


default search action
Communications of the ACM, Volume 60
Volume 60, Number 1, January 2017
- Moshe Y. Vardi:
Technology for the most effective use of mankind. 5 - Vicki L. Hanson:
The ACM future of computing academy. 7 - Vinton G. Cerf:
Information and misinformation on the internet. 9
- Valerie Barr:
How we teach CS2All. 10-11 - Michael Stonebraker, Raul Castro Fernandez, Dong Deng, Michael L. Brodie:
What to do about database decay. 11
- Don Monroe:
Pure randomness extracted from two poor sources. 13-15 - Alex Wright:
Mapping the internet of things. 16-18 - Gregory Mone:
Bias in technology. 19-20
- Michael A. Cusumano:
Is Google's alphabet a good bet? 22-25
- Michael Geist:
Why less is more when it comes to internet jurisdiction. 26-28
- Thomas Haigh:
Colossal genius: Tutte, Flowers, and a bad imitation of Turing. 29-35
- Jerry Kaplan:
Artificial intelligence: think again. 36-38 - Jeremy Straub
:
Effects of international trafficking in arms regulations changes. 39-41
- Kate Matsudaira:
Resolving conflict. 42-44 - Josh Bailey, Stephen Stuart:
Faucet: deploying SDN in the enterprise. 45-49 - Peter Bailis, Jean Yang, Vijay Janapa Reddi, Yuhao Zhu:
Research for practice: web security and mobile web computing. 50-53
- Peter J. Denning, Ted G. Lewis:
Exponential laws of computing growth. 54-65 - Cecil Eng Huang Chua
, Veda C. Storey:
Bottom-up enterprise information systems: rethinking the roles of central IT departments. 66-72
- Bülent Yener:
Cell-graphs: image-driven modeling of structure-function relationship. 74-84
- Richard Szeliski:
Magnifying motions the right way: technical perspective. 86 - Neal Wadhwa, Hao-Yu Wu, Abe Davis, Michael Rubinstein, Eugene Shih, Gautham J. Mysore, Justin G. Chen, Oral Büyüköztürk, John V. Guttag, William T. Freeman, Frédo Durand:
Eulerian video magnification and analysis. 87-95 - Valentina Salapura:
Technical Perspective: Mapping the universe. 96 - Salman Habib, Vitali A. Morozov, Nicholas Frontiere, Hal Finkel, Adrian Pope, Katrin Heitmann, Kalyan Kumaran, Venkatram Vishwanath, Tom Peterka, Joseph A. Insley, David Daniel, Patricia K. Fasel, Zarija Lukic:
HACC: extreme scaling and performance across diverse architectures. 97-104
- Dennis E. Shasha:
Open field tic-tac-toe. 112
Volume 60, Number 2, February 2017
- Vicki L. Hanson:
Celebrating 50 years of the Turing award. 5 - Francine Berman, Vinton G. Cerf:
Social and ethical behavior in the internet of things. 6-7
- Use the scientific method in computer science. 8-9
- Artificial intelligence. 10-11
- Janet Davis:
Liberal arts academia wants YOU! 12-13
- Chris Edwards:
Secure quantum communications. 15-17 - Samuel Greengard:
Are computer chips the new security threat? 18-19 - Keith Kirkpatrick:
It's not the algorithm, it's the data. 21-23
- Ulf Lindqvist
, Peter G. Neumann:
The future of the internet of things. 26-30
- Aman Yadav
, Steve Cooper:
Fostering creativity through computing. 31-33
- George V. Neville-Neil
:
The unholy trinity of software development. 34-36
- Azer Bestavros
, Andrei Lapets
, Mayank Varia:
User-centric distributed solutions for privacy-preserving analytics. 37-39
- Alan Bundy:
Smart machines are not a threat to humanity. 40-42 - Devdatt P. Dubhashi, Shalom Lappin:
AI dangers: imagined and real. 43-45
- Pat Helland:
Life beyond distributed transactions. 46-54 - Thomas A. Limoncelli:
Are you load balancing wrong? 55-57 - Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson:
BBR: congestion-based congestion control. 58-66
- Brett Danaher, Michael D. Smith
, Rahul Telang
:
Copyright enforcement in the digital age: empirical evidence and policy implications. 68-75 - Herbert E. Bruderer
:
Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe. 76-84
- Frits W. Vaandrager:
Model learning. 86-95
- Eric Rescorla:
Technical Perspective: Cleaning up flaws in TLS implementations. 98 - Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss
, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A messy state of the union: taming the composite state machines of TLS. 99-107 - Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. 108-115
- William Sims Bainbridge:
Fatal guidance. 120-
Volume 60, Number 3, March 2017
- Moshe Y. Vardi:
ACM's open-conference principle and political reality. 5 - Vicki L. Hanson:
ACM's commitment to accessibility. 7 - Vinton G. Cerf:
Grumpy old cells. 9
- Address the consequences of AI in advance. 10-11
- Mark Guzdial
, Robin K. Hill:
The slow evolution of CS for all, the beauty of programs. 12-13
- Neil Savage:
Thinking deeply to make better speech. 15-17 - Samuel Greengard:
The future of semiconductors. 18-20 - Keith Kirkpatrick:
Financing the dark web. 21-22 - ACM recognizes new fellows. 23
- Pamela Samuelson:
Supreme Court on design patent damages in Samsung v. Apple. 26-28
- Elizabeth Varki:
Where review goes wrong. 29-30
- Peter J. Denning, Matti Tedre, Pat Yongpradit:
Misconceptions about computer science. 31-33
- Thomas M. Philip:
Learning with mobile technologies. 34-36
- Theo Schlossnagle:
Time, but faster. 38-41 - Mohamed Zahran
:
Heterogeneous computing: here to stay. 42-45 - Peter Bailis, Irene Zhang, Fadel Adib:
Research for practice: distributed transactions and networks as physical sensors. 46-49
- Jonathan Lazar, Elizabeth F. Churchill, Tovi Grossman, Gerrit C. van der Veer, Philippe A. Palanque, John Morris, Jennifer Mankoff
:
Making the field of computing more inclusive. 50-59 - Daniel J. Mazzola, Robert D. St. Louis, Mohan R. Tanniru
:
The path to the top: insights from career histories of top CIOs. 60-68
- Simon Price
, Peter A. Flach
:
Computational support for academic peer review: a perspective from artificial intelligence. 70-79
- Srinivasan Keshav
:
Technical Perspective: The power of wi-fi to deliver power. 82 - Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Joshua R. Smith, Shyamnath Gollakota:
Powering the next Billion devices with wi-fi. 83-91 - Leonid Libkin
:
Technical Perspective: Data distribution for fast joins. 92 - Tom J. Ameloot, Gaetano Geck
, Bas Ketsman
, Frank Neven
, Thomas Schwentick:
Reasoning on data partitioning for single-round multi-join evaluation in massively parallel systems. 93-100
- Leah Hoffmann:
Out of bounds. 104-
Volume 60, Number 4, April 2017
- Valerie Barr:
Gender diversity in computing: are we making any progress? 5 - Vinton G. Cerf:
A genetic theory of the Silicon Valley phenomenon. 7
- Consider indirect threats of AI, too. 8-9
- John Arquilla, Mark Guzdial
:
Crafting a national cyberdefense, and preparing to support computational literacy. 10-11
- Gregory Mone:
Sensors on the brain. 12-14 - Chris Edwards:
Digitizing the world. 15-16 - Esther Shein:
Computing the arts. 17-19 - Cybersecurity. 20-21
- Ineke Buskens:
Online social networks and global women's empowerment. 22-23
- George V. Neville-Neil
:
The chess player who couldn't pass the salt. 24-25
- William Regli:
Wanted: toolsmiths. 26-28 - Yancey Strickler:
What it means to be an entrepreneur today. 29-31
- Meng-Day (Mandel) Yu, Srinivas Devadas:
Pervasive, dynamic authentication of physical items. 32-39 - Robert C. Seacord:
Uninitialized reads. 40-44 - Kate Matsudaira:
Does anybody listen to you? 45-46
- Luiz André Barroso, Mike Marty, David A. Patterson, Parthasarathy Ranganathan:
Attack of the killer microseconds. 48-54 - Aman Yadav
, Chris Stephenson, Hai Hong:
Computational thinking for teacher education. 55-62
- Athman Bouguettaya
, Munindar P. Singh
, Michael N. Huhns, Quan Z. Sheng
, Hai Dong
, Qi Yu
, Azadeh Ghari Neiat, Sajib Mistry
, Boualem Benatallah
, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos
, Liang Chen, Surya Nepal
, Zaki Malik
, Abdelkarim Erradi, Yan Wang
, M. Brian Blake, Schahram Dustdar
, Frank Leymann, Michael P. Papazoglou
:
A service computing manifesto: the next 10 years. 64-72
- Gernot Heiser:
Technical Perspective: Proving file systems meet expectations. 74 - Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler:
Certifying a file system using crash hoare logic: correctness in the presence of crashes. 75-84 - Jonathan R. Ullman:
Technical Perspective: Building a safety net for data reuse. 85 - Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth
:
Guilt-free data reuse. 86-93
- Dennis E. Shasha:
Stacking the deck. 96
Volume 60, Number 5, May 2017
- Moshe Y. Vardi:
Cyber insecurity and cyber libertarianism. 5 - Vinton G. Cerf:
Can liberty survive the digital age? 7
- Bertrand Meyer:
Ending null pointer crashes. 8-9
- Esther Shein:
Combating cancer with data. 10-12 - Samuel Greengard:
Making chips smarter. 13-15 - Keith Kirkpatrick:
Bionics in competition. 16-17 - The internet of things. 18-19
- Woodrow Hartzog
:
The anonymization debate should be about risk, not perfection. 22-24
- Leo Porter
, Cynthia Bailey Lee, Beth Simon, Mark Guzdial
:
Preparing tomorrow's faculty to address challenges in teaching computer science. 25-27
- Wendell Wallach:
Toward a ban on lethal autonomous weapons: surmounting the obstacles. 28-34
- Erik Meijer:
Making money using math. 36-42 - Robert Guo:
MongoDB's JavaScript fuzzer. 43-47 - Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning. 48-51
- Catherine C. Marshall, Frank M. Shipman III:
Who owns the social web? 52-61 - Marina Jirotka, Barbara Grimpe, Bernd Carsten Stahl, Grace Eden
, Mark Hartswood:
Responsible research and innovation in the digital age. 62-68
- Milan Vojnovic:
Contest theory. 70-80
- Guy E. Blelloch:
Technical Perspective: Functional compilers. 82 - Geoffrey Mainland, Roman Leshchinskiy, Simon Peyton Jones:
Exploiting vector instructions with generalized stream fusion. 83-91 - Alon Y. Halevy:
Technical Perspective: Building knowledge bases from messy data. 92 - Ce Zhang, Christopher Ré, Michael J. Cafarella, Jaeho Shin, Feiran Wang, Sen Wu:
DeepDive: declarative knowledge base construction. 93-102
- David Allen Batchelor:
Beyond 'Star Trek'. 104-
- Bo Brinkman, Catherine Flick
, Don Gotterbarn
, Keith W. Miller
, Marty J. Wolf:
Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. 105-111
Volume 60, Number 6, June 2017
- Moshe Y. Vardi:
Ten years at the helm of communications of the ACM. 5
- Vinton G. Cerf:
Open access to academic research. 7
- Technologies do have ethics. 8-9
- Mark Guzdial
:
Balancing teaching CS efficiently with motivating students. 10-11
- Don Monroe:
Deep learning takes on translation. 12-14 - Chris Edwards:
Optimization search finds a heart of glass. 15-16 - Sarah Underwood:
Potential and peril. 17-19 - Neil Savage:
Weaving the web. 20-22 - Big data. 24-25
- Peter G. Neumann:
Trustworthiness and truthfulness are essential. 26-28
- Leslie Goodyear, Gary Silverstein, Linda P. Thurston:
The influence and promise of alliances. 29-30
- George V. Neville-Neil:
Forced exception handling. 31-32
- Peter J. Denning:
Remaining trouble spots with computational thinking. 33-39
- Devon H. O'Dell:
The debugging mind-set. 40-45 - Pat Helland, Simon Weaver, Ed Harris:
Too big NOT to fail. 46-50 - Kate Matsudaira, Erik Meijer:
Conversations with technology leaders: Erik Meijer. 51-54
- David Barrera, Laurent Chuat, Adrian Perrig
, Raphael M. Reischuk, Pawel Szalachowski:
The SCION internet architecture. 56-65 - Yili Liu, Lina Zhou:
The dynamics of work-family conflict. 66-70
- David Bau
, Jeff Gray
, Caitlin Kelleher, Josh Sheldon, Franklyn A. Turbak:
Learnable programming: blocks and beyond. 72-80
- Jitendra Malik:
Technical Perspective: What led computer vision to deep learning? 82-83 - Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton:
ImageNet classification with deep convolutional neural networks. 84-90 - Avi Wigderson:
Technical Perspective: Low-depth arithmetic circuits. 91 - Ankit Gupta, Pritish Kamath, Neeraj Kayal, Ramprasad Saptharishi
:
Unexpected power of low-depth arithmetic circuits. 93-100
- Leah Hoffmann:
This is for everyone. 104-
Volume 60, Number 7, July 2017
- Andrew A. Chien:
Today's Communications of the ACM. 5
- Vinton G. Cerf:
A brittle and fragile future. 7
- Mark Guzdial
:
'Generation CS' drives growth in enrollments. 10-11
- Neil Savage:
Building a brain may mean going analog. 13-15 - Samuel Greengard:
Cracking the code on DNA storage. 16-18 - Gary Anthes:
Artificial intelligence poised to ride a new wave. 19-21 - Lawrence M. Fisher:
Jean E. Sammet 1928-2017. 22
- Adam L. Young, Moti Yung:
Cryptovirology: the birth, neglect, and explosion of ransomware. 24-26
- Brad Greenwood
, Gordon Burtch
:
Unknowns of the gig-economy. 27-29
- Peter J. Denning:
The beginner's creed. 30-31
- Marc Snir:
The informal guide to ACM fellow nominations. 32-34
- Pat Helland:
Side effects, front and center. 36-39 - Mark A. Overton:
The IDAR graph. 40-45 - Peter Bailis, Peter Alvaro
, Sumit Gulwani:
Research for practice: tracing and debugging distributed systems; programming by examples. 46-49
- D. Fox Harrell, Chong-U Lim:
Reimagining the avatar dream: modeling social identity in digital media. 50-61 - Pantelis Koutroumpis, Aija Leiponen, Llewellyn D. W. Thomas
:
How important is IT? 62-68
- Denis Nekipelov:
Inference and auction design in online advertising. 70-79
- Fred B. Schneider:
Technical Perspective: IronFleet simplifies proving safety and liveness properties. 82 - Chris Hawblitzel, Jon Howell, Manos Kapritsos
, Jacob R. Lorch, Bryan Parno, Michael Lowell Roberts, Srinath T. V. Setty, Brian Zill:
IronFleet: proving safety and liveness of practical distributed systems. 83-92 - Michael Mitzenmacher:
Technical Perspective: Building a better hash function. 93 - Mikkel Thorup
:
Fast and powerful hashing using tabulation. 94-101
- Dennis E. Shasha:
Ruby risks. 104
Volume 60, Number 8, August 2017
- Andrew A. Chien:
Building the future: Communications of the ACM. 5
- Vinton G. Cerf:
In praise of under-specification? 7
- Embed ethical guidelines in autonomous weapons. 8-9
- Philip J. Guo:
How adults ages 60+ are learning to code. 10-11
- Esther Shein:
Hacker-proof coding. 12-14 - Logan Kugler:
Why virtual reality will transform a workplace near you. 15-17 - Keith Kirkpatrick:
AI in contact centers. 18-19 - Lawrence M. Fisher:
Charles P. 'Chuck' Thacker: 1943-2017. 20-21
- David P. Anderson:
Prophets, seers, and pioneers. 22-25
- Jennifer Wang:
Is the U.S. education system ready for CS for all? 26-28
- George V. Neville-Neil
:
The observer effect. 29-30
- Dominic Horsman
, Vivien M. Kendon
, Susan Stepney
:
The natural science of computing. 31-34
- Ricardo Olenewa, Gary M. Olson, Judith S. Olson, Daniel M. Russell:
Now that we can write simultaneously, how do we use that to our advantage? 36-43 - Hans-Juergen Boehm:
Small-data computing: correct calculator arithmetic. 44-49
- Leo Corry:
Turing's pre-war analog computers: the fatherhood of the modern computer revisited. 50-58 - Longbing Cao
:
Data science: challenges and directions. 59-68
- Marijn J. H. Heule
, Oliver Kullmann:
The science of brute force. 70-79
- Marc Shapiro:
Technical Perspective: Unexpected connections. 82 - Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich:
The scalable commutativity rule: designing scalable software for multicore processors. 83-90 - Helmut Pottmann:
Technical Perspective: Linking form, function, and fabrication. 91 - Moritz Bächer, Bernd Bickel
, Emily Whiting
, Olga Sorkine-Hornung:
Spin-it: optimizing moment of inertia for spinnable objects. 92-99
- Brian Clegg:
Turing's taxi. 104-
Volume 60, Number 9, September 2017
- Simson L. Garfinkel
, Jeanna N. Matthews
, Stuart S. Shapiro, Jonathan M. Smith:
Toward algorithmic transparency and accountability. 5
- Vinton G. Cerf:
Take two aspirin and call me in the morning. 6
- Moshe Y. Vardi:
Divination by program committee. 7
- Computational thinking is not necessarily computational. 8-9
- Robin K. Hill:
Assuring software quality by preventing neglect. 10-11
- Samuel Greengard:
It's all about image. 13-15 - Gregory Mone:
Broadband to Mars. 16-17 - Logan Kugler:
Why GPS spoofing is a threat to companies, countries. 18-19 - Lawrence M. Fisher:
Turing laureates celebrate award's 50th anniversary. 20-23 - Lawrence M. Fisher:
Charles W. Bachman: 1924-2017. 24-25
- Joel R. Reidenberg:
Digitocracy. 26-28
- Carolina Alves de Lima Salge, Nicholas Berente:
Is that social bot behaving unethically? 29-31
- Peter J. Denning:
Multitasking without thrashing. 32-34
- Gregorio Convertino, Nancy Frishberg:
Why agile teams fail without UX research. 35-37 - Andrew Conway, Peter Eckersley:
When does law enforcement's demand to read your data become a demand to read your mind? 38-40
- Benjamin Treynor Sloss, Mike Dahlin, Vivek Rau, Betsy Beyer:
The calculus of service availability. 42-47 - Graham Cormode
:
Data sketching. 48-55 - Kate Matsudaira:
10 ways to be a better interviewer. 56-58
- Carissa Schoenick, Peter Clark, Oyvind Tafjord, Peter D. Turney, Oren Etzioni:
Moving beyond the Turing Test with the Allen AI Science Challenge. 60-64 - Petter Bae Brandtzæg
, Asbjørn Følstad:
Trust and distrust in online fact-checking services. 65-71
- Sean Peisert
:
Security in high-performance computing environments. 72-80
- Charles (Chuck) Thacker:
Technical perspective: A gloomy look at the integrity of hardware. 82 - Kaiyuan Yang
, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester:
Exploiting the analog properties of digital circuits for malicious hardware. 83-91 - Ed H. Chi:
Technical perspective: Humans and computers working together on hard tasks. 92 - Walter S. Lasecki, Christopher D. Miller, Iftekhar Naim, Raja S. Kushalnagar
, Adam Sadilek, Daniel Gildea, Jeffrey P. Bigham:
Scribe: deep integration of human and machine intelligence to caption speech in real time. 93-100
- Leah Hoffmann:
All the pretty pictures. 104-
Volume 60, Number 10, October 2017
- Andrew A. Chien:
Computing is a profession. 5 - Vinton G. Cerf:
Six education. 7
- Beyond brute force. 8-9
- Robin K. Hill, Mark Guzdial
:
Manipulating word representations, and preparing students for coding jobs? 12-13
- Keith Kirkpatrick:
3D-printing human body parts. 15-17 - Don Monroe:
Digital hearing. 18-20 - Chris Edwards:
Portable device fears show power of social development. 21-22
- Michael A. Cusumano:
Amazon and whole foods: follow the strategy (and the money). 24-26
- David Lorge Parnas:
The real risks of artificial intelligence. 27-31
- Vasant Dhar, Roger M. Stein:
FinTech platforms and strategy. 32-35
- George V. Neville-Neil
:
IoT: the internet of terror. 36-37
- Roderick Chapman, Neil White, Jim Woodcock
:
What can agile methods bring to high-integrity software development? 38-41
- Alvaro Videla:
Metaphors we compute by. 42-45 - Peter Bailis, Tawanna Dillahunt, Stefanie Mueller, Patrick Baudisch:
Research for practice: technology for underserved communities; personal fabrication. 46-49 - Thomas A. Limoncelli:
Four ways to make CS and IT more immersive. 50-52
- Ewan D. Tempero, Tony Gorschek, Lefteris Angelis:
Barriers to refactoring. 54-61 - Heiko Gewald, Xuequn Wang
, Andy Weeger, Mahesh S. Raisinghani, Gerald G. Grant
, Otávio P. Sanchez
, Siddhi Pittayachawan
:
Millennials' attitudes toward IT consumerization in the workplace. 62-69
- Stephen B. Wicker, Kolbeinn Karlsson:
Internet advertising: technology, ethics, and a serious difference of opinion. 70-79
- Jeffrey F. Naughton:
Technical Perspective: Broadening and deepening query optimization yet still making progress. 80 - Immanuel Trummer, Christoph Koch:
Multi-objective parametric query optimization. 81-89 - Jeffrey S. Foster:
Technical Perspective: Shedding new light on an old language debate. 90 - Baishakhi Ray, Daryl Posnett, Premkumar T. Devanbu, Vladimir Filkov:
A large-scale study of programming languages and code quality in GitHub. 91-100
- Dennis E. Shasha:
Partitioned peace. 112-
Volume 60, Number 11, November 2017
- Laurie A. Williams, Doug Baldwin:
Highlights of the ACM student research competition. 5
- Vinton G. Cerf:
Heidelberg laureate forum. 6
- Moshe Y. Vardi:
Would Turing have won the Turing award? 7
- They see what you see. 8-9
- Mei Kobayashi:
Opportunities for women, minorities in information retrieval. 10-11
- Neil Savage:
A block on the old chip. 12-14 - Alex Wright:
Censoring sensors. 15-16 - Esther Shein:
Overcoming disabilities. 17-19
- Pamela Samuelson:
Disgorging profits in design patent cases. 20-22
- Solon Barocas
, danah boyd
:
Engaging the ethics of data science in practice. 23-25
- Richard Connor, Quintin I. Cutts, Judy Robertson
:
Keeping the machinery in computing education. 26-28
- Martin Spann
, Lucas Stich
, Klaus M. Schmidt
:
Pay what you want as a pricing model for open access publishing? 29-31 - Virginia Dignum
:
Social agents: bridging simulation and engineering. 32-34
- Hootsuite: in pursuit of reactive systems. 36-43
- Kate Matsudaira:
Breadth and depth. 44-45 - Ivar Jacobson, Ian Spence, Pan Wei Ng:
Is there a single method for the internet of things? 46-53
- Makoto Odamaki, Shree K. Nayar:
Cambits: a reconfigurable camera system. 54-61 - Stuart McIlroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan:
User reviews of top mobile apps in Apple and Google app stores. 62-67
- Laurel D. Riek:
Healthcare robotics. 68-78
- David Silver:
Technical perspective: Solving imperfect information games. 80 - Michael Bowling, Neil Burch, Michael Johanson, Oskari Tammelin:
Heads-up limit hold'em poker is solved. 81-88 - Marc Alexa
:
Technical perspective: Exploring a kingdom by geodesic measures. 89 - Keenan Crane, Clarisse Weischedel, Max Wardetzky:
The heat method for distance computation. 90-99
- G. Seth Shostak:
Butterfly effect. 112-
Volume 60, Number 12, December 2017
- Andrew A. Chien:
Computing is the secret ingredient (well, not so secret). 5
- Start CS students off with industry best practices. 6
- Vinton G. Cerf:
Now for something entirely different. 7
- Philip J. Guo:
Building tools to help students learn to program. 8-9
- Don Monroe:
Perovskites boost solar-cell potential. 11-13 - Samuel Greengard:
Gaming machine learning. 14-16 - Keith Kirkpatrick:
Parallel computational thinking. 17-19
- Peter J. Denning:
The forgotten engineer. 20-23
- Louise Ann Lyon, Jill Denner:
Community colleges: a resource for increasing equity and inclusion in computer science education. 24-26
- George V. Neville-Neil
:
Cold, hard cache. 27-28
- Stephen J. Andriole:
The death of big software. 29-32 - Ernest Davis:
Lousy advice to the lovelorn. 33-35
- Arvind Narayanan, Jeremy Clark:
Bitcoin's academic pedigree. 36-45 - Pat Helland:
XML and JSON are like cardboard. 46-47 - John Regehr, Peter Bailis:
Research for practice: vigorous public debates in academic computer science. 48-50
- Martin E. Hellman:
Cybersecurity, nuclear security, alan turing, and illogical logic. 52-59 - Ramiro Montealegre, Wayne F. Cascio:
Technology-driven changes in work and employment. 60-67
- Gustavo Pinto, Fernando Castor
:
Energy efficiency: a new concern for application software developers. 68-75
- Aaron Roth
:
Pricing information (and its implications): technical perspective. 78 - Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu
:
A theory of pricing private data. 79-86 - James R. Larus:
A simple, elegant approach to non-numeric parallelization: technical perspective. 87 - Simone Campanoni, Kevin Brownell, Svilen Kanev, Timothy M. Jones
, Gu-Yeon Wei, David M. Brooks:
Automatically accelerating non-numerical programs by architecture-compiler co-design. 88-97
- Leah Hoffmann:
Grooming the leaders of tomorrow. 112-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.