Journal: Communications of the ACM

Volume 64, Issue 9

0 -- 0Leah Hoffmann. Playing with, and against, computers
5 -- 0Moshe Y. Vardi. The sand-heap paradox of privacy and influence
7 -- 0Andrew Sorensen. How music and programming led me to build digital microworlds
9 -- 0CACM Staff. Turing reaction
10 -- 11Doug Meil, Mario Antoine Aoun. Finding the art in systems conversions, naming
13 -- 15Marina Krakovsky. A model restoration
16 -- 18Samuel Greengard. Photonic processors light the way
19 -- 20Logan Kugler. Non-fungible tokens and the future of art
22 -- 24Anupam Chander. Protecting the global internet from technology cold wars
25 -- 27Marjory S. Blumenthal. Security done right can make smart cities wise
28 -- 34Thomas Haigh. Women's lives in code
35 -- 37Peter J. Denning. Back of the envelope
38 -- 40Lamont A. Flowers. Testing educational digital games
41 -- 42James R. Larus. Whose smartphone is it?
43 -- 45Illah Reza Nourbakhsh. AI ethics: a call to faculty
46 -- 53Atefeh Mashatan, Douglas Heintzman. The complex path to quantum resistance
54 -- 61Michael Gardiner, Alexander Truskovsky, George V. Neville-Neil, Atefeh Mashatan. Quantum-safe trust for vehicles: the race is already on
62 -- 71Sherif Sakr, Angela Bonifati, Hannes Voigt, Alexandru Iosup, Khaled Ammar, Renzo Angles, Walid G. Aref, Marcelo Arenas, Maciej Besta, Peter A. Boncz, Khuzaima Daudjee, Emanuele Della Valle, Stefania Dumbrava, Olaf Hartig, Bernhard Haslhofer, Tim Hegeman, Jan Hidders, Katja Hose, Adriana Iamnitchi, Vasiliki Kalavri, Hugo Kapp, Wim Martens, M. Tamer Özsu, Eric Peukert, Stefan Plantikow, Mohamed Ragab 0001, Matei Ripeanu, Semih Salihoglu, Christian Schulz 0003, Petra Selmer, Juan F. Sequeda, Joshua Shinavier, Gábor Szárnyas, Riccardo Tommasini 0001, Antonino Tumeo, Alexandru Uta, Ana Lucia Varbanescu, Hsiang-Yun Wu, Nikolay Yakovets, Da Yan 0001, Eiko Yoneki. The future is big graphs: a community view on graph processing systems
72 -- 77Kelly Idell, David Gefen, Arik Ragowsky. Managing IT professional turnover
78 -- 84Hadas Kress-Gazit, Kerstin Eder, Guy Hoffman, Henny Admoni, Brenna Argall, Rüdiger Ehlers, Christoffer Heckman, Nils Jansen 0001, Ross Knepper, Jan Kretínský, Shelly Levy-Tzedek, Jamy Li, Todd D. Murphey, Laurel D. Riek, Dorsa Sadigh. Formalizing and guaranteeing human-robot interaction
86 -- 95Athman Bouguettaya, Quan Z. Sheng, Boualem Benatallah, Azadeh Ghari Neiat, Sajib Mistry, Aditya Ghose, Surya Nepal, Lina Yao. An internet of things service roadmap
98 -- 0Leora Morgenstern. Technical perspective: The importance of WINOGRANDE
99 -- 106Keisuke Sakaguchi, Ronan Le Bras, Chandra Bhagavatula, Yejin Choi. WinoGrande: an adversarial winograd schema challenge at scale
107 -- 0Stefano Balietti. Technical perspective: Does your experiment smell?
108 -- 116Emma Tosch, Eytan Bakshy, Emery D. Berger, David D. Jensen, J. Eliot B. Moss. PlanAlyzer: assessing threats to the validity of online experiments

Volume 64, Issue 8

0 -- 0Brian Clegg. Agent algorithm: crime-solving computer plays by its own rules
5 -- 0Vinton G. Cerf. On communication
7 -- 9CACM Staff. Tales of two Turings
10 -- 11Orit Hazzan, Koby Mike. A journal for interdisciplinary data science education
13 -- 15Chris Edwards. Better security through obfuscation
16 -- 17Keith Kirkpatrick. Fixing the internet
18 -- 20Logan Kugler. The unionization of technology companies
21 -- 0Marty J. Wolf, Don Gotterbarn, Michael S. Kirkpatrick. Upholding ACM's principles
24 -- 26Georgios Petropoulos. A European union approach to regulating big tech
27 -- 29Brett A. Becker. What does saying that 'programming is hard' really say, and about whom?
30 -- 31George V. Neville-Neil. In praise of the disassembler
32 -- 35Ben Shneiderman. Responsible AI: bridging from ethics to practice
36 -- 38Carlo Ghezzi. Science needs to engage with society: some lessons from COVID-19
39 -- 43David B. Whalley, Xin Yuan 0001, Xiuwen Liu. The domestic computer science graduate students are there, we just need to recruit them
44 -- 49Ramya Srinivasan 0002, Ajay Chander. Biases in AI systems
50 -- 54Niklas Blum, Serge Lachapelle, Harald Alvestrand. WebRTC: real-time communication for the open web platform
56 -- 68Patrick Baudin, François Bobot, David Bühler, Loïc Correnson, Florent Kirchner, Nikolai Kosmatov, André Maroneze, Valentin Perrelle, Virgile Prevosto, Julien Signoles, Nicky Williams. The dogged pursuit of bug-free C programs: the Frama-C software analysis platform
69 -- 79Tali Dekel, Noah Snavely. Unveiling unexpected training data in internet video
80 -- 86Xiaonan Wang 0001, Xingwei Wang 0001. Multimedia data delivery based on IoT clouds
88 -- 97Alistair Barros, Renuka Sindhgatta, Alireza Nili. Scaling up chatbots for corporate service delivery systems
98 -- 106Sarah E. Chasins, Elena L. Glassman, Joshua Sunshine. PL and HCI: better together
108 -- 0Constantinos Daskalakis. Technical perspective: The quest for optimal multi-item auctions
109 -- 116Paul Dütting, Zhe Feng 0004, Harikrishna Narasimhan, David C. Parkes, Sai Srivatsa Ravindranath. Optimal auctions through deep learning
117 -- 0Josiah D. Hester. Technical perspective: eBP rides the third wave of mobile health
118 -- 125Nam Bui, Nhat Pham, Jessica Jacqueline Barnitz, Zhanan Zou, Phuc Nguyen, Hoang Truong 0002, Taeho Kim, Nicholas Farrow, Anh Nguyen 0001, Jianliang Xiao, Robin Deterding, Thang N. Dinh, Tam Vu 0001. eBP: an ear-worn device for frequent and comfortable blood pressure monitoring

Volume 64, Issue 7

5 -- 0Moshe Y. Vardi. Program verification: vision and reality
7 -- 0Victoria Holt. Obtain a Ph.D. and a career in data
8 -- 9CACM Staff. Two sides of the software engineering coin
10 -- 12John Arquilla, Judi Fusco, Pati Ruiz, Jeremy Roschelle. Securing seabed cybersecurity, emphasizing intelligence augmentation
13 -- 15Samuel Greengard. Formal software verification measures up
16 -- 18Esther Shein. A battery-free internet of things
19 -- 21Paul Marks. The future of supply chains
22 -- 0Simson L. Garfinkel, Eugene H. Spafford. Charles M. Geschke (1939-2021)
24 -- 26Pamela Samuelson. Reimplementing software interfaces is fair use
27 -- 29Lorrie Faith Cranor. Lessons from the loo
30 -- 32Solon Barocas, Asia J. Biega, Margarita Boyarskaya, Kate Crawford 0002, Hal Daumé III, Miroslav Dudík, Benjamin Fish, Mary L. Gray, Brent Hecht, Alexandra Olteanu, Forough Poursabzi-Sangdeh, Luke Stark, Jennifer Wortman Vaughan, Hanna M. Wallach, Marion Zepf. Responsible computing during COVID-19 and beyond
33 -- 35Josep Domingo-Ferrer, David Sánchez 0001, Alberto Blanco-Justicia. The limits of differential privacy (and its misuse in data release and machine learning)
36 -- 38Diomidis Spinellis. Why computing students should contribute to open source software projects
39 -- 41Travis Breaux, Jennifer Moritz. The 2021 software developer shortage is coming
42 -- 49Chris Nokleberg, Brad Hawkes. Application frameworks
50 -- 56Theo Schlossnagle, Justin Sheehy, Chris McCubbin. Always-on time-series database: keeping up where there's no way to catch up
58 -- 65Yoshua Bengio, Yann LeCun, Geoffrey E. Hinton. Deep learning for AI
66 -- 71Bran Knowles, Vicki L. Hanson, Yvonne Rogers, Anne Marie Piper, Jenny Waycott, Nigel Davies 0001, Aloha May Hufana Ambe, Robin N. Brewer, Debaleena Chattopadhyay, Marianne Dee, David M. Frohlich, Marisela Gutierrez Lopez, Ben Jelen, Amanda Lazar, Radoslaw Nielek, Belén Barros Pena, Abi Roper, Mark Schlager, Britta Schulte, Irene Ye Yuan. The harm in conflating aging with accessibility
72 -- 79Mohammad Hossein Jarrahi, Gemma Newlands, Brian Butler 0001, Saiph Savage, Christoph Lutz, Michael Dunn, Steve Sawyer. Flexible work and personal digital infrastructures
82 -- 88Stephan Winter 0001, Timothy Baldwin, Martin Tomko, Jochen Renz, Werner Kuhn, Maria Vasardani. Spatial concepts in the conversation with a computer
90 -- 0Sriram Sankaranarayanan 0001. Technical perspective: An elegant model for deriving equations
91 -- 99Vasileios Tsoutsouras, Sam Willis, Phillip Stanley-Marbell. Deriving equations from sensor data using dimensional function synthesis
100 -- 0Jennifer Rexford. Technical perspective: Tracking pandemic-driven internet traffic
101 -- 108Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis. A year in lockdown: how the waves of COVID-19 impact internet traffic
112 -- 0Dennis Shasha. String me along

Volume 64, Issue 6

0 -- 0Leah Hoffmann. Shaping the foundations of programming languages
5 -- 0Andrew A. Chien. two annual Turing awards
7 -- 0Vinton G. Cerf. It came from outer space!
10 -- 11Doug Meil. The search for unlimited productivity
12 -- 14Neil Savage. Getting down to basics
15 -- 16Don Monroe. Deceiving AI
17 -- 0Simson L. Garfinkel, Eugene H. Spafford. Jack Minker (1927 - 2021)
18 -- 20Marina Krakovsky. Taking the heat
21 -- 22Chris Edwards. Let the algorithm decide?
24 -- 30Rebecca T. Mercuri, Peter G. Neumann. The risks of election believability (or lack thereof)
31 -- 0George V. Neville-Neil. Aversion to versions
32 -- 34Peter J. Denning. Locality and professional life
35 -- 38Todd Hylton, Thomas M. Conte, Mark D. Hill. A vision to compute like nature: thermodynamically
39 -- 42Danfeng (Daphne) Yao. Depth and persistence: what researchers need to know about impostor syndrome
43 -- 44Michael L. Littman. Collusion rings threaten the integrity of computer science research
46 -- 53Nicole Forsgren, Margaret-Anne D. Storey, Chandra Shekhar Maddila, Thomas Zimmermann 0001, Brian Houck, Jenna L. Butler. The SPACE of developer productivity
54 -- 61Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia. Toward confidential cloud computing
62 -- 68Hui Guan, Shaoshan Liu, Xiaolong Ma, Wei Niu, Bin Ren, Xipeng Shen, Yanzhi Wang, Pu Zhao. CoCoPIE: enabling real-time AI on off-the-shelf mobile devices via compression-compilation co-design
69 -- 75Xavier Franch, Cristina Palomares, Tony Gorschek. On the requirements engineer role
76 -- 83Thomas J. Misa. Dynamics of gender bias in computing
86 -- 96Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal. Securing internet applications from routing attacks
98 -- 0Abhishek Bhattacharjee. Technical perspective: Race logic presents a novel form of encoding
99 -- 105Georgios Tzimpragos, Advait Madhavan, Dilip Vasudevan, Dmitri B. Strukov, Timothy Sherwood. In-sensor classification with boosted race trees
106 -- 0Natalie D. Enright Jerger. Technical perspective: A chiplet prototype system for deep learning inference
107 -- 116Yakun Sophia Shao, Jason Cemons, Rangharajan Venkatesan, Brian Zimmer, Matthew Fojtik, Nan Jiang 0009, Ben Keller, Alicia Klinefelter, Nathaniel Ross Pinckney, Priyanka Raina, Stephen G. Tell, Yanqing Zhang, William J. Dally, Joel S. Emer, C. Thomas Gray, Brucek Khailany, Stephen W. Keckler. Simba: scaling deep-learning inference with chiplet-based architecture

Volume 64, Issue 5

0 -- 0P-Ray. Behold the Ch!Ld
4 -- 0Moshe Y. Vardi. The agency trilemma and ACM
5 -- 0Cherri M. Pancake, Andrew A. Chien. In response to 'Vardi's insights'
7 -- 0Caven Cade Mitchell. Computing enabled me to...promote sustainability and help underserved communities
8 -- 9Mark Guzdial. Teaching other teachers how to teach CS better
10 -- 12Don Monroe. A satisfying result
13 -- 14Neil Savage. Catching the fakes
15 -- 17Keith Kirkpatrick. A traffic cop for low earth orbit
18 -- 21Sean Peisert. Trustworthy scientific computing
22 -- 24Bryan H. Choi. Software professionals, malpractice law, and codes of ethics
25 -- 27Tim Bell. CS unplugged or coding classes?
28 -- 31Mireille Hildebrandt. Understanding law and the rule of law: a plea to augment CS curricula
32 -- 36Vanessa Sochat. The 10 best practices for remote software engineering
37 -- 41Nachum Dershowitz. Let's be honest
42 -- 51Jatinder Singh, Jennifer Cobbe, Do Le Quoc, Zahra Tarkhani. Enclaves in the clouds
52 -- 59Jessie Frazelle. Battery day
60 -- 65Eric Grosse, Fred B. Schneider, Lynette L. Millett. Implementing insider defenses
66 -- 75Yuhang Liu, Xian-He Sun, Yang Wang, Yungang Bao. HCDA: from computational thinking to a generalized thinking paradigm
76 -- 84Johann Schleier-Smith, Vikram Sreekanti, Anurag Khandelwal, Joao Carreira, Neeraja Jayant Yadwadkar, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica, David A. Patterson. What serverless computing is and should become: the next phase of cloud computing
86 -- 95Loris D'Antoni, Margus Veanes. Automata modulo theories
97 -- 0Pascal Schweitzer. Technical perspective: A logical step toward the graph isomorphism problem
98 -- 105Martin Grohe, Daniel Neuen. Isomorphism, canonization, and definability for graphs of bounded rank width
106 -- 0Jacob Steinhardt. Technical perspective: Robust statistics tackle new problems
107 -- 115Ilias Diakonikolas, Gautam Kamath 0001, Daniel M. Kane, Jerry Li 0001, Ankur Moitra, Alistair Stewart. Robustness meets algorithms

Volume 64, Issue 4

0 -- 0Dennis Shasha. Roulette Angel
5 -- 0Vinton G. Cerf. What does a static, sustainable economy look like?
6 -- 7John Arquilla, Mark Guzdial. The SolarWinds hack, and a grand challenge for CS education
9 -- 11Chris Edwards. The best of NLP
12 -- 14Paul Marks. Deep learning speeds MRI scans
15 -- 17Samuel Greengard. The worsening state of ransomware
20 -- 22Mari Sako. From remote work to working from anywhere
23 -- 24Quincy Brown, Tyrone Grandison, Jamika D. Burge, Odest Chadwicke Jenkins, Tawanna Dillahunt. Reflections on black in computing
25 -- 27George V. Neville-Neil. The non-psychopath's guide to managing an open source project
28 -- 34Thomas Haigh. When hackers were heroes
35 -- 37Liesbeth De Mol, Maarten Bullynck. Roots of 'program' revisited
38 -- 41Denny Vrandecic. Building a multilingual Wikipedia
42 -- 44Sherif G. Aly 0001, Mohamed Mokbel, Moustafa Youssef 0001. Welcome
46 -- 49Elmootazbellah (Mootaz) Elnozahy. Building a research university in the Arab region: the case of KAUST
50 -- 53Ahmed Elmagarmid, Abdellatif Saoudi. Building a preeminent research lab in the Arab region: the case of QCRI
54 -- 56Motaz El-Saban. Data science for the oil and gas industry in the Arab region
57 -- 58Farah E. Shamout, Dana Abu Ali. The strategic pursuit of artificial intelligence in the United Arab Emirates
59 -- 61Ashraf Aboulnaga, Sanjay Chawla, Ahmed K. Elmagarmid, Mohammed Al-Mannai, Hassan Al-Sayed. An AI-enabled future for Qatar and the region
62 -- 63Walid R. Touma, Saad El Zein. Entrepreneurship ecosystem in Lebanon
64 -- 66Hesham M. Eraqi, Ibrahim Sobh. Autonomous driving in the face of unconventional odds
67 -- 68Sofiane Abbar, Rade Stanojevic, Shadab Mustafa, Mohamed F. Mokbel. Traffic routing in the ever-changing city of Doha
69 -- 71Shaimaa Lazem, MennatAllah Saleh, Ebtisam Alabdulqader. ArabHCI: five years and counting
72 -- 81Kareem Darwish, Nizar Habash, Mourad Abbas, Hend S. Al-Khalifa, Hussein T. Al-Natsheh, Houda Bouamor, Karim Bouzoubaa, Violetta Cavalli-Sforza, Samhaa R. El-Beltagy, Wassim El-Hajj, Mustafa Jarrar, Hamdy Mubarak. A panoramic survey of natural language processing in the Arab world
82 -- 87David E. Keyes. The Arab world prepares the exascale workforce
88 -- 95Ingmar Weber, Muhammad Imran 0002, Ferda Ofli, Fouad Mrad, Jennifer Colville, Mehdi Fathallah, Alissar Chaker, Wigdan Seed Ahmed. Non-traditional data sources: providing insights into sustainable development
96 -- 101Christina Pöpper, Michail Maniatakos, Roberto Di Pietro. Cyber security research in the Arab region: a blooming ecosystem with global ambitions
102 -- 107Slim Abdennadher, Sherif G. Aly 0001, Joe Tekli, Karima Echihabi. Unleashing early maturity academic innovations
108 -- 113Seif Eldawlatly, Mohamed Abouelhoda, Omar Sultan Al-Kadi, Takashi Gojobori, Boris Jankovic, Mohamad Khalil, Ahsan H. Khandoker, Ahmed Morsy. Biomedical computing in the Arab world: unlocking the potential of a growing research community
114 -- 119Basem Shihada, Tamer A. ElBatt, Ahmed Eltawil, Mohammad Mansour, Essaid Sabir, Slim Rekhis, Sanaa Sharafeddine. Networking research for the Arab world: from regional initiatives to potential global impact
120 -- 123Ashraf Aboulnaga, Azza Abouzied, Karima Echihabi, Mourad Ouzzani. Database systems research in the Arab world: a tradition that spans decades
124 -- 129Ahmed Ali, Shammur A. Chowdhury, Mohamed Afify, Wassim El-Hajj, Hazem M. Hajj, Mourad Abbas, Amir Hussein, Nada Ghneim, Mohammad Abushariah, Assal Alqudah. Connecting Arabs: bridging the gap in dialectal speech recognition
130 -- 134David Crawshaw. Everything VPN is new again
136 -- 143Sorelle A. Friedler, Carlos Scheidegger, Suresh Venkatasubramanian. The (Im)possibility of fairness: different value systems require different mechanisms for fair decision making
144 -- 152Ralf Jung 0002, Jacques-Henri Jourdan, Robbert Krebbers, Derek Dreyer. Safe systems programming in Rust
154 -- 163Eduardo Souza dos Reis, Cristiano André da Costa, Diórgenes Silveira, Rodrigo Bavaresco, Rodrigo Da Rosa Righi, Jorge Luis Victória Barbosa, Rodolfo Stoffel Antunes, Márcio Miguel Gomes, Gustavo Federizzi. Transformers aftermath: current research and rising trends
165 -- 0Stratos Idreos. Technical perspective: The strength of SuRF
166 -- 173Huanchen Zhang, Hyeontaek Lim, Viktor Leis, David G. Andersen, Michael Kaminsky, Kimberly Keeton, Andrew Pavlo. Succinct range filters

Volume 64, Issue 3

0 -- 0Brian Clegg. Awakening
5 -- 7Andrew A. Chien. Communications' Regional Special Sections
9 -- 0Moshe Y. Vardi. The people vs. tech
11 -- 0Graham Oakes. Enabling renewable energy through smarter grids
12 -- 13Mark Guzdial, Joel C. Adams. Disputing Dijkstra, and birthdays in base 2
15 -- 17Don Monroe. The power of quantum complexity
18 -- 19Neil Savage. Fact-finding mission
20 -- 22Paul Marks. Can the biases in facial recognition be fixed; also, should they?
23 -- 24Simson L. Garfinkel, Eugene H. Spafford. Edmund M. Clarke (1945 - 2020)
26 -- 28Pamela Samuelson. The push for stricter rules for internet platforms
29 -- 32Lorrie Faith Cranor. Informing California privacy regulations with evidence from research
33 -- 35Deborah G. Johnson, Nicholas Diakopoulos. What to do about deepfakes
36 -- 38Peter J. Denning, Jeffrey Johnson 0001. Science is not another opinion
39 -- 41Niklaus Wirth. 50 years of Pascal
42 -- 45Sascha Friesike, Frédéric Thiesse, George Kuk. What can the maker movement teach us about the digitization of creativity?
46 -- 48Oded Nov, Yindalon Aphinyanaphongs, Yvonne W. Lui, Devin M. Mann, Maurizio Porfiri, Mark Riedl, John-Ross Rizzo, Batia Wiesenfeld. The transformation of patient-clinician relationships with AI-based medical advice
50 -- 57CACM Staff. A second conversation with Werner Vogels
58 -- 62Jessie Frazelle. Out-of-this-world additive manufacturing
64 -- 72Neil C. Thompson, Svenja Spanuth. The decline of computers as a general purpose technology
73 -- 77Andreea Molnar, Therese Keane, Rosemary Stockdale. Educational interventions and female enrollment in IT degrees
78 -- 84Lucy Lu Wang, Gabriel Stanovsky, Luca Weihs, Oren Etzioni. Gender trends in computer science authorship
86 -- 95Wojciech Mazurczyk, Luca Caviglione. Cyber reconnaissance techniques
96 -- 104Claudio Gutiérrez 0001, Juan F. Sequeda. Knowledge graphs
106 -- 0Sanjeev Arora. Technical perspective: Why don't today's deep nets overfit to their training data?
107 -- 115Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, Oriol Vinyals. Understanding deep learning (still) requires rethinking generalization
116 -- 0Prabal Dutta. Technical perspective: Localizing insects outdoors
117 -- 125Rajalakshmi Nandakumar, Vikram Iyer, Shyamnath Gollakota. 3D localization for subcentimeter-sized devices

Volume 64, Issue 2

0 -- 0Leah Hoffmann. Bringing stability to wireless connections
5 -- 0Andrew A. Chien. Driving the cloud to true zero carbon
7 -- 0Vinton G. Cerf. Half-baked high-resolution referencing
8 -- 9CACM Staff. Salary disputes
10 -- 11Robin K. Hill. Issues arise when time goes digital
12 -- 14Chris Edwards. Moore's Law: what comes next?
15 -- 16Logan Kugler. The state of virtual reality hardware
17 -- 19Keith Kirkpatrick. Technological responses to COVID-19
20 -- 22Yannis Bakos, Hanna Halaburda, Christoph Müller-Bloch. When permissioned blockchains deliver more decentralization than permissionless
23 -- 25Carol L. Fletcher, Jayce R. Warner. CAPE: a framework for assessing equity throughout the computer science education ecosystem
26 -- 27George V. Neville-Neil. Kabin fever
28 -- 30Chris Maurer, Kevin Kim, Dan J. Kim, Leon A. Kappelman. Cybersecurity: is it worse than we think?
31 -- 32Subbarao Kambhampati. Polanyi's revenge and AI's new romance with tacit knowledge
33 -- 35Donald E. Knuth, Len Shustek. Let's not dumb down the history of computer science
36 -- 43CACM Staff. Differential privacy: the pursuit of protections by default
44 -- 46Thomas A. Limoncelli. The time I stole $10, 000 from Bell Labs
48 -- 58Anna Maria Feit, Mathieu Nancel, Maximilian John, Andreas Karrenbauer, Daryl Weir, Antti Oulasvirta. AZERTY amélioré: computational design on a national scale
59 -- 65Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram. GDPR anti-patterns
66 -- 74Dong H. Ahn, Allison H. Baker, Michael Bentley, Ian Briggs, Ganesh Gopalakrishnan, Dorit M. Hammerling, Ignacio Laguna, Gregory L. Lee, Daniel J. Milroy, Mariana Vertenstein. Keeping science on keel when software moves
76 -- 83Pascal Hitzler. A review of the semantic web field
84 -- 93Sameer Wagh, Xi He 0001, Ashwin Machanavajjhala, Prateek Mittal. DP-cryptography: marrying differential privacy and cryptography in emerging applications
96 -- 0 Nada Amin. Technical perspective: Programming microfluidics to execute biological protocols
97 -- 104Jason Ott, Tyson Loveless, Christopher Curtis, Mohsen Lesani, Philip Brisk. BioScript: programming safe chemistry on laboratories-on-a-chip
105 -- 0Zachary G. Ives. Technical perspective: Solving the signal reconstruction problem at scale
106 -- 115Abolfazl Asudeh, Jees Augustine, Saravanan Thirumuruganathan, Azade Nazi, Nan Zhang 0004, Gautam Das 0001, Divesh Srivastava. Scalable signal reconstruction for a broad range of applications

Volume 64, Issue 12

0 -- 0Leah Hoffmann. Exploring the promise of quantum computing
5 -- 0Vicki L. Hanson. Communicating ACM priorities
6 -- 7Andrew A. Chien. Good, better, best: how sustainable should computing be?
9 -- 0Vinton G. Cerf. On heterogeneous computing
10 -- 12CACM Staff. Common ails
14 -- 15Robin K. Hill, Carlos Baquero. Seeking out Camille, and being open to others
17 -- 19Don Monroe. Trouble at the source
20 -- 22Keith Kirkpatrick. The road ahead for augmented reality
23 -- 25Samuel Greengard. What is the cost of living online?
26 -- 27Jack W. Davidson, Joseph A. Konstan, Scott E. Delman. ACM publications finances for 2020
30 -- 33Peter J. Denning, Matti Tedre. Computational thinking for professionals
34 -- 35Marshall W. van Alstyne, Georgios Petropoulos, Geoffrey G. Parker 0001, Bertin Martens. 'In situ' data rights
36 -- 38Mark D. Hill, Vijay Janapa Reddi. Accelerator-level parallelism
39 -- 0George V. Neville-Neil. Patent absurdity
40 -- 42Rosalind W. Picard. What every engineer and computer scientist should know: the biggest contributor to happiness
44 -- 47Liu Leqi, Dylan Hadfield-Menell, Zachary C. Lipton. When curation becomes creation
48 -- 56Ashish Gehani, Raza Ahmad, Hassaan Irshad, Jianqiao Zhu, Jignesh Patel. Digging into big provenance (with SPADE)
58 -- 65Sara Hooker. The hardware lottery
66 -- 74Xiaowei Xu 0004, Hailong Qiu, Qianjun Jia, Yuhao Dong, Zeyang Yao, Wen Xie, Huiming Guo, Haiyun Yuan, Jian Zhuang, Meiping Huang, Yiyu Shi. AI-CHD: an AI-based framework for cost-effective surgical telementoring of congenital heart disease
75 -- 84Ranveer Chandra, Stewart Collis. Digital agriculture for small-scale producers: challenges and opportunities
86 -- 92Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna M. Wallach, Hal Daumé III, Kate Crawford 0002. Datasheets for datasets
94 -- 0Fadel Adib. Technical perspective: Cooking up a solution to microwave heat distribution
95 -- 103Haojian Jin, Jingxian Wang, Swarun Kumar, Jason I. Hong. Software-defined cooking using a microwave oven
104 -- 0Timothy Sherwood. Technical perspective: A recipe for protecting against speculation attacks
105 -- 112Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison 0001, Josep Torrellas, Christopher W. Fletcher. Speculative taint tracking (STT): a comprehensive protection for speculatively accessed data

Volume 64, Issue 11

5 -- 0Moshe Y. Vardi. The paradox of choice in computing-research conferences
7 -- 0Ann Moffatt. Grace Hopper, minicomputers, and megabytes: it's a fun career
8 -- 9Andrei Sukhov, Vivek S. Buzruk. Assessing internet software engineering, encouraging competitions
11 -- 13Samuel Greengard. Qubit devices inch toward reality
14 -- 16Chris Edwards. Holograms on the horizon?
17 -- 19Esther Shein. Filtering for beauty
20 -- 22Pamela Samuelson. Text and data mining of in-copyright works: is it legal?
23 -- 25Lea Kissner, Lorrie Faith Cranor. Privacy engineering superheroes
26 -- 29Katie Shilton, Megan Finn, Quinn DuPont. Shaping ethical computing cultures
30 -- 33Alexander Repenning, Ashok R. Basawapatna. Explicative programming
34 -- 36Karl Stöger, David Schneeberger, Andreas Holzinger. Medical artificial intelligence: the European legal perspective
37 -- 39Yoram Reich, Eswaran Subrahmanian. We are not users: gaining control over new technologies
40 -- 42Hai Jin, Yuanchun Shi, Dahua Lin. Welcome back!
44 -- 47Fang Su, Xiao-Peng An, Ji-Ye Mao. Innovations and trends in China's digital economy
48 -- 49Chunfeng Yuan, Xiaopeng Gao, Yu Chen, Yungang Bao. Teaching undergraduates to build real computer systems
50 -- 51Xu Han 0007, Zhengyan Zhang, Zhiyuan Liu 0001. Knowledgeable machine learning for natural language processing
52 -- 54Fei Wu 0001, Qinming He, Chao Wu 0001. AI+X micro-program fosters interdisciplinary skills in China
55 -- 56Jing Yang. AI start-ups in China
57 -- 59Feng Tian 0001, Yuntao Wang, Yicheng Zhu. Natural interactive techniques for the detection and assessment of neurological diseases
60 -- 63Yiming Zhang, Kai Lu, Wenguang Chen. Processing extreme-scale graphs on China's supercomputers
64 -- 69Guofeng Zhang 0001, Xiaowei Zhou, Feng Tian, Hongbin Zha, Yongtian Wang, Hujun Bao. The present and future of mixed reality in China
70 -- 75Chun Yu, Jiajun Bu. The practice of applying AI to benefit visually impaired people in China
76 -- 80Zhiwen Yu 0001, Huadong Ma, Bin Guo 0001, Zheng Yang. Crowdsensing 2.0
81 -- 87Jia Jia, Wei Chen, Kai Yu, Xiaodong He 0001, Jun Du, Heung-Yeung Shum. The practice of speech and language processing in China
88 -- 93Liang Cai, Yi Sun, Zibin Zheng, Jiang Xiao, Weiwei Qiu. Blockchain in China
94 -- 96Poul-Henning Kamp. What went wrong?
98 -- 108Christoph Gröger. There is no AI without data
109 -- 117Favyen Bastani, Songtao He, Satvat Jagwani, Edward Park, Sofiane Abbar, Mohammad Alizadeh, Hari Balakrishnan, Sanjay Chawla, Sam Madden, Mohammad Amin Sadeghi. Inferring and improving street maps with data-driven automation
120 -- 0Pascal Van Hentenryck. Technical perspective: Finding the sweet spot amid accuracy and performance
121 -- 129Alexandru Cristian, Luke Marshall, Mihai Negrea, Flavius Stoichescu, Peiwei Cao, Ishai Menache. Multi-itinerary optimization as cloud service
130 -- 0Dorit Aharonov, Michael Chapman. Technical perspective: On proofs, entanglement, and games
131 -- 138Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright 0004, Henry Yuen. MIP* = RE
144 -- 0William Sims Bainbridge. World of hackcraft: an obsessive gamer's quest for the absolutely most significant computer ever

Volume 64, Issue 10

0 -- 0Dennis E. Shasha. Randomower
5 -- 0Vinton G. Cerf. The future of text redux
6 -- 7Andrei Sukhov, Igor Sorokin, Doug Meil. New life for cordless communication, old regrets for software projects
8 -- 10Don Monroe. Flatter chips
11 -- 12Keith Kirkpatrick. Algorithmic poverty
13 -- 15Chris Edwards. A switch in time
16 -- 18Michael A. Cusumano. Section 230 and a tragedy of the commons
19 -- 21Kendra Walther, Richard E. Ladner. Broadening participation by teaching accessibility
22 -- 24Hannah Thinyane. Remaining connected throughout design
25 -- 0George V. Neville-Neil. Divide and conquer
26 -- 29Cory Doctorow. Competitive compatibility: let's fix the internet, not the tech giants
30 -- 31Devdatt P. Dubhashi. AI futures: fact and fantasy
32 -- 35João Varajão. Software development in disruptive times
36 -- 39Jessie Frazelle. A new era for mechanical CAD
40 -- 47Matthew Groh, Ziv Epstein, Nick Obradovich, Manuel Cebrián, Iyad Rahwan. Human detection of machine-manipulated media
48 -- 55Osku Torro, Henri Jalo, Henri Pirkkalainen. Six reasons why virtual reality is a game-changing computing and communication platform for organizations
56 -- 63Mark Tannian, Willie Coston. The role of professional certifications in computer occupations
64 -- 71Jeannette M. Wing. Trustworthy AI
74 -- 0Tam Vu. Technical perspective: Liquid testing using built-in phone sensors
75 -- 83Shichao Yue, Dina Katabi. Liquid testing with your smartphone
84 -- 0Ahmad-Reza Sadeghi. Technical perspective: The real-world dilemma of security and privacy by design
85 -- 93Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha. Securing the wireless emergency alerts system

Volume 64, Issue 1

5 -- 0Andrew A. Chien. 2021: Computing's divided future
7 -- 0Moshe Y. Vardi. Reboot the computing-research publication systems
9 -- 0Dona Crawford. A career fueled by HPC
10 -- 11Mark Guzdial. Talking about race in CS education
13 -- 15Samuel Greengard. Geometric deep learning advances data science
16 -- 18Don Monroe. Fugaku takes the lead
19 -- 21Chris Edwards. Coalition of the willing takes aim at COVID-19
22 -- 25Michael A. Cusumano. Boeing's 737 MAX: a failure of management, not just technology
26 -- 28Terry Benzel. Cybersecurity research for the future
29 -- 31Kate Klonick. Content moderation modulation
32 -- 37Thomas Haigh. The immortal soul of an old machine
38 -- 41Gary Marcus, Ernest Davis. Insights for AI from the human mind
42 -- 44Ofir Turel, Christopher Ferguson. Excessive use of technology: can tech providers be the culprits?
46 -- 55Phil Vachon. The identity in everyone's pocket
56 -- 60Edlyn V. Levine. The die is cast
62 -- 69José González Cabañas, Ángel Cuevas, Aritz Arrate Galán, Rubén Cuevas. Does Facebook use sensitive data for advertising purposes?
70 -- 78Pantelis Koutroumpis, Aija Leiponen, Llewellyn D. W. Thomas. Digital instruments as invention machines
79 -- 85Karoly Bozan, Kalle Lyytinen, Gregory M. Rose. How to transition incrementally to microservice architecture
86 -- 96Yehuda Lindell. Secure multiparty computation
97 -- 103Stephen B. Wicker. The ethics of zero-day exploits - : the NSA meets the trolley car
105 -- 0Daniel Gottesman. Technical perspective: Deciphering errors to reduce the cost of quantum computation
106 -- 114Omar Fawzi, Antoine Grospellier, Anthony Leverrier. Constant overhead quantum fault tolerance with quantum expander codes
115 -- 0Richard Han. Technical perspective: SkyCore's architecture takes it to the 'edge'
116 -- 124Mehrdad Moradi, Karthikeyan Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao. SkyCore: moving core to the edge for untethered and reliable UAV-based LTE networks
128 -- 0Dennis E. Shasha. Stay in balance