default search action
Communications of the ACM, Volume 62
Volume 62, Number 1, January 2019
- Andrew A. Chien:
Open collaboration in an age of distrust. 5
- Vinton G. Cerf:
A people-centered economy. 6
- Moshe Y. Vardi:
Are we having an ethical crisis in computing? 7
- Judy Robertson:
Answering children's questions about computers. 8-9
- Don Monroe:
Quantum leap. 10-12 - Chris Edwards:
Hidden messages fool AI. 13-14 - Esther Shein:
Who owns 3D scans of historic sites? 15-17
- Michal S. Gal:
Illegal pricing algorithms. 18-20
- Michael A. Cusumano:
CRISPR: an emerging platform for gene editing. 21-23
- Thomas Haigh:
Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo. 24-30
- Niels da Vitoria Lobo, Mubarak Shah:
UCF's 30-year REU site in computer vision. 31-34 - Edward A. Lee:
Modeling in engineering and science. 35-36
- Alpha Lam:
Using remote cache service for bazel. 38-42 - Jessie Frazelle:
Research for practice: security for the modern age. 43-45 - Thomas A. Limoncelli:
SQL is no excuse to avoid DevOps. 46-49
- Stefan Seidel, Nicholas Berente, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson:
Autonomous tools and design: a triple-loop approach to human-machine learning. 50-57 - Sergio Orenga-Roglá, Ricardo Chalmeta:
Framework for implementing a big data ecosystem in organizations. 58-65 - B. Jack Copeland, Oron Shagrir:
The Church-Turing thesis: logical limit or breachable barrier? 66-74
- Yolanda Gil, Suzanne A. Pierce, Hassan A. Babaie, Arindam Banerjee, Kirk D. Borne, Gary S. Bust, Michelle Cheatham, Imme Ebert-Uphoff, Carla P. Gomes, Mary C. Hill, John D. Horel, Leslie Hsu, Jim Kinter, Craig A. Knoblock, David M. Krum, Vipin Kumar, Pierre F. J. Lermusiaux, Yan Liu, Chris North, Victor Pankratius, Shanan Peters, Beth Plale, Allen Pope, Sai Ravela, Juan Restrepo, Aaron J. Ridley, Hanan Samet, Shashi Shekhar:
Intelligent systems for geosciences: an essential research agenda. 76-84 - William Casey, Ansgar Kellner, Parisa Memarmoshrefi, Jose Andre Morales, Bud Mishra:
Deception, identity, and security: the game theory of sybil attacks. 85-93
- Hao Li:
Technical perspective: Photorealistic facial digitization and manipulation. 95 - Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner:
Face2Face: real-time face capture and reenactment of RGB videos. 96-104 - Dan Boneh:
Technical perspective: Attacking cryptographic key exchange with precomputation. 105 - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. 106-114
- Dennis E. Shasha:
Randomized anti-counterfeiting. 120-
Volume 62, Number 2, February 2019
- Vinton G. Cerf:
Libraries considered hazardous. 5
- Between the lines in the China region special section. 6-7
- Herbert E. Bruderer, Robin K. Hill:
Seeking digital humanities, IT tech support. 8-9
- Samuel Greengard:
A brave new world of genetic engineering. 11-13 - Keith Kirkpatrick:
Technologizing agriculture. 14-16 - Logan Kugler:
Being recognized everywhere. 17-19
- Carl E. Landwehr:
2018: a big year for privacy. 20-22
- Carol Frieze, Jeria L. Quesenberry:
How computer science at CMU is attracting and retaining women. 23-26
- George V. Neville-Neil:
Writing a test plan. 27
- Dror G. Feitelson:
Tony's law. 28-31 - Enrico Nardelli:
Do we really need computational thinking? 32-35
- CodeFlow: improving the code review process at Microsoft. 36-44
- Kate Matsudaira:
The importance of a great finish. 45-47
- John L. Hennessy, David A. Patterson:
A new golden age for computer architecture. 48-60 - Chao Gao, Zhen Su, Jiming Liu, Jürgen Kurths:
Even central users do not always drive information diffusion. 61-67 - Juan Pablo Bello, Cláudio T. Silva, Oded Nov, R. Luke DuBois, Anish Arora, Justin Salamon, Charles Mydlarz, Harish Doraiswamy:
SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution. 68-77
- Maurice Herlihy:
Blockchains from a distributed computing perspective. 78-85 - Peter W. O'Hearn:
Separation logic. 86-95
- Thomas F. Wenisch:
How economic theories can help computers beat the heat: technical perspective. 97 - Songchun Fan, Seyed Majid Zahedi, Benjamin C. Lee:
Distributed strategies for computational sprints. 98-106 - Surajit Chaudhuri:
To do or not to do: extending SQL with integer linear programming?: technical perspective. 107 - Matteo Brucato, Azza Abouzied, Alexandra Meliou:
Scalable computation of high-order optimization queries. 108-116
- David Allen Batchelor:
Hawking's nightmare. 120-
Volume 62, Number 3, March 2019
- Andrew A. Chien:
Owning computing's environmental impact. 5
- Vinton G. Cerf:
Ownership vs. stewardship. 6
- Moshe Y. Vardi:
Lost in math? 7
- Mary W. Hall, Richard E. Ladner, Diane Levitt, Manuel A. Pérez-Quiñones, Saurabh Bagchi:
Smoothing the path to computing: pondering uses for big data. 8-9
- Logan Kugler:
Building a better battery. 11-13 - Esther Shein:
Exoskeletons today. 14-16 - Keith Kirkpatrick:
Electronics need rare earths. 17-18
- Pamela Samuelson:
Questioning a new intellectual property right for press publishers. 20-23
- Ofir Turel:
Potential 'dark sides' of leisure technology use in youth. 24-27
- Peter J. Denning:
An interview with William Hugh Murray. 28-30
- Sepehr Vakil, Jennifer Higgs:
It's about power. 31-33
- Mike Tissenbaum, Josh Sheldon, Hal Abelson:
From computational thinking to computational action. 34-36
- Jim Waldo:
A hitchhiker's guide to the blockchain universe. 38-42 - Kate Matsudaira:
Design patterns for managing up. 43-45 - Simson L. Garfinkel, John M. Abowd, Christian Martindale:
Understanding database reconstruction attacks on public data. 46-53
- Judea Pearl:
The seven tools of causal inference, with reflections on machine learning. 54-60 - Zhi Quan Zhou, Liqun Sun:
Metamorphic testing of driverless cars. 61-67 - Advaith Siddharthan, Kapila Ponnamperuma, Chris Mellish, Cheng Zeng, Daniel Heptinstall, Annie Robinson, Stuart Benn, René van der Wal:
Blogging birds: telling informative stories about the lives of birds from telemetric data. 68-77 - Pamela Zave, Jennifer Rexford:
The compositional architecture of the internet. 78-87
- Tim Roughgarden:
Beyond worst-case analysis. 88-96
- Martin C. Rinard:
Technical perspective: Borrowing big code to automate programming activities. 98 - Veselin Raychev, Martin T. Vechev, Andreas Krause:
Predicting program properties from 'big code'. 99-107 - Nisheeth K. Vishnoi:
Technical perspective: Isolating a matching when your coins go missing. 108 - Stephen A. Fenner, Rohit Gurjar, Thomas Thierauf:
A deterministic parallel algorithm for bipartite perfect matching. 109-115
- Leah Hoffmann:
Guiding computers, robots to see and think. 120-
Volume 62, Number 4, April 2019
- Vinton G. Cerf:
In debt to the NSF. 5
- Robin K. Hill, Mark Guzdial:
Pondering variables and direct instruction. 6
- Chris Edwards:
Soft robots look to new environments. 9 - Samuel Greengard:
The future of data storage. 12 - Sarah Underwood:
The fine line between coercion and care. 15
- Mari Sako:
Free trade in a digital world. 18
- George V. Neville-Neil:
Know your algorithms. 22
- Dirk Lewandowski:
The web is missing an essential part of infrastructure: an open web index. 24
- Panagiota Fatourou, Chris Hankin:
Welcome to the Europe region special section. 28
- Lisa Korrigane:
A demographic snapshot of the IT workforce in Europe. 32 - David Pringle:
Enterprises lead ICT innovation in Europe. 34 - David Pringle:
Europe's ambitious ICT agenda. 35 - David Pringle:
Europe's well-connected consumers. 36 - Laurence Kalman:
New European data privacy and cyber security laws: one year later. 38 - Jan Gulliksen:
Incorporating Europe's values in future research. 40 - Koen De Bosschere, Marc Duranton, Madeleine Gray:
HiPEAC: a European network built to last. 42 - Joaquim A. Jorge, Mashhuda Glencross, Aaron Quigley:
ACM Europe Council's best paper awards. 44
- Julie A. McCann, Gian Pietro Picco, Alexander Gluhak, Karl Henrik Johansson, Martin Törngren, Laila Gide:
Connected things connecting Europe. 46 - Panagiota Fatourou, Yota Papageorgiou, Vasiliki Petousi:
Women are needed in STEM: European policies and incentives. 52 - Michael E. Caspersen, Judith Gal-Ezer, Andrew D. McGettrick, Enrico Nardelli:
Informatics as a fundamental discipline for the 21st century. 58 - Paola Inverardi:
The European perspective on responsible computing. 64 - Thomas Skordas:
Toward a European exascale ecosystem: the EuroHPC joint undertaking. 70 - Steffen Staab, Susan Halford, Wendy Hall:
Web science in Europe: beyond boundaries. 74
- Pat Helland:
Identity by any other name. 80 - Benjamin Treynor Sloss, Shylaja Nukala, Vivek Rau:
Metrics that matter. 88 - Nitesh Mor:
Research for practice: edge computing. 95
- Vijay Khatri, Binny M. Samuel:
Analytics for managerial work. 100
- James B. Aimone:
Neural algorithms and computing beyond Moore's law. 110 - Petros Wallden, Elham Kashefi:
Cyber security in the quantum era. 120
- Gilles Brassard:
Was Edgar Allan Poe wrong after all?: technical perspective. 132 - Umesh V. Vazirani, Thomas Vidick:
Fully device independent quantum key distribution. 133
- Dennis E. Shasha:
Fighting for lava. 144
Volume 62, Number 5, May 2019
- Vinton G. Cerf:
APIs, standards, and enabling infrastructure. 5
- Moshe Y. Vardi:
Quantum hype and quantum skepticism. 7
- Stefan Monnier, Andrew A. Chien, Robert L. Glass, Charles H. Davis, Thorkil Naur, Thomas A. Limoncelli:
Don't ignore the cost of 'embedded energy'. 10-11
- Ryan Carrier:
Implementing guidelines for governance, oversight of AI, and automation. 12-13
- Chris Edwards:
Questioning quantum. 15-17 - Neil Savage:
Code talkers. 18-19 - Samuel Greengard:
Deep insecurities: the internet of things shifts technology risk. 20-22
- James Grimmelmann:
Continuity and change in internet law. 24-26
- Joan Feigenbaum:
Encryption and surveillance. 27-29
- Emmanuel Schanzer, Shriram Krishnamurthi, Kathi Fisler:
What does it mean for a computing curriculum to succeed? 30-32
- Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao:
Enterprise wi-fi: we need devices that are secure by default. 33-35
- Raymond Blum, Betsy Beyer:
Achieving digital permanence. 36-42 - Martin Kleppmann, Alastair R. Beresford, Boerge Svingen:
Online event processing. 43-49 - Aleksandar Kuzmanovic:
Net neutrality: unexpected solution to blockchain scaling. 50-55
- Fay Cobb Payton, Eleni Berki:
Countering the negative image of women in computing. 56-63 - Yongge Wang, Qutaibah M. Malluhi:
The limit of blockchains: infeasibility of a smart Obama-Trump contract. 64-69
- Rod Downey, Denis R. Hirschfeldt:
Algorithmic randomness. 70-80
- Zachary G. Ives:
Technical perspective: Compressing matrices for large-scale machine learning. 82 - Ahmed Elgohary, Matthias Boehm, Peter J. Haas, Frederick R. Reiss, Berthold Reinwald:
Compressed linear algebra for declarative large-scale machine learning. 83-91
- Ken MacLeod:
Like old times. 96-
Volume 62, Number 6, June 2019
- Cherri M. Pancake:
ACM awards honor CS contributions. 5
- Vinton G. Cerf:
Back to the future. 7
- Mark Guzdial, John Arquilla:
Is CS really for all, and defending democracy in cyberspace. 8-9
- Neil Savage:
Neural net worth. 10-12 - Gary Anthes:
Lifelong learning in artificial neural networks. 13-15 - Don Monroe:
And then, there were three. 16-18 - Keith Kirkpatrick:
Ethics in technology jobs. 19-20
- Linnet Taylor:
Global data justice. 22-24
- A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann:
Through computer architecture, darkly. 25-27
- Peter J. Denning, David Brin:
An interview with David Brin on resiliency. 28-31
- Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
Personal data and the internet of things. 32-34
- Ulan Degenbaev, Michael Lippautz, Hannes Payer:
Garbage collection as a joint venture. 36-41 - Kate Matsudaira:
How to create a great team culture (and why it matters). 42-44 - Zachary C. Lipton, Jacob Steinhardt:
Research for practice: troubling trends in machine-learning scholarship. 45-53
- Jaeyoung Do, Sudipta Sengupta, Steven Swanson:
Programmable solid-state storage in future cloud datacenters. 54-62 - O. Sami Saydjari:
Engineering trustworthy systems: a principled approach to cybersecurity. 63-69
- Daniel S. Weld, Gagan Bansal:
The challenge of crafting intelligible intelligence. 70-79
- Rishiyur S. Nikhil:
Technical perspective: Back to the edge. 82 - Tony Nowatzki, Vinay Gangadhar, Karthikeyan Sankaralingam:
Heterogeneous Von Neumann/dataflow microprocessors. 83-91
- Leah Hoffmann:
Reaching new heights with artificial neural networks. 96-
Volume 62, Number 7, July 2019
- Andrew A. Chien:
Halfway round!: growing the regional special sections. 5
- Vinton G. Cerf:
Back to the future, part II. 6
- Moshe Y. Vardi:
To serve humanity. 7
- Gloria Childress Townsend, Sheldon Waite:
Bringing more women, immigrants, to computer science. 8-9
- Erica Klarreich:
Good algorithms make good neighbors. 11-13 - Keith Kirkpatrick:
The edge of computational photography. 14-16 - Logan Kugler:
Protecting the 2020 census. 17-19
- Pamela Samuelson:
API copyrights revisited. 20-22
- Susan J. Winter:
Who benefits? 23-25
- David Nordfors, Chally Grundwag, V. R. Ferose:
A new labor market for people with 'coolabilities'. 26-28
- Emery D. Berger, Stephen M. Blackburn, Carla E. Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Kuansan Wang, Lexing Xie:
GOTO rankings considered helpful. 29-30
- Pat Helland:
Extract, shoehorn, and load. 32-33 - Thomas A. Limoncelli:
The top 10 things executives should know about software. 34-40 - Access controls and healthcare records: who owns the data? 41-46
- Micah Beck:
On the hourglass model. 48-57 - Christopher Frauenberger, Peter Purgathofer:
Ways of thinking in informatics. 58-64
- Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar:
Internet of things search engine. 66-73 - Pedro M. Domingos, Daniel Lowd:
Unifying logical and statistical AI with Markov logic. 74-83
- Costin Raiciu:
Do you know why your web pages load faster?: technical perspective. 85 - Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. 86-94
- Dennis E. Shasha:
Opioid games. 96-
Volume 62, Number 8, August 2019
- Cherri M. Pancake:
Dispelling common myths about ACM awards and honors. 5
- Vinton G. Cerf:
Undo, redo, and regrets. 7
- CACM Staff:
A case against mission-critical applications of machine learning. 9
- Mark Guzdial:
Cutting the wait for CS advice. 12-13
- Samuel Greengard:
The algorithm that changed quantum machine learning. 15-17 - Don Monroe:
I don't understand my car. 18-19 - Gregory Mone:
What makes a robot likable? 20-21
- David Weintrop:
Block-based programming in computer science education. 22-25
- Marshall W. Van Alstyne:
A response to fake news as a response to Citizens United. 26-29
- George V. Neville-Neil:
MUST and MUST NOT. 30-31
- Marco Aiello:
The success of the web: a triumph of the amateurs. 32-34
- Natalya Fridman Noy, Yuqing Gao, Anshu Jain, Anant Narayanan, Alan Patterson, Jamie Taylor:
Industry-scale knowledge graphs: lessons and challenges. 36-43 - Anna Wiedemann, Nicole Forsgren, Manuel Wiesche, Heiko Gewald, Helmut Krcmar:
Research for practice: the DevOps phenomenon. 44-49 - Kate Matsudaira:
Overly attached. 50-52
- Barbara J. Grosz, David Gray Grant, Kate Vredenburgh, Jeff Behrends, Lily Hu, Alison Simmons, Jim Waldo:
Embedded EthiCS: integrating ethics across CS education. 54-61 - Dino Distefano, Manuel Fähndrich, Francesco Logozzo, Peter W. O'Hearn:
Scaling static analyses at Facebook. 62-70
- Jakob E. Bardram, Steven Jeuris, Paolo Tell, Steven Houben, Stephen Voida:
Activity-centric computing systems. 72-81 - Emilio Ferrara:
The history of digital spam. 82-91
- Graham Cormode:
Technical perspective: The true cost of popularity. 94 - Kasper Green Larsen, Jelani Nelson, Huy L. Nguyen, Mikkel Thorup:
Heavy hitters via cluster-preserving clustering. 95-100
- William Sims Bainbridge:
Fluid democracy. 104-
Volume 62, Number 9, September 2019
- Andrew A. Chien:
Sustaining open collaboration in universities. 5
- Vinton G. Cerf:
Polyglot! 6
- Moshe Y. Vardi:
The long game of research. 7
- CACM Staff:
On being 'random enough'. 9
- Yegor Bugayenko, Mark Guzdial:
Why programmers should curb their enthusiasm, and thinking about computational thinking. 10-11
- Samuel Greengard:
An inability to reproduce. 13-15 - Gary Anthes:
Augmented reality gets real. 16-18 - Sarah Underwood:
Can you locate your location data? 19-21
- Eric Goldman:
Internet immunity and the freedom to code. 22-24
- Hilarie Orman:
Online voting: we can do it! (we have to). 25-27
- Peter J. Denning, Andrew M. Odlyzko:
An interview with Andrew Odlyzko on cyber security. 28-30
- David Auerbach:
Bitwise: a life in code. 31-33
- Russ Cox:
Surviving software dependencies. 36-43 - Tom Killalea:
Velocity in software engineering. 44-47 - Shaul Kfir, Camille Fournier:
DAML: the contract language of distributed ledgers. 48-54
- Carla P. Gomes, Thomas G. Dietterich, Christopher Barrett, Jon Conrad, Bistra Dilkina, Stefano Ermon, Fei Fang, Andrew Farnsworth, Alan Fern, Xiaoli Z. Fern, Daniel Fink, Douglas H. Fisher, Alexander Flecker, Daniel Freund, Angela Fuller, John M. Gregoire, John E. Hopcroft, Steve Kelling, J. Zico Kolter, Warren B. Powell, Nicole D. Sintov, John S. Selker, Bart Selman, Daniel Sheldon, David B. Shmoys, Milind Tambe, Weng-Keen Wong, Christopher Wood, Xiaojian Wu, Yexiang Xue, Amulya Yadav, Abdul-Aziz Yakubu, Mary Lou Zeeman:
Computational sustainability: computing for a better world and a sustainable future. 56-65 - Daniel Jackson:
Alloy: a language and tool for exploring software designs. 66-76
- Jason Freeman, Brian Magerko, Doug Edwards, Tom McKlin, Taneisha Lee, Roxanne Moore:
EarSketch: engaging broad populations in computing through music. 78-85 - Yossi Gilad:
Metadata-private communication for the 99%. 86-93
- Sylvain Lefebvre:
Technical perspective: From virtual worlds to digital fabrication. 96 - Kiril Vidimce, Szu-Po Wang, Jonathan Ragan-Kelley, Wojciech Matusik:
OpenFab: a programmable pipeline for multimaterial fabrication. 97-105
- Leah Hoffmann:
Inspired by the home of the future. 112-
Volume 62, Number 10, October 2019
- Cherri M. Pancake:
How ACM evolves in response to community needs. 5
- Vinton G. Cerf:
AI is not an excuse! 7
- Robin K. Hill, Edwin Torres:
Pinning down variables, and taking an agile approach. 8-9
- Don Monroe:
Closing in on quantum error correction. 11-13 - Keith Kirkpatrick:
Protecting industrial control systems. 14-16 - Esther Shein:
The CS teacher shortage. 17-18
- Michael A. Cusumano:
The cloud as an innovation platform for software development. 20-22
- Peter G. Neumann:
How might we increase system trustworthiness? 23-25
- George V. Neville-Neil:
What is a chief security officer good for? 26-27
- Ryen W. White, Adam Fourney, Allen Herring, Paul N. Bennett, Nirupama Chandrasekaran, Robert Sim, Elnaz Nouri, Mark J. Encarnación:
Multi-device digital assistance. 28-31
- Jessie Frazelle:
Open source firmware. 34-38 - Thomas A. Limoncelli:
Demo data as code. 39-41 - Kate Matsudaira:
The evolution of management. 42-47
- Justine S. Hastings, Mark Howison, Ted Lawless, John Ucles, Preston White:
Unlocking data to improve public policy. 48-53 - Oren Salzman:
Sampling-based robot motion planning. 54-63
- Jennifer Mankoff, Megan Hofmann, Xiang 'Anthony' Chen, Scott E. Hudson, Amy Hurst, Jeeeun Kim:
Consumer-grade fabrication and its potential to revolutionize accessibility. 64-75 - Mark A. Hallen, Bruce Randall Donald:
Protein design by provable algorithms. 76-84
- Andrew W. Appel:
Technical Perspective: The scalability of CertiKOS. 88 - Ronghui Gu, Zhong Shao, Hao Chen, Jieung Kim, Jérémie Koenig, Xiongnan (Newman) Wu, Vilhelm Sjöberg, David Costanzo:
Building certified concurrent OS kernels. 89-99
- Dennis E. Shasha:
Dust wars. 104-
Volume 62, Number 11, November 2019
- Vinton G. Cerf:
Hazards of the information superhighway. 5
- Moshe Y. Vardi:
The winner-takes-all tech corporation. 7
- CACM Staff:
You can publish it!: (you have to). 8-9
- Yegor Bugayenko:
The benefits of indolence. 10-11
- Don Monroe:
Information is physics. 13-15 - Samuel Greengard:
When drones fly. 16-18 - Logan Kugler:
Real-world applications for drones. 19-21
- Pamela Samuelson:
Europe's controversial digital copyright directive finalized. 24-27
- Mark Guzdial, Alan C. Kay, Cathie Norris, Elliot Soloway:
Computational thinking should just be good thinking. 28-30
- George Varghese:
An interview with Leonard Kleinrock. 31-36
- Selena Silva, Martin Kenney:
Algorithms, platforms, and ethnic bias. 37-39
- P. J. Narayanan, Pankaj Jalote, Anand Deshpande:
Welcome to the India region special section. 40-42
- Manik Varma:
Extreme classification. 44-45 - Maryam Mustafa, Amna Batool, Agha Ali Raza:
Designing ICT interventions for women in Pakistan. 46-47 - Jayant R. Haritsa, S. Sudarshan:
Turbocharging database query processing and testing. 48-49 - Neeta Verma, Savita Dawar:
Digital transformation in the Indian government. 50-53 - Vipul Shah:
CSpathshala: bringing computational thinking to schools. 54-55 - Ajit Samaranayake, Sampath Tilakumara, Thayaparan Sripavan, Rasika Withanawasam:
Creative disruption in fintech from Sri Lanka. 56-57 - C. V. Jawahar, Venkata N. Padmanabhan:
Technology interventions for road safety and beyond. 58-59 - Shashank Srikant, Rohit Takhar, Vishal Venugopal, Varun Aggarwal:
Skill evaluation. 60-61 - Gautam Shroff, K. Ananth Krishnan:
Computing research at Tata Consultancy Services. 62-63
- Pankaj Jalote, Pari Natarajan:
The growth and evolution of India's software industry. 64-69 - Pushpak Bhattacharyya, Hema A. Murthy, Surangika Ranathunga, Ranjiva Munasinghe:
Indic language computing. 70-75 - Vivek Raghavan, Sanjay Jain, Pramod Varma:
India stack - digital infrastructure as public good. 76-81 - Subhashis Banerjee, Subodh Sharma:
Privacy concerns with Aadhaar. 80 - Charles Assisi, Avinash Raghava, N. S. Ramnath:
The rise of the Indian start-up ecosystem. 82-87 - Supratik Chakraborty, Vasudeva Varma:
Highlights of software R&D in India. 88-91 - Meena Mahajan, Madhavan Mukund, Nitin Saxena:
Research in theoretical computer science. 92-95 - Niloy Ganguly, Ponnurangam Kumaraguru:
The positive and negative effects of social media in India. 98-99 - Aditya Vashistha, Umar Saif, Agha Ali Raza:
The internet of the orals. 100-103
- Michelle Vaccaro, Jim Waldo:
The effects of mixing machine learning and human judgment. 104-110 - Pat Helland:
The trade-offs between write and read. 111-113
- Raja Appuswamy, Goetz Graefe, Renata Borovica-Gajic, Anastasia Ailamaki:
The five-minute rule 30 years later and its impact on the storage hierarchy. 114-120
- Yan Pei, Swarnendu Biswas, Donald S. Fussell, Keshav Pingali:
An elementary introduction to Kalman filtering. 122-133
- David G. Andersen:
Technical perspective: A whitebox solution for blackbox-like behaviors. 136 - Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: automated whitebox testing of deep learning systems. 137-145
- Cantando con la Corrente (singing with current). 160-
Volume 62, Number 12, December 2019
- Cherri M. Pancake:
Engaging future generations of ACM leaders. 5
- Vinton G. Cerf:
A hands-free ride. 7
- CACM Staff:
Online voting still security pipedream. 9
- Mark Guzdial, Robin K. Hill:
Getting high school, college students interested in CS. 10-11
- Chris Edwards:
Malevolent machine learning. 13-15 - Paul Marks:
Robots aim to boost astronaut efficiency. 16-18 - Keith Kirkpatrick:
Regulating information technology. 19-21
- David M. Douglas:
Should researchers use data from security breaches? 22-24
- George V. Neville-Neil:
Koding academies. 25
- Peter J. Denning, Ted G. Lewis:
Uncertainty. 26-28
- Beth Simone Noveck:
Public entrepreneurship and policy engineering. 29-31
- Ariana Mirian:
Hack for hire. 32-37 - Thomas A. Limoncelli:
API practices if you hate your customers. 38-42
- Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski:
The rise of serverless computing. 44-54
- Claire Le Goues, Michael Pradel, Abhik Roychoudhury:
Automated program repair. 56-65 - Moshe Tennenholtz, Oren Kurland:
Rethinking search engines and recommendation systems: a game theoretic perspective. 66-75
- Michael B. Taylor:
Technical perspective: Bootstrapping a future of open source, specialized hardware. 78 - Jonathan Balkind, Michael McKeown, Yaosheng Fu, Tri Minh Nguyen, Yanqi Zhou, Alexey Lavrov, Mohammad Shahrad, Adi Fuchs, Samuel Payne, Xiaohua Liang, Matthew Matl, David Wentzlaff:
OpenPiton: an open source hardware platform for your research. 79-87
- Leah Hoffmann:
RISCy beginnings. 96-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.