Journal: SIGACT News

Volume 43, Issue 4

10 -- 12William I. Gasarch. The book review column
13 -- 16Alexandre Anzala-Yamajako. Review of algorithmic cryptanalysis, by Antoine Joux
17 -- 24Aaron Sterling. Review of algorithmic bioprocesses, edited by Condon, Harel, Kok, Salomaa, Winfree
25 -- 29Yu Wang 0003. Review of vehicular networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle
30 -- 34Francesco Silvestri. Review of graph theory and interconnection networks, by Lih-Hsing Hsu and Cheng-Kuan Lin
34 -- 37Stephan Falke. Review of transitions and trees: an introduction to structural operational semantics, by Hans Hüttel
38 -- 40Haim Kilov. Review of origins and foundations of computing, by Friedrich L. Bauer
41 -- 43Ben Fulton. Review of introduction to scheduling, by Yves Robert and Frederic Vivien
44 -- 48Kyriakos N. Sgarbas. Review of semantic techniques in quantum computation, edited by Simon Gay and Ian Mackie
49 -- 51Song Yan. Review of modern computer arithmetic, by Richard Brent and Paul Zimmermann
52 -- 54Deeparnab Chakrabarty. Review of design of approximation algorithms, by David P. Williamson and David B. Shmoys
55 -- 56Dean Kelley. Technical report column
57 -- 59Samir Khuller. Algorithms column: An overview of the recent progress on matrix multiplication by Virginia Vassilevska Williams
70 -- 89Lane A. Hemaspaandra, Ryan Williams. SIGACT News Complexity Theory Column 76: an atypical survey of typical-case heuristic algorithms
90 -- 97Adrian Dumitrescu, Csaba D. Tóth. Computational geometry column 54
98 -- 100Idit Keidar. Distributed computing column 48: annual review 2012
101 -- 103Maurice Herlihy, Nir Shavit. Transactional memory: beyond the first two decades
104 -- 111Siddhartha Sen. Review of PODC 2012
112 -- 115Mika Göös. Review of DISC 2012
116 -- 122Vincent Gramoli, Alessia Milani. WTTM 2012, the fourth workshop on the theory of transactional memory
123 -- 129Rob van Stee. SIGACT news online algorithms column 21: APPROX and ALGO

Volume 43, Issue 3

15 -- 18William I. Gasarch. The book review column
19 -- 21William I. Gasarch. Review of combinatorial games: tic-tac-toe theory, by Jozsef Beck
22 -- 24Antonio E. Porreca. Review of algorithmic adventures: from knowledge to magic, by Juraj Hromković
25 -- 27Yulai Xie. Review of applied algebra: codes, ciphers and discrete algorithms, by Darel W. Hardy, Fred Richman, and Carol L. Walker
28 -- 31José de Oliveira Guimarães. Review of models of computation: an introduction to computability theory, by Maribel Fernández
32 -- 37Michaël Cadilhac. Review of handbook of weighted automata, edited by Manfred Droste, Werner Kuich and Heiko Vogler
38 -- 40Haris Aziz. Review of matching theory, by László Lovász and Michael D. Plummer
41 -- 44Stephan Falke. Review of introduction to mathematics of satisfiability, by Victor W. Marek
45 -- 47Shiva Kintali. Review of elements of automata theory, by Jacques Sakarovitch, Translator (from French) Reuben Thomas
48 -- 50Anthony Labarre. Review of combinatorial pattern matching algorithms in computational biology using Perl and R, by Gabriel Valiente
51 -- 53Haris Aziz. Review of in pursuit of the traveling salesman, by William J. Cook
54 -- 55Karolina Soltys. Review of permutation patterns, edited by Steve Linton, Nik Ruškuc, Vincent Vatter
56 -- 59Dean Kelley. Technical report column
60 -- 64Nachum Dershowitz, Edward M. Reingold. Modulo intervals: a proposed notation
65 -- 66Lane A. Hemaspaandra. SIGACT news complexity theory column 75
67 -- 84Amir Yehudayoff. Proving expansion in three steps
85 -- 86Michael Benedikt. Report on PODS 2012
87 -- 0Idit Keidar. Distributed computing column 47: distributed computability
88 -- 110Maurice Herlihy, Sergio Rajsbaum, Michel Raynal. Computability in distributed computing: a Tutorial

Volume 43, Issue 2

6 -- 8William I. Gasarch. The book review column
9 -- 10Ville Hautamäki. Review of a concise introduction to data compression by David Salomon
11 -- 14Mihai Pop. Review of parallel algorithms by Henri Casanova, Arnaud Legrand, and Yves Robert
15 -- 20Akash Kumar. Review of polynomia and related realms by Dan Kalman
21 -- 24Jeffrey Shallit. Review of biscuits of number theory by Arthur T. Benjamin and Ezra Brown
25 -- 28Gabriel Istrate. Review of handbook of large-scale random networks by Bela Bollobás, Robert Kozma and Deszö Miklós
29 -- 32Nick Papanikolaou. Review of algorithms and theory of computation handbook by Mikhail J. Atallah and Marina Blanton
33 -- 35S. C. Coutinho. Review of primality testing and integer factorization in public key cryptography by Song Y. Yan
36 -- 38Wesley Calvert. Review of process algebra: equational theories of communicating processes by J. C. M. Baeten, T. Basten, and M. A. Reniers
38 -- 40Kim-Kwang Raymond Choo. Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop
41 -- 44Dean Kelley. Technical report column
45 -- 50Oded Goldreich. On intellectual and instrumental values in science
51 -- 52Lane A. Hemaspaandra. SIGACT news complexity theory column 74
53 -- 77William I. Gasarch. Guest Column: the second P =?NP poll
78 -- 83Adrian Dumitrescu. Computational geometry column 53
84 -- 0Idit Keidar. Distributed computing column 46: synthesizing distributed and concurrent programs
85 -- 107Borzoo Bonakdarpour, Sandeep S. Kulkarni. Automated model repair for distributed programs
108 -- 123Michael Kuperstein, Martin T. Vechev, Eran Yahav. Automatic inference of memory fences
124 -- 126Chong-Zhang Li. Hilbert's formalistic method and its development in computer science
127 -- 136Rob van Stee. SIGACT news online algorithms column 20: the power of harmony

Volume 43, Issue 1

7 -- 9William I. Gasarch. The book review column
9 -- 14Abu Mohammad Omar Shehab Uddin Ayub. Review of the Cryptoclub: using mathematics to make and break secret codes by Janet Beissinger and Vera Pless
14 -- 16Leo Irakliotis. Review of cryptanalytic attacks on RSA by Song Y. Yan
16 -- 18Antoine Rojat. Review of cryptanalysis of RSA and its variants by Jason Hinek
18 -- 21Jérémy Barbay. Review of understanding and applying cryptography and data security by Adam J. Elbirt
21 -- 23Jonathan Katz. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell
23 -- 27Daniel Apon. Review of theory of computation by Dexter C. Kozen
27 -- 29Robert J. Low. Review of codes: an introduction to information communication and cryptography by Norman L Biggs
30 -- 31Jeffrey Shallit. Review of finite fields and applications by Gary L. Mullen and Carl Mummert
32 -- 33Miklós Bóna. Review of the life and times of the central limit theorem by William J. Adams
33 -- 34Robert Szarka. Review of pearls of discrete mathematics by Martin Erickson
35 -- 37Dimitris Papamichail. Review of design theory by C. C. Lindner and C. A. Rodger
39 -- 0William I. Gasarch. Review of an introduction to the history of algebra solving equations from Mesopotamian Times to the Renaissance by Jacques Sesiano
40 -- 43Dean Kelley. Technical report column
43 -- 60Oded Goldreich. On struggle and competition in scientic fields
61 -- 0Lane A. Hemaspaandra. SIGACT news complexity theory column 73
62 -- 81Dana Moshkovitz. Guest column: algebraic construction of projection PCPs
82 -- 85Joseph O'Rourke. Computational geometry column 52
86 -- 0Idit Keidar. Distributed computing column 45: what theory for transactional memory?
87 -- 92Petr Kuznetsov, Srivatsan Ravi. WTTM 2011: the third workshop on the theory of transactional memory