Journal: Communications of the ACM

Volume 62, Issue 9

5 -- 0Andrew A. Chien. Sustaining open collaboration in universities
6 -- 0Vinton G. Cerf. Polyglot!
7 -- 0Moshe Y. Vardi. The long game of research
9 -- 0CACM Staff. On being 'random enough'
10 -- 11Yegor Bugayenko, Mark Guzdial. Why programmers should curb their enthusiasm, and thinking about computational thinking
13 -- 15Samuel Greengard. An inability to reproduce
16 -- 18Gary Anthes. Augmented reality gets real
19 -- 21Sarah Underwood. Can you locate your location data?
22 -- 24Eric Goldman. Internet immunity and the freedom to code
25 -- 27Hilarie Orman. Online voting: we can do it! (we have to)
28 -- 30Peter J. Denning, Andrew M. Odlyzko. An interview with Andrew Odlyzko on cyber security
31 -- 33David Auerbach. Bitwise: a life in code
36 -- 43Russ Cox. Surviving software dependencies
44 -- 47Tom Killalea. Velocity in software engineering
48 -- 54Shaul Kfir, Camille Fournier. DAML: the contract language of distributed ledgers
56 -- 65Carla P. Gomes, Thomas G. Dietterich, Christopher Barrett, Jon Conrad, Bistra Dilkina, Stefano Ermon, Fei Fang, Andrew Farnsworth, Alan Fern, Xiaoli Z. Fern, Daniel Fink, Douglas H. Fisher, Alexander Flecker, Daniel Freund 0001, Angela Fuller, John M. Gregoire, John E. Hopcroft, Steve Kelling, J. Zico Kolter, Warren B. Powell, Nicole D. Sintov, John S. Selker, Bart Selman, Daniel Sheldon, David B. Shmoys, Milind Tambe, Weng-Keen Wong, Christopher Wood, XiaoJian Wu, Yexiang Xue, Amulya Yadav, Abdul-Aziz Yakubu, Mary Lou Zeeman. Computational sustainability: computing for a better world and a sustainable future
66 -- 76Daniel Jackson 0001. Alloy: a language and tool for exploring software designs
78 -- 85Jason Freeman, Brian Magerko, Doug Edwards, Tom McKlin, Taneisha Lee, Roxanne Moore. EarSketch: engaging broad populations in computing through music
86 -- 93Yossi Gilad. Metadata-private communication for the 99%
96 -- 0Sylvain Lefebvre 0001. Technical perspective: From virtual worlds to digital fabrication
97 -- 105Kiril Vidimce, Szu-Po Wang, Jonathan Ragan-Kelley, Wojciech Matusik. OpenFab: a programmable pipeline for multimaterial fabrication
112 -- 0Leah Hoffmann. Inspired by the home of the future

Volume 62, Issue 8

5 -- 0Cherri M. Pancake. Dispelling common myths about ACM awards and honors
7 -- 0Vinton G. Cerf. Undo, redo, and regrets
9 -- 0CACM Staff. A case against mission-critical applications of machine learning
12 -- 13Mark Guzdial. Cutting the wait for CS advice
15 -- 17Samuel Greengard. The algorithm that changed quantum machine learning
18 -- 19Don Monroe. I don't understand my car
20 -- 21Gregory Mone. What makes a robot likable?
22 -- 25David Weintrop. Block-based programming in computer science education
26 -- 29Marshall W. van Alstyne. Citizens United
30 -- 31George V. Neville-Neil. MUST and MUST NOT
32 -- 34Marco Aiello 0001. The success of the web: a triumph of the amateurs
36 -- 43Natalya Fridman Noy, Yuqing Gao, Anshu Jain, Anant Narayanan, Alan Patterson, Jamie Taylor. Industry-scale knowledge graphs: lessons and challenges
44 -- 49Anna Wiedemann, Nicole Forsgren, Manuel Wiesche, Heiko Gewald, Helmut Krcmar. Research for practice: the DevOps phenomenon
50 -- 52Kate Matsudaira. Overly attached
54 -- 61Barbara J. Grosz, David Gray Grant, Kate Vredenburgh, Jeff Behrends, Lily Hu, Alison Simmons, Jim Waldo. Embedded EthiCS: integrating ethics across CS education
62 -- 70Dino Distefano, Manuel Fähndrich, Francesco Logozzo, Peter W. O'Hearn. Scaling static analyses at Facebook
72 -- 81Jakob E. Bardram, Steven Jeuris, Paolo Tell, Steven Houben, Stephen Voida. Activity-centric computing systems
82 -- 91Emilio Ferrara. The history of digital spam
94 -- 0Graham Cormode. Technical perspective: The true cost of popularity
95 -- 100Kasper Green Larsen, Jelani Nelson, Huy L. Nguyen, Mikkel Thorup. Heavy hitters via cluster-preserving clustering
104 -- 0William Sims Bainbridge. Fluid democracy

Volume 62, Issue 7

5 -- 0Andrew A. Chien. Halfway round!: growing the regional special sections
6 -- 0Vinton G. Cerf. Back to the future, part II
7 -- 0Moshe Y. Vardi. To serve humanity
8 -- 9Gloria Childress Townsend, Sheldon Waite. Bringing more women, immigrants, to computer science
11 -- 13Erica Klarreich. Good algorithms make good neighbors
14 -- 16Keith Kirkpatrick. The edge of computational photography
17 -- 19Logan Kugler. Protecting the 2020 census
20 -- 22Pamela Samuelson. API copyrights revisited
23 -- 25Susan J. Winter. Who benefits?
26 -- 28David Nordfors, Chally Grundwag, V. R. Ferose. A new labor market for people with 'coolabilities'
29 -- 30Emery Berger, Stephen M. Blackburn, Carla E. Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Kuansan Wang, Lexing Xie. GOTO rankings considered helpful
32 -- 33Pat Helland. Extract, shoehorn, and load
34 -- 40Thomas A. Limoncelli. The top 10 things executives should know about software
41 -- 46. Access controls and healthcare records: who owns the data?
48 -- 57Micah Beck. On the hourglass model
58 -- 64Christopher Frauenberger, Peter Purgathofer. Ways of thinking in informatics
66 -- 73Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar. Internet of things search engine
74 -- 83Pedro M. Domingos, Daniel Lowd. Unifying logical and statistical AI with Markov logic
85 -- 0Costin Raiciu. Do you know why your web pages load faster?: technical perspective
86 -- 94Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove. Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols
96 -- 0Dennis E. Shasha. Opioid games

Volume 62, Issue 6

5 -- 0Cherri M. Pancake. ACM awards honor CS contributions
7 -- 0Vinton G. Cerf. Back to the future
8 -- 9Mark Guzdial, John Arquilla. Is CS really for all, and defending democracy in cyberspace
10 -- 12Neil Savage. Neural net worth
13 -- 15Gary Anthes. Lifelong learning in artificial neural networks
16 -- 18Don Monroe. And then, there were three
19 -- 20Keith Kirkpatrick. Ethics in technology jobs
22 -- 24Linnet Taylor. Global data justice
25 -- 27A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann. Through computer architecture, darkly
28 -- 31Peter J. Denning, David Brin. An interview with David Brin on resiliency
32 -- 34Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon. Personal data and the internet of things
36 -- 41Ulan Degenbaev, Michael Lippautz, Hannes Payer. Garbage collection as a joint venture
42 -- 44Kate Matsudaira. How to create a great team culture (and why it matters)
45 -- 53Zachary C. Lipton, Jacob Steinhardt. Research for practice: troubling trends in machine-learning scholarship
54 -- 62Jaeyoung Do, Sudipta Sengupta, Steven Swanson. Programmable solid-state storage in future cloud datacenters
63 -- 69O. Sami Saydjari. Engineering trustworthy systems: a principled approach to cybersecurity
70 -- 79Daniel S. Weld, Gagan Bansal. The challenge of crafting intelligible intelligence
82 -- 0Rishiyur S. Nikhil. Technical perspective: Back to the edge
83 -- 91Tony Nowatzki, Vinay Gangadhar, Karthikeyan Sankaralingam. Heterogeneous Von Neumann/dataflow microprocessors
96 -- 0Leah Hoffmann. Reaching new heights with artificial neural networks

Volume 62, Issue 5

5 -- 0Vinton G. Cerf. APIs, standards, and enabling infrastructure
7 -- 0Moshe Y. Vardi. Quantum hype and quantum skepticism
10 -- 11Stefan Monnier, Andrew A. Chien, Robert L. Glass, Charles H. Davis, Thorkil Naur, Thomas A. Limoncelli. Don't ignore the cost of 'embedded energy'
12 -- 13Ryan Carrier. Implementing guidelines for governance, oversight of AI, and automation
15 -- 17Chris Edwards. Questioning quantum
18 -- 19Neil Savage. Code talkers
20 -- 22Samuel Greengard. Deep insecurities: the internet of things shifts technology risk
24 -- 26James Grimmelmann. Continuity and change in internet law
27 -- 29Joan Feigenbaum. Encryption and surveillance
30 -- 32Emmanuel Schanzer, Shriram Krishnamurthi, Kathi Fisler. What does it mean for a computing curriculum to succeed?
33 -- 35Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao. Enterprise wi-fi: we need devices that are secure by default
36 -- 42Raymond Blum, Betsy Beyer. Achieving digital permanence
43 -- 49Martin Kleppmann, Alastair R. Beresford, Boerge Svingen. Online event processing
50 -- 55Aleksandar Kuzmanovic. Net neutrality: unexpected solution to blockchain scaling
56 -- 63Fay Payton, Eleni Berki. Countering the negative image of women in computing
64 -- 69Yongge Wang, Qutaibah M. Malluhi. The limit of blockchains: infeasibility of a smart Obama-Trump contract
70 -- 80Rod Downey, Denis R. Hirschfeldt. Algorithmic randomness
82 -- 0Zachary G. Ives. Technical perspective: Compressing matrices for large-scale machine learning
83 -- 91Ahmed Elgohary, Matthias Boehm 0001, Peter J. Haas, Frederick R. Reiss, Berthold Reinwald. Compressed linear algebra for declarative large-scale machine learning
96 -- 0Ken MacLeod. Like old times

Volume 62, Issue 4

5 -- 0Vinton G. Cerf. In debt to the NSF
6 -- 0Robin K. Hill, Mark Guzdial. Pondering variables and direct instruction
9 -- 0Chris Edwards. Soft robots look to new environments
12 -- 0Samuel Greengard. The future of data storage
15 -- 0Sarah Underwood. The fine line between coercion and care
18 -- 0Mari Sako. Free trade in a digital world
22 -- 0George V. Neville-Neil. Know your algorithms
24 -- 0Dirk Lewandowski. The web is missing an essential part of infrastructure: an open web index
28 -- 0Panagiota Fatourou, Chris Hankin. Welcome to the Europe region special section
32 -- 0Lisa Korrigane. A demographic snapshot of the IT workforce in Europe
34 -- 0David Pringle. Enterprises lead ICT innovation in Europe
35 -- 0David Pringle. Europe's ambitious ICT agenda
36 -- 0David Pringle. Europe's well-connected consumers
38 -- 0Laurence Kalman. New European data privacy and cyber security laws: one year later
40 -- 0Jan Gulliksen. Incorporating Europe's values in future research
42 -- 0Koen De Bosschere, Marc Duranton, Madeleine Gray. HiPEAC: a European network built to last
44 -- 0Joaquim A. Jorge, Mashhuda Glencross, Aaron Quigley. ACM Europe Council's best paper awards
46 -- 0Julie A. McCann, Gian Pietro Picco, Alexander Gluhak, Karl Henrik Johansson, Martin Törngren, Laila Gide. Connected things connecting Europe
52 -- 0Panagiota Fatourou, Yota Papageorgiou, Vasiliki Petousi. Women are needed in STEM: European policies and incentives
58 -- 0Michael E. Caspersen, Judith Gal-Ezer, Andrew D. McGettrick, Enrico Nardelli. st century
64 -- 0Paola Inverardi. The European perspective on responsible computing
70 -- 0Thomas Skordas. Toward a European exascale ecosystem: the EuroHPC joint undertaking
74 -- 0Steffen Staab, Susan Halford, Wendy Hall. Web science in Europe: beyond boundaries
80 -- 0Pat Helland. Identity by any other name
88 -- 0Benjamin Treynor Sloss, Shylaja Nukala, Vivek Rau. Metrics that matter
95 -- 0Nitesh Mor. Research for practice: edge computing
100 -- 0Vijay Khatri, Binny M. Samuel. Analytics for managerial work
110 -- 0James B. Aimone. Neural algorithms and computing beyond Moore's law
120 -- 0Petros Wallden, Elham Kashefi. Cyber security in the quantum era
132 -- 0Gilles Brassard. Was Edgar Allan Poe wrong after all?: technical perspective
133 -- 0Umesh V. Vazirani, Thomas Vidick. Fully device independent quantum key distribution
144 -- 0Dennis E. Shasha. Fighting for lava

Volume 62, Issue 3

5 -- 0Andrew A. Chien. Owning computing's environmental impact
6 -- 0Vinton G. Cerf. Ownership vs. stewardship
7 -- 0Moshe Y. Vardi. Lost in math?
8 -- 9Mary Hall, Richard E. Ladner, Diane Levitt, Manuel A. Pérez-Quiñones, Saurabh Bagchi. Smoothing the path to computing: pondering uses for big data
11 -- 13Logan Kugler. Building a better battery
14 -- 16Esther Shein. Exoskeletons today
17 -- 18Keith Kirkpatrick. Electronics need rare earths
20 -- 23Pamela Samuelson. Questioning a new intellectual property right for press publishers
24 -- 27Ofir Turel. Potential 'dark sides' of leisure technology use in youth
28 -- 30Peter J. Denning. An interview with William Hugh Murray
31 -- 33Sepehr Vakil, Jennifer Higgs. It's about power
34 -- 36Mike Tissenbaum, Josh Sheldon, Hal Abelson. From computational thinking to computational action
38 -- 42Jim Waldo. A hitchhiker's guide to the blockchain universe
43 -- 45Kate Matsudaira. Design patterns for managing up
46 -- 53Simson L. Garfinkel, John M. Abowd, Christian Martindale. Understanding database reconstruction attacks on public data
54 -- 60Judea Pearl. The seven tools of causal inference, with reflections on machine learning
61 -- 67Zhi Quan Zhou, Liqun Sun. Metamorphic testing of driverless cars
68 -- 77Advaith Siddharthan, Kapila Ponnamperuma, Chris Mellish, Cheng Zeng, Daniel Heptinstall, Annie Robinson, Stuart Benn, René van der Wal. Blogging birds: telling informative stories about the lives of birds from telemetric data
78 -- 87Pamela Zave, Jennifer Rexford. The compositional architecture of the internet
88 -- 96Tim Roughgarden. Beyond worst-case analysis
98 -- 0Martin C. Rinard. Technical perspective: Borrowing big code to automate programming activities
99 -- 107Veselin Raychev, Martin T. Vechev, Andreas Krause 0001. Predicting program properties from 'big code'
108 -- 0Nisheeth K. Vishnoi. Technical perspective: Isolating a matching when your coins go missing
109 -- 115Stephen A. Fenner, Rohit Gurjar, Thomas Thierauf. A deterministic parallel algorithm for bipartite perfect matching
120 -- 0Leah Hoffmann. Guiding computers, robots to see and think

Volume 62, Issue 2

5 -- 0Vinton G. Cerf. Libraries considered hazardous
6 -- 7. Between the lines in the China region special section
8 -- 9Herbert E. Bruderer, Robin K. Hill. Seeking digital humanities, IT tech support
11 -- 13Samuel Greengard. A brave new world of genetic engineering
14 -- 16Keith Kirkpatrick. Technologizing agriculture
17 -- 19Logan Kugler. Being recognized everywhere
20 -- 22Carl Landwher. 2018: a big year for privacy
23 -- 26Carol Frieze, Jeria L. Quesenberry. How computer science at CMU is attracting and retaining women
27 -- 0George V. Neville-Neil. Writing a test plan
28 -- 31Dror G. Feitelson. Tony's law
32 -- 35Enrico Nardelli. Do we really need computational thinking?
36 -- 44. CodeFlow: improving the code review process at Microsoft
45 -- 47Kate Matsudaira. The importance of a great finish
48 -- 60John L. Hennessy, David A. Patterson. A new golden age for computer architecture
61 -- 67Chao Gao, Zhen Su, Jiming Liu 0001, Jürgen Kurths. Even central users do not always drive information diffusion
68 -- 77Juan Pablo Bello, Cláudio T. Silva, Oded Nov, R. Luke DuBois, Anish Arora, Justin Salamon, Charles Mydlarz, Harish Doraiswamy. SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution
78 -- 85Maurice Herlihy. Blockchains from a distributed computing perspective
86 -- 95Peter W. O'Hearn. Separation logic
97 -- 0Thomas F. Wenisch. How economic theories can help computers beat the heat: technical perspective
98 -- 106Songchun Fan, Seyed Majid Zahedi, Benjamin C. Lee. Distributed strategies for computational sprints
107 -- 0Surajit Chaudhuri. To do or not to do: extending SQL with integer linear programming?: technical perspective
108 -- 116Matteo Brucato, Azza Abouzied, Alexandra Meliou. Scalable computation of high-order optimization queries
120 -- 0David Allen Batchelor. Hawking's nightmare

Volume 62, Issue 12

5 -- 0Cherri M. Pancake. Engaging future generations of ACM leaders
7 -- 0Vinton G. Cerf. A hands-free ride
9 -- 0CACM Staff. Online voting still security pipedream
10 -- 11Mark Guzdial, Robin K. Hill. Getting high school, college students interested in CS
13 -- 15Chris Edwards. Malevolent machine learning
16 -- 18Paul Marks. Robots aim to boost astronaut efficiency
19 -- 21Keith Kirkpatrick. Regulating information technology
22 -- 24David M. Douglas. Should researchers use data from security breaches?
25 -- 0George V. Neville-Neil. Koding academies
26 -- 28Peter J. Denning, Ted G. Lewis. Uncertainty
29 -- 31Beth Simone Noveck. Public entrepreneurship and policy engineering
32 -- 37Ariana Mirian. Hack for hire
38 -- 42Thomas A. Limoncelli. API practices if you hate your customers
44 -- 54Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski. The rise of serverless computing
56 -- 65Claire Le Goues, Michael Pradel, Abhik Roychoudhury. Automated program repair
66 -- 75Moshe Tennenholtz, Oren Kurland. Rethinking search engines and recommendation systems: a game theoretic perspective
78 -- 0Michael B. Taylor. Technical perspective: Bootstrapping a future of open source, specialized hardware
79 -- 87Jonathan Balkind, Michael McKeown, Yaosheng Fu, Tri Minh Nguyen 0003, Yanqi Zhou, Alexey Lavrov, Mohammad Shahrad, Adi Fuchs, Samuel Payne, Xiaohua Liang, Matthew Matl, David Wentzlaff. OpenPiton: an open source hardware platform for your research
96 -- 0Leah Hoffmann. RISCy beginnings

Volume 62, Issue 11

5 -- 0Vinton G. Cerf. Hazards of the information superhighway
7 -- 0Moshe Y. Vardi. The winner-takes-all tech corporation
8 -- 9CACM Staff. You can publish it!: (you have to)
10 -- 11Yegor Bugayenko. The benefits of indolence
13 -- 15Don Monroe. Information is physics
16 -- 18Samuel Greengard. When drones fly
19 -- 21Logan Kugler. Real-world applications for drones
24 -- 27Pamela Samuelson. Europe's controversial digital copyright directive finalized
28 -- 30Mark Guzdial, Alan Kay, Cathie Norris, Elliot Soloway. Computational thinking should just be good thinking
31 -- 36George Varghese. An interview with Leonard Kleinrock
37 -- 39Selena Silva, Martin Kenney. Algorithms, platforms, and ethnic bias
40 -- 42P. J. Narayanan, Pankaj Jalote, Anand Deshpande. Welcome to the India region special section
44 -- 45Manik Varma. Extreme classification
46 -- 47Maryam Mustafa, Amna Batool, Agha Ali Raza. Designing ICT interventions for women in Pakistan
48 -- 49Jayant R. Haritsa, S. Sudarshan 0001. Turbocharging database query processing and testing
50 -- 53Neeta Verma, Savita Dawar. Digital transformation in the Indian government
54 -- 55Vipul Shah. CSpathshala: bringing computational thinking to schools
56 -- 57Ajit Samaranayake, Sampath Tilakumara, Thayaparan Sripavan, Rasika Withanawasam. Creative disruption in fintech from Sri Lanka
58 -- 59C. V. Jawahar, Venkata N. Padmanabhan. Technology interventions for road safety and beyond
60 -- 61Shashank Srikant, Rohit Takhar, Vishal Venugopal, Varun Aggarwal. Skill evaluation
62 -- 63Gautam Shroff, K. Ananth Krishnan. Computing research at Tata Consultancy Services
64 -- 69Pankaj Jalote, Pari Natarajan. The growth and evolution of India's software industry
70 -- 75Pushpak Bhattacharyya, Hema Murthy, Surangika Ranathunga, Ranjiva Munasinghe. Indic language computing
76 -- 81Vivek Raghavan, Sanjay Jain, Pramod Varma. India stack - digital infrastructure as public good
80 -- 0Subhashis Banerjee, Subodh Sharma 0001. Privacy concerns with Aadhaar
82 -- 87Charles Assisi, Avinash Raghava, N. S. Ramnath. The rise of the Indian start-up ecosystem
88 -- 91Supratik Chakraborty, Vasudeva Varma. Highlights of software R&D in India
92 -- 95Meena Mahajan, Madhavan Mukund, Nitin Saxena 0001. Research in theoretical computer science
98 -- 99Niloy Ganguly, Ponnurangam Kumaraguru. The positive and negative effects of social media in India
100 -- 103Aditya Vashistha, Umar Saif, Agha Ali Raza. The internet of the orals
104 -- 110Michelle Vaccaro, Jim Waldo. The effects of mixing machine learning and human judgment
111 -- 113Pat Helland. The trade-offs between write and read
114 -- 120Raja Appuswamy, Goetz Graefe, Renata Borovica-Gajic, Anastasia Ailamaki. The five-minute rule 30 years later and its impact on the storage hierarchy
122 -- 133Yan Pei, Swarnendu Biswas, Donald S. Fussell, Keshav Pingali. An elementary introduction to Kalman filtering
136 -- 0David G. Andersen. Technical perspective: A whitebox solution for blackbox-like behaviors
137 -- 145Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana. DeepXplore: automated whitebox testing of deep learning systems
160 -- 0. Cantando con la Corrente (singing with current)

Volume 62, Issue 10

5 -- 0Cherri M. Pancake. How ACM evolves in response to community needs
7 -- 0Vinton G. Cerf. AI is not an excuse!
8 -- 9Robin K. Hill, Edwin Torres. Pinning down variables, and taking an agile approach
11 -- 13Don Monroe. Closing in on quantum error correction
14 -- 16Keith Kirkpatrick. Protecting industrial control systems
17 -- 18Esther Shein. The CS teacher shortage
20 -- 22Michael A. Cusumano. The cloud as an innovation platform for software development
23 -- 25Peter G. Neumann. How might we increase system trustworthiness?
26 -- 27George V. Neville-Neil. What is a chief security officer good for?
28 -- 31Ryen W. White, Adam Fourney, Allen Herring, Paul N. Bennett, Nirupama Chandrasekaran, Robert Sim, Elnaz Nouri, Mark J. Encarnación. Multi-device digital assistance
34 -- 38Jesse Frazelle. Open source firmware
39 -- 41Thomas A. Limoncelli. Demo data as code
42 -- 47Kate Matsudaira. The evolution of management
48 -- 53Justine S. Hastings, Mark Howison, Ted Lawless, John Ucles, Preston White. Unlocking data to improve public policy
54 -- 63Oren Salzman. Sampling-based robot motion planning
64 -- 75Jennifer Mankoff, Megan Hofmann, Xiang 'Anthony' Chen, Scott E. Hudson, Amy Hurst, Jeeeun Kim. Consumer-grade fabrication and its potential to revolutionize accessibility
76 -- 84Mark A. Hallen, Bruce Randall Donald. Protein design by provable algorithms
88 -- 0Andrew W. Appel. Technical Perspective: The scalability of CertiKOS
89 -- 99Ronghui Gu, Zhong Shao, Hao Chen 0023, Jieung Kim, Jérémie Koenig, Xiongnan (Newman) Wu, Vilhelm Sjöberg, David Costanzo. Building certified concurrent OS kernels
104 -- 0Dennis E. Shasha. Dust wars

Volume 62, Issue 1

5 -- 0Andrew A. Chien. Open collaboration in an age of distrust
6 -- 0Vinton G. Cerf. A people-centered economy
7 -- 0Moshe Y. Vardi. Are we having an ethical crisis in computing?
8 -- 9Judy Robertson. Answering children's questions about computers
10 -- 12Don Monroe. Quantum leap
13 -- 14Chris Edwards. Hidden messages fool AI
15 -- 17Esther Shein. Who owns 3D scans of historic sites?
18 -- 20Michal S. Gal. Illegal pricing algorithms
21 -- 23Michael A. Cusumano. CRISPR: an emerging platform for gene editing
24 -- 30Thomas Haigh. Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo
31 -- 34Niels da Vitoria Lobo, Mubarak Shah. UCF's 30-year REU site in computer vision
35 -- 36Edward A. Lee. Modeling in engineering and science
38 -- 42Alpha Lam. Using remote cache service for bazel
43 -- 45Jessie Frazelle. Research for practice: security for the modern age
46 -- 49Thomas A. Limoncelli. SQL is no excuse to avoid DevOps
50 -- 57Stefan Seidel, Nicholas Berente, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson. Autonomous tools and design: a triple-loop approach to human-machine learning
58 -- 65Sergio Orenga-Roglá, Ricardo Chalmeta. Framework for implementing a big data ecosystem in organizations
66 -- 74B. Jack Copeland, Oron Shagrir. The Church-Turing thesis: logical limit or breachable barrier?
76 -- 84Yolanda Gil, Suzanne A. Pierce, Hassan A. Babaie, Arindam Banerjee, Kirk D. Borne, Gary Bust, Michelle Cheatham, Imme Ebert-Uphoff, Carla Gomes, Mary Hill, John Horel, Leslie Hsu, Jim Kinter, Craig A. Knoblock, David Krum, Vipin Kumar, Pierre Lermusiaux, Yan Liu, Chris North, Victor Pankratius, Shanan Peters, Beth Plale, Allen Pope, Sai Ravela, Juan Restrepo, Aaron J. Ridley, Hanan Samet, Shashi Shekhar. Intelligent systems for geosciences: an essential research agenda
85 -- 93William Casey, Ansgar Kellner, Parisa Memarmoshrefi, Jose Andre Morales, Bud Mishra. Deception, identity, and security: the game theory of sybil attacks
95 -- 0Hao Li. Technical perspective: Photorealistic facial digitization and manipulation
96 -- 104Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner. Face2Face: real-time face capture and reenactment of RGB videos
105 -- 0Dan Boneh. Technical perspective: Attacking cryptographic key exchange with precomputation
106 -- 114David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann. Imperfect forward secrecy: how Diffie-Hellman fails in practice
120 -- 0Dennis E. Shasha. Randomized anti-counterfeiting