default search action
XRDS, Volume 21
Volume 21, Number 1, Fall 2014
- Inbal Talgam-Cohen, Sean Follmer:
Do no evil in research. 5-6
- Diverse responses to our diversty issue. 7
- Adrian Scoica, Daniel Bauer:
New directions in language processing. 8-9
- Jay Patel:
Technology for talking. 9
- Claudia Schulz:
From zero to excellence. 10
- Oded Green, Yoav Green:
A call for passion. 11
- Farnaz Ronaghi:
Successfully transitioning from academia to entrepreneurship. 12-13
- Maria Kechagia:
Why to get involved in the open source community? 14-15 - Olivia Simpson:
The geometric origins of spectral graph theory. 15-17
- Percy Liang:
Talking to computers in natural language. 18-21 - Mariano Felice, Zheng Yuan:
To err is human, to correct is divine. 22-27 - Per Ola Kristensson:
From wax tablets to touchscreens: an introduction to text-entry research. 28-33 - Terhi Nurmikko-Fuller:
Ancient Sumerian online: challenges and opportunities. 34-39 - Sara Rosenthal:
Detecting influencers in social media discussions. 40-45 - Pierre Lison, Raveesh Meena:
Spoken dialogue systems: the new frontier in human-computer interaction. 46-51 - Heba Elfardy, Mohamed Al-Badrashiny, Mona T. Diab:
A hybrid system for code switch point detection in informal Arabic text. 52-57 - Daniel Bauer, Billy Rathje:
Miriam Plieninger on language learning with Babbel. 58-59 - Adrian Scoica:
Profile Geoffrey Hinton: unlocking the language of the brain. 60-61
- Georgios Kontonatsios, Matt Shardlow:
National Centre for Text Mining (NaCTeM): Manchester, United Kingdom. 62-63
- Finn Kuusisto:
Speech synthesis. 63
- Marinka Zitnik:
Dynamics of news from the New York Times. 64-66
Volume 21, Number 2, Winter 2014
Letter from the editors
- Sean Follmer, Inbal Talgam-Cohen:
A shrimp's tale: why we need to fund research. 5-6
- On the NLP issue. 7
- Diana Lynn MacLean:
Health 2.0: the digital health revolution. 8
- Numair Khan:
The essentials of a computer scientist's toolkit. 9
- Claudia Schulz:
Staying in touch: how print and digital media can further student chapter outreach. 10-11
- Jay Patel:
Vital technology. 11
- Dean Jackson, Taliver Heath:
An antidote to impostor syndrome. 12-13
- Wolfgang Richter:
My $300 home cloud server: a story of blood, sweat, and eBay. 14-17
- Diana Lynn MacLean:
Gathering people to gather data. 18-22 - Munmun De Choudhury:
Opportunities of social media in health and well-being. 23-27 - Fay Cobb Payton, KaMar Galloway:
Here comes the #engagement: A serious health initiative made trendy. 28-31 - Matthew Kay:
Challenges in personal health tracking: the data isn't enough. 32-37 - Matthew L. Lee:
Did I take my meds today? 38-43 - Megan Monroe:
Seeing is believing. 44-47 - Sinziana Mazilu, Gerhard Tröster:
Wearable technologies: One step closer to gait rehabilitation in Parkinson's patients. 48-53 - Adrian Scoica:
Profile: Trevor van MierloThe story of building a startup in health informatics. 54-55
- Suranga Nath Kasthurirathne:
The Regenstrief global health informatics group: Indianapolis, Indiana. 56-57
- Finn Kuusisto:
Radiography. 57
- Marinka Zitnik:
The anatomy of a human disease network. 58-60
Volume 21, Number 3, Spring 2015
Letter from the editors
- Sean Follmer:
Stay weird, stay different. 5-6
- Inbox. 7
- Shashank Agrawal:
Alice and Bob in the new world. 8-9
- Claudia Schulz:
ACM-W chapters at home and abroad: An initiative on women, not of women. 10-11
- Jay Patel:
Chronicling ciphers. 11
- Vaggelis Giannikas:
The Ph.D. journey: tips from somebody who managed to defend his thesis. 12
- Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee:
Computer science faculty careers at liberal arts colleges. 13-15
- Maria Kechagia:
Exception handling evaluation of large APIs. 16-17 - Dimitris Mitropoulos:
On the evolution of security bugs. 18-19
- Shashank Agrawal, Billy Rathje:
Kristin Lauter on Cryptography and Mathematics. 20-22 - David J. Wu:
Fully Homomorphic Encryption: Cryptography's holy grail. 24-29 - Seny Kamara:
Encrypted Search. 30-34 - Mike Rosulek:
Secure Your Data and Compute on It, Too. 36-41 - Jason R. C. Nurse:
Exploring the Risks to Identity Security and Privacy in Cyberspace. 42-47 - Michael Smith:
The Wrens of Bletchley Park. 48-53 - Adrian Scoica:
Ian Pratt: Pioneering security through virtualization. 54-55
- Luke Garratt:
Cyber security centre: University of Oxford, United Kingdom. 56-57
- Finn Kuusisto:
Ancient and modern cryptography. 57
- Tomaz Hocevar:
Counting stars: pattern counting in networks. 58-59
Volume 21, Number 4, Summer 2015
Letter from the editors
- Inbal Talgam-Cohen:
Crossing boundaries. 5-7
- Cristina Pop:
A tale of two cells. 9-10
- Marius Tudor Benea:
Tips for writing a good scientific paper. 11
- Claudia Schulz:
A community for learning. 12-13
- Jay Patel:
Biological backstory. 13
- William Cox, Mike Freenor:
A fleeting sense of security: or security as a science (and how to make your boss understand). 14-15
- Fahad Khalid:
Dependence and parallelization: how automated tools determine the parallelizability of a loop. 16-19
- Cristina Pop, Billy Rathje:
An interview with the director of biomedical informatics at Stanford. 20-23 - Christoph Lippert, David Heckerman:
Computational and statistical issues in personalized medicine. 24-27 - Marina Sirota, Bin Chen:
Fighting disease with data. 28-33 - Narges Razavian:
Advancing the frontier of data-driven healthcare. 34-37 - Malay Bhattacharyya:
Disease dietomics. 38-44 - Cristina Pop:
A conversation with Vijay Pande. 45-47 - Adam A. Smith:
Hidden Markov models and mouse ultrasonic vocalizations. 48-53 - Karen Sachs, Tiffany Chen:
Big data comes in tiny packages: single-cell driven science and health. 54-59 - Sarah Aerni, Hulya Farinas, Gautam S. Muralidhar:
Digital drivers in the age of massive datasets. 60-66 - Adrian Scoica:
Profile Sriram Kosuri: Never mind the cloud, back up your selfies to DNA. 68-69
- Sam Abujudeh:
Cancer Research UK Cambridge Institute: University of Cambridge, United Kingdom. 70-71
- Finn Kuusisto:
Gene expression profiling. 71
- Marinka Zitnik:
Hidden genes: understanding cancer data with matrix factorization. 72-74
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.