Journal: Communications of the ACM

Volume 63, Issue 9

0 -- 0Brian Clegg. Little green message: a different kind of first-contact scenario
5 -- 0Moshe Y. Vardi. Where have all the domestic graduate students gone?
9 -- 10CACM Staff. Lost in translation
12 -- 13Orit Hazzan. Teaching CS undergrads online to work with others effectively
15 -- 17Gregory Mone. It's alive!
18 -- 20Samuel Greengard. AI on edge
21 -- 23Paul Marks. Virtual collaboration in the age of the coronavirus
24 -- 27Margot E. Kaminski. A recent renaissance in privacy law
28 -- 31Jaynarayan H. Lala, Carl E. Landwehr, John F. Meyer. Autonomous vehicle safety: lessons from aviation
32 -- 34Peter J. Denning. Avalanches make us all innovators
35 -- 37Guido Schryen. Integrating management science into the HPC research ecosystem
38 -- 40Amy S. Bruckman. 'Have you thought about...': talking about ethical implications of research
42 -- 47Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar. Dark patterns: past, present, and future
48 -- 54Terence Kelly. Is persistent memory persistent?
56 -- 64Quinn K. Burke, Cinamon Sunrise Bailey. Becoming an 'adaptive' expert
65 -- 71Andrew Burton-Jones, Alicia Kate Gilchrist, Peter Green 0002, Michael Draheim. Improving social alignment during digital transformation
72 -- 81Joseph M. Hellerstein, Peter Alvaro. Keeping CALM: when distributed consistency is easy
84 -- 0Cyrus Shahabi. Technical perspective: Computing the value of location data
85 -- 92Heba Aly, John Krumm, Gireeja Ranade, Eric Horvitz. Computing value of spatiotemporal information
93 -- 0Shashi Shekhar. Technical perspective: Progress in spatial computing for flood prediction
94 -- 102Aaron Lowe, Pankaj K. Agarwal, Mathias Rav. Flood-risk analysis on terrains

Volume 63, Issue 8

0 -- 0Leah Hoffmann. Seeing light at the end of the cybersecurity tunnel
5 -- 0Vinton G. Cerf. On the internet of medical things
6 -- 7John Arquilla, Jeremy Roschelle. How WWII was won, and why CS students feel unappreciated
9 -- 11Samuel Greengard. Neuromorphic chips take shape
12 -- 14Don Monroe. Digital humans on the big screen
15 -- 16Logan Kugler. Are we addicted to technology?
18 -- 21Jannie Fernandez, JeffriAnne Wilder. TECHNOLOchicas: a critical intersectional approach shaping the color of our future
22 -- 23George V. Neville-Neil. Broken hearts and coffee mugs
24 -- 26Shriram Krishnamurthi, Kathi Fisler. Data-centricity: a challenge and opportunity for computing education
27 -- 29Zvi Galil. OMSCS: the revolution will be digitized
30 -- 32Michael Scroggins, Irene V. Pasquetto, R. Stuart Geiger, Bernadette M. Boscoe, Peter T. Darch, Charlotte Cabasse-Mazel, Cheryl Thompson, Milena S. Golshan, Christine L. Borgman. Thorny problems in data (-intensive) science
34 -- 40CACM Staff. To catch a failure: the record-and-replay approach to debugging
41 -- 45Jessie Frazelle. Power to the people
46 -- 53Neil A. M. Maiden, Konstantinos Zachos, Amanda Brown, Dimitris Apostolou, Balder Holm, Lars Nyre, Aleksander Nygård Tonheim, Arend van den Beld. Digital creativity support for original journalism
54 -- 59Randy Connolly. Why computing belongs within the social sciences
60 -- 68Fay Cobb Payton, Alexa Busch. Examining undergraduate computer science participation in North Carolina
70 -- 79Andy Cockburn, Pierre Dragicevic, Lonni Besançon, Carl Gutwin. Threats of a replication crisis in empirical computer science
82 -- 0Wang Chiew Tan. Technical perspective: Entity matching with Magellan
83 -- 91AnHai Doan, Pradap Konda, Paul Suganthan G. C., Yash Govind, Derek Paulsen, Kaushik Chandrasekhar, Philip Martinkus, Matthew Christie. Magellan: toward building ecosystems of entity matching solutions
92 -- 0Yannis Papakonstantinou. Technical perspective: Supporting linear algebra operations in SQL
93 -- 101Shangyu Luo, Zekai J. Gao, Michael N. Gubanov, Luis Leopoldo Perez, Dimitrije Jankov, Christopher M. Jermaine. Scalable linear algebra on a relational database system

Volume 63, Issue 7

0 -- 0Dennis Shasha. Strategic paddling
5 -- 0Moshe Y. Vardi. A computational lens on economics
7 -- 0Yosuke Ozawa. Challenge yourself by reaching for the highest bar
9 -- 0CACM Staff. Computing's role in climate warming
10 -- 11John Arquilla, Mark Guzdial. Transitioning to distance learning and virtual conferencing
12 -- 14Gregory Mone. The quantum threat
15 -- 16Neil Savage. Your wish is my CMD
17 -- 19Keith Kirkpatrick. Reducing and eliminating e-waste
20 -- 22Pamela Samuelson. AI authorship?
23 -- 25Marshall W. van Alstyne. Proposal: a market for truth to address false ads on social media
26 -- 28Kathleen H. Pine, Margaret M. Hinrichs, Jieshu Wang, Dana Lewis, Erik Johnston. For impactful community engagement: check your role
29 -- 31Allison Stanger. Consumers vs. citizens in democracy's public sphere
32 -- 35Brian Subirana. Call for a wake standard for artificial intelligence
36 -- 39Pat Helland. The best place to build a subway
40 -- 46Jeremy Clark, Didem Demirag, Seyedehmahsa Moosavi. Demystifying stablecoins
48 -- 57William J. Dally, Yatish Turakhia, Song Han. Domain-specific hardware accelerators
58 -- 66Victoria Stodden. The data science life cycle: a disciplined approach to advancing data science as a science
67 -- 78Norman P. Jouppi, Doe Hyun Yoon, George Kurian, Sheng Li 0007, Nishant Patil, James Laudon, Cliff Young, David A. Patterson. A domain-specific supercomputer for training deep neural networks
80 -- 90Christian Catalini, Joshua S. Gans. Some simple economics of the blockchain
92 -- 0Mark D. Hill. Technical perspective: Why 'correct' computers can leak your information
93 -- 101Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas 0004, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher 0002, Michael Schwarz 0001, Yuval Yarom. Spectre attacks: exploiting speculative execution
102 -- 0Parthasarathy Ranganathan. Technical perspective: ASIC clouds: specializing the datacenter
103 -- 109Michael Bedford Taylor, Luis Vega, Moein Khazraee, Ikuo Magaki, Scott Davidson, Dustin Richmond. ASIC clouds: specializing the datacenter for planet-scale applications

Volume 63, Issue 6

0 -- 0Leah Hoffmann. Attaining the third dimension
5 -- 6Andrew A. Chien. What do DDT and computing have in common?
6 -- 0CACM Staff. Safety proposal points in same direction
7 -- 0Vinton G. Cerf. Implications of the COVID-19 pandemic
8 -- 9Terrence DeFranco, Jeremy Roschelle. Detecting/preventing infections, and moving instruction online
10 -- 12Neil Savage. An animating spirit
13 -- 14Chris Edwards. Leveraging unlabeled data
15 -- 16Neil Savage. Seeing through walls
17 -- 19Esther Shein. Hiring from the autism spectrum
20 -- 24Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han. How to curtail oversensing in the home
25 -- 26George V. Neville-Neil. Kode vicious plays in traffic
27 -- 29Peter J. Denning, Ted G. Lewis. Technology adoption
30 -- 34Janet Siegmund, Norman Peitek, André Brechmann, Chris Parnin, Sven Apel. Studying programming in the neuroage: just a crazy idea?
35 -- 37Meredith Ringel Morris. AI and accessibility
38 -- 41Jessie Frazelle. Commit to memory
42 -- 44Thomas A. Limoncelli. Communicate using the numbers 1, 2, 3, and more
46 -- 56Moritz Lipp, Michael Schwarz 0001, Daniel Gruss, Thomas Prescher 0002, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx. Meltdown: reading kernel memory from user space
57 -- 64Alan Borning, Batya Friedman, Nick Logler. The 'invisible' materiality of information technology
66 -- 74Noah A. Smith. Contextual word representations: putting words into computers
75 -- 83Max Mühlhäuser, Christian Meurisch, Michael Stein, Jörg Daubert, Julius von Willich, Jan Riemann, Lin Wang. Street lamps as a platform
86 -- 0Avrim Blum. Technical perspective: Algorithm selection as a learning problem
87 -- 94Rishi Gupta, Tim Roughgarden. Data-driven algorithm design

Volume 63, Issue 5

5 -- 0Cherri M. Pancake. How ACM is adapting in this period of global uncertainties
7 -- 0Jodi Tims. Partnerships can help drive gender equality
9 -- 0Moshe Y. Vardi. Efficiency vs. resilience: what COVID-19 teaches computing
11 -- 21Gerald Segal. ACM's 2020 general election
22 -- 0Andrew A. Chien. Communications
23 -- 0Arquimedes Canedo. Automating automation: CS at the heart of the manufacturing economy
24 -- 25Mark Guzdial, Jiajie Zhang. Teaching CS humbly, and watching the AI revolution
27 -- 29Don Monroe. A proof from 'the book'
30 -- 32Samuel Greengard. Will RISC-V revolutionize computing?
33 -- 35Keith Kirkpatrick. Deceiving the masses on social media
36 -- 38C. Scott Hemphill. What role for antitrust in regulating platforms?
39 -- 41Adam Shostack, Mary Ellen Zurko. Secure development tools and techniques need more research that will increase their impact and effectiveness in practice
42 -- 44Mike Tissenbaum, Anne T. Ottenbreit-Leftwich. A vision of K - : 12 computer science education for 2030
45 -- 48Aaron Hertzmann. Computers do not make art, people do
49 -- 52Calvin C. Newport. When technology goes awry
53 -- 57Jack W. Davidson, Joseph A. Konstan, Scott E. Delman. ACM publications finances
58 -- 63J. Paul Reed. Beyond the 'fix-it' treadmill
64 -- 67David D. Woods, John Allspaw. Revealing the critical role of human performance in software
68 -- 73Stephen B. Wicker, Dipayan P. Ghosh. Reading in the panopticon - : your kindle may be spying on you, but you can't be sure
74 -- 80Sandra Mattauch, Katja Lohmann, Frank Hannig, Daniel Lohmann, Jürgen Teich. A bibliometric approach for detecting the gender gap in computer science
82 -- 89Alexandra Chouldechova, Aaron Roth 0001. A snapshot of the frontiers of fairness in machine learning
90 -- 99Hagit Attiya, Sergio Rajsbaum. Indistinguishability
102 -- 0Geoffrey M. Voelker. Technical perspective: Fake 'likes' and targeting collusion networks
103 -- 111Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq. Measuring and mitigating OAuth access token abuse by collusion networks
112 -- 0Dennis E. Shasha. Optimal chimes

Volume 63, Issue 4

0 -- 0Leah Hoffmann. Reinventing virtual machines
5 -- 0Cherri M. Pancake. New ways to think about CS education
7 -- 0Vinton G. Cerf. Multisensory adventures
9 -- 0CACM Staff. Adding more color to patch picture
10 -- 11Mark Guzdial. Teaching teachers to offer STEM to undergrads
13 -- 15Gary Anthes. Dead languages come to life
16 -- 17Gregory Mone. Machine learning, meet whiskey
18 -- 20Esther Shein. How universities deploy student data
22 -- 24Alan Rubel, Kyle M. L. Jones. The temptation of data-enabled surveillance
25 -- 27Mari Sako. Artificial intelligence and the future of professional work
28 -- 29George V. Neville-Neil. Master of tickets
30 -- 34Gaurav Banga. Why is cybersecurity not a human-scale problem anymore?
35 -- 38Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock. Organizing family support services at ACM conferences
39 -- 41Jerrold M. Grochow. A taxonomy of automated assistants
44 -- 46Sue Moon, Ann Nicholson, Abhik Roychoudhury. Welcome
48 -- 49Ken-ichi Kawarabayashi. The NII Shonan meeting in Japan
50 -- 52Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi, Annika Hinze. Capturing cultural heritage in East Asia and Oceania
53 -- 54Carsten Rudolph, Sadie Creese, Sameer Sharma. Cybersecurity in Pacific Island nations
55 -- 57Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury. Singapore's cybersecurity ecosystem
58 -- 59Thomas Ho Chee Tat, George Loh Chee Ping. Innovating services and digital economy in Singapore
60 -- 63Sintia Teddy-Ang, Abigail Toh. AI Singapore: empowering a smart nation
62 -- 0Lam Kwok Yan, Campbell Wilson. Developing AI for law enforcement in Singapore and Australia
64 -- 67Chris Bain, Abraham Oshni Alvandi. Digital healthcare across Oceania
68 -- 71Meeyoung Cha, Wei Gao, Cheng-Te Li. Detecting fake news in social media: an Asia-Pacific perspective
72 -- 75Gernot Heiser, Gerwin Klein, June Andronick. seL4 in Australia: from research to real-world trustworthy systems
76 -- 81Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo 0001, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong-Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu 0001, Jianying Zhou 0001. Advances in security research in the Asiacrypt region
82 -- 85Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, SunWoo Lee. 5G commercialization and trials in Korea
86 -- 88Sang Kil Cha, Zhenkai Liang. Asia's surging interest in binary analysis
90 -- 96Laura M. D. Maguire. Managing the hidden costs of coordination
97 -- 103Marisa R. Grayson. Cognitive work of hypothesis exploration during anomaly response
104 -- 107Daniel W. Woods, Tyler Moore. Cyber warranties: market fix or marketing trick?
108 -- 115Herbert E. Bruderer. The Antikythera mechanism
118 -- 0Ariel D. Procaccia. An answer to fair division's most enigmatic question: technical perspective
119 -- 126Haris Aziz 0001, Simon Mackenzie. A bounded and envy-free cake cutting algorithm

Volume 63, Issue 3

0 -- 0Dennis E. Shasha. Stopping tyranny
5 -- 0Moshe Y. Vardi. Advancing computing as a science and profession: but to what end?
6 -- 7CACM Staff. Conferences and carbon impact
8 -- 9Robin K. Hill. Coding for voting
10 -- 12Samuel Greengard. Can nanosheet transistors keep Moore's law alive?
13 -- 14Don Monroe. Algorithms to harvest the wind
15 -- 17Keith Kirkpatrick. Across the language barrier
18 -- 21Michael Lachney, Aman Yadav. Computing and community in formal education
22 -- 24Peter J. Denning, Dorothy E. Denning. Dilemmas of artificial intelligence
25 -- 27Omer Reingold. Through the lens of a passionate theoretician
28 -- 30Kieron O'Hara, Wendy Hall. Four internets
31 -- 34Marc C. Canellas, Rachel A. Haga. Unsafe at any level
35 -- 37Benjamin C. Pierce, Michael Hicks 0001, Crista Lopes, Jens Palsberg. Conferences in an era of expensive carbon
38 -- 42Jessie Frazelle. Securing the boot process
43 -- 46Richard I. Cook. Above the line, below the line
48 -- 55Edmond Awad, Sohan Dsouza, Jean-François Bonnefon, Azim Shariff, Iyad Rahwan. Crowdsourcing moral machines
56 -- 61Darja Smite, Nils Brede Moe, Marcin Floryan, Georgiana Levinta, Panagiota Chatzipetrou. Spotify guilds
62 -- 69Jonny Austin, Howard Baker, Thomas Ball, James Devine, Joe Finney, Peli de Halleux, Steve Hodges, Michal Moskal, Gareth Stockdale. The BBC micro: bit: from the U.K. to the world
70 -- 79Ohad Fried, Jennifer Jacobs, Adam Finkelstein, Maneesh Agrawala. Editing self-image
80 -- 91Jörg Kienzle, Gunter Mussbacher, Benoît Combemale, Lucy Bastin, Nelly Bencomo, Jean-Michel Bruel, Christoph Becker, Stefanie Betz, Ruzanna Chitchyan, Betty H. C. Cheng, Sonja Klingert, Richard F. Paige, Birgit Penzenstadler, Norbert Seyff, Eugene Syriani, Colin C. Venters. Toward model-driven sustainability evaluation
93 -- 0Rebecca Isaacs. Technical perspective: A perspective on pivot tracing
94 -- 102Jonathan Mace, Ryan Roelke, Rodrigo Fonseca. Pivot tracing: dynamic causal monitoring for distributed systems

Volume 63, Issue 2

0 -- 0Leah Hoffmann. 'Everything fails all the time'
5 -- 0Cherri M. Pancake. Start small, then achieve big impact
7 -- 0Vinton G. Cerf. On durability
10 -- 11Mark Guzdial. Sizing the U.S. student cohort for computer science
13 -- 15Chris Edwards. Learning to trust quantum computers
16 -- 18Paul Marks. Dark web's doppelgängers aim to dupe antifraud systems
19 -- 21Keith Kirkpatrick. Tracking shoppers
22 -- 24Carlos Iglesias, Dhanaraj Thakur, Michael L. Best. Are we losing momentum?
25 -- 28Nancy Leveson. Are you sure your software will not kill anyone?
29 -- 30George V. Neville-Neil. Numbers are for computers, strings are for humans
31 -- 34Yen-Chia Hsu, Illah R. Nourbakhsh. When human-computer interaction meets community citizen science
35 -- 37Clif Kussmaul. Guiding students to develop essential skills
38 -- 40Jessie Frazelle. Opening up the baseboard management controller
41 -- 49Matt Godbolt. Optimizations in C++ compilers
50 -- 59Ricardo Bianchini, Marcus Fontoura, Eli Cortez, Anand Bonde, Alexandre Muzio, Ana-Maria Constantin, Thomas Moscibroda, Gabriel Magalhaes, Girish Bablani, Mark Russinovich. Toward ML-centric cloud platforms
60 -- 69Thomas Olsson 0002, Jukka Huhtamäki, Hannu Kärkkäinen. Directions for professional social matching systems
70 -- 76Patrice Godefroid. Fuzzing: hack, art, and science
80 -- 0Marco Gruteser. Lighting the way to visual privacy: technical perspective
81 -- 89Shilin Zhu, Chi Zhang, Xinyu Zhang 0003. Automating visual privacy protection using a smart LED

Volume 63, Issue 12

0 -- 0William Sims Bainbridge. Walden Three
5 -- 0Vinton G. Cerf. Repairability redux
6 -- 7Monroe M. Newborn. Pitting computers against each other ... in chess
9 -- 11Neil Savage. Tracking COVID, discreetly
12 -- 14Esther Shein. Softening up robots
15 -- 17Logan Kugler. Technologies for the visually impaired
18 -- 21Cansu Canca. Operationalizing AI ethics principles
22 -- 25W. Richards Adrion, Sarah T. Dunton, Barbara Ericson, Renee Fall, Carol L. Fletcher, Mark Guzdial. U.S. states must broaden participation while expanding access to computer science education
26 -- 28Peter J. Denning. Navigating in real-time environments
29 -- 0George V. Neville-Neil. Removing kode
30 -- 32Margaret O'Mara. Silicon politics
33 -- 36Yong Cheng, Yang Liu, Tianjian Chen, Qiang Yang 0001. Federated learning for privacy-preserving AI
38 -- 45Jessie Frazelle. The life of a data byte
46 -- 52Roger Piqueras Jover. Security analysis of SMS as a second factor of authentication
54 -- 63Roy Schwartz, Jesse Dodge, Noah A. Smith, Oren Etzioni. Green AI
64 -- 80Michele Maasberg, Craig Van Slyke, Selwyn Ellis, Nicole Beebe. The dark triad and insider threats in cyber security
72 -- 80Nick Feamster, Jason Livingood. Measuring internet speed: current challenges and future recommendations
82 -- 0David Alexander Forsyth. Technical perspective: XNOR-networks-powerful but tricky
83 -- 90Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, Ali Farhadi. Enabling AI at the edge with XNOR-networks
91 -- 0Joseph A. Paradiso. Technical perspective: The future of large-scale embedded sensing
92 -- 99Nivedita Arora, Thad Starner, Gregory D. Abowd. SATURN: an introduction to the internet of materials

Volume 63, Issue 11

0 -- 0Leah Hoffmann. Tackling the challenges of CS education
5 -- 0Moshe Y. Vardi. What should be done about social media?
7 -- 0Celeste M. Rohlfing. A career unfolds in phases
8 -- 9CACM Staff. Weighing grad school payback
12 -- 13David Patterson, Yegor Bugayenko. Bringing industry back to conferences, and paying for results
14 -- 16Don Monroe. Seeking artificial common sense
17 -- 18Keith Kirkpatrick. Natural language misunderstanding
19 -- 21Samuel Greengard. Terahertz networks move closer to reality
22 -- 24Lorrie Faith Cranor. Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic
25 -- 27Pamela Samuelson. Copyright's online service providers safe harbors under siege
28 -- 30Marshall W. van Alstyne, Alisa Lenart. Using data and respecting users
31 -- 33Amy J. Ko, Alannah Oleson, Neil Ryan, Yim Register, Benjamin Xie, Mina Tari, Matthew J. Davidson, Stefania Druga, Dastyni Loksa. It is time for more critical CS education
34 -- 37Boaz Ronen, Alex Coman. Where should your IT constraint be?: The case of the financial services industry
38 -- 40Jacky Visser, John Lawrence, Chris Reed. Reason-checking fake news
42 -- 44Virgilio Almeida, Gonzalo Navarro, Sergio Rajsbaum. Welcome
46 -- 48Rosiane de Freitas, João M. B. Cavalcanti, Sergio Cleger, Niro Higuchi, Carlos Henrique Souza Celes, Adriano Jose Nogueira Lima. Estimating Amazon carbon stock using AI-based remote sensing
49 -- 50Alejandro Hevia, Camilo Gómez. Why me?: shedding light on random processes via randomness beacons
51 -- 52Fabio Kon, Kelly Rosa Braghetto, Eduardo Felipe Zambom Santana, Roberto Speicys Cardoso, Jorge Guerra Guerra. Toward smart and sustainable cities
53 -- 55Gastón Milano, Diego Vallespir, Alfredo Viola. A technological and innovative approach to COVID-19 in Uruguay
56 -- 58Wagner Meira Jr., Antonio Luiz P. Ribeiro, Derick M. de Oliveira, Antônio H. Ribeiro. Contextualized interpretable machine learning for medical diagnosis
59 -- 60Carlos Arce-Lopera, Gerardo M. Sarria M.. Understanding salsa: how computing is defining latin music
61 -- 63Barbara Poblete, Jorge Pérez 0001. Minding the AI gap in LATAM
64 -- 65Diego Arroyuelo, José Fuentes Sepúlveda, Diego Seco. Three success stories about compact data structures
66 -- 71Isidoro Gitler, Antônio Tadeu A. Gomes, Sergio Nesmachnow. The Latin American supercomputing ecosystem for science
72 -- 77Monica Tentori, Artur Ziviani, Débora C. Muchaluat-Saade, Jesús Favela. Digital healthcare in Latin America: the case of Brazil and Mexico
78 -- 83Marcelo Arenas, Pablo Barceló. Chile's new interdisciplinary institute for foundational research on data
84 -- 89Gerardo Torres Zelaya. A panorama of computing in central America and the Caribbean
90 -- 95Claudio Delrieux, Virginia Ballarín, Cristian García Bauza, Mario A. López. Imaging sciences R&D laboratories in Argentina
96 -- 101Elias P. Duarte, Raimundo J. A. Macêdo, Eliane Martins, Sergio Rajsbaum. A tour of dependable computing research in Latin America
102 -- 107Marcos Kiwi, Yoshiharu Kohayakawa, Sergio Rajsbaum, Francisco Rodríguez-Henríquez, Jayme Luiz Szwarcfiter, Alfredo Viola. A perspective on theoretical computer science in Latin America
108 -- 110Thomas A. Limoncelli. Five nonobvious remote work techniques
111 -- 118Pat Helland. Data on the outside versus data on the inside
120 -- 127Mitchel Resnick, Natalie Rusk. Coding at a crossroads
128 -- 134Martin Grohe, Pascal Schweitzer. The graph isomorphism problem
138 -- 0Alexei A. Efros, Aaron Hertzmann. Technical perspective: When the adversary is your friend
139 -- 144Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, Yoshua Bengio. Generative adversarial networks
145 -- 0Harry Xu. Technical perspective: BLeak: semantics-aware leak detection in the web
146 -- 153John Vilk, Emery D. Berger. BLeak: automatically debugging memory leaks in web applications

Volume 63, Issue 10

0 -- 0Dennis E. Shasha. Privacy-preserving polling
5 -- 0Vinton G. Cerf. On digital diplomacy
8 -- 0Robin K. Hill. Protecting computers and people from viruses
10 -- 12Don Monroe. Bouncing balls and quantum computing
13 -- 14Chris Edwards. Thwarting side-channel attacks
15 -- 17Keith Kirkpatrick. Who has access to your smartphone data?
18 -- 19Simson L. Garfinkel, Eugene H. Spafford. Fran Allen: 1932-2020
20 -- 22Michael A. Cusumano. Self-driving vehicle technology: progress and promises
23 -- 27Peter G. Neumann. A holistic view of future risks
28 -- 29George V. Neville-Neil. Sanity vs. invisible markings
30 -- 32Richard T. Snodgrass, Marianne Winslett. conflicts of interest
33 -- 35John MacCormick. Using computer programs and search problems for teaching theory of computation
36 -- 39Oskar Mencer, Dennis Allison, Elad Blatt, Mark Cummings, Michael J. Flynn, Jerry Harris, Carl Hewitt, Quinn Jacobson, Maysam Lavasani, Mohsen Moazami, Hal Murray, Masoud Nikravesh, Andreas Nowatzyk, Mark Shand, Shahram Shirazi. The history, status, and future of FPGAs
40 -- 46Charisma Chan, Beth Cooper. Debugging incidents in Google's distributed systems
48 -- 53Stuart D. Galup, Ronald Dattero, Jing Quan 0001. What do agile, lean, and ITIL mean to DevOps?
54 -- 60Reinhard Wilhelm. Real time spent on real time
62 -- 71Rainer Böhme, Lisa Eckey, Tyler Moore 0001, Neha Narula, Tim Ruffing, Aviv Zohar. Responsible vulnerability disclosure in cryptocurrencies
72 -- 83Stefano Cresci. A decade of social bot detection
86 -- 0Benjamin Livshits. Technical perspective: Analyzing smart contracts with MadMax
87 -- 95Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis. MadMax: analyzing the out-of-gas world of smart contracts
96 -- 0Paul Beame. Technical perspective: Two for the price of one
97 -- 105Alireza Farhadi 0001, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi. Lower bounds for external memory integer sorting via network coding

Volume 63, Issue 1

0 -- 0Dennis E. Shasha. Feedback for foxes
5 -- 0Andrew A. Chien. Cracks in open collaboration in universities
7 -- 0Moshe Y. Vardi. and perish
8 -- 9Bertrand Meyer 0001. In search of the shortest possible schedule
11 -- 13Erica Klarreich. Multiplication hits the speed limit
14 -- 16Logan Kugler. How the internet spans the globe
17 -- 19Samuel Greengard. Will deepfakes do deep damage?
20 -- 22Elizabeth E. Joh. Increasing automation in policing
23 -- 25Michael A. Cusumano. 'Platformizing' a bad business does not make it a good business
26 -- 32Thomas Haigh, Mark Priestley. von Neumann thought Turing's universal machine was 'simple and neat.': but that didn't tell him how to design a computer
33 -- 35Johannes Himmelreich. Ethics of technology needs more political philosophy
36 -- 37James W. Davis, Jeff Hachtel. A* search: what's in a name?
38 -- 45Sanjay Sha. The reliability of enterprise applications
46 -- 53Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham. Blockchain technology: what is it good for?
54 -- 56Pat Helland. Space time discontinuum
58 -- 66Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang. Dependability in edge computing
68 -- 77Mengnan Du, Ninghao Liu, Xia Hu. Techniques for interpretable machine learning
78 -- 87Sergio Rajsbaum, Michel Raynal. Mastering concurrent computing through sequential thinking
90 -- 0Mark Guzdial. Technical perspective: Is there a geek gene?
91 -- 98Elizabeth Patitsas, Jesse Berlin, Michelle Craig, Steve Easterbrook. Evidence that computer science grades are not bimodal