default search action
Communications of the ACM, Volume 61
Volume 61, Number 1, January 2018
- Vinton G. Cerf:
The role of archives in digital preservation. 7
- Moshe Y. Vardi:
Computer professionals for social responsibility. 9
- A leap from artificial to intelligence. 10-11
- Mark R. Nelson:
The big IDEA and the PD pipeline. 12-13
- Gregory Mone:
Feeling sounds, hearing sights. 15-17 - Alex Wright:
Smartphone science. 18-20 - Marina Krakovsky:
The new jobs. 21-23
- Michael A. Cusumano:
The sharing economy meets reality. 26-28
- Christopher T. Marsden:
How law and computer science can work together to improve the information society. 29-31
- Thomas Haigh:
Defining American greatness: IBM from Watson to Trump. 32-37
- Henry C. Lucas Jr.:
Technology and the failure of the university. 38-41 - Chitta Baral, Shih-Fu Chang, Brian Curless, Partha Dasgupta, Julia Hirschberg, Anita Jones:
Ask not what your postdoc can do for you ... 42-44
- Antony Alappatt:
Network applications are interactive. 46-53 - Peter Alvaro, Severine Tymon:
Abstracting the geniuses away from failure testing. 54-61 - Jacob Loveless:
Cache me if you can. 62-68
- Michele Coscia:
Popularity spikes hurt future chances for viral propagation of protomemes. 70-77 - Hemang Subramanian:
Decentralized blockchain-based electronic marketplaces. 78-84
- Wojciech Mazurczyk, Steffen Wendzel:
Information hiding: Challenges for forensic experts. 86-94
- David C. Parkes:
Technical perspective: Moving spectrum. 96 - Neil Newman, Alexandre Fréchette, Kevin Leyton-Brown:
Deep optimization for spectrum repacking. 97-104 - Manuel M. T. Chakravarty:
Technical perspective: Can high performance be portable? 105 - Jonathan Ragan-Kelley, Andrew Adams, Dillon Sharlet, Connelly Barnes, Sylvain Paris, Marc Levoy, Saman P. Amarasinghe, Frédo Durand:
Halide: decoupling algorithms from schedules for high-performance image processing. 106-115
- Dennis E. Shasha:
Polychromatic choreography. 120
- Don Gotterbarn, Amy S. Bruckman, Catherine Flick, Keith W. Miller, Marty J. Wolf:
ACM code of ethics: a guide for positive action. 121-128
Volume 61, Number 2, February 2018
- Jodi L. Tims:
Achieving gender equity: ACM-W can't do it alone. 5
- Vinton G. Cerf:
A comprehensive self-driving car test. 7
- Toward an equation that anticipates AI risks. 8-9
- John Arquilla, Mark Guzdial:
Protecting the power grid, and finding bias in student evaluations. 10-11
- Chris Edwards:
Quantum technology forgoes unconditional security to extend its reach. 12-14 - Neil Savage:
Going serverless. 15-16 - Logan Kugler:
The war over the value of personal data. 17-19
- Kevin Fu, Wenyuan Xu:
Risks of trusting the physics of sensors. 20-23
- Sarah J. Wille, Daphne Sajous-Brady:
The inclusive and accessible workplace. 24-26
- George V. Neville-Neil:
Reducing the attack surface. 27-28
- Jennifer Keating, Illah R. Nourbakhsh:
Teaching artificial intelligence and humanity. 29-32 - Shane Greenstein:
Innovation from the edges. 33-36
- Andrew Leung, Andrew Spyker, Tim Bozarth:
Titus: introducing containers to the Netflix cloud. 38-45 - Albert Kwon, James R. Wilcox, Peter Bailis:
Research for practice: private online communication; highlights in systems verification. 46-49 - Kate Matsudaira:
Views from the top. 50-52
- John Zysman, Martin Kenney:
The next phase in the digital revolution: intelligent tools, platforms, growth, employment. 54-63 - Vlasta Stavova, Lenka Dedkova, Martin Ukrop, Vashek Matyas:
A large-scale comparative study of beta testers and regular users. 64-71
- Othon Michail, Paul G. Spirakis:
Elements of the theory of dynamic networks. 72
- Steve Zdancewic:
Technical perspective: Building bug-free compilers. 83 - Nuno P. Lopes, David Menendez, Santosh Nagarakatte, John Regehr:
Practical verification of peephole optimizations with Alive. 84-91 - Vincent Conitzer:
Technical perspective: Designing algorithms and the fairness criteria they should satisfy. 92 - Kobi Gal, Ariel D. Procaccia, Moshe Mash, Yair Zick:
Which is the fairest (rent division) of them all? 93-100
- David Allen Batchelor:
Welcome to the singularity. 104-
Volume 61, Number 3, March 2018
- Andrew A. Chien:
Here comes everybody...to Communications. 5
- Vinton G. Cerf:
Unintended consequences. 7
- Moshe Y. Vardi:
A declaration of the dependence of cyberspace. 9
- Keep the ACM code of ethics as it is. 10-11
- Mark Guzdial, Bertrand Meyer:
The costs and pleasures of a computer science teacher. 12-13
- Samuel Greengard:
In pursuit of virtual life. 15-17 - Keith Kirkpatrick:
The construction industry in the 21st century. 18-20 - Esther Shein:
The state of fakery. 21-23
- Ross Anderson:
Making security sustainable. 24-26
- Pamela Samuelson:
Will the Supreme Court nix reviews of bad patents? 27-29
- Simon Rogerson:
Ethics omission increases gases emission. 30-32
- Peter J. Denning:
The computing profession. 33-35
- Fred B. Schneider:
Impediments with policy interventions to foster cybersecurity. 36-38 - M. Six Silberman, Bill Tomlinson, R. LaPlante, Joel Ross, Lilly Irani, Andrew Zaldivar:
Responsible research with crowds: pay crowdworkers at least minimum wage. 39-41 - Hanna M. Wallach:
Computational social science ≠ computer science + social data. 42-44
- Yonatan Sompolinsky, Aviv Zohar:
Bitcoin's underlying incentives. 46-53 - Thomas A. Limoncelli:
Operational excellence in April Fools' pranks. 54-57 - Theo Schlossnagle:
Monitoring in a DevOps world. 58-61
- Matthias Felleisen, Robert Bruce Findler, Matthew Flatt, Shriram Krishnamurthi, Eli Barzilay, Jay A. McCarthy, Sam Tobin-Hochstadt:
A programmable programming language. 62-71 - Bran Knowles, Vicki L. Hanson:
The wisdom of older technology (non)users. 72-77 - Tony Gorschek:
Evolution toward soft(er) products. 78-84
- Benjamin Kuipers:
How can we trust a robot? 86-95
- Nicole Immorlica:
Technical perspective: A graph-theoretic framework traces task planning. 98 - Jon M. Kleinberg, Sigal Oren:
Time-inconsistent planning: a computational problem in behavioral economics. 99-107 - Kenny Paterson:
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. 108 - Liang Zhang, David R. Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. 109-116
- Leah Hoffmann:
Q&A: The network effect. 120-
Volume 61, Number 4, April 2018
- Andrew A. Chien:
Go big! 5 - Vinton G. Cerf:
The sound of programming. 6
- Moshe Y. Vardi:
Open access and ACM. 7
- CACM Staff:
Predicting failure of the university. 8-9
- Jodi L. Tims, Daniel A. Reed:
Fostering inclusion, keeping the net neutral. 10-11
- Neil Savage:
Always out of balance. 12-14 - Don Monroe:
Chips for artificial intelligence. 15-17 - Marina Krakovsky:
Artificial (emotional) intelligence. 18-19
- Mari Sako:
Business ecosystems: how do they matter for innovation? 20-22
- George V. Neville-Neil:
Popping kernels. 23-24
- Sheldon H. Jacobson:
Push versus pull. 25-27 - Stephen B. Wicker:
Smartphones, contents of the mind, and the fifth amendment. 28-31
- Nicole Forsgren:
DevOps delivers. 32-33 - Jez Humble:
Continuous delivery sounds great, but will it work here? 34-39 - Bridget Kromhout:
Containers will not fix your broken culture (and other hard truths). 40-43 - Nicole Forsgren, Mik Kersten:
DevOps metrics. 44-48
- Mila Gascó-Hernández:
Building a smart city: lessons from Barcelona. 50-57 - Caitlin Sadowski, Edward Aftandilian, Alex Eagle, Liam Miller-Cushon, Ciera Jaspan:
Lessons from building static analysis tools at Google. 58-66 - Francine Berman, Rob A. Rutenbar, Brent Hailpern, Henrik I. Christensen, Susan B. Davidson, Deborah Estrin, Michael J. Franklin, Margaret Martonosi, Padma Raghavan, Victoria Stodden, Alexander S. Szalay:
Realizing the potential of data science. 67-72
- Mordechai Guri, Yuval Elovici:
Bridgeware: the air-gap malware. 74-82
- David M. Blei:
Technical perspective: Expressive probabilistic models and scalable method of moments. 84 - Sanjeev Arora, Rong Ge, Yoni Halpern, David M. Mimno, Ankur Moitra, David A. Sontag, Yichen Wu, Michael Zhu:
Learning topic models - provably and efficiently. 85-93
- Dennis E. Shasha:
Finding October. 96-95
Volume 61, Number 5, May 2018
- Vinton G. Cerf:
Turing test 2. 5
- Jack W. Davidson, Joseph A. Konstan, Andrew A. Chien, Scott E. Delman:
Toward sustainable access: where are we now? 6-7
- Moshe Y. Vardi:
How we lost the women in computing. 9
- CACM Staff:
Get ACM (and Communications) out of politics. 20-11
- CACM Staff:
ACM's 2018 general election: please take this opportunity to vote. 13-21
- Edwin Torres, Walid S. Saba:
Commenting on code, considering data's bottleneck. 24-25
- Gregory Mone:
Shrinking machines, cellular computers. 26-28 - Neil Savage:
Using functions for easier programming. 29-30 - Samuel Greengard:
Finding a healthier approach to managing medical data. 31-33
- Ryan Calo:
Is the law ready for driverless cars? 34-36
- Fred B. Schneider:
Putting trust in security engineering. 37-39
- Alexander Repenning:
Scale or fail. 40-42
- Harold "Bud" Lawson:
The march into the black hole of complexity. 43-45 - Margaret Martonosi:
Science, policy, and service. 46-48
- Malte Schwarzkopf, Peter Bailis:
Research for practice: cluster scheduling for datacenters. 50-53 - Stepán Davidovic, Betsy Beyer:
Canary analysis service. 54-62 - Kate Matsudaira:
How is your week going so far? 63-64
- Josh Tenenberg, Wolff-Michael Roth, Donald Chinn, Alfredo Jornet, David Socha, Skip Walter:
More than the code: learning rules of rejection in writing programs. 66-71 - Richard R. Brooks, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc:
Internet freedom in West Africa: technical support for journalists and democracy advocates. 72-82 - Xiaonan Wang:
Data acquisition in vehicular ad hoc networks. 83-88
- Björn W. Schuller:
Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends. 90-99
- Oren Etzioni:
Technical perspective: Breaking the mold of machine learning. 102 - Tom M. Mitchell, William W. Cohen, Estevam R. Hruschka Jr., Partha P. Talukdar, Bo Yang, Justin Betteridge, Andrew Carlson, Bhavana Dalvi Mishra, Matt Gardner, Bryan Kisiel, Jayant Krishnamurthy, Ni Lao, Kathryn Mazaitis, Thahir Mohamed, Ndapandula Nakashole, Emmanouil A. Platanios, Alan Ritter, Mehdi Samadi, Burr Settles, Richard C. Wang, Derry Wijaya, Abhinav Gupta, Xinlei Chen, Abulhair Saparov, Malcolm Greaves, Joel Welling:
Never-ending learning. 103-115
- Ken MacLeod:
Free press. 120-
Volume 61, Number 6, June 2018
- Vinton G. Cerf:
Celebrating excellence. 5
- CACM Staff:
When to hold 'em. 6-7
- Mark Guzdial, Susan Landau:
Programming programming languages, and analyzing Facebook's failure. 8-9
- Neil Savage:
Rewarded for RISC. 10-12 - Chris Edwards:
Deep learning hunts for signals among the noise. 13-14 - Keith Kirkpatrick:
3D sensors provide security, better games. 15-17 - Logan Kugler:
Getting hooked on tech. 18-19
- Nicholas Weaver:
Risks of cryptocurrencies. 20-24
- Peter J. Denning:
An interview with Dave Parnas. 25-27
- George V. Neville-Neil:
Watchdogs vs. snowflakes. 28-29
- Claire Le Goues, Yuriy Brun, Sven Apel, Emery D. Berger, Sarfraz Khurshid, Yannis Smaragdakis:
Effectiveness of anonymization in double-blind review. 30-33
- Diptanu Gon Choudhury, Timothy Perrett:
Designing cluster schedulers for internet-scale services. 34-40 - Tobias Lauinger, Abdelberi Chaabane, Christo Wilson:
Thou shalt not depend on me. 41-47 - Thomas A. Limoncelli:
Documentation is automation. 48-53
- Ricardo Baeza-Yates:
Bias on the web. 54-61 - Jacob O. Wobbrock, Krzysztof Z. Gajos, Shaun K. Kane, Gregg C. Vanderheiden:
Ability-based design. 62-71 - David Gefen, Jake Miller, Johnathon Kyle Armstrong, Frances H. Cornelius, Noreen Robertson, Aaron Smith-McLallen, Jennifer A. Taylor:
Identifying patterns in medical records through latent semantic analysis. 72-77
- Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou:
Privacy in decentralized cryptocurrencies. 78-88
- Landon P. Cox:
Technical perspective: Measuring optimization potential with Coz. 90 - Charlie Curtsinger, Emery D. Berger:
Coz: finding code that counts with causal profiling. 91-99
- Leah Hoffmann:
RISC management. 104-
Volume 61, Number 7, July 2018
- Vicki L. Hanson:
Reflections on my two years. 5
- Vinton G. Cerf:
On neural networks. 7
- Moshe Y. Vardi:
How the hippies destroyed the internet. 9
- CACM Staff:
Teach the law (and the AI) 'foreseeability'. 10-11
- Yegor Bugayenko:
We are done with 'hacking'. 12-13
- Logan Kugler:
Why cryptocurrencies use so much energy: and what to do about it. 15-17 - Gary Anthes:
You've got mail! 18-19 - Keith Kirkpatrick:
Bringing the internet to the (developing) world. 20-21
- Pamela Samuelson:
Copyright blocks a news-monitoring technology. 24-26
- Marshall W. van Alstyne:
Session details: Economic and business dimensions. - Hanna Halaburda:
Blockchain revolution without the blockchain? 27-29
- Richard E. Ladner:
Session details: Broadening participation. - Alex Ahmed:
Beyond diversity. 30-32
- Osman Yasar:
A new perspective on computational thinking. 33-39 - Josiah Dykstra, Eugene H. Spafford:
The case for disappearing cyber security. 40-42
- David Chisnall:
C is not a low-level language. 44-48 - Kate Matsudaira:
How to come up with great ideas. 49-51 - Deepak Vasisht, Peter Bailis:
Research for practice: toward a network of connected things. 52-54
- Ian J. Goodfellow, Patrick D. McDaniel, Nicolas Papernot:
Making machine learning robust against adversarial inputs. 56-66 - Christoph Schneider, Markus Weinmann, Jan vom Brocke:
Digital nudging: guiding online user choices through interface design. 67-73 - John K. Ousterhout:
Always measure one level deeper. 74-83
- Carlo Gabriel Porto Bellini:
The ABCs of effectiveness in the digital society. 84-91
- Sharon Goldberg, Ethan Heilman:
Technical perspective: The rewards of selfish mining. 94 - Ittay Eyal, Emin Gün Sirer:
Majority is not enough: bitcoin mining is vulnerable. 95-102
- Dennis E. Shasha:
String wars. 104
Volume 61, Number 8, August 2018
- James R. Larus, Chris Hankin:
Regulating automated decision making. 5
- Vinton G. Cerf:
Traceability. 7
- CACM Staff:
Encourage ACM to address U.S. election integrity. 10-11
- Robin K. Hill:
Assessing responsibility for program output. 12-13
- Chris Edwards:
Animals teach robots to find their way. 14-16 - Don Monroe:
Electronics are leaving the plane. 17-18 - Esther Shein:
Broadening the path for women in STEM. 19-21
- Michael L. Best:
Session details: Global computing. - Kashif Ali, Kurtis Heimerl:
Designing sustainable rural infrastructure through the lens of OpenCellular. 22-25
- Mark Guzdial, Amy S. Bruckman:
Providing equitable access to computing education. 26-28
- George V. Neville-Neil:
Every silver lining has a cloud. 29-30
- Ehud Shapiro:
Point: foundations of e-democracy. 31-34 - Douglas Schuler:
Counterpoint: e-democracy won't save democracy. democracy will save democracy. 34-36
- Alex Petrov:
Algorithms behind modern storage systems. 38-44 - Daniel Crankshaw, Joseph Gonzalez, Peter Bailis:
Research for practice: prediction-serving systems. 45-49 - Pat Helland:
Consistently eventual. 50-52
- Emanuelle Burton, Judy Goldsmith, Nicholas Mattei:
How to teach computer ethics through science fiction. 54-64 - Christina Delimitrou, Christos Kozyrakis:
Amdahl's law for tail latency. 65-72
- Jose M. Such, Natalia Criado:
Multiparty privacy in social media. 74-81
- John D. Owens:
Technical perspective: Graphs, betweenness centrality, and the GPU. 84 - Adam McLaughlin, David A. Bader:
Accelerating GPU betweenness centrality. 85-92
- William Sims Bainbridge:
Deadlock. 96-
Volume 61, Number 9, September 2018
- Andrew A. Chien:
Computer architecture: disruption from above. 5
- Vinton G. Cerf:
The peace of westphalia. 6
- Moshe Y. Vardi:
Move fast and break things. 7
- CACM Staff:
Hippie values really did build the internet. 9-11
- Yegor Bugayenko:
Discovering bugs, or ensuring success? 12-13
- Don Monroe:
AI holds the better hand. 14-16 - Gregory Mone:
Robotic implants. 17-18 - Keith Kirkpatrick:
Borders in the cloud. 19-21
- Alan R. Wagner, Jason Borenstein, Ayanna M. Howard:
Overtrust in the robotic age. 22-24
- Frank Pasquale:
When machine learning is facially invalid. 25-27
- Peter J. Denning:
Navigating with accelerating technology change. 28-30
- Adam Barker:
An academic's observations from a sabbatical at Google. 31-33 - Edward A. Lee:
Is software the result of top-down intelligent design or evolution? 34-36
- Thomas A. Limoncelli:
GitOps: a path to more self-service IT. 38-42 - Noor Mubeen:
Workload frequency scaling law: derivation and verification. 43-47 - Gustavo Alonso, Peter Bailis:
Research for practice: FPGAs in datacenters. 48-49
- Norman P. Jouppi, Cliff Young, Nishant Patil, David A. Patterson:
A domain-specific architecture for deep neural networks. 50-59 - Robert Perricone, Xiaobo Sharon Hu, Joseph Nahas, Michael T. Niemier:
Can beyond-CMOS devices illuminate dark silicon? 60-69 - Slobodan Vucetic, Ashis Kumar Chanda, Shanshan Zhang, Tian Bai, Aniruddha Maiti:
Peer assessment of CS doctoral programs shows strong correlation with faculty citations. 70-76
- Daniel J. Abadi, Jose M. Faleiro:
An overview of deterministic database systems. 78-88
- Romit Roy Choudhury:
Technical perspective: Is your WiFi a sensor? 90 - Mingmin Zhao, Fadel Adib, Dina Katabi:
Emotion recognition using wireless signals. 91-100
- Dennis E. Shasha:
Bounce blockchain. 104-
Volume 61, Number 10, October 2018
- Vinton G. Cerf:
The internet in the 21st century. 5
- CACM Staff:
Hennessy and Patterson on the roots of RISC. 6-7
- Amir Banifatemi:
Can we use AI for global good? 8-9
- Chris Edwards:
Floating voxels provide new hope for 3D displays. 11-13 - Samuel Greengard:
Transient electronics take shape. 14-16 - Esther Shein:
The dangers of automating social programs. 17-19
- Michael A. Cusumano:
The business of quantum computing. 20-22
- Peter P. Swire:
A pedagogic cybersecurity framework. 23-26
- George V. Neville-Neil:
The obscene coupling known as spaghetti code. 27-28
- Jean-François Abramatic, Roberto Di Cosmo, Stefano Zacchiroli:
Building the universal archive of source code. 29-31 - Jordi Cabot, Javier Luis Cánovas Izquierdo, Valerio Cosentino:
Are CS conferences (too) closed communities? 32-34
- Zachary C. Lipton:
The mythos of model interpretability. 36-43 - Kate Matsudaira:
The secret formula for choosing the right next role. 44-46 - Pat Helland:
Mind your state for your state of mind. 47-54
- Adnan Darwiche:
Human-level intelligence or animal-like abilities? 56-67 - Gerwin Klein, June Andronick, Matthew Fernandez, Ihor Kuz, Toby C. Murray, Gernot Heiser:
Formally verified software in the real world. 68-77 - Quang Neo Bui, Sean Hansen, Manlu Liu, Qiang Tu:
The productivity paradox in health information technology. 78-85
- Bonnie A. Nardi, Bill Tomlinson, Donald J. Patterson, Jay Chen, Daniel Pargman, Barath Raghavan, Birgit Penzenstadler:
Computing within limits. 86-93
- John Baillieul:
Technical perspective: A control theorist's view on reactive control for autonomous drones. 95 - Luca Mottola, Kamin Whitehouse:
Fundamental concepts of reactive control for autonomous drones. 96-104 - Marc Snir:
Technical perspective: The future of MPI. 105 - Robert Gerstenberger, Maciej Besta, Torsten Hoefler:
Enabling highly scalable remote memory access programming with MPI-3 one sided. 106-113
- Leah Hoffmann:
Reaping the benefits of a diverse background. 120-
Volume 61, Number 11, November 2018
- Vinton G. Cerf:
The upper layers of the internet. 5
- Moshe Y. Vardi:
Self-reference and section 230. 7
- Carl Hewitt, Vijay Kumar:
The gap in CS, mulling irrational exuberance. 8-9
- Don Monroe:
AI, explain yourself. 11-13 - Neil Savage:
A new movement in seismology. 14-15 - Samuel Greengard:
Weighing the impact of GDPR. 16-18
- Pamela Samuelson:
The EU's controversial digital single market directive. 20-23
- Steven M. Bellovin, Peter G. Neumann:
The big picture. 24-26
- R. Benjamin Shapiro, Rebecca Fiebrink, Peter Norvig:
How machine learning impacts the undergraduate computing curriculum. 27-29
- Christos Liaskos, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, Ian F. Akyildiz:
Using any surface to realize a new paradigm for wireless communications. 30-33 - Janne Lahtiranta, Sami Hyrynsalmi:
Crude and rude? 34-35
- Andrew A. Chien:
Introducing Communications' regional special sections. 36-37
- Wenguang Chen, Xiang-Yang Li:
Welcome to the China region special section. 38 - Elliott Zaagman:
China's computing ambitions. 40-41 - Chao-Yang Lu, Cheng-Zhi Peng, Jian-Wei Pan:
Quantum communication at 7, 600km and beyond. 42-43 - Jun Zhu, Tiejun Huang, Wenguang Chen, Wen Gao:
The future of artificial intelligence in China. 44-45 - Peter Guy:
Consumers, corporations, and government: computing in China. 46-47 - San Zhang:
Regional computing culture and personalities. 48-49 - Xiang-Yang Li, Jianwei Qian, Xiaoyang Wang:
Can China lead the development of data trading and sharing markets? 50-51 - Luyi Xu:
Exploiting psychology and social behavior for game stickiness. 52-53
- Wanli Min, Liang Yu, Lei Yu, Shubo He:
People logistics in smart cities. 54-59 - Hai Jin, Haibo Chen, Hong Gao, Xiang-Yang Li, Song Wu:
Cloud bursting for the world's largest consumer market. 60-64 - Yuan Qi, Jing Xiao:
Fintech: AI powers financial services to improve people's lives. 65-69 - Huaxia Xia, Haiming Yang:
Is last-mile delivery a 'killer app' for self-driving vehicles? 70-75 - Yue Zhuge:
Video consumption, social networking, and influence. 76-81 - Yutong Lu, Depei Qian, Haohuan Fu, Wenguang Chen:
Will supercomputers be super-data and super-AI machines? 82-87
- Matt Fata, Philippe-Joseph Arida, Patrick Hahn, Betsy Beyer:
Corp to cloud: Google's virtual desktops. 88-94 - Alexander Ratner, Christopher Ré, Peter Bailis:
Research for practice: knowledge base construction in the machine-learning era. 95-97 - Silvia Esparrachiari, Tanya Reilly, Ashleigh Rentz:
Tracking and controlling microservice dependencies. 98-104
- Ryen W. White:
Skill discovery in virtual assistants. 106-113 - Roberto Ierusalimschy, Luiz Henrique de Figueiredo, Waldemar Celes Filho:
A look at the design of Lua. 114-123 - Diomidis Spinellis:
Modern debugging: the art of finding a needle in a haystack. 124-134
- Daniel G. Waddington, Jim Harris:
Software challenges for the changing storage landscape. 136-145
- Markus G. Kuhn:
Technical perspective: Backdoor engineering. 147 - Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. 148-155 - Tanzeem Choudhury:
Technical perspective: Making sleep tracking more user friendly. 156 - Anh Nguyen, Raghda Alqurashi, Zohreh Raghebi, Farnoush Banaei Kashani, Ann C. Halbower, Tam Vu:
LIBS: a bioelectrical sensing system from human ears for staging whole-night sleep study. 157-165
- Brian Clegg:
Between the abbey and the edge of time. 176-
Volume 61, Number 12, December 2018
- Vinton G. Cerf:
Self-authenticating identifiers. 5
- CACM Staff:
Reclaim internet greatness. 7-8
- John Arquilla, Yegor Bugayenko:
Securing agent 111, and the job of software architect. 10-11
- Chris Edwards:
Learning to see. 13-15 - Keith Kirkpatrick:
Technology for the deaf. 16-18 - Logan Kugler:
AI judges and juries. 19-21
- Ted G. Lewis, Peter J. Denning:
Learning machine learning. 24-27
- George V. Neville-Neil:
A chance gardener. 28-29
- Oren Etzioni:
Point: Should AI technology be regulated?: yes, and here's how. 30-32 - Andrea O'Sullivan, Adam Thierer:
Counterpoint: Regulators should allow the greatest space for AI innovation. 33-35
- Ryen W. White:
Opportunities and challenges in search interaction. 36-38
- Rich Bennett, Craig Callahan, Stacy Jones, Matt Levine, Merrill Miller, Andy Ozment:
How to live in a post-meltdown and -spectre world. 40-44 - Shylaja Nukala, Vivek Rau:
Why SRE documents matter. 45-51 - Kate Matsudaira:
How to get things done when you don't feel like it. 52-54
- Junyeong Lee, Jaylyn Jeonghyun Oh:
What motivates a citizen to take the initiative in e-participation?: the case of a South Korean parliamentary hearing. 56-61 - Bran Knowles, Alison Smith-Renner, Forough Poursabzi-Sangdeh, Di Lu, Halimat Alabi:
Uncertainty in current and future health wearables. 62-67 - Barbara J. Grosz, Peter Stone:
A century-long commitment to assessing artificial intelligence and its impact on society. 68-73
- Daniel McDuff, Mary Czerwinski:
Designing emotionally sentient agents. 74-83 - Rajeev Alur, Rishabh Singh, Dana Fisman, Armando Solar-Lezama:
Search-based program synthesis. 84-93
- Tim Harris:
Technical perspective: Node replication divides to conquer. 96 - Irina Calciu, Siddhartha Sen, Mahesh Balakrishnan, Marcos K. Aguilera:
How to implement any concurrent data structure. 97-105 - Anders Møller:
Technical perspective: WebAssembly: a quiet revolution of the web. 106 - Andreas Rossberg, Ben L. Titzer, Andreas Haas, Derek L. Schuff, Dan Gohman, Luke Wagner, Alon Zakai, J. F. Bastien, Michael Holman:
Bringing the web up to speed with WebAssembly. 107-115
- Leah Hoffmann:
Promoting common sense, reality, dependable engineering. 128-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.