeem Choudhury. Technical perspective: Making sleep tracking more user friendly
157 -- 165Anh Nguyen, Raghda Alqurashi, Zohreh Raghebi, Farnoush Banaei Kashani, Ann C. Halbower, Tam Vu. LIBS: a bioelectrical sensing system from human ears for staging whole-night sleep study
176 -- 0Brian Clegg. Between the abbey and the edge of time

Volume 61, Issue 10

5 -- 0Vinton G. Cerf. st century
6 -- 7CACM Staff. Hennessy and Patterson on the roots of RISC
8 -- 9Amir Banifatemi. Can we use AI for global good?
11 -- 13Chris Edwards. Floating voxels provide new hope for 3D displays
14 -- 16Samuel Greengard. Transient electronics take shape
17 -- 19Esther Shein. The dangers of automating social programs
20 -- 22Michael A. Cusumano. The business of quantum computing
23 -- 26Peter P. Swire. A pedagogic cybersecurity framework
27 -- 28George V. Neville-Neil. The obscene coupling known as spaghetti code
29 -- 31Jean-François Abramatic, Roberto Di Cosmo, Stefano Zacchiroli. Building the universal archive of source code
32 -- 34Jordi Cabot, Javier Luis Cánovas Izquierdo, Valerio Cosentino. Are CS conferences (too) closed communities?
36 -- 43Zachary C. Lipton. The mythos of model interpretability
44 -- 46Kate Matsudaira. The secret formula for choosing the right next role
47 -- 54Pat Helland. Mind your state for your state of mind
56 -- 67Adnan Darwiche. Human-level intelligence or animal-like abilities?
68 -- 77Gerwin Klein, June Andronick, Matthew Fernandez, Ihor Kuz, Toby C. Murray, Gernot Heiser. Formally verified software in the real world
78 -- 85Quang, Sean Hansen, Manlu Liu, Qiang Tu. The productivity paradox in health information technology
86 -- 93Bonnie A. Nardi, Bill Tomlinson, Donald J. Patterson, Jay Chen, Daniel Pargman, Barath Raghavan, Birgit Penzenstadler. Computing within limits
95 -- 0John Baillieul. Technical perspective: A control theorist's view on reactive control for autonomous drones
96 -- 104Luca Mottola, Kamin Whitehouse. Fundamental concepts of reactive control for autonomous drones
105 -- 0Marc Snir. Technical perspective: The future of MPI
106 -- 113Robert Gerstenberger, Maciej Besta, Torsten Hoefler. Enabling highly scalable remote memory access programming with MPI-3 one sided
120 -- 0Leah Hoffmann. Reaping the benefits of a diverse background

Volume 61, Issue 1

7 -- 0Vinton G. Cerf. The role of archives in digital preservation
9 -- 0Moshe Y. Vardi. Computer professionals for social responsibility
10 -- 11. A leap from artificial to intelligence
12 -- 13Mark R. Nelson. The big IDEA and the PD pipeline
15 -- 17Gregory Mone. Feeling sounds, hearing sights
18 -- 20Alex Wright. Smartphone science
21 -- 23Marina Krakovsky. The new jobs
26 -- 28Michael A. Cusumano. The sharing economy meets reality
29 -- 31Chris Marsden. How law and computer science can work together to improve the information society
32 -- 37Thomas Haigh. Defining American greatness: IBM from Watson to Trump
38 -- 41Henry C. Lucas Jr.. Technology and the failure of the university
42 -- 44Chitta Baral, Shih-Fu Chang, Brian Curless, Partha Dasgupta, Julia Hirschberg, Anita Jones. Ask not what your postdoc can do for you ..
46 -- 53Antony Alappatt. Network applications are interactive
54 -- 61Peter Alvaro, Severine Tymon. Abstracting the geniuses away from failure testing
62 -- 68Jacob Loveless. Cache me if you can
70 -- 77Michele Coscia. Popularity spikes hurt future chances for viral propagation of protomemes
78 -- 84Hemang Subramanian. Decentralized blockchain-based electronic marketplaces
86 -- 94Wojciech Mazurczyk, Steffen Wendzel. Information hiding: Challenges for forensic experts
96 -- 0David C. Parkes. Technical perspective: Moving spectrum
97 -- 104Neil Newman, Alexandre Fréchette, Kevin Leyton-Brown. Deep optimization for spectrum repacking
105 -- 0Manuel Chakravarty. Technical perspective: Can high performance be portable?
106 -- 115Jonathan Ragan-Kelley, Andrew Adams, Dillon Sharlet, Connelly Barnes, Sylvain Paris, Marc Levoy, Saman P. Amarasinghe, Frédo Durand. Halide: decoupling algorithms from schedules for high-performance image processing
120 -- 0Dennis E. Shasha. Polychromatic choreography
121 -- 128Don Gotterbarn, Amy Bruckman, Catherine Flick, Keith W. Miller, Marty J. Wolf. ACM code of ethics: a guide for positive action