Table of contents for issues of Communications of the ACM

Last update: Wed Oct 18 11:06:48 MDT 2023                Valid HTML 3.2!

Volume 53, Number 1, January, 2010
Volume 53, Number 2, February, 2010
Volume 53, Number 3, March, 2010
Volume 53, Number 4, April, 2010
Volume 53, Number 5, May, 2010
Volume 53, Number 6, June, 2010
Volume 53, Number 7, July, 2010
Volume 53, Number 8, August, 2010
Volume 53, Number 9, September, 2010
Volume 53, Number 10, October, 2010
Volume 53, Number 11, November, 2010
Volume 53, Number 12, December, 2010
Volume 54, Number 1, January, 2011
Volume 54, Number 2, February, 2011
Volume 54, Number 3, March, 2011
Volume 54, Number 4, April, 2011
Volume 54, Number 5, May, 2011
Volume 54, Number 6, June, 2011
Volume 54, Number 7, July, 2011
Volume 54, Number 8, August, 2011
Volume 54, Number 9, September, 2011
Volume 54, Number 10, October, 2011
Volume 54, Number 11, November, 2011
Volume 54, Number 12, December, 2011
Volume 55, Number 1, January, 2012
Volume 55, Number 2, February, 2012
Volume 55, Number 3, March, 2012
Volume 55, Number 4, April, 2012
Volume 55, Number 5, May, 2012
Volume 55, Number 6, June, 2012
Volume 55, Number 7, July, 2012
Volume 55, Number 8, August, 2012
Volume 55, Number 9, September, 2012
Volume 55, Number 10, October, 2012
Volume 55, Number 11, November, 2012
Volume 55, Number 12, December, 2012
Volume 56, Number 1, January, 2013
Volume 56, Number 2, February, 2013
Volume 56, Number 3, March, 2013
Volume 56, Number 4, April, 2013
Volume 56, Number 5, May, 2013
Volume 56, Number 6, June, 2013
Volume 56, Number 7, July, 2013
Volume 56, Number 8, August, 2013
Volume 56, Number 9, September, 2013
Volume 56, Number 10, October, 2013
Volume 56, Number 11, November, 2013
Volume 56, Number 12, December, 2013
Volume 57, Number 1, January, 2014
Volume 57, Number 2, February, 2014
Volume 57, Number 3, March, 2014
Volume 57, Number 4, April, 2014
Volume 57, Number 5, May, 2014
Volume 57, Number 6, June, 2014
Volume 57, Number 7, July, 2014
Volume 57, Number 8, August, 2014
Volume 57, Number 9, September, 2014
Volume 57, Number 10, October, 2014
Volume 57, Number 11, November, 2014
Volume 57, Number 12, December, 2014
Volume 58, Number 1, January, 2015
Volume 58, Number 2, February, 2015
Volume 58, Number 3, March, 2015
Volume 58, Number 4, April, 2015
Volume 58, Number 5, May, 2015
Volume 58, Number 6, June, 2015
Volume 58, Number 7, July, 2015
Volume 58, Number 8, August, 2015
Volume 58, Number 9, September, 2015
Volume 58, Number 10, October, 2015
Volume 58, Number 11, November, 2015
Volume 58, Number 12, December, 2015
Volume 59, Number 1, January, 2016
Volume 59, Number 2, February, 2016
Volume 59, Number 3, March, 2016
Volume 59, Number 4, April, 2016
Volume 59, Number 5, May, 2016
Volume 59, Number 6, June, 2016
Volume 59, Number 7, July, 2016
Volume 59, Number 8, August, 2016
Volume 59, Number 9, September, 2016
Volume 59, Number 10, October, 2016
Volume 59, Number 11, November, 2016
Volume 59, Number 12, December, 2016
Volume 60, Number 1, January, 2017
Volume 60, Number 2, February, 2017
Volume 60, Number 3, March, 2017
Volume 60, Number 4, April, 2017
Volume 60, Number 5, May, 2017
Volume 60, Number 6, June, 2017
Volume 60, Number 7, July, 2017
Volume 60, Number 8, August, 2017
Volume 60, Number 9, September, 2017
Volume 60, Number 10, October, 2017
Volume 60, Number 11, November, 2017
Volume 60, Number 12, December, 2017
Volume 61, Number 1, January, 2018
Volume 61, Number 2, February, 2018
Volume 61, Number 3, March, 2018
Volume 61, Number 4, April, 2018
Volume 61, Number 5, May, 2018
Volume 61, Number 6, June, 2018
Volume 61, Number 7, July, 2018
Volume 61, Number 8, August, 2018
Volume 61, Number 9, September, 2018
Volume 61, Number 10, October, 2018
Volume 61, Number 11, November, 2018
Volume 61, Number 12, December, 2018
Volume 62, Number 1, January, 2019
Volume 62, Number 2, February, 2019
Volume 62, Number 3, March, 2019
Volume 62, Number 4, April, 2019
Volume 62, Number 5, May, 2019
Volume 62, Number 6, June, 2019
Volume 62, Number 7, July, 2019
Volume 62, Number 8, August, 2019
Volume 62, Number 9, September, 2019
Volume 62, Number 10, October, 2019
Volume 62, Number 11, November, 2019
Volume 62, Number 12, December, 2019


Communications of the ACM
Volume 53, Number 1, January, 2010

                 Moshe Y. Vardi   Editor's letter: More debate, please!    5--5
                     CACM Staff   Letters to the Editor: Software still as
                                  much an art as science . . . . . . . . . 7--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
                     Wendy Hall   ACM's annual report  . . . . . . . . . . 9--13
                Greg Linden and   
               Ruben Ortega and   
                     Jason Hong   blog@CACM: Software engineering,
                                  smartphones and health systems, and
                                  security warnings  . . . . . . . . . . . 16--17
                    David Roman   CACM online: The corollary of
                                  empowerment  . . . . . . . . . . . . . . 18--18
                     Tom Geller   News: Rebuilding for eternity  . . . . . 19--21
                  Leah Hoffmann   News: Amir Pnueli: ahead of his time . . 22--23
                    Gary Anthes   News: Automated translation of Indian
                                  languages  . . . . . . . . . . . . . . . 24--26
                    Neil Savage   News: New search challenges and
                                  opportunities  . . . . . . . . . . . . . 27--28
                Kirk L. Kroeker   News: Future Internet design summit  . . 29--29
               Karen A. Frenkel   News: Robert Lovett Ashenhurst:
                                  1929--2009 . . . . . . . . . . . . . . . 30--30
               Samuel Greengard   News: ACM and India  . . . . . . . . . . 31--31
               Michael Cusumano   Viewpoints: Technology strategy and
                                  management: The evolution of platform
                                  thinking . . . . . . . . . . . . . . . . 32--34
              Phillip G. Armour   Viewpoints: The business of software: In
                                  praise of bad programmers  . . . . . . . 35--36
                       Arti Rai   Viewpoints: Law and technology:
                                  Unstandard standardization: the case of
                                  biology  . . . . . . . . . . . . . . . . 37--39
              Bjarne Stroustrup   Viewpoint: What should we teach new
                                  software developers? Why?  . . . . . . . 40--42
             William Aspray and   
                Len Shustek and   
                  Norbert Ryska   Viewpoints: Computer museum series:
                                  Great computing museums of the world,
                                  part one . . . . . . . . . . . . . . . . 43--46
                    Julian Hyde   Data in flight . . . . . . . . . . . . . 48--52
             Stephen Petschulat   Other people's data  . . . . . . . . . . 53--57
                 Adam Leventhal   Triple-parity RAID and beyond  . . . . . 58--63
        Michael Stonebraker and   
               Daniel Abadi and   
            David J. DeWitt and   
                 Sam Madden and   
               Erik Paulson and   
               Andrew Pavlo and   
                Alexander Rasin   MapReduce and parallel DBMSs: friends or
                                  foes?  . . . . . . . . . . . . . . . . . 64--71
               Jeffrey Dean and   
                Sanjay Ghemawat   MapReduce: a flexible data processing
                                  tool . . . . . . . . . . . . . . . . . . 72--77
                    Raz Lin and   
                    Sarit Kraus   Can automated agents proficiently
                                  negotiate with humans? . . . . . . . . . 78--88
                    Dan Wallach   Technical perspective: Native Client: a
                                  clever alternative . . . . . . . . . . . 90--90
                 Bennet Yee and   
                 David Sehr and   
             Gregory Dardyk and   
            J. Bradley Chen and   
                Robert Muth and   
              Tavis Ormandy and   
              Shiki Okasaka and   
                Neha Narula and   
              Nicholas Fullagar   Native Client: a sandbox for portable,
                                  untrusted x86 native code  . . . . . . . 91--99
                    Alon Halevy   Technical perspective: Schema mappings:
                                  rules for mixing data  . . . . . . . . . 100--100
            Balder ten Cate and   
            Phokion G. Kolaitis   Structural characterizations of
                                  schema-mapping languages . . . . . . . . 101--110
                  Leah Hoffmann   Last Byte: Q&A: HP's running man  . . . . 120--ff
               Dongback Seo and   
                   King-Tim Mak   Using the thread-fabric perspective to
                                  analyze industry dynamics  . . . . . . . 121--125
               Randal Burns and   
               Zachary Peterson   Security constructs for
                                  regulatory-compliant storage . . . . . . 126--130
               Wonchang Hur and   
                    Dongsoo Kim   The future of digital imaging  . . . . . 131--135
              Seongwoon Kim and   
                Inseong Lee and   
                   Kiho Lee and   
               Seungki Jung and   
                Joonah Park and   
               Yeun Bae Kim and   
             Sang Ryong Kim and   
                     Jinwoo Kim   Mobile Web 2.0 with multi-display
                                  buttons  . . . . . . . . . . . . . . . . 136--141
             Paul D. Witman and   
                     Terry Ryan   Think big for reuse  . . . . . . . . . . 142--147
               Vijay Khatri and   
                 Carol V. Brown   Designing data governance  . . . . . . . 148--152
             Vittorio Miori and   
                Dario Russo and   
               Massimo Aliberti   Domotic technologies incompatibility
                                  becomes user transparent . . . . . . . . 153--157
                    Zvi Drezner   Technical opinion: Random selection from
                                  a stream of events . . . . . . . . . . . 158--159

Communications of the ACM
Volume 53, Number 2, February, 2010

                 Diane Crawford   An issue of teamwork . . . . . . . . . . 5--5
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
                   Valerie Barr   blog@CACM: Connecting women and
                                  technology . . . . . . . . . . . . . . . 10--11
                    David Roman   CACM online: Where the data is . . . . . 12--12
                Kirk L. Kroeker   News: Alternate interface technologies
                                  emerge . . . . . . . . . . . . . . . . . 13--15
                    Alex Wright   News: Type theory comes of age . . . . . 16--17
                Sarah Underwood   News: Improving disaster management  . . 18--20
                     CACM Staff   News: ACM Fellows honored  . . . . . . . 21--21
                M. Angela Sasse   Privacy and security: Not seeing the
                                  crime for the cameras? . . . . . . . . . 22--25
            Dennis P. Groth and   
        Jeffrey K. MacKie-Mason   Education: Why an informatics degree?    26--28
                Douglas Maughan   Inside risks: The need for a national
                                  cybersecurity research and development
                                  agenda . . . . . . . . . . . . . . . . . 29--31
         Michel Beaudouin-Lafon   Open access to scientific publications   32--34
         George V. Neville-Neil   Kode Vicious: Taking your network's
                                  temperature  . . . . . . . . . . . . . . 35--36
                  Dennis Shasha   An interview with Michael Rabin  . . . . 37--42
                      Eric Saxe   Power-efficient software . . . . . . . . 44--48
         Alexandra Fedorova and   
          Sergey Blagodurov and   
               Sergey Zhuravlev   Managing contention for shared resources
                                  on multicore processors  . . . . . . . . 49--57
           Steven P. Miller and   
          Michael W. Whalen and   
                Darren D. Cofer   Software model checking takes off  . . . 58--64
                  Al Bessey and   
                  Ken Block and   
                  Ben Chelf and   
                  Andy Chou and   
               Bryan Fulton and   
                Seth Hallem and   
         Charles Henri-Gros and   
                Asya Kamsky and   
               Scott McPeak and   
                  Dawson Engler   A few billion lines of code later: using
                                  static analysis to find bugs in the real
                                  world  . . . . . . . . . . . . . . . . . 66--75
              Eric Benhamou and   
              Jon Eisenberg and   
                  Randy H. Katz   Assessing the changing U.S. IT R&D
                                  ecosystem  . . . . . . . . . . . . . . . 76--83
                 Dave Bacon and   
                    Wim van Dam   Recent progress in quantum algorithms    84--93
                Sanjoy Dasgupta   Strange effects in high dimension  . . . 96--96
                  Nir Ailon and   
               Bernard Chazelle   Faster dimension reduction . . . . . . . 97--104
              Shekhar Y. Borkar   Want to be a bug buster? . . . . . . . . 105--105
             Sung-Boem Park and   
                Subhasish Mitra   Post-silicon bug localization for
                                  processors using IFRA  . . . . . . . . . 106--113
                  Peter Winkler   Last Byte: Puzzled: Breaking chocolate
                                  bars . . . . . . . . . . . . . . . . . . 120--120
                Dongmin Kim and   
                  Izak Benbasat   Designs for effective implementation of
                                  trust assurances in Internet stores  . . 121--126
     Irma Becerra-Fernandez and   
                 Joyce Elam and   
                 Susan Clemmons   Reversing the landslide in
                                  computer-related degree programs . . . . 127--133
              Tim Chenoweth and   
               Robert Minch and   
                   Sharon Tabor   Wireless insecurity: examining user
                                  security behavior on public networks . . 134--138
              Farheen Altaf and   
                   David Schuff   Taking a flexible approach to ASPs . . . 139--143
                John Minor Ross   Informatics creativity: a role for
                                  abductive reasoning? . . . . . . . . . . 144--148
              Damien Joseph and   
                   Soon Ang and   
          Roger H. L. Chang and   
            Sandra A. Slaughter   Practical intelligence in IT: assessing
                                  soft skills of IT professionals  . . . . 149--154
           Vijay K. Gurbani and   
              Anita Garvert and   
              James D. Herbsleb   Managing a corporate open source
                                  software asset . . . . . . . . . . . . . 155--159
               Nikhil Mehta and   
                     Anju Mehta   It takes two to tango: how relational
                                  investments improve IT outsourcing
                                  partnerships . . . . . . . . . . . . . . 160--164

Communications of the ACM
Volume 53, Number 3, March, 2010

                 Moshe Y. Vardi   Revisiting the publication culture in
                                  computing research . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the Editor: Too much debate?  6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
               Mark Guzdial and   
                 Judy Robertson   BLOG@CACM: Too much programming too
                                  soon?  . . . . . . . . . . . . . . . . . 10--11
                    David Roman   CACM online: Granting a second life  . . 12--12
                   Gregory Goth   News: CS and biology's growing pains . . 13--15
                Kirk L. Kroeker   News: Engineering the Web's third decade 16--18
               Samuel Greengard   News: Tracking garbage . . . . . . . . . 19--20
                     CACM Staff   News: Katayanagi prizes and other CS
                                  awards . . . . . . . . . . . . . . . . . 21--21
                      Tim Chang   Economic and business dimensions: Gaming
                                  will save us all . . . . . . . . . . . . 22--24
               Pamela Samuelson   Legally speaking: Only technological
                                  processes are patentable . . . . . . . . 25--27
             Rachelle Hollander   Computing ethics: The ethics beat  . . . 28--29
           Peter J. Denning and   
            Fernando Flores and   
                  Peter Luzmore   The Profession of IT: Orchestrating
                                  coordination in pluralistic networks . . 30--32
                  Richard Tapia   Broadening participation: Hiring and
                                  developing minority faculty at research
                                  universities . . . . . . . . . . . . . . 33--35
             Cameron Wilson and   
                   Peter Harsha   IT Policy: Making the case for computing 36--38
              Kieron O'Hara and   
                 Nigel Shadbolt   Privacy: Privacy on the data web . . . . 39--41
              Kirk McKusick and   
                   Sean Quinlan   GFS: evolution on fast-forward . . . . . 42--49
             David J. Brown and   
                  Charles Reams   Toward energy-efficient computing  . . . 50--58
              Siew Kien Sia and   
              Christina Soh and   
                    Peter Weill   Global IT management: structuring for
                                  scale, responsiveness, and innovation    59--64
            Thomas Lengauer and   
       André Altmann and   
          Alexander Thielen and   
                    Rolf Kaiser   Chasing the AIDS virus . . . . . . . . . 66--74
               Cameron Seay and   
                    Gary Tucker   Virtual computing initiative at a small
                                  public university  . . . . . . . . . . . 75--83
               Vincent Conitzer   Making decisions based on the
                                  preferences of multiple agents . . . . . 84--94
             Daniele Micciancio   A first glimpse of cryptography's Holy
                                  Grail  . . . . . . . . . . . . . . . . . 96--96
                   Craig Gentry   Computing arbitrary functions of
                                  encrypted data . . . . . . . . . . . . . 97--105
                  Pietro Perona   Seeing the trees, the forest, and much
                                  more . . . . . . . . . . . . . . . . . . 106--106
                A. Torralba and   
               K. P. Murphy and   
                  W. T. Freeman   Using the forest to see the trees:
                                  exploiting context for visual object
                                  detection and localization . . . . . . . 107--114
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 118--118
                      Ari Juels   Last Byte: Future tense: The Primal Cue  120--ff
              Fabio Arduini and   
              Vincenzo Morabito   Business continuity and the banking
                                  industry . . . . . . . . . . . . . . . . 121--125
        Sherrie Drye Cannoy and   
                    A. F. Salam   A framework for health care information
                                  assurance policy and compliance  . . . . 126--131
                    Lin Lin and   
            Paul Jen-Hwa Hu and   
        Olivia R. Liu Sheng and   
                     Johnny Lee   Is stickiness profitable for electronic
                                  retailers? . . . . . . . . . . . . . . . 132--136
       Ramanath Subramanyam and   
          Fei Lee Weisstein and   
                 M. S. Krishnan   User participation in software
                                  development projects . . . . . . . . . . 137--141
            S. T. Parkinson and   
              R. M. Hierons and   
                  M. Lycett and   
                      M. Norman   Practitioner-based measurement: a
                                  collaborative approach . . . . . . . . . 142--147
                   Del Nagy and   
            Areej M. Yassin and   
             Anol Bhattacherjee   Organizational adoption of open source
                                  software: barriers and remedies  . . . . 148--151
           John H. Benamati and   
           Zafer D. Ozdemir and   
                  H. Jeff Smith   Aligning undergraduate IS curricula with
                                  industry needs . . . . . . . . . . . . . 152--156
                  Hing Kai Chan   Agent-oriented embedded electronic
                                  measuring systems  . . . . . . . . . . . 157--162

Communications of the ACM
Volume 53, Number 4, April, 2010

             Calvin Gotlieb and   
                  James Horning   The work of ACM's awards committee . . . 5--5
                     CACM Staff   Letters to the Editor: Computing
                                  paradigm not a branch of science . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
            Michael Stonebraker   BLOG@CACM: SQL databases v. NoSQL
                                  databases  . . . . . . . . . . . . . . . 10--11
                    David Roman   CACM Online: Going mobile  . . . . . . . 12--12
                    Alex Wright   News: Data streaming 2.0 . . . . . . . . 13--14
                    Gary Anthes   News: Robots gear up for disaster
                                  response . . . . . . . . . . . . . . . . 15--16
               Samuel Greengard   News: Spies among us?  . . . . . . . . . 17--19
                  Richard Heeks   Emerging Markets: Development 2.0: the
                                  IT-enabled transformation of
                                  international development  . . . . . . . 22--24
          Martin Campbell-Kelly   Historical reflection: Be careful what
                                  you wish for . . . . . . . . . . . . . . 25--26
               Michael Cusumano   Technology strategy and management:
                                  Cloud computing and SaaS as new
                                  computing platforms  . . . . . . . . . . 27--29
                       Paul Ohm   Viewpoint: When network neutrality met
                                  privacy  . . . . . . . . . . . . . . . . 30--32
         George V. Neville-Neil   Kode Vicious: The data-structure canon   33--34
                     Andy Woods   Cooling the data center  . . . . . . . . 36--42
                  Mache Creeger   CTO roundtable: malware defense  . . . . 43--49
           Michael Armbrust and   
                Armando Fox and   
              Rean Griffith and   
          Anthony D. Joseph and   
                 Randy Katz and   
             Andy Konwinski and   
                  Gunho Lee and   
            David Patterson and   
               Ariel Rabkin and   
                 Ion Stoica and   
                  Matei Zaharia   A view of cloud computing  . . . . . . . 50--58
      Parthasarathy Ranganathan   Recipe for efficiency: principles of
                                  power-aware computing  . . . . . . . . . 60--67
                Sergey Yekhanin   Private information retrieval  . . . . . 68--73
               Sergio Antoy and   
                  Michael Hanus   Functional logic programming . . . . . . 74--85
             Padhraic Smyth and   
                  Charles Elkan   Technical perspective: Creativity helps
                                  influence prediction precision . . . . . 88--88
                   Yehuda Koren   Collaborative filtering with temporal
                                  dynamics . . . . . . . . . . . . . . . . 89--97
          Leslie Pack Kaelbling   Technical perspective New bar set for
                                  intelligent vehicles . . . . . . . . . . 98--98
                Sebastian Thrun   Toward robotic cars  . . . . . . . . . . 99--106
                  Leah Hoffmann   Last Byte: Q&A: Systematic Thinking:
                                  Andrew S. Tanenbaum talks about MINIX,
                                  microkernels, and electronic voting
                                  systems  . . . . . . . . . . . . . . . . 112--ff
               Pak-Lok Poon and   
               Sau-Fun Tang and   
                  T. H. Tse and   
                     T. Y. Chen   CHOC'LATE: a framework for
                                  specification-based testing  . . . . . . 113--118
         Robert J. Aalberts and   
              Percy S. Poon and   
                Paul D. Thistle   A tale of two Internet service providers 119--123
                   Keith Wright   Capstone programming courses considered
                                  harmful  . . . . . . . . . . . . . . . . 124--127
         Surya Rebbapragada and   
                  Amit Basu and   
                    John Semple   Data mining and revenue management
                                  methodologies in college admissions  . . 128--133
                  Dawn G. Gregg   Designing for collective intelligence    134--138
           Stefano Ferretti and   
               Marco Furini and   
         Claudio E. Palazzi and   
             Marco Roccetti and   
                 Paola Salomoni   WWW recycling for a better world . . . . 139--143
                Rhoda C. Joseph   Individual resistance to IT innovations  144--146

Communications of the ACM
Volume 53, Number 5, May, 2010

                 Moshe Y. Vardi   \em Globalization and Offshoring of
                                  Software revisited . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the Editor: Roots of
                                  publication delay  . . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
          Jeannette M. Wing and   
                    Daniel Reed   BLOG@CACM: NSF funding advice: 21st
                                  century innovation . . . . . . . . . . . 10--11
                    David Roman   CACM Online: Looking for control . . . . 12--12
                    Jeff Kanipe   News: Modeling the astronomical  . . . . 13--15
                    Gary Anthes   News: Happy Birthday, RDBMS! . . . . . . 16--17
               Samuel Greengard   News: Cloud computing and developing
                                  nations  . . . . . . . . . . . . . . . . 18--20
               Jack Rosenberger   News: Thacker wins Turing Award  . . . . 21--21
                     CACM Staff   ACM's 2010 general election  . . . . . . 23--31
          Erik Brynjolfsson and   
               Paul Hofmann and   
                    John Jordan   Economic and business dimensions: Cloud
                                  computing and electricity: beyond the
                                  utility model  . . . . . . . . . . . . . 32--34
             Cameron Wilson and   
                   Mark Guzdial   Education: How to make progress in
                                  computing education  . . . . . . . . . . 35--37
                     Roman Beck   Viewpoint: Can IT lean against the wind? 38--40
                 Ofir Turel and   
              Alexander Serenko   Viewpoint: Is mobile email addiction
                                  overlooked?  . . . . . . . . . . . . . . 41--43
                 William Aspray   Computer museum series: Great computing
                                  museums of the world, part two . . . . . 45--49
                 Peter Phillips   Enhanced debugging with traces . . . . . 50--53
              Julien Ridoux and   
                  Darryl Veitch   Principles of robust timing over the
                                  Internet . . . . . . . . . . . . . . . . 54--61
                    Dave Durkee   Why cloud computing will never be free   62--69
          Abigail J. Sellen and   
                Steve Whittaker   Beyond total capture: a constructive
                                  critique of lifelogging  . . . . . . . . 70--77
              Clayton Lewis and   
         Michele H. Jackson and   
               William M. Waite   Student and faculty attitudes and
                                  beliefs about computer science . . . . . 78--85
                 Susanne Albers   Energy-efficient algorithms  . . . . . . 86--96
              Peter L. Bartlett   Learning to act in uncertain
                                  environments: technical perspective  . . 98--98
             Kuzman Ganchev and   
            Yuriy Nevmyvaka and   
             Michael Kearns and   
       Jennifer Wortman Vaughan   Censored exploration and the dark pool
                                  problem  . . . . . . . . . . . . . . . . 99--107
                    Mark Harman   Automated patching techniques: the fix
                                  is in: technical perspective . . . . . . 108--108
             Westley Weimer and   
          Stephanie Forrest and   
            Claire Le Goues and   
                 ThanhVu Nguyen   Automatic program repair with
                                  evolutionary computation . . . . . . . . 109--116
                  Peter Winkler   Last Byte: Puzzled: Variations on the
                                  Ham Sandwich Theorem . . . . . . . . . . 120--120
                 Paul P. Tallon   Understanding the dynamics of
                                  information management costs . . . . . . 121--125
        Blaize Horner Reich and   
                    Chris Sauer   Roles of the external IT project manager 126--129
                Wonil Hwang and   
               Gavriel Salvendy   Number of people required for usability
                                  evaluation: the $10 \pm 2$ rule  . . . . 130--133
             Charles E. Downing   Is Web-based supply chain integration
                                  right for your company?  . . . . . . . . 134--137
                 Demin Wang and   
          Dharma P. Agrawal and   
            Wassana Toruksa and   
Chaichana Chaiwatpongsakorn and   
                Mingming Lu and   
                  Tim C. Keener   Monitoring ambient air quality with
                                  carbon monoxide sensor-based wireless
                                  network  . . . . . . . . . . . . . . . . 138--141
 Theophanis C. Stratopoulos and   
                    Jee-Hae Lim   IT innovation persistence: an oxymoron?  142--146
            E. Vance Wilson and   
                   Bengisu Tulu   The rise of a health-IT academic focus   147--150
               Hyeyoung Kim and   
                Jae-Nam Lee and   
                     Jaemin Han   The role of IT in business ecosystems    151--156

Communications of the ACM
Volume 53, Number 6, June, 2010

                  Patricia Ryan   A tour of ACM's HQ . . . . . . . . . . . 5--5
                     CACM Staff   Workflow tools for distributed teams?    6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
                Greg Linden and   
                  Ed H. Chi and   
                   Mark Guzdial   The chaos of the Internet as an external
                                  brain; and more  . . . . . . . . . . . . 10--11
                    David Roman   CACM online: Interact naturally  . . . . 12--12
                    Neil Savage   News: Straightening out heavy tails  . . 13--15
                     Tom Geller   News: Beyond the Smart Grid  . . . . . . 16--17
                  Leah Hoffmann   News: Mine your business . . . . . . . . 18--19
                  Leah Hoffmann   News: Robin Milner: the elegant
                                  pragmatist . . . . . . . . . . . . . . . 20--21
               Jack Rosenberger   News: CS and technology leaders honored  22--22
           Arvind Narayanan and   
               Vitaly Shmatikov   Privacy and security: Myths and
                                  fallacies of `personally identifiable
                                  information' . . . . . . . . . . . . . . 24--26
              Stuart S. Shapiro   Inside risks: Privacy by design: moving
                                  from art to practice . . . . . . . . . . 27--29
           Peter J. Denning and   
                 Jack B. Dennis   The profession of IT: The resurgence of
                                  parallelism  . . . . . . . . . . . . . . 30--32
         George V. Neville-Neil   Kode Vicious: Plotting away  . . . . . . 33--34
François Lévêque   Law and technology: Intel's rebates:
                                  above board or below the belt? . . . . . 35--37
        Simson L. Garfinkel and   
            Lorrie Faith Cranor   Viewpoint: Institutional review boards
                                  and your research  . . . . . . . . . . . 38--40
                    Len Shustek   Interview: An interview with Ed
                                  Feigenbaum . . . . . . . . . . . . . . . 41--45
                   Dustin Owens   Securing elasticity in the cloud . . . . 46--51
                George Phillips   Simplicity betrayed  . . . . . . . . . . 52--58
               Jeffrey Heer and   
            Michael Bostock and   
               Vadim Ogievetsky   A tour through the visualization zoo . . 59--67
         Anastasia Ailamaki and   
             Verena Kantere and   
                 Debabrata Dash   Managing scientific data . . . . . . . . 68--78
                 Jilin Chen and   
              Joseph A. Konstan   Conference paper selectivity and impact  79--83
                Kristen Grauman   Efficiently searching for similar images 84--94
                   Vivek Sarkar   Building confidence in multicore
                                  software . . . . . . . . . . . . . . . . 96--96
               Jacob Burnim and   
                    Koushik Sen   Asserting and checking determinism for
                                  multithreaded programs . . . . . . . . . 97--105
             K. Rustan M. Leino   Learning to do program verification  . . 106--106
               Gerwin Klein and   
             June Andronick and   
          Kevin Elphinstone and   
              Gernot Heiser and   
                 David Cock and   
              Philip Derrin and   
          Dhammika Elkaduwe and   
             Kai Engelhardt and   
             Rafal Kolanski and   
            Michael Norrish and   
              Thomas Sewell and   
                Harvey Tuch and   
                  Simon Winwood   seL4: formal verification of an
                                  operating-system kernel  . . . . . . . . 107--115
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 118--118
                     David Brin   Last Byte: Future tense: How the Net
                                  ensures our cosmic survival  . . . . . . 120, 119
                    Jun Sun and   
           Marshall Scott Poole   Beyond connection: situated wireless
                                  communities  . . . . . . . . . . . . . . 121--125
           Sergio de Cesare and   
                Mark Lycett and   
         Robert D. Macredie and   
             Chaitali Patel and   
                       Ray Paul   Examining perceptions of agility in
                                  software development practice  . . . . . 126--130
             Alexander Nill and   
           John Schibrowsky and   
               James W. Peltier   Factors that influence software piracy:
                                  a view from Germany  . . . . . . . . . . 131--134
              Jan Kietzmann and   
                     Ian Angell   Panopticon revisited . . . . . . . . . . 135--138
              Benoit Baudry and   
              Sudipto Ghosh and   
             Franck Fleurey and   
              Robert France and   
              Yves Le Traon and   
               Jean-Marie Mottu   Barriers to systematic model
                                  transformation testing . . . . . . . . . 139--143
         Kevin P. Gallagher and   
             Kate M. Kaiser and   
            Judith C. Simon and   
           Cynthia M. Beath and   
                      Tim Goles   The requisite variety of skills for IT
                                  professionals  . . . . . . . . . . . . . 144--148
           Sandra A. Vannoy and   
                Prashant Palvia   The social influence model of technology
                                  adoption . . . . . . . . . . . . . . . . 149--153
                 Cheul Rhee and   
        G. Lawrence Sanders and   
             Natalie C. Simpson   I, myself and e-myself . . . . . . . . . 154--157

Communications of the ACM
Volume 53, Number 7, July, 2010

                 Moshe Y. Vardi   Hypercriticality . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the Editor: Don't ignore
                                  security offshore, or in the cloud . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
               Ruben Ortega and   
               Mark Guzdial and   
                    Daniel Reed   BLOG@CACM: Software development and
                                  crunch time; and more  . . . . . . . . . 10--11
                    David Roman   CACM online: In case you missed it . . . 12--12
                  David Lindley   News: Sharing computational perspectives 13--15
               Samuel Greengard   News: Censored!  . . . . . . . . . . . . 16--18
                Kirk L. Kroeker   News: Mainstreaming augmented reality    19--21
                    Gary Anthes   News: Committed to success . . . . . . . 22--23
                   Gregory Goth   News: Eric Brewer: change agent  . . . . 24--24
                Sarah Underwood   News: Visions of the future  . . . . . . 25--25
                      Mari Sako   Outsourcing versus shared services . . . 27--29
               Jason Borenstein   Computing ethics: Work life in the
                                  robotic age  . . . . . . . . . . . . . . 30--31
               Pamela Samuelson   Legally speaking: Should the Google book
                                  settlement be approved?  . . . . . . . . 32--34
              Valerie E. Taylor   Broadening participation: Cultivating
                                  cultural diversity in information
                                  technology . . . . . . . . . . . . . . . 35--36
          Gonzalo Génova   Viewpoint: Is computer science truly
                                  scientific?  . . . . . . . . . . . . . . 37--39
                  Marc Snir and   
                  Telle Whitney   Distinguished members: Advice to members
                                  seeking ACM distinction  . . . . . . . . 40--41
                     Eugene Loh   The ideal HPC programming language . . . 42--47
                  Brendan Gregg   Visualizing system latency . . . . . . . 48--54
              Poul-Henning Kamp   You're doing it wrong  . . . . . . . . . 55--59
           Gary Lewandowski and   
          Dennis J. Bouvier and   
                Tzu-Yi Chen and   
           Robert McCartney and   
               Kate Sanders and   
                 Beth Simon and   
               Tammy VanDeGrift   Commonsense understanding of
                                  concurrency: computing students and
                                  concert tickets  . . . . . . . . . . . . 60--70
                 Takeo Igarashi   Computer graphics for all  . . . . . . . 71--77
                Tim Roughgarden   Algorithmic game theory  . . . . . . . . 78--86
                  Hans-J. Boehm   A solid foundation for x86 shared
                                  memory: technical perspective  . . . . . 88--88
               Peter Sewell and   
              Susmit Sarkar and   
                Scott Owens and   
   Francesco Zappa Nardelli and   
               Magnus O. Myreen   x86-TSO: a rigorous and usable
                                  programmer's model for x86
                                  multiprocessors  . . . . . . . . . . . . 89--97
                Mary Jane Irwin   Technology scaling redirects main
                                  memories: technical perspective  . . . . 98--98
            Benjamin C. Lee and   
                 Engin Ipek and   
                 Onur Mutlu and   
                    Doug Burger   Phase change memory architecture and the
                                  quest for scalability  . . . . . . . . . 99--106
                  Leah Hoffmann   Last Byte: Q&A: From Single Core to
                                  Multicore  . . . . . . . . . . . . . . . 112, 111
                 Yurong Yao and   
              Edward Watson and   
                Beverly K. Kahn   Application service providers: market
                                  and adoption decisions . . . . . . . . . 113--117
            Jorge A. Romero and   
                Nirup Menon and   
            Rajiv D. Banker and   
                  Mark Anderson   ERP: drilling for profit in the oil and
                                  gas industry . . . . . . . . . . . . . . 118--121
              Wei-Lun Chang and   
              Soe-Tsyr Yuan and   
                   Carol W. Hsu   Creating the experience economy in
                                  e-commerce . . . . . . . . . . . . . . . 122--127
                   Oded Nov and   
                        Chen Ye   Why do people tag?: motivations for
                                  photo tagging  . . . . . . . . . . . . . 128--131
             Domenico Talia and   
                  Paolo Trunfio   How distributed data mining tasks can
                                  thrive as knowledge services . . . . . . 132--137
             Alan R. Dennis and   
            Thomas M. Duffy and   
                    Hasan Cakir   IT programs in high schools: lessons
                                  from the Cisco Networking Academy
                                  program  . . . . . . . . . . . . . . . . 138--141
             John C. Ruhnka and   
                  John W. Bagby   Using ESI discovery teams to manage
                                  electronic data discovery  . . . . . . . 142--144

Communications of the ACM
Volume 53, Number 8, August, 2010

                   Victor Vianu   JACM at the start of a new decade  . . . 5--5
                     CACM Staff   In the Virtual Extension . . . . . . . . 6--6
                     CACM Staff   Letters to the Editor: CS expertise for
                                  institutional review boards  . . . . . . 7--7
                Greg Linden and   
          Michael Bernstein and   
             Erika Shehan Poole   BLOG@CACM: The war against spam: and
                                  more . . . . . . . . . . . . . . . . . . 8--9
                    David Roman   CACM online: Print is not just ink
                                  anymore  . . . . . . . . . . . . . . . . 10--10
                    Gary Anthes   News: Mechanism design meets computer
                                  science  . . . . . . . . . . . . . . . . 11--13
                Kirk L. Kroeker   News: Looking beyond stereoscopic $3$D's
                                  revival  . . . . . . . . . . . . . . . . 14--16
                Sarah Underwood   News: Making sense of real-time behavior 17--18
                Kirk L. Kroeker   News: Celebrating the legacy of PLATO    19--20
               Jack Rosenberger   News: Gödel Prize and other CS awards . . 21--21
             Christopher S. Yoo   Is the Internet a maturing market? . . . 24--26
             David S. Touretzky   Preparing computer science students for
                                  the robotics revolution  . . . . . . . . 27--29
                   Ping Gao and   
                       Jiang Yu   Has China caught up in IT? . . . . . . . 30--32
         George V. Neville-Neil   Kode Vicious: Presenting your project    33--34
             Eugene H. Spafford   Privacy and security: Remembrances of
                                  things pest  . . . . . . . . . . . . . . 35--37
                   Samir Chopra   Rights for autonomous artificial agents? 38--40
                 Thomas J. Misa   An interview with Edsger W. Dijkstra . . 41--47
              Robert DeLine and   
               Gina Venolia and   
                     Kael Rowan   Software development with code maps  . . 48--54
                  Mache Creeger   Moving to the edge: a CTO roundtable on
                                  network virtualization . . . . . . . . . 55--62
              Jan Damsgaard and   
                 Jan Karlsbjerg   Seven principles for selecting software
                                  packages . . . . . . . . . . . . . . . . 63--71
                James Larus and   
                     Galen Hunt   The Singularity system . . . . . . . . . 72--79
                Gabor Szabo and   
           Bernardo A. Huberman   Predicting the popularity of online
                                  content  . . . . . . . . . . . . . . . . 80--88
             Sarita V. Adve and   
                  Hans-J. Boehm   Memory models: a case for rethinking
                                  parallel languages and hardware  . . . . 90--101
                     Helen Wang   Attacks target Web server logic and prey
                                  on XCS weaknesses: technical perspective 104--104
             Hristo Bojinov and   
             Elie Bursztein and   
                      Dan Boneh   The emergence of cross channel scripting 105--113
                 Fritz Henglein   Large-scale sound and precise program
                                  analysis: technical perspective  . . . . 114--114
                Isil Dillig and   
              Thomas Dillig and   
                     Alex Aiken   Reasoning about the unknown in static
                                  analysis . . . . . . . . . . . . . . . . 115--123
                  Peter Winkler   Last Byte: Puzzled: Figures on a Plane   128--128
              Wei-Fung Tung and   
                  Soe-Tsyr Yuan   Intelligent service machine  . . . . . . 129--134
             Marc N. Haines and   
         Marcus A. Rothenberger   How a service-oriented architecture may
                                  change the software development process  135--140
               Eugenio Tisselli   thinkflickrthink: a case study on
                                  strategic tagging  . . . . . . . . . . . 141--145
                  Lutz Prechelt   Plat\_Forms: is there one best Web
                                  development technology?  . . . . . . . . 146--149

Communications of the ACM
Volume 53, Number 9, September, 2010

                 Moshe Y. Vardi   Science has only two legs  . . . . . . . 5--5
                     CACM Staff   Letters to the Editor: More than one way
                                  to annotate metadata . . . . . . . . . . 7--7
                  Ed H. Chi and   
                   Ruben Ortega   BLOG@CACM: Expanding CS education;
                                  improving software development . . . . . 8--9
                    David Roman   CACM online: More \em Communications . . 12--12
                  David Lindley   News: Brains and bytes . . . . . . . . . 13--15
               Samuel Greengard   Obituary: Carl Adam Petri, 1926--2010    14--14
                     Phil Scott   Security: New Passwords Approach . . . . 15--15
                    Neil Savage   News: Cycling through data . . . . . . . 16--17
               Marina Krakovsky   News: Degrees, distance, and dollars . . 18--19
                     Tom Geller   News: ACM China nearing launch . . . . . 20--20
               Jack Rosenberger   News: Kyoto prize and other CS awards    21--21
              Phillip G. Armour   The business of software: Return at risk 23--25
          Robert A. Hillman and   
            Maureen A. O'Rourke   Law and Technology: Principles of the
                                  law of software contracts  . . . . . . . 26--28
           Peter J. Denning and   
             Dorothy E. Denning   The profession of IT: Discussing cyber
                                  attack . . . . . . . . . . . . . . . . . 29--31
              Mordechai Ben-Ari   Viewpoint: Objects never?: well, hardly
                                  ever!  . . . . . . . . . . . . . . . . . 32--35
           Jennifer Rexford and   
           Constantine Dovrolis   Point/Counterpoint: Future Internet
                                  architecture: clean-slate versus
                                  evolutionary research  . . . . . . . . . 36--40
            Stephen V. Cantrill   Computers in patient care: the promise
                                  and the challenge  . . . . . . . . . . . 42--47
                  Steve Chessin   Injecting errors for fun and profit  . . 48--54
                   Cary Millsap   Thinking clearly about performance, part
                                  1  . . . . . . . . . . . . . . . . . . . 55--60
       Dag I. K. Sjòberg   Confronting the myth of rapid
                                  obsolescence in computing research . . . 62--67
                  Joe Armstrong   Erlang . . . . . . . . . . . . . . . . . 68--75
             Christel Baier and   
     Boudewijn R. Haverkort and   
            Holger Hermanns and   
            Joost-Pieter Katoen   Performance evaluation and model
                                  checking join forces . . . . . . . . . . 76--85
                Johannes Gehrke   Programming with differential privacy:
                                  technical perspective  . . . . . . . . . 88--88
                 Frank McSherry   Privacy integrated queries: an
                                  extensible platform for
                                  privacy-preserving data analysis . . . . 89--97
                    Mark Jerrum   Constraint satisfaction problems and
                                  computational complexity: technical
                                  perspective  . . . . . . . . . . . . . . 98--98
          Andrei A. Bulatov and   
             Dániel Marx   Constraint satisfaction problems and
                                  global cardinality constraints . . . . . 99--106
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 110--110
                      Greg Bear   Last Byte: Future tense: Little Brother
                                  is Watching  . . . . . . . . . . . . . . 112--ff

Communications of the ACM
Volume 53, Number 10, October, 2010

                 Alain Chesnais   ACM is built on volunteers' shoulders    5--5
                     CACM Staff   Letters to the Editor: How to celebrate
                                  Codd's RDBMS vision  . . . . . . . . . . 7--7
            Michael Stonebraker   BLOG@CACM: In search of database
                                  consistency  . . . . . . . . . . . . . . 8--9
                    David Roman   CACM online: The mobile road ahead . . . 10--10
                    Alex Wright   News: Linear logic . . . . . . . . . . . 11--13
           Graeme Stemp-Morlock   News: Personal fabrication . . . . . . . 14--15
              Dennis McCafferty   News: Should code be released? . . . . . 16--17
          Martin Campbell-Kelly   Victorian data processing  . . . . . . . 19--21
            Michael A. Cusumano   Platforms and services: understanding
                                  the resurgence of Apple  . . . . . . . . 22--24
                David L. Parnas   Inside Risks: Risks of undisciplined
                                  development  . . . . . . . . . . . . . . 25--27
         George V. Neville-Neil   Kode Vicious: Version aversion . . . . . 28--29
              Michael Hicks and   
              Jeffrey S. Foster   Viewpoint: SCORE: agile research group
                                  management . . . . . . . . . . . . . . . 30--31
                 ACM Case Study   Photoshop scalability: keeping it simple 32--38
                   Cary Millsap   Thinking clearly about performance, part
                                  2  . . . . . . . . . . . . . . . . . . . 39--45
                 Kevin Montagne   Tackling architectural complexity with
                                  modeling . . . . . . . . . . . . . . . . 46--52
               Thomas Serre and   
                  Tomaso Poggio   A neuromorphic approach to computer
                                  vision . . . . . . . . . . . . . . . . . 54--61
          Prasanna B. Tambe and   
                  Lorin M. Hitt   How offshoring affects IT workers  . . . 62--70
          Rodrigo Rodrigues and   
                 Peter Druschel   Peer-to-peer systems . . . . . . . . . . 72--82
               Carl Waldspurger   A VM `Engine' that makes a difference:
                                  technical perspective  . . . . . . . . . 84--84
              Diwaker Gupta and   
                Sangmin Lee and   
             Michael Vrable and   
              Stefan Savage and   
            Alex C. Snoeren and   
            George Varghese and   
        Geoffrey M. Voelker and   
                    Amin Vahdat   Difference engine: harnessing memory
                                  redundancy in virtual machines . . . . . 85--93
                 Yair Weiss and   
                    Judea Pearl   Belief propagation: technical
                                  perspective  . . . . . . . . . . . . . . 94--94
           Erik B. Sudderth and   
         Alexander T. Ihler and   
              Michael Isard and   
         William T. Freeman and   
                Alan S. Willsky   Nonparametric belief propagation . . . . 95--103
                  Leah Hoffmann   Last Byte: Q&A: Gray's Paradigm . . . . . 112--ff

Communications of the ACM
Volume 53, Number 11, November, 2010

                 Moshe Y. Vardi   On P, NP, and computational complexity   5--5
                     CACM Staff   Letters to the Editor: How to think
                                  about objects  . . . . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
                      Tessa Lau   BLOG@CACM: Rethinking the systems review
                                  process  . . . . . . . . . . . . . . . . 10--11
                    David Roman   CACM online: a preference for PDF  . . . 12--12
                   Gregory Goth   News: Turning data into knowledge  . . . 13--15
                    Gary Anthes   News: Security in the cloud  . . . . . . 16--18
                  Leah Hoffmann   News: Career opportunities . . . . . . . 19--21
                    Neil Savage   News: Wide open spaces . . . . . . . . . 23--23
            Pablo J. Boczkowski   Economic and business dimensions: The
                                  divergent online news preferences of
                                  journalists and readers  . . . . . . . . 24--25
             Stephen Cooper and   
      Lance C. Pérez and   
                  Daphne Rainey   Education: K--12 computational learning  27--29
               Pamela Samuelson   Legally speaking: Why do software
                                  startups patent (or not)?  . . . . . . . 30--32
                Joel F. Brenner   Privacy and security: Why isn't
                                  cyberspace more secure?  . . . . . . . . 33--35
                     Matt Welsh   Viewpoint: Sensor networks for the
                                  sciences . . . . . . . . . . . . . . . . 36--39
       Brian W. Fitzpatrick and   
                       JJ Lueck   The case against data lock-in  . . . . . 42--46
          David S. H. Rosenthal   Keeping bits safe: how hard can it be?   47--55
              Poul-Henning Kamp   Sir, please step away from the ASR-33!   56--57
            Michael Garland and   
                  David B. Kirk   Understanding throughput-oriented
                                  architectures  . . . . . . . . . . . . . 58--66
               Patrick Vogl and   
                Michael Barrett   Regulating the information gatekeepers   67--72
          Piotr Faliszewski and   
         Edith Hemaspaandra and   
           Lane A. Hemaspaandra   Using complexity to protect elections    74--82
                    Sarita Adve   Data races are evil with no exceptions:
                                  technical perspective  . . . . . . . . . 84--84
               Tayfun Elmas and   
                Shaz Qadeer and   
                 Serdar Tasiran   Goldilocks: a race-aware Java runtime    85--92
            Cormac Flanagan and   
              Stephen N. Freund   FastTrack: efficient and precise dynamic
                                  race detection . . . . . . . . . . . . . 93--101
                  Peter Winkler   Last Byte: Puzzled: Rectangles Galore    112--112
                   Duncan Buell   Viewpoints: Virtual extension: In
                                  support of computer science teachers and
                                  the CSTA . . . . . . . . . . . . . . . . 113--115
              Massimo Ficco and   
       Roberto Pietrantuono and   
                  Stefano Russo   Virtual extension: Supporting ubiquitous
                                  location information in interworking 3G
                                  and wireless networks  . . . . . . . . . 116--123
                Jill Freyne and   
               Lorcan Coyle and   
                Barry Smyth and   
             Padraig Cunningham   Virtual extension: Relative status of
                                  journal and conference publications in
                                  computer science . . . . . . . . . . . . 124--132

Communications of the ACM
Volume 53, Number 12, December, 2010

             David A. Patterson   Diverse connections  . . . . . . . . . . 5--5
                     CACM Staff   Science has four legs  . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
                Greg Linden and   
                 Jason Hong and   
                   Mark Guzdial   Security advice; malvertisements; and CS
                                  education in Qatar . . . . . . . . . . . 10--11
                    David Roman   School grades need improvement . . . . . 12--12
                   Gregory Goth   The eyes have it . . . . . . . . . . . . 13--15
                    Gary Anthes   Topic models vs. unstructured data . . . 16--18
               Marina Krakovsky   CSEdWeek expands its reach . . . . . . . 19--19
               Samuel Greengard   The new face of war  . . . . . . . . . . 20--22
                  David Lindley   A matter of privacy  . . . . . . . . . . 23--23
            Seymour Goodman and   
                  Andrew Harris   The coming African tsunami of
                                  information insecurity . . . . . . . . . 24--27
            Mark Smotherman and   
                     Dag Spicer   IBM's single-processor supercomputer
                                  efforts  . . . . . . . . . . . . . . . . 28--30
               Ann Quiroz Gates   The role of Hispanic-serving
                                  institutions in contributing to an
                                  educated work force  . . . . . . . . . . 31--33
           Peter J. Denning and   
                 Robert E. Kahn   The long quest for universal information
                                  access . . . . . . . . . . . . . . . . . 34--36
         George V. Neville-Neil   Literate coding  . . . . . . . . . . . . 37--38
                Francine Berman   We need a research data census . . . . . 39--41
                     CACM Staff   A conversation with Ed Catmull . . . . . 42--47
                  Mache Creeger   The theft of business innovation: an
                                  ACM--BCS roundtable on threats to global
                                  competitiveness  . . . . . . . . . . . . 48--55
                     Zhong Shao   Certified software . . . . . . . . . . . 56--66
            Stephen J. Andriole   Business impact of Web 2.0 technologies  67--79
                 Adnan Darwiche   Bayesian networks  . . . . . . . . . . . 80--90
               Michael Elad and   
                    Raja Giryes   Iterative signal recovery from
                                  incomplete samples: technical
                                  perspective  . . . . . . . . . . . . . . 92--92
             Deanna Needell and   
                  Joel A. Tropp   CoSaMP: iterative signal recovery from
                                  incomplete and inaccurate samples  . . . 93--100
                 Scott Aaronson   QIP = PSPACE breakthrough: technical
                                  perspective  . . . . . . . . . . . . . . 101--101
                 Rahul Jain and   
               Zhengfeng Ji and   
          Sarvagya Upadhyay and   
                   John Watrous   QIP $=$ PSPACE . . . . . . . . . . . . . 102--109
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 126--126
                     Rumilisoun   Future tense: Rebirth of worlds  . . . . 128--ff
            Massimo Franceschet   The role of conference publications in
                                  CS . . . . . . . . . . . . . . . . . . . 129--132
                 Barry Lunt and   
                 J. Ekstrom and   
              Han Reichgelt and   
             Michael Bailey and   
                Richard Leblanc   IT 2008: the history of a new computing
                                  discipline . . . . . . . . . . . . . . . 133--141
              Ralph Morelli and   
         Chamindra de Silva and   
       Trishan de Lanerolle and   
             Rebecca Curzon and   
                  Xin Sheng Mao   A global collaboration to deploy help to
                                  China  . . . . . . . . . . . . . . . . . 142--149


Communications of the ACM
Volume 54, Number 1, January, 2011

                 Moshe Y. Vardi   Where have all the workshops gone? . . . 5--5
                     CACM Staff   To change the world, take a chance . . . 6--7
                      Anonymous   In the Virtual Extension . . . . . . . . 8--8
                     Wendy Hall   ACM's annual report  . . . . . . . . . . 9--13
           Jack Rosenberger and   
                 Judy Robertson   Smart career advice: laptops as a
                                  classroom distraction  . . . . . . . . . 14--15
                    David Roman   Scholarly publishing model needs an
                                  update . . . . . . . . . . . . . . . . . 16--ff
                    Gary Anthes   Nonlinear systems made easy  . . . . . . 17--19
                    Alex Wright   The touchy subject of haptics  . . . . . 20--22
               Marina Krakovsky   India's elephantine effort . . . . . . . 23--24
               Jack Rosenberger   EMET prize and other awards  . . . . . . 25--25
              Phillip G. Armour   Don't bring me a good idea . . . . . . . 27--29
                Stefan Bechtold   Google AdWords and European trademark
                                  law  . . . . . . . . . . . . . . . . . . 30--32
            Michael A. Cusumano   Reflections on the Toyota debacle  . . . 33--35
                   Mark D. Ryan   Cloud computing privacy concerns on our
                                  doorstep . . . . . . . . . . . . . . . . 36--38
              Guy L. Steele Jr.   An interview with Frances E. Allen . . . 39--45
              Eben M. Haber and   
              Eser Kandogan and   
                 Paul P. Maglio   Collaboration in system administration   46--53
                      Anonymous   UX design and agile: a natural fit?  . . 54--60
           Evangelos Kotsovinos   Virtualization: blessing or curse? . . . 61--65
                 Gio Wiederhold   Follow the intellectual property . . . . 66--74
                    Uzi Vishkin   Using simple abstraction to reinvent
                                  computing for parallelism  . . . . . . . 75--85
                  Cynthia Dwork   A firm foundation for private data
                                  analysis . . . . . . . . . . . . . . . . 86--95
                    Dina Katabi   Sora promises lasting impact: technical
                                  perspective  . . . . . . . . . . . . . . 98--98
                    Kun Tan and   
                     He Liu and   
             Jiansong Zhang and   
            Yongguang Zhang and   
                    Ji Fang and   
            Geoffrey M. Voelker   Sora: high-performance software radio
                                  using general-purpose multi-core
                                  processors . . . . . . . . . . . . . . . 99--107
                  Damon Wischik   Multipath: a new control architecture
                                  for the Internet: technical perspective  108--108
                  Peter Key and   
   Laurent Massoulié and   
                    Don Towsley   Path selection and multipath congestion
                                  control  . . . . . . . . . . . . . . . . 109--116
              Dennis McCafferty   Last Byte: Q&A: a Journey of Discovery    128--ff
         Michael E. Locasto and   
              Anup K. Ghosh and   
             Sushil Jajodia and   
                Angelos Stavrou   The ephemeral legion: producing an
                                  expert cyber-security work force from
                                  thin air . . . . . . . . . . . . . . . . 129--131
        Peter Fröhlich and   
           Antti Oulasvirta and   
           Matthias Baldauf and   
                 Antti Nurminen   On the move, wirelessly connected to the
                                  world  . . . . . . . . . . . . . . . . . 132--138
            Matthias Häsel   Opensocial: an enabler for social
                                  applications on the Web  . . . . . . . . 139--144

Communications of the ACM
Volume 54, Number 2, February, 2011

                     Tom Rodden   ICPS offers major research venue . . . . 5--5
                     CACM Staff   Shine the light of computational
                                  complexity . . . . . . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
                     Jason Hong   Matters of design  . . . . . . . . . . . 10--11
                    David Roman   End of days for Communications in print? 12--12
                   Gregory Goth   Chipping away at greenhouse gases  . . . 13--15
                    Neil Savage   Information theory after Shannon . . . . 16--18
                  Leah Hoffmann   Maurice Wilkes: the last pioneer . . . . 19--19
               Samuel Greengard   Following the crowd  . . . . . . . . . . 20--22
                    Gary Anthes   ACM launches new Digital Library . . . . 23--24
                     CACM Staff   ACM Fellows honored  . . . . . . . . . . 25--25
                   Maura Conway   Against cyberterrorism . . . . . . . . . 26--28
            Gregory Rosston and   
               Scott Savage and   
                 Donald Waldman   Household demand for broadband Internet
                                  service  . . . . . . . . . . . . . . . . 29--31
              George Ledin, Jr.   The growing harm of not teaching malware 32--34
         George V. Neville-Neil   Forest for the trees . . . . . . . . . . 35--36
                   Mark Guzdial   From science to engineering  . . . . . . 37--39
                Jonathan Grudin   Technology, conferences, and community   41--43
                   Julian Harty   Finding usability bugs with automated
                                  tests  . . . . . . . . . . . . . . . . . 44--49
           Thomas A. Limoncelli   A plea from sysadmins to software
                                  vendors: 10 do's and don'ts  . . . . . . 50--51
                 Christina Lear   System administration soft skills  . . . 52--58
           Juan Pablo Wachs and   
        Mathias Kölsch and   
               Helman Stern and   
                      Yael Edan   Vision-based hand-gesture applications   60--71
       Michael J. Cafarella and   
                Alon Halevy and   
                Jayant Madhavan   Structured data on the Web . . . . . . . 72--79
                 Stephen Davies   Still building the Memex . . . . . . . . 80--88
               Fernando Pereira   Markov meets Bayes: technical
                                  perspective  . . . . . . . . . . . . . . 90--90
                 Frank Wood and   
               Jan Gasthaus and   
   Cédric Archambeau and   
             Lancelot James and   
                   Yee Whye Teh   The sequence memoizer  . . . . . . . . . 91--98
               Norman P. Jouppi   DRAM errors in the wild: technical
                                  perspective  . . . . . . . . . . . . . . 99--99
           Bianca Schroeder and   
           Eduardo Pinheiro and   
            Wolf-Dietrich Weber   DRAM errors in the wild: a large-scale
                                  field study  . . . . . . . . . . . . . . 100--107
                  Peter Winkler   Last Byte: Puzzled: Parsing Partitions   112--112
             John K. Estell and   
                Ken Christensen   The need for a new graduation rite of
                                  passage  . . . . . . . . . . . . . . . . 113--115
                   Qinping Zhao   10 scientific problems in virtual
                                  reality  . . . . . . . . . . . . . . . . 116--118
               David Wright and   
               Paul De Hert and   
                 Serge Gutwirth   Are the OECD guidelines at 30 showing
                                  their age? . . . . . . . . . . . . . . . 119--127

Communications of the ACM
Volume 54, Number 3, March, 2011

                 Moshe Y. Vardi   Fumbling the future  . . . . . . . . . . 5--5
                     CACM Staff   Free speech for algorithms?  . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 11--11
               Mark Guzdial and   
                    Greg Linden   Scientists, engineers, and computer
                                  science; industry and research groups    12--13
                    David Roman   Time to change . . . . . . . . . . . . . 14--14
                Kirk L. Kroeker   Grid computing's future  . . . . . . . . 15--17
                    Neil Savage   Twitter as medium and message  . . . . . 18--20
                     Tom Geller   Evaluating government funding  . . . . . 21--21
                    Gary Anthes   Memristors: pass or fail?  . . . . . . . 22--24
               Samuel Greengard   Gary Chapman, technologist: 1952--2010   25--25
               Pamela Samuelson   Do you own the software you buy? . . . . 26--28
              Kenneth D. Pimple   Surrounded by machines . . . . . . . . . 29--31
               Peter J. Denning   Managing time  . . . . . . . . . . . . . 32--34
            Daryl E. Chubin and   
           Roosevelt Y. Johnson   A program greater than the sum of its
                                  parts: the BPC alliances . . . . . . . . 35--37
                      Marc Snir   Computer and information science and
                                  engineering: one discipline, many
                                  specialties  . . . . . . . . . . . . . . 38--43
                   Mark Burgess   Testable system administration . . . . . 44--49
        Ross Stapleton-Gray and   
               William Woodcock   National Internet defense---small states
                                  on the skirmish line . . . . . . . . . . 50--55
              Poul-Henning Kamp   B.Y.O.C (1,342 times and counting) . . . 56--58
               Katy Börner   Plug-and-play macroscopes  . . . . . . . 60--69
              Frank Stajano and   
                    Paul Wilson   Understanding scam victims: seven
                                  principles for systems security  . . . . 70--75
                     Nir Shavit   Data structures in the multicore age . . 76--84
                 Juan Bello and   
                 Yann LeCun and   
                    Robert Rowe   Concerto for violin and Markov model:
                                  technical perspective  . . . . . . . . . 86--86
            Christopher Raphael   The informatics philharmonic . . . . . . 87--93
               Jennifer Rexford   VL2: technical perspective . . . . . . . 94--94
           Albert Greenberg and   
          James R. Hamilton and   
               Navendu Jain and   
           Srikanth Kandula and   
              Changhoon Kim and   
            Parantap Lahiri and   
             David A. Maltz and   
              Parveen Patel and   
               Sudipta Sengupta   VL2: a scalable and flexible data center
                                  network  . . . . . . . . . . . . . . . . 95--104
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 109--109
                Gregory Benford   Future tense . . . . . . . . . . . . . . 112--ff
           Frances Rosamond and   
           Roswitha Bardohl and   
              Stephan Diehl and   
                Uwe Geisler and   
             Gordon Bolduan and   
  Annette Lessmöllmann and   
            Andreas Schwill and   
                   Ulrike Stege   Reaching out to the media: become a
                                  computer science ambassador  . . . . . . 113--116
           R. Kelly Garrett and   
              James N. Danziger   The Internet electorate  . . . . . . . . 117--123
          Steven De Hertogh and   
               Stijn Viaene and   
                   Guido Dedene   Governing Web 2.0  . . . . . . . . . . . 124--130

Communications of the ACM
Volume 54, Number 4, April, 2011

             Robert B. Schnabel   Educating computing's next generation    5--5
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
                     CACM Staff   I want a personal information pod  . . . 9--9
                     Jason Hong   Matters of design, part II . . . . . . . 10--11
                Scott E. Delman   ACM on the move  . . . . . . . . . . . . 12--12
                    Gary Anthes   The quest for randomness . . . . . . . . 13--15
                Kirk L. Kroeker   Engineering sensation in artificial
                                  limbs  . . . . . . . . . . . . . . . . . 16--18
               Samuel Greengard   Social games, virtual goods  . . . . . . 19--22
                Sarah Underwood   British computer scientists reboot . . . 23--23
             Fred Niederman and   
                   Felix B. Tan   Managing global IT teams: considering
                                  cultural dynamics  . . . . . . . . . . . 24--27
               Nathan Ensmenger   Building castles in the air  . . . . . . 28--30
            Michael A. Cusumano   Platform wars come to social media . . . 31--33
         George V. Neville-Neil   Coder's block  . . . . . . . . . . . . . 34--35
José Luis Gómez-Barroso and   
          Claudio Feijóo   Asymmetries and shortages of the network
                                  neutrality principle . . . . . . . . . . 36--37
             Jonathan Parri and   
             Daniel Shapiro and   
              Miodrag Bolic and   
                    Voicu Groza   Returning control to the programmer:
                                  SIMD intrinsics for virtual machines . . 38--43
       Thomas A. Limoncelli and   
                 Vinton G. Cerf   Successful strategies for IPv6 rollouts:
                                  Really . . . . . . . . . . . . . . . . . 44--48
                Erik Meijer and   
                  Gavin Bierman   A co-relational model of data for large
                                  shared data banks  . . . . . . . . . . . 49--58
           Maneesh Agrawala and   
                  Wilmot Li and   
            Floraine Berthouzoz   Design principles for visual
                                  communication  . . . . . . . . . . . . . 60--69
      Aleksandar Dragojevik and   
              Pascal Felber and   
            Vincent Gramoli and   
               Rachid Guerraoui   Why STM can be more than a research toy  70--77
               John C. Tang and   
             Manuel Cebrian and   
        Nicklaus A. Giacobe and   
               Hyun-Woo Kim and   
                 Taemie Kim and   
     Douglas ``Beaker'' Wickert   Reflecting on the DARPA Red Balloon
                                  Challenge  . . . . . . . . . . . . . . . 78--85
                 Anhai Doan and   
         Raghu Ramakrishnan and   
                 Alon Y. Halevy   Crowdsourcing systems on the World-Wide
                                  Web  . . . . . . . . . . . . . . . . . . 86--96
                Daniel M. Berry   Liability issues in software
                                  engineering: technical perspective . . . 98--98
   Daniel Le Métayer and   
              Manuel Maarek and   
              Eduardo Mazza and   
          Marie-Laure Potet and   
Stéphane Frénot and   
Valérie Viet Triem Tong and   
           Nicolas Craipeau and   
                 Ronan Hardouin   Liability issues in software
                                  engineering: the use of formal methods
                                  to reduce legal uncertainties  . . . . . 99--106
                    Madhu Sudan   Patterns hidden from simple algorithms:
                                  technical perspective  . . . . . . . . . 107--107
                 Mark Braverman   Poly-logarithmic independence fools
                                  bounded-depth Boolean circuits . . . . . 108--115
                  Leah Hoffmann   Last Byte: Q&A: The Chief Computer  . . . 120--ff
          Patricia Morreale and   
                   David Joiner   Reaching future computer scientists  . . 121--124
              Ann Majchrzak and   
              Philip H. B. More   Emergency! Web 2.0 to the rescue!  . . . 125--132
              Fred Grossman and   
            Charles Tappert and   
                 Joe Bergin and   
               Susan M. Merritt   A research doctorate for computing
                                  professionals  . . . . . . . . . . . . . 133--141
            Gerardo Canfora and   
      Massimiliano Di Penta and   
                   Luigi Cerulo   Achievements and challenges in software
                                  reverse engineering  . . . . . . . . . . 142--151

Communications of the ACM
Volume 54, Number 5, May, 2011

                 Moshe Y. Vardi   Technology has social consequences . . . 5--5
                     CACM Staff   Preserve privacy in statistical
                                  correlations . . . . . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
            Michael Stonebraker   Stonebraker on data warehouses . . . . . 10--11
                Scott E. Delman   Let ACM help you find your next job
                                  `online' . . . . . . . . . . . . . . . . 12--12
                    Neil Savage   Sorting through photos . . . . . . . . . 13--15
                   Gregory Goth   I, domestic robot  . . . . . . . . . . . 16--17
                  Leah Hoffmann   Data optimization in developing nations  18--20
               Marina Krakovsky   Deus ex machina  . . . . . . . . . . . . 22--22
                    Alex Wright   Web science meets network science  . . . 23--23
               Avi Goldfarb and   
            Catherine E. Tucker   Online advertising, behavioral
                                  targeting, and privacy . . . . . . . . . 25--27
                     Brian Dorn   Reaching learners beyond our hallowed
                                  halls  . . . . . . . . . . . . . . . . . 28--30
                         Tim Wu   Bell Labs and centralized innovation . . 31--33
              Jason Fitzpatrick   An interview with Steve Furber . . . . . 34--39
            Juan A. Añel   The importance of reviewing the code . . 40--41
              Poul-Henning Kamp   The one-second war . . . . . . . . . . . 44--48
             Andre Charland and   
                   Brian Leroux   Mobile application development: Web vs.
                                  native . . . . . . . . . . . . . . . . . 49--53
               Patrick McKenzie   Weapons of mass assignment . . . . . . . 54--59
        Dennis J. McFarland and   
             Jonathan R. Wolpaw   Brain-computer interfaces for
                                  communication and control  . . . . . . . 60--66
             Shekhar Borkar and   
                Andrew A. Chien   The future of microprocessors  . . . . . 67--77
          Mikhail Afanasyev and   
            Tadayoshi Kohno and   
                  Justin Ma and   
                Nick Murphy and   
              Stefan Savage and   
            Alex C. Snoeren and   
            Geoffrey M. Voelker   Privacy-preserving network forensics . . 78--87
                 Byron Cook and   
           Andreas Podelski and   
             Andrey Rybalchenko   Proving program termination  . . . . . . 88--98
                David C. Parkes   Complex financial products: caveat
                                  emptor: technical perspective  . . . . . 100--100
              Sanjeev Arora and   
                 Boaz Barak and   
        Markus Brunnermeier and   
                        Rong Ge   Computational complexity and information
                                  asymmetry in financial products  . . . . 101--107
               Guillermo Sapiro   Images everywhere: looking for models:
                                  technical perspective  . . . . . . . . . 108--108
              Antoni Buades and   
              Bartomeu Coll and   
              Jean-Michel Morel   Self-similarity-based image denoising    109--117
                  Peter Winkler   Last Byte: Puzzled: Games, Roles, Turns  120--120
             Subhankar Dhar and   
                 Upkar Varshney   Challenges and business models for
                                  mobile location-based services and
                                  advertising  . . . . . . . . . . . . . . 121--128
                  Guido Schryen   Is open source security a myth?  . . . . 130--140
             Jacques Wainer and   
                 Cleo Billa and   
              Siome Goldenstein   Invisible work in standard bibliometric
                                  evaluation of computer science . . . . . 141--146

Communications of the ACM
Volume 54, Number 6, June, 2011

            P. J. Narayanan and   
                Anand Deshpanda   Computing and India  . . . . . . . . . . 5--5
                     CACM Staff   Why concurrent objects are recurrently
                                  complicated  . . . . . . . . . . . . . . 6--6
                     CACM Staff   In the Virtual Extension . . . . . . . . 7--7
                Daniel Reed and   
               Mark Guzdial and   
                 Judy Robertson   Simple design; research vs. teaching;
                                  and quest to learn . . . . . . . . . . . 8--9
                Scott E. Delman   Say it with video  . . . . . . . . . . . 10--10
                Kirk L. Kroeker   Biology-inspired networking  . . . . . . 11--13
                    Gary Anthes   Beauty and elegance: Leslie Valiant
                                  talks about machine learning, parallel
                                  computing, and his quest for simplicity  14--15
                     Tom Geller   The promise of flexible displays . . . . 16--18
                   Gregory Goth   Unlimited possibilities  . . . . . . . . 19--19
               Marina Krakovsky   All the news that's fit for you  . . . . 20--21
                   Ari Schwartz   Identity management and privacy: a rare
                                  opportunity to get it right  . . . . . . 22--24
           Peter J. Denning and   
              Dennis J. Frailey   Who are we---now?  . . . . . . . . . . . 25--27
              Phillip G. Armour   Practical application of theoretical
                                  estimation . . . . . . . . . . . . . . . 28--30
             David Lorge Parnas   The risks of stopping too soon . . . . . 31--33
         George V. Neville-Neil   Think before you fork  . . . . . . . . . 34--35
        Clayton T. Morrison and   
           Richard T. Snodgrass   Computer science can use more science    36--38
                    Pat Helland   If you have too much data, then `good
                                  enough' is good enough . . . . . . . . . 40--47
                    Michael Rys   Scalable SQL . . . . . . . . . . . . . . 48--53
                    Qing Hu and   
              Zhengchuan Xu and   
               Tamara Dinev and   
                      Hong Ling   Does deterrence work in reducing
                                  information security policy abuse by
                                  employees? . . . . . . . . . . . . . . . 54--60
           W. Keith Edwards and   
         Rebecca E. Grinter and   
              Ratul Mahajan and   
                David Wetherall   Advancing the state of home networking   62--71
        Michael Stonebraker and   
                   Rick Cattell   10 rules for scalable performance in
                                  `simple operation' datastores  . . . . . 72--80
               Mike Barnett and   
      Manuel Fähndrich and   
         K. Rustan M. Leino and   
          Peter Müller and   
            Wolfram Schulte and   
                  Herman Venter   Specification and verification: the
                                  Spec# experience . . . . . . . . . . . . 81--91
            Massimo Franceschet   PageRank: standing on the shoulders of
                                  giants . . . . . . . . . . . . . . . . . 92--101
            Phokion G. Kolaitis   The quest for a logic for
                                  polynomial-time computation: technical
                                  perspective  . . . . . . . . . . . . . . 103--103
                   Martin Grohe   From polynomial time queries to graph
                                  structure theory . . . . . . . . . . . . 104--112
            Michael J. Franklin   Data analysis at astonishing speed:
                                  technical perspective  . . . . . . . . . 113--13
              Sergey Melnik and   
             Andrey Gubarev and   
             Jing Jing Long and   
             Geoffrey Romer and   
           Shiva Shivakumar and   
                Matt Tolton and   
                Theo Vassilakis   Dremel: interactive analysis of
                                  Web-scale datasets . . . . . . . . . . . 114--123
                  Peter Winkler   Last Byte: Puzzled: a Lifelong Learner   126--126
                  Leah Hoffmann   Last Byte: Q&A: a Lifelong Learner:
                                  Leslie Valiant discusses machine
                                  learning, parallel computing, and
                                  computational neuroscience . . . . . . . 128, 127
                Paolo Boldi and   
           Francesco Bonchi and   
            Carlos Castillo and   
               Sebastiano Vigna   Viscous democracy for social networks    129--137
             Denise Mcmanus and   
               Houston Carr and   
                 Benjamin Adams   Wireless on the precipice: The 14th
                                  century revisited  . . . . . . . . . . . 138--143

Communications of the ACM
Volume 54, Number 7, July, 2011

                 Moshe Y. Vardi   Solving the unsolvable . . . . . . . . . 5--5
                     CACM Staff   Practical research yields fundamental
                                  insight, too . . . . . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
          Jeannette M. Wing and   
                      Ed H. Chi   Reviewing peer review  . . . . . . . . . 10--11
                Scott E. Delman   ACM aggregates publication statistics in
                                  the ACM Digital Library  . . . . . . . . 12--12
                Kirk L. Kroeker   Weighing Watson's impact . . . . . . . . 13--15
                    Alex Wright   Automotive autonomy  . . . . . . . . . . 16--18
              Dennis McCafferty   Brave, new social world  . . . . . . . . 19--21
                     CACM Staff   ACM award recipients . . . . . . . . . . 22--22
                      Mari Sako   Driving power in global supply chains    23--25
                Cory Knobel and   
             Geoffrey C. Bowker   Values in design . . . . . . . . . . . . 26--28
               Pamela Samuelson   Too many copyrights? . . . . . . . . . . 29--31
                Maria (Mia) Ong   The status of women of color in computer
                                  science  . . . . . . . . . . . . . . . . 32--34
       Mordechai (Moti) Ben-Ari   Non-myths about programming  . . . . . . 35--37
      Roberto Ierusalimschy and   
Luiz Henrique De Figueiredo and   
                 Waldemar Celes   Passing a language through the eye of a
                                  needle . . . . . . . . . . . . . . . . . 38--43
                 Debasish Ghosh   DSL for the uninitiated  . . . . . . . . 44--50
                     CACM Staff   Microsoft's protocol documentation
                                  program: interoperability testing at
                                  scale  . . . . . . . . . . . . . . . . . 51--57
                Michael Edwards   Algorithmic composition: computational
                                  thinking in music  . . . . . . . . . . . 58--67
                Thomas Ball and   
             Vladimir Levin and   
             Sriram K. Rajamani   A decade of software model checking with
                                  SLAM . . . . . . . . . . . . . . . . . . 68--76
      Joseph M. Hellerstein and   
           David L. Tennenhouse   Searching for Jim Gray: a technical
                                  overview . . . . . . . . . . . . . . . . 77--87
              Stephen B. Wicker   Cellular telephony and the question of
                                  privacy  . . . . . . . . . . . . . . . . 88--98
      Luiz André Barroso   FAWN: a Fast Array of Wimpy Nodes:
                                  technical perspective  . . . . . . . . . 100--100
          David G. Andersen and   
             Jason Franklin and   
           Michael Kaminsky and   
           Amar Phanishayee and   
               Lawrence Tan and   
                Vijay Vasudevan   FAWN: a Fast Array of Wimpy Nodes  . . . 101--109
                John Ousterhout   Is scale your enemy, or is scale your
                                  friend?: technical perspective . . . . . 110--110
       Kinshuman Kinshumann and   
                Kirk Glerum and   
            Steve Greenberg and   
                Gabriel Aul and   
              Vince Orgovan and   
               Greg Nichols and   
                David Grant and   
            Gretchen Loihle and   
                     Galen Hunt   Debugging in the (very) large: ten years
                                  of implementation and experience . . . . 111--116
                    Rudy Rucker   Future tense . . . . . . . . . . . . . . 120--ff
            John Ousterhout and   
              Parag Agrawal and   
             David Erickson and   
         Christos Kozyrakis and   
             Jacob Leverich and   
           David Mazi\`eres and   
            Subhasish Mitra and   
          Aravind Narayanan and   
               Diego Ongaro and   
              Guru Parulkar and   
           Mendel Rosenblum and   
          Stephen M. Rumble and   
             Eric Stratmann and   
                  Ryan Stutsman   The case for RAMCloud  . . . . . . . . . 121--130
             Gargi Dasgupta and   
                Amit Sharma and   
               Akshat Verma and   
              Anindya Neogi and   
                   Ravi Kothari   Workload management for power efficiency
                                  in virtualized data centers  . . . . . . 131--141

Communications of the ACM
Volume 54, Number 8, August, 2011

              Sorel Reisman and   
                 Alain Chesnais   From the Presidents of the IEEE Computer
                                  Society and ACM  . . . . . . . . . . . . 5--5
                     CACM Staff   A policy that deters violation of
                                  security policy  . . . . . . . . . . . . 7--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 8--8
            Michael Stonebraker   Stonebraker on NoSQL and enterprises . . 10--11
                Scott E. Delman   Why you should be happy to sign in!  . . 12--12
                Kirk L. Kroeker   A new benchmark for artificial
                                  intelligence . . . . . . . . . . . . . . 13--15
                     Tom Geller   Supercomputing's exaflop target  . . . . 16--18
               Samuel Greengard   Life, translated . . . . . . . . . . . . 19--21
           Jonathon N. Cummings   Geography is alive and well in virtual
                                  teams  . . . . . . . . . . . . . . . . . 24--26
              Betsy DiSalvo and   
                   Amy Bruckman   From interests to values . . . . . . . . 27--29
             S. M. Bellovin and   
              S. O. Bradner and   
                  W. Diffie and   
                  S. Landau and   
                     J. Rexford   Privacy and Security: As simple as
                                  possible---but not more so: An
                                  assessment of the U.S. government's
                                  EINSTEIN project . . . . . . . . . . . . 30--33
         George V. Neville-Neil   Storage strife . . . . . . . . . . . . . 34--35
          Joseph Y. Halpern and   
                David C. Parkes   Journals for certification, conferences
                                  for rapid dissemination  . . . . . . . . 36--38
                    Eric Allman   The robustness principle reconsidered    40--45
                   Satnam Singh   Computing without processors . . . . . . 46--54
                      Oren Eini   The pain of implementing LINQ providers  55--61
        Dharmendra S. Modha and   
 Rajagopal Ananthanarayanan and   
            Steven K. Esser and   
           Anthony Ndirango and   
       Anthony J. Sherbondy and   
              Raghavendra Singh   Cognitive computing  . . . . . . . . . . 62--71
          J. McGrath Cohoon and   
               Sergey Nigai and   
         Joseph ``Jofish'' Kaye   Gender and computing conference papers   72--80
             Luca De Alfaro and   
      Ashutosh Kulshreshtha and   
                    Ian Pye and   
                B. Thomas Adler   Reputation systems for open
                                  collaboration  . . . . . . . . . . . . . 81--87
          Surajit Chaudhuri and   
             Umeshwar Dayal and   
                Vivek Narasayya   An overview of business intelligence
                                  technology . . . . . . . . . . . . . . . 88--98
                  Peter J. Haas   Sketches get sketchier . . . . . . . . . 100--100
                    Ping Li and   
      Arnd Christian König   Theory and applications of $b$-bit
                                  minwise hashing  . . . . . . . . . . . . 101--109
                  Scott Klemmer   Skintroducing the future . . . . . . . . 110--110
             Chris Harrison and   
                 Desney Tan and   
                     Dan Morris   Skinput: appropriating the skin as an
                                  interactive canvas . . . . . . . . . . . 111--118
                  Peter Winkler   Last Byte: Puzzled: Uncommon Divisors    120--120
                   David Wright   Should privacy impact assessments be
                                  mandatory? . . . . . . . . . . . . . . . 121--131
                    Sanjay Goel   Cyberwarfare: connecting the dots in
                                  cyber intelligence . . . . . . . . . . . 132--140

Communications of the ACM
Volume 54, Number 9, September, 2011

                 Moshe Y. Vardi   Are you talking to me? . . . . . . . . . 5--5
                     CACM Staff   Solved, for all practical purposes . . . 7--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
          Jeannette M. Wing and   
                   Valerie Barr   Jeannette M. Wing @ PCAST; Barbara
                                  Liskov keynote . . . . . . . . . . . . . 10--11
                Kirk L. Kroeker   A breakthrough in algorithm design . . . 13--15
                    Gary Anthes   Invasion of the mobile apps  . . . . . . 16--18
               Samuel Greengard   In Memoriam: Robert Morris, 1932--2011   17--17
                    Neil Savage   Remaking American medicine . . . . . . . 19--21
                Rebecca Tushnet   Remix nation . . . . . . . . . . . . . . 22--24
          Martin Campbell-Kelly   In praise of 'Wilkes, Wheeler, and Gill' 25--27
                  Ron Babin and   
               Steve Briggs and   
                Brian Nicholson   Corporate social responsibility and
                                  global IT outsourcing  . . . . . . . . . 28--30
           Peter J. Denning and   
                       Ritu Raj   Managing time, part 2  . . . . . . . . . 31--33
            Ben Shneiderman and   
            Jennifer Preece and   
                  Peter Pirolli   Realizing the value of social media
                                  requires innovative computing research   34--37
                     Paul Vixie   Arrogance in business planning . . . . . 38--41
              Poul-Henning Kamp   The most expensive one-byte mistake  . . 42--44
                  Mache Creeger   ACM CTO roundtable on mobile devices in
                                  the enterprise . . . . . . . . . . . . . 45--53
             Stephen J. Lukasik   Protecting users of the cyber commons    54--61
                Craig Partridge   Realizing the future of wireless data
                                  communications . . . . . . . . . . . . . 62--68
          Leonardo De Moura and   
         Nikolaj Bjòrner   Satisfiability modulo theories:
                                  introduction and applications  . . . . . 69--77
            Patricia Bouyer and   
             Uli Fahrenberg and   
              Kim G. Larsen and   
                 Nicolas Markey   Quantitative analysis of real-time
                                  systems using priced timed automata  . . 78--87
            Christopher Kruegel   Making browser extensions secure:
                                  technical perspective  . . . . . . . . . 90--90
          Sruthi Bandhakavi and   
                Nandit Tiku and   
              Wyatt Pittman and   
             Samuel T. King and   
              P. Madhusudan and   
              Marianne Winslett   Vetting browser extensions for security
                                  vulnerabilities with VEX . . . . . . . . 91--99
              Olivier Danvy and   
                  Jan Midtgaard   Abstracting abstract machines: technical
                                  perspective  . . . . . . . . . . . . . . 100--100
             David Van Horn and   
                  Matthew Might   Abstracting abstract machines: a
                                  systematic approach to higher-order
                                  program analysis . . . . . . . . . . . . 101--109
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 110--110
                  Leah Hoffmann   Last Byte: Q&A: Scaling Up  . . . . . . . 112--ff
         Monideepa Tarafdar and   
                   Qiang Tu and   
          T. S. Ragu-Nathan and   
           Bhanu S. Ragu-Nathan   Crossing to the dark side: examining
                                  creators, outcomes, and inhibitors of
                                  technostress . . . . . . . . . . . . . . 113--120
                  Murray Cantor   Calculating and improving ROI in
                                  software and system programs . . . . . . 121--130

Communications of the ACM
Volume 54, Number 10, October, 2011

         Ronald F. Boisvert and   
               Jack W. Davidson   ACM's copyright policy . . . . . . . . . 5--6
                     CACM Staff   In the Virtual Extension . . . . . . . . 7--7
                Daniel Reed and   
                   Mark Guzdial   From idea to product: how schools of
                                  education can help CS  . . . . . . . . . 8--9
                Scott E. Delman   ACM TechNews now available in the
                                  Android Market . . . . . . . . . . . . . 10--10
                Kirk L. Kroeker   Improving brain-computer interfaces  . . 11--14
                     Tom Geller   Seeing is not enough . . . . . . . . . . 15--16
               Samuel Greengard   Living in a digital world  . . . . . . . 17--19
               Marina Krakovsky   Success at 16  . . . . . . . . . . . . . 20--20
            Michael A. Cusumano   The platform leader's dilemma  . . . . . 21--24
         George V. Neville-Neil   File-system litter . . . . . . . . . . . 25--26
         Carsten Schürmann   Modernizing the Danish democratic
                                  process  . . . . . . . . . . . . . . . . 27--29
              Phillip G. Armour   Testing: failing to succeed  . . . . . . 30--31
                 Dan S. Wallach   Rebooting the CS publication process . . 32--35
             Rishiyur S. Nikhil   Abstraction in hardware system design    36--44
                    Erik Meijer   The world according to LINQ  . . . . . . 45--51
          B. Scott Andersen and   
                George Romanski   Verification of safety-critical software 52--57
                  John Arquilla   From blitzkrieg to bitskrieg: the
                                  military encounter with computers  . . . 58--65
                Sarah Cohen and   
          James T. Hamilton and   
                    Fred Turner   Computational journalism . . . . . . . . 66--71
              Jasmin Fisher and   
                David Harel and   
            Thomas A. Henzinger   Biology as reactivity  . . . . . . . . . 72--82
                  Charles Moore   Power efficiency as the #1 design
                                  constraint: technical perspective  . . . 84--84
               Rehan Hameed and   
             Wajahat Qadeer and   
                Megan Wachs and   
                 Omid Azizi and   
          Alex Solomatnikov and   
            Benjamin C. Lee and   
         Stephen Richardson and   
         Christos Kozyrakis and   
                  Mark Horowitz   Understanding sources of inefficiency in
                                  general-purpose chips  . . . . . . . . . 85--93
             Geoffrey E. Hinton   A better way to learn features:
                                  technical perspective  . . . . . . . . . 94--94
                Honglak Lee and   
               Roger Grosse and   
           Rajesh Ranganath and   
                   Andrew Y. Ng   Unsupervised learning of hierarchical
                                  representations with convolutional deep
                                  belief networks  . . . . . . . . . . . . 95--103
                   Carlo Tomasi   Visual reconstruction: technical
                                  perspective  . . . . . . . . . . . . . . 104--104
             Sameer Agarwal and   
          Yasutaka Furukawa and   
               Noah Snavely and   
                  Ian Simon and   
              Brian Curless and   
            Steven M. Seitz and   
               Richard Szeliski   Building Rome in a day . . . . . . . . . 105--112
                 Shumeet Baluja   Future tense . . . . . . . . . . . . . . 120--ff
             Daniel Gayo-Avello   Don't turn social media into another
                                  `Literary Digest' poll . . . . . . . . . 121--128
                  Zhiwei Xu and   
                      Guojie Li   Computing for the masses . . . . . . . . 129--137

Communications of the ACM
Volume 54, Number 11, November, 2011

                 Moshe Y. Vardi   Is Moore's Party over? . . . . . . . . . 5--5
                     CACM Staff   Justice for Jahromi  . . . . . . . . . . 6--7
                     CACM Staff   In the Virtual Extension . . . . . . . . 9--9
             Bertrand Meyer and   
                    Greg Linden   In support of open reviews: better
                                  teaching through large-scale data mining 12--13
                Scott E. Delman   ACM offers a new approach to
                                  self-archiving . . . . . . . . . . . . . 14--14
                Kirk L. Kroeker   Modeling chaotic storms  . . . . . . . . 15--17
                    Alex Wright   Hacking cars . . . . . . . . . . . . . . 18--19
                  Leah Hoffmann   Risky business . . . . . . . . . . . . . 20--22
              Hannes Tschofenig   Security risks in next-generation
                                  emergency services . . . . . . . . . . . 23--25
                 Scott Wallsten   What gets measured gets done . . . . . . 26--28
               Pamela Samuelson   Why the Google book settlement failed:
                                  and what comes next? . . . . . . . . . . 29--31
                  Michael Davis   Will software engineering ever be
                                  engineering? . . . . . . . . . . . . . . 32--34
SIGCSE Teaching-Oriented Faculty Working Group   Teaching-oriented faculty at research
                                  universities . . . . . . . . . . . . . . 35--37
            Douglas Baumann and   
          Susanne Hambrusch and   
               Jennifer Neville   Gender demographics trends and changes
                                  in U.S. CS departments . . . . . . . . . 38--42
              Poul-Henning Kamp   The software industry is the problem . . 44--47
                        Li Gong   Java security architecture revisited . . 48--52
                   Yaron Minsky   OCaml for the masses . . . . . . . . . . 53--58
                Marti A. Hearst   'Natural' search user interfaces . . . . 60--67
               DongBack Seo and   
            Albert Boonstra and   
            Marjolein Offenbeek   Managing IS adoption in ambivalent
                                  groups . . . . . . . . . . . . . . . . . 68--73
                Ken Kennedy and   
            Charles Koelbel and   
                      Hans Zima   The rise and fall of High Performance
                                  Fortran  . . . . . . . . . . . . . . . . 74--82
            Ian F. Akyildiz and   
        Josep Miquel Jornet and   
          Massimiliano Pierobon   Nanonetworks: a new frontier in
                                  communications . . . . . . . . . . . . . 84--89
                 Butler Lampson   Making untrusted code useful: technical
                                  perspective  . . . . . . . . . . . . . . 92--92
         Nickolai Zeldovich and   
        Silas Boyd-Wickizer and   
               Eddie Kohler and   
               David Mazi\`eres   Making information flow explicit in
                                  HiStar . . . . . . . . . . . . . . . . . 93--101
             William T. Freeman   A perfect `match': technical perspective 102--102
            Connelly Barnes and   
             Dan B. Goldman and   
              Eli Shechtman and   
               Adam Finkelstein   The PatchMatch randomized matching
                                  algorithm for image manipulation . . . . 103--110
                  Peter Winkler   Last Byte: Puzzled: Distances Between
                                  Points on the Plane  . . . . . . . . . . 120--120
       Hector Garcia-Molina and   
           Georgia Koutrika and   
            Aditya Parameswaran   Information seeking: convergence of
                                  search, recommendations, and advertising 121--130

Communications of the ACM
Volume 54, Number 12, December, 2011

                 Moshe Y. Vardi   Computing for humans . . . . . . . . . . 5--5
                     CACM Staff   To boost presentation quality, ask
                                  questions  . . . . . . . . . . . . . . . 7--7
              John Langford and   
                 Judy Robertson   Conferences and video lectures;
                                  scientific educational games . . . . . . 8--9
                     CACM Staff   Nominees for elections and report of the
                                  ACM Nominating Committee . . . . . . . . 10--10
                Kirk L. Kroeker   The rise of molecular machines . . . . . 11--13
                   Gregory Goth   Brave NUI world  . . . . . . . . . . . . 14--16
              Dennis McCafferty   Activism vs. slacktivism . . . . . . . . 17--19
               Samuel Greengard   CSEdWeek takes hold  . . . . . . . . . . 20--20
                     Paul Hyman   Dennis Ritchie, 1941--2011 . . . . . . . 21--21
                   Jaron Lanier   The most ancient marketing . . . . . . . 22--23
                 Genevieve Bell   Life, death, and the iPad: cultural
                                  symbols and Steve Jobs . . . . . . . . . 24--25
            Michael A. Cusumano   The legacy of Steve Jobs . . . . . . . . 26--28
                 Kentaro Toyama   On turbocharged, heat-seeking, robotic
                                  fishing poles  . . . . . . . . . . . . . 29--31
         George V. Neville-Neil   Debugging on live systems  . . . . . . . 32--33
             Valerie Taylor and   
                 Richard Ladner   Data trends on minorities and people
                                  with disabilities in computing . . . . . 34--37
               Peter J. Denning   The grounding practice . . . . . . . . . 38--40
              Andrew Bernat and   
                   Eric Grimson   Doctoral program rankings for U.S.
                                  computing programs: the National
                                  Research Council strikes out . . . . . . 41--43
                  David Pacheco   Postmortem debugging in dynamic
                                  environments . . . . . . . . . . . . . . 44--51
          G. Bruce Berriman and   
                Steven L. Groom   How will astronomy archives survive the
                                  data tsunami?  . . . . . . . . . . . . . 52--56
               Robert Green and   
                  Henry Ledgard   Coding guidelines: finding the art in
                                  the science  . . . . . . . . . . . . . . 57--63
             Brian E. Moore and   
                   Saad Ali and   
               Ramin Mehran and   
                   Mubarak Shah   Visual crowd surveillance through a
                                  hydrodynamics lens . . . . . . . . . . . 64--73
               Manuel Sojer and   
                 Joachim Henkel   License risks from ad hoc reuse of code
                                  from the Internet  . . . . . . . . . . . 74--81
      Ganesh Gopalakrishnan and   
            Robert M. Kirby and   
             Stephen Siegel and   
              Rajeev Thakur and   
              William Gropp and   
                 Ewing Lusk and   
      Bronis R. De Supinski and   
              Martin Schulz and   
               Greg Bronevetsky   Formal analysis of MPI-based parallel
                                  programs . . . . . . . . . . . . . . . . 82--91
             Gerhard Brewka and   
               Thomas Eiter and   
       Miros\law Truszczy\'nski   Answer set programming at a glance . . . 92--103
                   Xavier Leroy   Safety first!: technical perspective . . 122--122
                  Jean Yang and   
               Chris Hawblitzel   Safe to the last instruction: automated
                                  verification of a type-safe operating
                                  system . . . . . . . . . . . . . . . . . 123--131
               Vitaly Shmatikov   Anonymity is not privacy: technical
                                  perspective  . . . . . . . . . . . . . . 132--132
             Lars Backstrom and   
              Cynthia Dwork and   
                  Jon Kleinberg   Wherefore art thou R3579X?: anonymized
                                  social networks, hidden patterns, and
                                  structural steganography . . . . . . . . 133--141
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 142--142
                  Leah Hoffmann   Last Byte: Q&A: Scaling Up: M. Frans
                                  Kaashoek talks about multicore
                                  computing, security, and operating
                                  system design  . . . . . . . . . . . . . 144, 143


Communications of the ACM
Volume 55, Number 1, January, 2012

                 Moshe Y. Vardi   Artificial intelligence: past and future 5--5
                     CACM Staff   Software engineering is engineering  . . 6--7
                 Alain Chesnais   ACM President's letter . . . . . . . . . 8--8
                 Alain Chesnais   ACM's annual report  . . . . . . . . . . 9--13
               Mark Guzdial and   
                 Bertrand Meyer   Understanding CS1 students; defective
                                  software . . . . . . . . . . . . . . . . 14--15
                   Scott Delman   eBooks will abound in the ACM Digital
                                  Library  . . . . . . . . . . . . . . . . 16--16
                    Neil Savage   Better medicine through machine learning 17--19
                    Gary Anthes   Revamping storage performance  . . . . . 20--22
               Samuel Greengard   Law and disorder . . . . . . . . . . . . 23--25
                Sarah Underwood   Celebration time . . . . . . . . . . . . 26--26
                    Alex Wright   Analyzing Apple products . . . . . . . . 27--27
                     Paul Hyman   John McCarthy, 1927--2011  . . . . . . . 28--29
               Randal C. Picker   The yin and yang of copyright and
                                  technology . . . . . . . . . . . . . . . 30--32
              Phillip G. Armour   The difference engine  . . . . . . . . . 33--34
                   Thomas Haigh   The IBM PC: from beige box to industry
                                  standard . . . . . . . . . . . . . . . . 35--37
               Kai A. Olsen and   
                Alessio Malizia   Interfaces for the ordinary user: can we
                                  hide too much? . . . . . . . . . . . . . 38--40
                Philip L. Frana   An interview with Stephen A. Cook  . . . 41--46
                  Matthew Flatt   Creating languages in Racket . . . . . . 48--56
                 Jim Gettys and   
               Kathleen Nichols   Bufferbloat: dark buffers in the
                                  Internet . . . . . . . . . . . . . . . . 57--65
           Carl Waldspurger and   
               Mendel Rosenblum   I/O virtualization . . . . . . . . . . . 66--73
                     Jason Hong   The state of phishing attacks  . . . . . 74--81
              Geoff Coulson and   
               Barry Porter and   
    Ioannis Chatzigiannakis and   
           Christos Koninis and   
             Stefan Fischer and   
           Dennis Pfisterer and   
            Daniel Bimschas and   
              Torsten Braun and   
              Philipp Hurni and   
            Markus Anwander and   
         Gerald Wagenknecht and   
    Sándor P. Fekete and   
     Alexander Kröller and   
             Tobias Baumgartner   Flexible experimentation in wireless
                                  sensor networks  . . . . . . . . . . . . 82--90
              Chi-Sung Laih and   
             Shang-Ming Jen and   
                     Chia-Yu Lu   Long-term confidentiality of PKI . . . . 91--95
           Roberto Manduchi and   
                 James Coughlan   (Computer) vision without sight  . . . . 96--104
            Frédo Durand   Where do people draw lines?: technical
                                  perspective  . . . . . . . . . . . . . . 106--106
             Forrester Cole and   
        Aleksey Golovinskiy and   
            Alex Limpaecher and   
    Heather Stoddart Barros and   
           Adam Finkelstein and   
          Thomas Funkhouser and   
            Szymon Rusinkiewicz   Where do people draw lines?  . . . . . . 107--115
                     Jim Kurose   Content-centric networking: technical
                                  perspective  . . . . . . . . . . . . . . 116--116
               Van Jacobson and   
          Diana K. Smetters and   
          James D. Thornton and   
              Michael Plass and   
                Nick Briggs and   
               Rebecca Braynard   Networking named content . . . . . . . . 117--124
               Daniel H. Wilson   Future tense . . . . . . . . . . . . . . 136--ff

Communications of the ACM
Volume 55, Number 2, February, 2012

             Fabrizio Gagliardi   Revisiting ACM Europe  . . . . . . . . . 5--5
                Phil Brooke and   
              Vladik Kreinovich   Letters: Credit non-anonymous reviewers
                                  with a name  . . . . . . . . . . . . . . 6--7
        Lawrence C. Paulson and   
              Poul-Henning Kamp   Letters: What Liability for Faulty
                                  Software?  . . . . . . . . . . . . . . . 6--7
                     Ian Joyner   Letters: The [Steve] Jobs Factor . . . . 6--7
               August Schau and   
             Charles H. Lindsey   Letters: Give Me Competent Communication 6--7
        Michael Stonebraker and   
                     Jason Hong   Researchers' big data crisis;
                                  understanding design and functionality   10--11
                   Gregory Goth   The science of better science  . . . . . 13--15
               Samuel Greengard   The war against botnets  . . . . . . . . 16--18
                    Alex Wright   The social life of robots  . . . . . . . 19--21
                     CACM Staff   ACM Fellows inducted . . . . . . . . . . 23--23
                Gregory Rosston   Incentive auctions . . . . . . . . . . . 24--26
                 Beth Simon and   
                  Quintin Cutts   Peer instruction: a teaching method to
                                  foster deep understanding  . . . . . . . 27--29
               Donald A. Norman   Yet another technology cusp: confusion,
                                  vendor wars, and opportunities . . . . . 30--32
         George V. Neville-Neil   Wanton acts of debuggery . . . . . . . . 33--34
                 Rose McDermott   Emotion and security . . . . . . . . . . 35--37
            Marvin V. Zelkowitz   What have we learned about software
                                  engineering? . . . . . . . . . . . . . . 38--39
                  Vint Cerf and   
               Van Jacobson and   
                Nick Weaver and   
                     Jim Gettys   BufferBloat: what's wrong with the
                                  Internet?  . . . . . . . . . . . . . . . 40--47
              Hans-J. Boehm and   
                 Sarita V. Adve   You don't know jack about shared
                                  variables or memory models . . . . . . . 48--54
                Adam Oliner and   
          Archana Ganapathi and   
                         Wei Xu   Advances and challenges in log analysis  55--61
    Nicholas Evangelopoulos and   
               Lucian Visinescu   Text-mining the voice of the people  . . 62--69
                 Holger H. Hoos   Programming by optimization  . . . . . . 70--80
                Bryce Allen and   
             John Bresnahan and   
              Lisa Childers and   
                 Ian Foster and   
            Gopi Kandaswamy and   
             Raj Kettimuthu and   
                Jack Kordas and   
                  Mike Link and   
              Stuart Martin and   
               Karl Pickett and   
                  Steven Tuecke   Software as a service for data
                                  scientists . . . . . . . . . . . . . . . 81--88
             Miad Faezipour and   
            Mehrdad Nourani and   
                Adnan Saeed and   
              Sateesh Addepalli   Progress and challenges in intelligent
                                  vehicle area networks  . . . . . . . . . 90--100
                Rastislav Bodik   Compiling what to how: technical
                                  perspective  . . . . . . . . . . . . . . 102--102
              Viktor Kuncak and   
          Mikaël Mayer and   
              Ruzica Piskac and   
                 Philippe Suter   Software synthesis procedures  . . . . . 103--111
             Santosh S. Vempala   Modeling high-dimensional data:
                                  technical perspective  . . . . . . . . . 112--112
          Adam Tauman Kalai and   
               Ankur Moitra and   
                Gregory Valiant   Disentangling Gaussians  . . . . . . . . 113--120
                  Peter Winkler   Last Byte: Puzzled: Where Sets Meet
                                  (Venn Diagrams)  . . . . . . . . . . . . 128--128

Communications of the ACM
Volume 55, Number 3, March, 2012

                 Moshe Y. Vardi   What is an algorithm?  . . . . . . . . . 5--5
                     CACM Staff   From syntax to semantics for AI  . . . . 6--7
                 Bertrand Meyer   Knowledgeable beginners  . . . . . . . . 10--11
                    Neil Savage   Gaining wisdom from crowds . . . . . . . 13--15
                    Gary Anthes   Computing with magnets . . . . . . . . . 16--18
               Samuel Greengard   Policing the future  . . . . . . . . . . 19--21
                     Paul Hyman   Stanford schooling---gratis! . . . . . . 22--22
               Jack Rosenberger   Computer science awards  . . . . . . . . 23--23
                Patrick Lin and   
              Fritz Allhoff and   
                   Neil C. Rowe   War 2.0: cyberweapons and ethics . . . . 24--26
               Pamela Samuelson   Legally Speaking: Do software copyrights
                                  protect what programs do?  . . . . . . . 27--29
               Peter J. Denning   Viewpoint: The Profession of IT: The
                                  idea idea  . . . . . . . . . . . . . . . 30--32
              Vassilis Kostakos   Viewpoint: Training users vs. training
                                  soldiers: experiences from the
                                  battlefield  . . . . . . . . . . . . . . 33--35
            Alessio Malizia and   
                Andrea Bellucci   Viewpoint: The artificiality of natural
                                  user interfaces  . . . . . . . . . . . . 36--38
          Patrice Godefroid and   
           Michael Y. Levin and   
                   David Molnar   SAGE: whitebox fuzzing for security
                                  testing  . . . . . . . . . . . . . . . . 40--44
                    Luigi Rizzo   Revisiting network I/O APIs: the netmap
                                  framework  . . . . . . . . . . . . . . . 45--51
              Poul-Henning Kamp   The hyperdimensional tar pit . . . . . . 52--53
                Youngki Lee and   
              S. S. Iyengar and   
               Chulhong Min and   
               Younghyun Ju and   
              Seungwoo Kang and   
                Taiwoo Park and   
                 Jinwon Lee and   
               Yunseok Rhee and   
                   Junehwa Song   MobiCon: a mobile context-monitoring
                                  platform . . . . . . . . . . . . . . . . 54--65
             Seung Hyun Kim and   
              Qiu-Hong Wang and   
            Johannes B. Ullrich   A comparative study of cyberattacks  . . 66--73
                S. Barry Cooper   Turing's Titanic machine?  . . . . . . . 74--83
                J. Y. Huang and   
                 C. H. Tsai and   
                    S. T. Huang   The next generation of GPS navigation
                                  systems  . . . . . . . . . . . . . . . . 84--93
              Steven D. Gribble   The benefits of capability-based
                                  protection: technical perspective  . . . 96--96
        Robert N. M. Watson and   
          Jonathan Anderson and   
                 Ben Laurie and   
                  Kris Kennaway   A taste of Capsicum: practical
                                  capabilities for UNIX  . . . . . . . . . 97--104
             Michael L. Littman   A new way to search game trees:
                                  technical perspective  . . . . . . . . . 105--105
              Sylvain Gelly and   
             Levente Kocsis and   
            Marc Schoenauer and   
            Mich\`ele Sebag and   
               David Silver and   
    Csaba Szepesvári and   
                Olivier Teytaud   The grand challenge of computer Go:
                                  Monte Carlo tree search and extensions   106--113
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 118--118
                  Leah Hoffmann   Q&A: Chief Strategiest  . . . . . . . . . 120--ff

Communications of the ACM
Volume 55, Number 4, April, 2012

                 Yunhao Liu and   
                   Vincent Shen   ACM China Council  . . . . . . . . . . . 5--5
                     CACM Staff   The beauty of simplicity . . . . . . . . 6--7
                Daniel Reed and   
                   Mark Guzdial   The power of computing; design
                                  guidelines in CS education . . . . . . . 8--9
                   Gregory Goth   Preserving digital data  . . . . . . . . 11--13
                     Tom Geller   Talking to machines  . . . . . . . . . . 14--16
                  Leah Hoffmann   Open for business  . . . . . . . . . . . 17--19
            Michael A. Cusumano   Can services and platform thinking help
                                  the U.S. Postal Service? . . . . . . . . 21--23
                  Richard Heeks   Information technology and gross
                                  national happiness . . . . . . . . . . . 24--26
         George V. Neville-Neil   The network protocol battle  . . . . . . 27--28
                  Jill Ross and   
          Elizabeth Litzler and   
          J. McGrath Cohoon and   
                   Lucy Sanders   Improving gender composition in
                                  computing  . . . . . . . . . . . . . . . 29--31
                    Selma Tekir   Reading CS classics  . . . . . . . . . . 32--34
                   Daniel Soper   Is human mobility tracking a good idea?  35--37
                  Brian Beckman   Why LINQ matters: cloud composability
                                  guaranteed . . . . . . . . . . . . . . . 38--44
               Jeffrey Heer and   
                Ben Shneiderman   Interactive dynamics for visual analysis 45--54
            Andrew Danowitz and   
                Kyle Kelley and   
                  James Mao and   
          John P. Stevenson and   
                  Mark Horowitz   CPU DB: recording microprocessor history 55--63
               Martin Schmettow   Sample size in usability studies . . . . 64--70
                Laurie Williams   What agile teams think of agile
                                  principles . . . . . . . . . . . . . . . 71--76
                  David M. Blei   Probabilistic topic models . . . . . . . 77--84
      Sarvapali D. Ramchurn and   
    Perukrishnen Vytelingum and   
                Alex Rogers and   
           Nicholas R. Jennings   Putting the `smarts' into the smart
                                  grid: a grand challenge for artificial
                                  intelligence . . . . . . . . . . . . . . 86--97
                 Dinesh Manocha   Building robust dynamical simulation
                                  systems: technical perspective . . . . . 101--101
               David Harmon and   
              Etienne Vouga and   
             Breannan Smith and   
            Rasmus Tamstorf and   
                 Eitan Grinspun   Asynchronous contact mechanics . . . . . 102--109
                      Ed H. Chi   Who knows?: searching for expertise on
                                  the social web: technical perspective    110--110
             Damon Horowitz and   
             Sepandar D. Kamvar   Searching the village: models and
                                  methods for social search  . . . . . . . 111--118
                    Brian Clegg   Future tense . . . . . . . . . . . . . . 120--ff

Communications of the ACM
Volume 55, Number 5, May, 2012

                 Moshe Y. Vardi   Fair access  . . . . . . . . . . . . . . 5--5
                 Judy Robertson   Likert-type scales, statistical methods,
                                  and effect sizes . . . . . . . . . . . . 6--7
                    Neil Savage   Automating scientific discovery  . . . . 9--11
                    Alex Wright   Robots like us . . . . . . . . . . . . . 12--13
               Samuel Greengard   Digitally possessed  . . . . . . . . . . 14--16
                     Paul Hyman   A workshop revival . . . . . . . . . . . 17--17
                   Gerald Segal   ACM's 2012 general election  . . . . . . 19--29
                Peter S. Menell   Design for symbiosis . . . . . . . . . . 30--32
                 David Anderson   The future of the past . . . . . . . . . 33--34
                 Joel Waldfogel   Digitization and copyright: some recent
                                  evidence from music  . . . . . . . . . . 35--37
            Alexander Repenning   Programming goes back to school  . . . . 38--40
          Abraham Bernstein and   
                 Mark Klein and   
               Thomas W. Malone   Programming the global brain . . . . . . 41--43
                Armando Fox and   
                David Patterson   Crossing the software education chasm    44--49
                    Eric Allman   Managing technical debt  . . . . . . . . 50--55
                    Pat Helland   Idempotence is not a medical condition   56--65
                    Erik Meijer   Your mouse is a database . . . . . . . . 66--73
             Alok Choudhary and   
            William Hendrix and   
                  Kathy Lee and   
             Diana Palsetia and   
                  Wei-Keng Liao   Social media evolution of the Egyptian
                                  revolution . . . . . . . . . . . . . . . 74--80
            Daniel S. Soper and   
                     Ofir Turel   An $n$-gram analysis of Communications
                                  2000--2010 . . . . . . . . . . . . . . . 81--87
                  Nir Atias and   
                   Roded Sharan   Comparative analysis of protein
                                  networks: hard problems, practical
                                  solutions  . . . . . . . . . . . . . . . 88--97
                  William Gropp   Best algorithms $+$ best computers $=$
                                  powerful match . . . . . . . . . . . . . 100--100
                Ilya Lashuk and   
 Aparna Chandramowlishwaran and   
            Harper Langston and   
            Tuan-Anh Nguyen and   
              Rahul Sampath and   
        Aashay Shringarpure and   
              Richard Vuduc and   
                Lexing Ying and   
                Denis Zorin and   
                   George Biros   A massively parallel adaptive fast
                                  multipole method on heterogeneous
                                  architectures  . . . . . . . . . . . . . 101--109
                    Steven Hand   An experiment in determinism . . . . . . 110--110
             Amittai Aviram and   
              Shu-Chun Weng and   
                     Sen Hu and   
                     Bryan Ford   Efficient system-enforced deterministic
                                  parallelism  . . . . . . . . . . . . . . 111--119
                  Peter Winkler   Last Byte: Puzzled: Designs on Square
                                  Grids  . . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 55, Number 6, June, 2012

             Eugene H. Spafford   USACM and U.S. legislation . . . . . . . 5--5
                     CACM Staff   The halting problem in the clear light
                                  of probability . . . . . . . . . . . . . 6--7
                 Jason Hong and   
                    Greg Linden   Protecting against data breaches; living
                                  with mistakes  . . . . . . . . . . . . . 10--11
                Scott E. Delman   Don't throw the baby out with the
                                  bathwater  . . . . . . . . . . . . . . . 12--12
                   Gregory Goth   Analyzing medical data . . . . . . . . . 13--15
                    Gary Anthes   Smarter photography  . . . . . . . . . . 16--18
                  Leah Hoffmann   Data mining meets city hall  . . . . . . 19--21
                    Neil Savage   Game changer . . . . . . . . . . . . . . 22--23
                     Paul Hyman   An influential theoretician  . . . . . . 24--24
              Phillip G. Armour   A measure of control . . . . . . . . . . 26--28
            Simson L. Garfinkel   The cybersecurity risk . . . . . . . . . 29--32
         George V. Neville-Neil   Scale failure  . . . . . . . . . . . . . 33--34
                     Chris Hall   Security of the Internet and the known
                                  unknowns . . . . . . . . . . . . . . . . 35--37
           Peter J. Denning and   
                   Nicholas Dew   The myth of the elevator pitch . . . . . 38--40
                    Herbert Lin   Why computer scientists should care
                                  about cyber conflict and U.S. national
                                  security policy  . . . . . . . . . . . . 41--43
                Dennis Abts and   
                  Bob Felderman   A guided tour of data-center networking  44--51
             David Crandall and   
                   Noah Snavely   Modeling people and places with Internet
                                  photo collections  . . . . . . . . . . . 52--60
                 Kari Pulli and   
           Anatoly Baksheev and   
           Kirill Kornyakov and   
                Victor Eruhimov   Real-time computer vision with OpenCV    61--69
              Benjamin Doer and   
               Mahmoud Fouz and   
               Tobias Friedrich   Why rumors spread so quickly in social
                                  networks . . . . . . . . . . . . . . . . 70--75
                    Bryan Parno   Trust extension for commodity computers  76--85
           Michael J. Carey and   
               Nicola Onose and   
           Michalis Petropoulos   Data services  . . . . . . . . . . . . . 86--97
              Ketan D. Mulmuley   The GCT program toward the P vs. NP
                                  problem  . . . . . . . . . . . . . . . . 98--107
               Pablo A. Parrilo   Reconstructing the unknown, balancing
                                  structure and uncertainty: technical
                                  perspective  . . . . . . . . . . . . . . 110--110
          Emmanuel Cand\`es and   
                 Benjamin Recht   Exact matrix completion via convex
                                  optimization . . . . . . . . . . . . . . 111--119
                      Peter Lee   The fox and the hedgehog: technical
                                  perspective  . . . . . . . . . . . . . . 120--120
                Tiark Rompf and   
                 Martin Odersky   Lightweight modular staging: a pragmatic
                                  approach to runtime code generation and
                                  compiled DSLs  . . . . . . . . . . . . . 121--130
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 133--133
                  Leah Hoffmann   Last Byte: Q&A: a Sure Thing  . . . . . . 136, 135

Communications of the ACM
Volume 55, Number 7, July, 2012

                 Moshe Y. Vardi   Predatory scholarly publishing . . . . . 5--5
                     CACM Staff   An integral number and its consequences  7--8
               Mark Guzdial and   
                 Judy Robertson   CS and popular culture; learning from
                                  console games  . . . . . . . . . . . . . 10--11
                   Gregory Goth   Degrees of separation  . . . . . . . . . 13--15
                    Gary Anthes   HTML5 leads a Web revolution . . . . . . 16--17
               Marina Krakovsky   Patently inadequate  . . . . . . . . . . 18--20
                     Paul Hyman   Lost and found . . . . . . . . . . . . . 21--21
                      Mari Sako   Business models for strategy and
                                  innovation . . . . . . . . . . . . . . . 22--24
               Pamela Samuelson   Can online piracy be stopped by laws?    25--27
               R. T. Watson and   
                 J. Corbett and   
             M. C. Boudreau and   
                     J. Webster   An information strategy for
                                  environmental sustainability . . . . . . 28--30
          Martin Campbell-Kelly   Alan Turing's other universal machine    31--33
             Alfred Spector and   
               Peter Norvig and   
                    Slav Petrov   Google's hybrid approach to research . . 34--37
              Sarah Spiekermann   The challenges of privacy by design  . . 38--40
           Kathleen Nichols and   
                   Van Jacobson   Controlling queue delay  . . . . . . . . 42--50
              Poul-Henning Kamp   My compiler does not understand me . . . 51--53
               Eric Bouwers and   
               Joost Visser and   
               Arie van Deursen   Getting what you measure . . . . . . . . 54--59
               James Abello and   
            Peter Broadwell and   
         Timothy R. Tangherlini   Computational folkloristics  . . . . . . 60--70
            Ian Sommerville and   
                 Dave Cliff and   
             Radu Calinescu and   
                Justin Keen and   
                  Tim Kelly and   
          Marta Kwiatkowska and   
              John Mcdermid and   
                  Richard Paige   Large-scale complex IT systems . . . . . 71--77
          Milo M. K. Martin and   
               Mark D. Hill and   
                Daniel J. Sorin   Why on-chip cache coherence is here to
                                  stay . . . . . . . . . . . . . . . . . . 78--89
                David Harel and   
               Assaf Marron and   
                     Gera Weiss   Behavioral programming . . . . . . . . . 90--100
                David Patterson   For better or worse, benchmarks shape a
                                  field: technical perspective . . . . . . 104--104
          Hadi Esmaeilzadeh and   
                   Ting Cao and   
                    Xi Yang and   
       Stephen M. Blackburn and   
            Kathryn S. McKinley   Looking back and looking forward: power,
                                  performance, and upheaval  . . . . . . . 105--114
                      Amos Fiat   Why study the price of anarchy?:
                                  technical perspective  . . . . . . . . . 115--115
                Tim Roughgarden   Intrinsic robustness of the price of
                                  anarchy  . . . . . . . . . . . . . . . . 116--123
                    Ken MacLeod   Future Tense: They Just Click  . . . . . 128--ff
          Matthew Swinarski and   
           Diane H. Parente and   
                  Rajiv Kishore   Do small IT firms benefit from higher
                                  process capability?  . . . . . . . . . . 129--134

Communications of the ACM
Volume 55, Number 8, August, 2012

                   Bill Poucher   Giving students the competitive edge . . 5--5
                     CACM Staff   Composable trees for configurable
                                  behavior . . . . . . . . . . . . . . . . 7--7
              John Langford and   
                   Ruben Ortega   Machine learning and algorithms: agile
                                  development  . . . . . . . . . . . . . . 10--11
                    Jeff Kanipe   Cosmic simulations . . . . . . . . . . . 13--15
                     Tom Geller   DARPA Shredder challenge solved  . . . . 16--17
               Samuel Greengard   Advertising gets personal  . . . . . . . 18--20
               Karen A. Frenkel   Broader horizons . . . . . . . . . . . . 21--21
                      Paul Tjia   Inside the hermit kingdom: IT and
                                  outsourcing in North Korea . . . . . . . 22--25
                 Fred G. Martin   Will massive open online courses change
                                  how we teach?  . . . . . . . . . . . . . 26--28
                     Danah Boyd   The politics of ``real names'' . . . . . 29--31
         George V. Neville-Neil   A system is not a product  . . . . . . . 32--33
               Chris Forman and   
               Avi Goldfarb and   
               Shane Greenstein   The Internet is everywhere, but the
                                  payoff is not  . . . . . . . . . . . . . 34--35
               Kai A. Olsen and   
          Hans Fredrik Nordhaug   Internet elections: unsafe in any home?  36--38
                   Neil McBride   The ethics of software engineering
                                  should be an ethics for the client . . . 39--41
           Thomas A. Limoncelli   OpenFlow: a radical new idea in
                                  networking . . . . . . . . . . . . . . . 42--47
        Rafael Vanoni Polanczyk   Extending the semantics of scheduling
                                  priorities . . . . . . . . . . . . . . . 48--52
             Manuel Serrano and   
            Gérard Berry   Multitier programming in Hop . . . . . . 53--59
              Stephen B. Wicker   The loss of location privacy in the
                                  cellular age . . . . . . . . . . . . . . 60--68
            Bjorn De Sutter and   
        Aäron Van Den Oord   To be or not to be cited in computer
                                  science  . . . . . . . . . . . . . . . . 69--75
              Wil Van Der Aalst   Process mining . . . . . . . . . . . . . 76--83
             Scott Aaronson and   
               Edward Farhi and   
               David Gosset and   
          Avinatan Hassidim and   
            Jonathan Kelner and   
              Andrew Lutomirski   Quantum money  . . . . . . . . . . . . . 84--92
               Martin C. Rinard   Example-driven program synthesis for
                                  end-user programming: technical
                                  perspective  . . . . . . . . . . . . . . 96--96
              Sumit Gulwani and   
          William R. Harris and   
                  Rishabh Singh   Spreadsheet data manipulation using
                                  examples . . . . . . . . . . . . . . . . 97--105
                 Andreas Zeller   Proving programs continuous: technical
                                  perspective  . . . . . . . . . . . . . . 106--106
           Swarat Chaudhuri and   
              Sumit Gulwani and   
            Roberto Lublinerman   Continuity and robustness of programs    107--115
                  Peter Winkler   Last Byte: Puzzled: Find the Magic Set   120--120

Communications of the ACM
Volume 55, Number 9, September, 2012

                 Moshe Y. Vardi   Why ACM? . . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Operationalizing privacy by design . . . 7--7
                 Bertrand Meyer   Incremental research vs. paradigm-shift
                                  mania  . . . . . . . . . . . . . . . . . 8--9
                   Gregory Goth   Atomic-level computing . . . . . . . . . 11--13
                    Gary Anthes   Chips go upscale . . . . . . . . . . . . 14--16
               Marina Krakovsky   Garbage in, info out . . . . . . . . . . 17--19
                     Paul Hyman   In honor of Alan Turing  . . . . . . . . 20--23
                   Thomas Haigh   Seven lessons from bad history . . . . . 26--29
               Peter J. Denning   Don't feel bad if you can't predict the
                                  future . . . . . . . . . . . . . . . . . 30--32
                  Tal Z. Zarsky   Automated prediction: perception, law,
                                  and policy . . . . . . . . . . . . . . . 33--35
          Richard E. Ladner and   
              Elizabeth Litzler   The need to balance innovation and
                                  implementation in broadening
                                  participation  . . . . . . . . . . . . . 36--38
           Esperanza Marcos and   
           Juan Manuel Vara and   
              Valeria de Castro   Author order: what science can learn
                                  from the arts  . . . . . . . . . . . . . 39--41
      Christos H. Papadimitriou   Alan and I: a personal account of Alan
                                  Turing's life and impact . . . . . . . . 42--43
                 David Chisnall   A new Objective-C runtime: from research
                                  to production  . . . . . . . . . . . . . 44--47
                Emery D. Berger   Software needs seatbelts and airbags . . 48--53
                    Erik Meijer   All your database are belong to us . . . 54--60
              Gary Garrison and   
               Sanghyun Kim and   
             Robin L. Wakefield   Success factors for deploying cloud
                                  computing  . . . . . . . . . . . . . . . 62--68
             Radu Calinescu and   
               Carlo Ghezzi and   
          Marta Kwiatkowska and   
             Raffaela Mirandola   Self-adaptive software needs
                                  quantitative verification at runtime . . 69--77
             Doug A. Bowman and   
            Ryan P. McMahan and   
                  Eric D. Ragan   Questioning naturalism in $3$D user
                                  interfaces . . . . . . . . . . . . . . . 78--88
              William A. Buxton   Innovative interaction: from concept to
                                  the wild: technical perspective  . . . . 90--90
                Shumin Zhai and   
            Per Ola Kristensson   The word-gesture keyboard: reimagining
                                  keyboard interaction . . . . . . . . . . 91--101
                      Dan Suciu   SQL on an encrypted database: technical
                                  perspective  . . . . . . . . . . . . . . 102--102
            Raluca Ada Popa and   
   Catherine M. S. Redfield and   
         Nickolai Zeldovich and   
              Hari Balakrishnan   CryptDB: processing queries on an
                                  encrypted database . . . . . . . . . . . 103--111
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 117--117
                  Leah Hoffmann   Q&A: What Women Want  . . . . . . . . . . 120, 119

Communications of the ACM
Volume 55, Number 10, October, 2012

                 Vinton G. Cerf   Where is the science in computer
                                  science? . . . . . . . . . . . . . . . . 5--5
                     CACM Staff   When harm to conference reputation is
                                  self-inflicted . . . . . . . . . . . . . 6--7
                Daniel Reed and   
                      Ed H. Chi   Online privacy; replicating research
                                  results  . . . . . . . . . . . . . . . . 8--9
                    Neil Savage   Digging for drug facts . . . . . . . . . 11--13
                   Gregory Mone   Redesigning the data center  . . . . . . 14--16
                  Leah Hoffmann   Computer science and the three Rs  . . . 17--19
            Michael A. Cusumano   Reflecting on the Facebook IPO . . . . . 20--23
              Phillip G. Armour   The Goldilocks estimate  . . . . . . . . 24--25
               Peter G. Neumann   The foresight saga, redux  . . . . . . . 26--29
         George V. Neville-Neil   A nice piece of code . . . . . . . . . . 30--31
Jean-François Blanchette   Computing as if infrastructure mattered  32--34
                Ivan Sutherland   The tyranny of the clock . . . . . . . . 35--36
                Rick Ratzel and   
             Rodney Greenstreet   Toward higher precision  . . . . . . . . 38--47
                   John Allspaw   Fault injection in production  . . . . . 48--52
              Poul-Henning Kamp   A generation lost in the bazaar  . . . . 53--55
                 Michael Kearns   Experiments in social computation  . . . 56--67
             Barbara Simons and   
               Douglas W. Jones   Internet voting in the U.S.  . . . . . . 68--77
                 Pedro Domingos   A few useful things to know about
                                  machine learning . . . . . . . . . . . . 78--87
              Rocco A. Servedio   A high-dimensional surprise: technical
                                  perspective  . . . . . . . . . . . . . . 89--89
                Guy Kindler and   
                   Anup Rao and   
             Ryan O'Donnell and   
                  Avi Wigderson   Spherical cubes: optimal foams from
                                  computational hardness amplification . . 90--97
              Bruce Hendrickson   Graph embeddings and linear equations:
                                  technical perspective  . . . . . . . . . 98--98
             Ioannis Koutis and   
             Gary L. Miller and   
                   Richard Peng   A fast solver for a class of linear
                                  systems  . . . . . . . . . . . . . . . . 99--107
             Geoffrey A. Landis   Last Byte: Future tense: Fermi's Paradox
                                  and the End of the Universe  . . . . . . 112--112

Communications of the ACM
Volume 55, Number 11, November, 2012

                 Moshe Y. Vardi   Will MOOCs destroy academia? . . . . . . 5--5
                 Vinton G. Cerf   Why is accessibility so hard?  . . . . . 7--7
                     CACM Staff   When predicting, start with humility . . 8--9
            Michael Stonebraker   New opportunities for New SQL  . . . . . 10--11
                   Bernard Rous   Major update to ACM's Computing
                                  Classification System  . . . . . . . . . 12--12
                   Gregory Goth   Software on Mars . . . . . . . . . . . . 13--15
                     Tom Geller   Control without controllers  . . . . . . 16--18
               Samuel Greengard   On the digital trail . . . . . . . . . . 19--21
                David Basin and   
                  Srdjan Capkun   The research value of publishing attacks 22--24
               Pamela Samuelson   Legally speaking: Oracle v. Google: are
                                  APIs copyrightable?  . . . . . . . . . . 25--27
             Kristina McElheran   Decentralization versus centralization
                                  in IT governance . . . . . . . . . . . . 28--30
                 Aman Yadav and   
                   John T. Korb   Learning to teach computer science: the
                                  need for a methods course  . . . . . . . 31--33
             Timothy Kostyk and   
                 Joseph Herkert   Societal implications of the emerging
                                  smart grid . . . . . . . . . . . . . . . 34--36
             Richard A. DeMillo   Keeping technology promises  . . . . . . 37--39
                      Anonymous   Resilience engineering: learning to
                                  embrace failure  . . . . . . . . . . . . 40--47
                 Kripa Krishnan   Weathering the unexpected  . . . . . . . 48--52
         Marshall Kirk McKusick   Disks from the perspective of a file
                                  system . . . . . . . . . . . . . . . . . 53--55
                  Dan Boneh and   
                 Amit Sahai and   
                   Brent Waters   Functional encryption: a new vision for
                                  public-key cryptography  . . . . . . . . 56--64
          Joerg Kurt Wegner and   
             Aaron Sterling and   
              Rajarshi Guha and   
             Andreas Bender and   
           Jean-Loup Faulon and   
             Janna Hastings and   
               Noel O'Boyle and   
            John Overington and   
         Herman Van Vlijmen and   
               Egon Willighagen   Cheminformatics  . . . . . . . . . . . . 65--75
               Rolf Pfeifer and   
             Max Lungarella and   
                    Fumiya Iida   The challenges ahead for bio-inspired
                                  `soft' robotics  . . . . . . . . . . . . 76--87
               Richard Szeliski   Open platforms for computational
                                  photography: technical perspective . . . 89--89
               Andrew Adams and   
            David E. Jacobs and   
            Jennifer Dolson and   
                Marius Tico and   
                 Kari Pulli and   
         Eino-Ville Talvala and   
                Boris Ajdin and   
             Daniel Vaquero and   
       Hendrik P. A. Lensch and   
              Mark Horowitz and   
              Sung Hee Park and   
            Natasha Gelfand and   
               Jongmin Baek and   
           Wojciech Matusik and   
                     Marc Levoy   The Frankencamera: an experimental
                                  platform for computational photography   90--98
             Henning Schulzinne   The realities of home broadband:
                                  technical perspective  . . . . . . . . . 99--99
        Srikanth Sundaresan and   
           Walter de Donato and   
              Nick Feamster and   
            Renata Teixeira and   
               Sam Crawford and   
              Antonio Pescap\`e   Measuring home broadband performance . . 100--109
                  Peter Winkler   Last Byte: Puzzled: Weighed in the
                                  Balance  . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 55, Number 12, December, 2012

                      Mary Hall   Understanding ACM's past . . . . . . . . 5--5
                 Vinton G. Cerf   Computer science revisited . . . . . . . 7--7
                     CACM Staff   Why open access? . . . . . . . . . . . . 8--9
               Mark Guzdial and   
                 Judy Robertson   Levels of abstraction: pre-teens and
                                  career choices . . . . . . . . . . . . . 12--13
                   Gregory Goth   Quantum quests . . . . . . . . . . . . . 15--17
                    Gary Anthes   Zoom in, zoom out  . . . . . . . . . . . 18--19
                     Paul Hyman   In the year of disruptive education  . . 20--22
                  Richard Heeks   IT innovation for the bottom of the
                                  pyramid  . . . . . . . . . . . . . . . . 24--27
                 David Anderson   Saving Private Gromit  . . . . . . . . . 28--30
         George V. Neville-Neil   Can more code mean fewer bugs? . . . . . 31--32
               Peter J. Denning   Moods  . . . . . . . . . . . . . . . . . 33--35
             Teresa A. Dahlberg   Why we need an ACM Special Interest
                                  Group for broadening participation . . . 36--38
                 William Newman   Alan Turing remembered . . . . . . . . . 39--40
              Ivar Jacobson and   
                 Pan-Wei Ng and   
            Paul E. McMahon and   
                 Ian Spence and   
                  Svante Lidman   The essence of software engineering: the
                                  SEMAT kernel . . . . . . . . . . . . . . 42--49
                Aiman Erbad and   
          Charles `Buck' Krasic   Sender-side buffers and the case for
                                  multimedia adaptation  . . . . . . . . . 50--58
               Michael Cornwell   Anatomy of a solid-state drive . . . . . 59--63
               Bryce Thomas and   
                Raja Jurdak and   
                   Ian Atkinson   SPDYing up the web . . . . . . . . . . . 64--73
               Robert M. French   Moving beyond the Turing test  . . . . . 74--77
                     David Doty   Theory of algorithmic self-assembly  . . 78--88
             Yannis Smaragdakis   High-level data structures: technical
                                  perspective  . . . . . . . . . . . . . . 90--90
              Peter Hawkins and   
              Martin Rinard and   
                 Alex Aiken and   
                Mooly Sagiv and   
                Kathleen Fisher   An introduction to data representation
                                  synthesis  . . . . . . . . . . . . . . . 91--99
                  Ali Jadbabaie   Natural algorithms in a networked world:
                                  technical perspective  . . . . . . . . . 100--100
               Bernard Chazelle   Natural algorithms and influence systems 101--110
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 126--126
                  Leah Hoffmann   Q&A: As Good As It Gets . . . . . . . . . 128, 127


Communications of the ACM
Volume 56, Number 1, January, 2013

                 Moshe Y. Vardi   Who begat computing? . . . . . . . . . . 5--5
                 Vinton G. Cerf   From the President: What's a robot?  . . 7--7
                     CACM Staff   Letters to the Editor: Computer science
                                  is not a science . . . . . . . . . . . . 8--9
                 Alain Chesnais   ACM's annual report  . . . . . . . . . . 11--15
                    Daniel Reed   BLOG@CACM: Lost in translation . . . . . 16--17
                    Neil Savage   News: Stopping the leaks . . . . . . . . 19--21
                   Gregory Mone   News: Beyond Hadoop  . . . . . . . . . . 22--24
               Marina Krakovsky   News: Just the facts . . . . . . . . . . 25--27
            Michael A. Cusumano   Technology strategy and management: The
                                  Apple--Samsung lawsuits  . . . . . . . . 28--31
              Phillip G. Armour   The business of software: How we build
                                  things: \ldots and why things are 90%
                                  complete . . . . . . . . . . . . . . . . 32--33
                    Deven Desai   Law and technology: Beyond location:
                                  data security in the 21st century  . . . 34--36
                   Thomas Haigh   Historical reflections: Five lessons
                                  from really good history . . . . . . . . 37--40
                    Salman Khan   Viewpoint: What college could be like    41--43
            Jonathan Grudin and   
                Gloria Mark and   
                     John Riedl   Viewpoint: Conference-journal hybrids    44--49
                    Pat Helland   Condos and clouds  . . . . . . . . . . . 50--59
                     CACM Staff   Browser security: appearances can be
                                  deceiving  . . . . . . . . . . . . . . . 60--67
              Jeremiah Grossman   The Web won't be safe or secure until we
                                  break it . . . . . . . . . . . . . . . . 68--72
             Richard Becker and   
Ramón Cáceres and   
              Karrie Hanson and   
            Sibren Isaacman and   
                Ji Meng Loh and   
         Margaret Martonosi and   
              James Rowland and   
              Simon Urbanek and   
       Alexander Varshavsky and   
                 Chris Volinsky   Human mobility characterization from
                                  cellular network data  . . . . . . . . . 74--82
               Vineet Bafna and   
               Alin Deutsch and   
             Andrew Heiberg and   
         Christos Kozanitis and   
        Lucila Ohno-Machado and   
                George Varghese   Abstractions for genomics  . . . . . . . 83--93
             Tamara Denning and   
            Tadayoshi Kohno and   
                  Henry M. Levy   Computer security and the modern home    94--103
               Doug DeCarlo and   
                  Matthew Stone   Visualization, understanding, and
                                  design: technical perspective  . . . . . 105--105
             Niloy J. Mitra and   
            Yong-Liang Yang and   
              Dong-Ming Yan and   
                  Wilmot Li and   
               Maneesh Agrawala   Illustrating how mechanical assemblies
                                  work . . . . . . . . . . . . . . . . . . 106--114
                  James M. Rehg   Finding people in depth: technical
                                  perspective  . . . . . . . . . . . . . . 115--115
              Jamie Shotton and   
                 Toby Sharp and   
                Alex Kipman and   
          Andrew Fitzgibbon and   
             Mark Finocchio and   
               Andrew Blake and   
                   Mat Cook and   
                  Richard Moore   Real-time human pose recognition in
                                  parts from single depth images . . . . . 116--124
                    Rudy Rucker   Last byte: Future tense: Share my
                                  enlightenment  . . . . . . . . . . . . . 136, 135

Communications of the ACM
Volume 56, Number 2, February, 2013

         Ronald F. Boisvert and   
               Jack W. Davidson   Positioning ACM for an open access
                                  future . . . . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Growing the ACM family . . . . . . . . . 7--7
                 Bertrand Meyer   When reviews do more than sting  . . . . 8--9
                    Neil Savage   Life in simulation . . . . . . . . . . . 11--13
                    Alex Wright   Revving the rover  . . . . . . . . . . . 14--16
               Samuel Greengard   A new model for healthcare . . . . . . . 17--19
                    Eben Moglen   The tangled web we have woven  . . . . . 20--22
               Peter G. Neumann   Inside risks: More sight on foresight    23--25
         George V. Neville-Neil   Kode Vicious: Divided by division  . . . 26--27
               Steve Cooper and   
                  Mehran Sahami   Education: Reflections on Stanford's
                                  MOOCs  . . . . . . . . . . . . . . . . . 28--30
               Ana Aizcorbe and   
              Samuel Kortum and   
                    Unni Pillai   The value of microprocessor designs  . . 31--32
                Ali Sunyaev and   
              Stephan Schneider   Cloud services certification . . . . . . 33--36
                    Anita Jones   The explosive growth of postdocs in
                                  computer science . . . . . . . . . . . . 37--39
               William Cheswick   Rethinking passwords . . . . . . . . . . 40--44
                  Brendan Gregg   Thinking methodically about performance  45--51
            Robert N. M. Watson   A decade of OS access-control
                                  extensibility  . . . . . . . . . . . . . 52--63
                  Ari Juels and   
                    Alina Oprea   New approaches to security and
                                  availability for cloud data  . . . . . . 64--73
               Jeffrey Dean and   
      Luiz André Barroso   The tail at scale  . . . . . . . . . . . 74--80
             Cristian Cadar and   
                    Koushik Sen   Symbolic execution for software testing:
                                  three decades later  . . . . . . . . . . 82--90
                    Pradip Bose   Is dark silicon real?: technical
                                  perspective  . . . . . . . . . . . . . . 92--92
          Hadi Esmaeilzadeh and   
                 Emily Blem and   
     Renée St. Amant and   
  Karthikeyan Sankaralingam and   
                    Doug Burger   Power challenges may end the multicore
                                  era  . . . . . . . . . . . . . . . . . . 93--102
                  Peter Winkler   Last Byte: Puzzled: Tumbling Dice  . . . 112--112

Communications of the ACM
Volume 56, Number 3, March, 2013

                 Moshe Y. Vardi   To boycott or not to boycott . . . . . . 5--5
                 Vinton G. Cerf   A revolution in India  . . . . . . . . . 7--7
                     CACM Staff   No place for old educational flaws in
                                  new online media . . . . . . . . . . . . 8--9
                 Jason Hong and   
                    Daniel Reed   Passwords getting painful, computing
                                  still blissful . . . . . . . . . . . . . 10--11
                    Neil Savage   Decoding dementia  . . . . . . . . . . . 13--15
                   Gregory Mone   Rise of the swarm  . . . . . . . . . . . 16--17
                     Paul Hyman   Cybercrime: it's serious, but exactly
                                  how serious? . . . . . . . . . . . . . . 18--20
                     CACM Staff   ACM Fellows inducted . . . . . . . . . . 21--21
               Pamela Samuelson   A copyright challenge to resales of
                                  digital music  . . . . . . . . . . . . . 24--26
           Denice Ward Hood and   
              Stafford Hood and   
               Dominica McBride   Academic careers workshop for
                                  underrepresented groups  . . . . . . . . 27--29
               Peter J. Denning   Moods, wicked problems, and learning . . 30--32
             Rachelle Hollander   Ethics viewpoints efficacies . . . . . . 33--34
                   Jeff Johnson   Can computer professionals and digital
                                  technology engineers help reduce gun
                                  violence?  . . . . . . . . . . . . . . . 35--37
                  Mikkel Thorup   Funding successful research  . . . . . . 38--39
                 Arun Kumar and   
                   Feng Niu and   
          Christopher Ré   Hazy: making it easier to build and
                                  maintain big-data analytics  . . . . . . 40--49
              Brian Beckman and   
                    Erik Meijer   The story of the teapot in DHTML . . . . 50--55
                Kate Matsudaira   Making the mobile web faster . . . . . . 56--61
                Edwin Olson and   
             Johannes Strom and   
                Rob Goeddel and   
                Ryan Morton and   
        Pradeep Ranganathan and   
              Andrew Richardson   Exploration and mapping with autonomous
                                  robot teams  . . . . . . . . . . . . . . 62--70
         Nafaâ Jabeur and   
           Sherali Zeadally and   
                     Biju Sayed   Mobile social networking applications    71--79
             Fedor V. Fomin and   
                  Petteri Kaski   Exact exponential algorithms . . . . . . 80--88
                     David Oran   Video quality assessment in the age of
                                  Internet video: technical perspective    90--90
             Florin Dobrian and   
                  Asad Awan and   
               Dilip Joseph and   
              Aditya Ganjam and   
                 Jibin Zhan and   
                 Vyas Sekar and   
                 Ion Stoica and   
                      Hui Zhang   Understanding the impact of video
                                  quality on user engagement . . . . . . . 91--99
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 102--102
                  Leah Hoffmann   Last byte: Q&A: The Power of Distribution 104--ff

Communications of the ACM
Volume 56, Number 4, April, 2013

             Stephen Bourne and   
            George Neville-Neil   Developing tools and resources for those
                                  in practice  . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Open access  . . . . . . . . . . . . . . 7--7
                Scott E. Delman   An open access partnership . . . . . . . 9--9
                     CACM Staff   A robot's roots  . . . . . . . . . . . . 10--11
               Mark Guzdial and   
                    Daniel Reed   Securing the future of computer science;
                                  reconsidering analog computing . . . . . 12--13
               Nidhi Subbaraman   Artificial connections . . . . . . . . . 15--17
                    Gary Anthes   Inexact design: beyond fault-tolerance   18--20
                  Leah Hoffmann   Looking back at big data . . . . . . . . 21--23
            Michael A. Cusumano   Are the costs of `free' too high in
                                  online education?  . . . . . . . . . . . 26--28
                Michael L. Best   Peacebuilding in a networked world . . . 30--32
         George V. Neville-Neil   Code abuse . . . . . . . . . . . . . . . 33--34
                    Nir Kshetri   Cyber-victimization and cybersecurity in
                                  China  . . . . . . . . . . . . . . . . . 35--37
             Robert Rosenberger   The problem with hands-free dashboard
                                  cellphones . . . . . . . . . . . . . . . 38--40
              Nicholas C. Zakas   The evolution of web development for
                                  mobile devices . . . . . . . . . . . . . 42--48
                 Patrick Meenan   How fast is your website?  . . . . . . . 49--55
             David F. Bacon and   
              Rodric Rabbah and   
                   Sunil Shukla   FPGA programming for the masses  . . . . 56--63
              Zhengchuan Xu and   
                    Qing Hu and   
                Chenghong Zhang   Why computer talents become computer
                                  hackers  . . . . . . . . . . . . . . . . 64--74
             Nishant Thorat and   
        Arvind Raghavendran and   
                   Nigel Groves   Offline management in virtualized
                                  environments . . . . . . . . . . . . . . 75--81
                  Ronen Feldman   Techniques and applications for
                                  sentiment analysis . . . . . . . . . . . 82--89
                  David Forsyth   Understanding pictures of rooms:
                                  technical perspective  . . . . . . . . . 91--91
                Huayan Wang and   
              Stephen Gould and   
                  Daphne Roller   Discriminative learning with latent
                                  variables for cluttered indoor scene
                                  understanding  . . . . . . . . . . . . . 92--99
                Paul Di Filippo   Future tense . . . . . . . . . . . . . . 104--ff

Communications of the ACM
Volume 56, Number 5, May, 2013

                 Moshe Y. Vardi   Fricative computing  . . . . . . . . . . 5--5
                 Vinton G. Cerf   ACM President's salary increased by
                                  300%!  . . . . . . . . . . . . . . . . . 7--7
                Scott E. Delman   A few good reasons to publish in
                                  Communications . . . . . . . . . . . . . 9--9
                     CACM Staff   Try old boys security network  . . . . . 12--13
          Jeannette M. Wing and   
                   Mark Guzdial   Encouraging IT usage in future
                                  healthcare, quality in CS education  . . 14--15
                    Alex Wright   Proving grounds  . . . . . . . . . . . . 17--19
               Samuel Greengard   Vanishing electronics  . . . . . . . . . 20--22
                     Paul Hyman   `Small data' enabled prediction of
                                  Obama's win, say economists  . . . . . . 23--25
            P. Bernt Hugenholtz   Fair use in Europe . . . . . . . . . . . 26--28
                 David Anderson   Max Newman: forgotten man of early
                                  British computing  . . . . . . . . . . . 29--31
                   Mark Guzdial   Human-centered computing: a new degree
                                  for Licklider's world  . . . . . . . . . 32--34
               Peter J. Denning   The science in computer science  . . . . 35--38
           Michael J. Flynn and   
               Oskar Mencer and   
         Veljko Milutinovic and   
            Goran Rakocevic and   
              Per Stenstrom and   
               Roman Trobec and   
                   Mateo Valero   Moving from petaflops to petadata  . . . 39--42
                Latanya Sweeney   Discrimination in online ad delivery . . 44--54
               Peter Bailis and   
                     Ali Ghodsi   Eventual consistency today: limitations,
                                  extensions, and beyond . . . . . . . . . 55--63
              Adam H. Leventhal   A file system all its own  . . . . . . . 64--67
        Mithun George Jacob and   
                 Yu-Ting Li and   
          George A. Akingba and   
                  Juan P. Wachs   Collaboration with a robotic scrub nurse 68--75
           Chris F. Kemerer and   
        Charles Zhechao Liu and   
               Michael D. Smith   Strategies for tomorrow's
                                  `winners-take-some' digital goods
                                  markets  . . . . . . . . . . . . . . . . 76--82
               Iris Junglas and   
                  Jeanne Harris   The promise of consumer technologies in
                                  emerging markets . . . . . . . . . . . . 84--90
                     Matt Pharr   The ray-tracing engine that could:
                                  technical perspective  . . . . . . . . . 92--92
           Steven G. Parker and   
            Heiko Friedrich and   
               David Luebke and   
               Keith Morley and   
               James Bigler and   
             Jared Hoberock and   
           David McAllister and   
             Austin Robison and   
           Andreas Dietrich and   
             Greg Humphreys and   
             Morgan McGuire and   
                   Martin Stich   GPU ray tracing  . . . . . . . . . . . . 93--101
                  Peter Winkler   Last Byte: Puzzled: Ant Alice's
                                  Adventures . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 56, Number 6, June, 2013

                 Erik R. Altman   SGB fortifies global SIG community . . . 5--5
                 Vinton G. Cerf   From the President: Honoring our best    7--7
                     CACM Staff   Letters to the Editor: How to claim your
                                  fair share in academic publishing  . . . 8--9
                 Jason Hong and   
                 Judy Robertson   Computer security needs refocus, and be
                                  nice about it  . . . . . . . . . . . . . 10--11
                    Gary Anthes   Deep learning comes of age . . . . . . . 13--15
                   Gregory Mone   The future is flexible displays  . . . . 16--17
                     Paul Hyman   Augmented-reality glasses bring cloud
                                  security into sharp focus  . . . . . . . 18--20
                    Neil Savage   Proofs probable  . . . . . . . . . . . . 22--24
                     CACM Staff   ACM honors computing innovators  . . . . 25--25
              Stas Filshtinskiy   Privacy and security: Cybercrime,
                                  cyberweapons, cyber wars: is there too
                                  much of it in the air? . . . . . . . . . 28--30
              Phillip G. Armour   The business of software: What is a
                                  ``good'' estimate?: whether forecasting
                                  is valuable  . . . . . . . . . . . . . . 31--32
         George V. Neville-Neil   Kode Vicious: Swamped by automation  . . 33--34
               Peter J. Denning   The profession of IT: Thumb numbers  . . 35--37
               Nancy G. Leveson   Inside risks: Learning from the past to
                                  face the risks of today  . . . . . . . . 38--42
          Stephen B. Wicker and   
           Stephanie M. Santoso   Viewpoint: Access to the Internet is a
                                  human right  . . . . . . . . . . . . . . 43--46
                       Dan Geer   Resolved: the Internet is no place for
                                  critical infrastructure  . . . . . . . . 48--53
                   Bill Hsu and   
      Marc Sosnick-Pérez   Real-time GPU audio  . . . . . . . . . . 54--62
                    Mark Cavage   There is no getting around it: you are
                                  building a distributed system  . . . . . 63--70
              Ognjen Scekic and   
           Hong-Linh Truong and   
               Schahram Dustdar   Incentives and rewarding in social
                                  computing  . . . . . . . . . . . . . . . 72--82
                 Nabil Adam and   
               Randy Stiles and   
             Andrew Zimdars and   
               Ryan Timmons and   
               Jackie Leung and   
             Greg Stachnick and   
               Jeff Merrick and   
                Robert Coop and   
               Vadim Slavin and   
            Tanya Kruglikov and   
              John Galmiche and   
                Sharad Mehrotra   Consequence analysis of complex events
                                  on critical U.S. infrastructure  . . . . 83--91
             Deepak Agarwal and   
             Bee-Chung Chen and   
            Pradheep Elango and   
             Raghu Ramakrishnan   Content recommendation on Web portals    92--101
                  Yao-Wen Chang   Circuit placement challenges: technical
                                  perspective  . . . . . . . . . . . . . . 104--104
             Myung-Chul Kim and   
               Dong-Jin Lee and   
                 Igor L. Markov   SimPL: an algorithm for placing VLSI
                                  circuits . . . . . . . . . . . . . . . . 105--113
                  Peter Winkler   Last byte: Puzzled answers . . . . . . . 117--117
                  Leah Hoffmann   Q&A: Cracking the Code  . . . . . . . . . 120--ff

Communications of the ACM
Volume 56, Number 7, July, 2013

                 Moshe Y. Vardi   The great robotics debate  . . . . . . . 5--5
                 Vinton G. Cerf   From the President: `But officer, I was
                                  only programming at 100 lines per hour!' 7--7
                     CACM Staff   Letters to the Editor: Plenty more
                                  hacker motivations . . . . . . . . . . . 8--9
                     Jason Hong   Ph.D. students must break away from
                                  undergraduate mentality  . . . . . . . . 10--11
                   Esther Shein   Keeping computers cool from the inside   13--16
               Samuel Greengard   All the items fit to print . . . . . . . 17--19
                    Neil Savage   Backing creativity . . . . . . . . . . . 20--21
               Pamela Samuelson   Legally Speaking: Statutory damages as a
                                  threat to innovation . . . . . . . . . . 24--26
        Christopher S. Tang and   
               Joshua Zimmerman   Computing Ethics: Information and
                                  communication technology for managing
                                  supply chain risks . . . . . . . . . . . 27--29
                      Mari Sako   Technology strategy and management: The
                                  business of professionals  . . . . . . . 30--32
                 Ron Eglash and   
            Juan E. Gilbert and   
                   Ellen Foster   Broadening participation: Toward
                                  culturally responsive computing
                                  education  . . . . . . . . . . . . . . . 33--36
                    Martin Ford   Viewpoint: Could artificial intelligence
                                  create an unemployment crisis? . . . . . 37--39
               Paul E. McKenney   Structured deferral: synchronization via
                                  procrastination  . . . . . . . . . . . . 40--49
                  Samy Al Bahra   Nonblocking algorithms and scalable
                                  multicore programming  . . . . . . . . . 50--61
              Mathieu Desnoyers   Proving the correctness of nonblocking
                                  data structures  . . . . . . . . . . . . 62--69
                  Yang Tang and   
                    Di Wang and   
                   Jing Bai and   
                Xiaoyan Zhu and   
                        Ming Li   Information distance between what I said
                                  and what it heard  . . . . . . . . . . . 70--77
             Ariel D. Procaccia   Cake cutting: not just child's play  . . 78--87
             Madhav Marathe and   
       Anil Kumar S. Vullikanti   Computational epidemiology . . . . . . . 88--96
                    Peter Wonka   A fresh approach to vector graphics:
                                  technical perspective  . . . . . . . . . 100--100
          Alexandrina Orzan and   
            Adrien Bousseau and   
               Pascal Barla and   
    Holger Winnemöller and   
        Joëlle Thollot and   
                  David Salesin   Diffusion curves: a vector
                                  representation for smooth-shaded images  101--108
                Mark McClelland   Last Byte: Future tense  . . . . . . . . 112--ff

Communications of the ACM
Volume 56, Number 8, August, 2013

             Moshe Y. Vardi and   
                   Victor Vianu   What is a flagship publication?  . . . . 5--5
                 Vinton G. Cerf   Computer science education --- revisited 7--7
                     CACM Staff   Is computing science?  . . . . . . . . . 9--9
                     Philip Guo   Teaching programming the way it works
                                  outside the classroom  . . . . . . . . . 10--11
               Samuel Greengard   A new approach to information storage    13--15
                    Alex Wright   Patient, heal thyself  . . . . . . . . . 16--18
                     Paul Hyman   Software aims to ensure fairness in
                                  crowdsourcing projects . . . . . . . . . 19--21
              Richard Heeks and   
                Andrew Robinson   Ultra-low-cost computing and developing
                                  countries  . . . . . . . . . . . . . . . 22--24
     Chrysanthos Dellarocas and   
           Marshall Van Alstyne   Money models for MOOCs . . . . . . . . . 25--28
                     Eric Byres   The air gap: SCADA's enduring security
                                  myth . . . . . . . . . . . . . . . . . . 29--31
         George V. Neville-Neil   Cherry-picking and the scientific method 32--33
                 Leo Porter and   
               Mark Guzdial and   
           Charlie McDowell and   
                     Beth Simon   Success in introductory programming:
                                  what works?  . . . . . . . . . . . . . . 34--36
               Jean-Loup Richet   Overt censorship: a fatal mistake? . . . 37--38
                 Ariel Tseitlin   The antifragile organization . . . . . . 40--44
                  Alex Nicolaou   Best practices on the move: building web
                                  apps for mobile devices  . . . . . . . . 45--51
                   Tammy Everts   Rules for mobile performance
                                  optimization . . . . . . . . . . . . . . 52--59
                 Marc Lauritsen   Are we free to code the law? . . . . . . 60--66
             Jacques Wainer and   
            Michael Eckmann and   
          Siome Goldenstein and   
                 Anderson Rocha   How productivity and impact differ
                                  across computer science subareas . . . . 67--73
                Josh C. Bongard   Evolutionary robotics  . . . . . . . . . 74--83
                     Assaf Naor   Every graph is essentially sparse  . . . 86--86
              Joshua Batson and   
         Daniel A. Spielman and   
          Nikhil Srivastava and   
                 Shang-Hua Teng   Spectral sparsification of graphs:
                                  theory and algorithms  . . . . . . . . . 87--94
                  Peter Winkler   Last Byte: Puzzled: Wins in a Row  . . . 96--96

Communications of the ACM
Volume 56, Number 9, September, 2013

                 Moshe Y. Vardi   Has the innovation cup run dry?  . . . . 5--5
                 Vinton G. Cerf   Freedom and the social contract  . . . . 7--7
                     CACM Staff   For privacy and security, use public
                                  keys everywhere  . . . . . . . . . . . . 8--9
        Michael Stonebraker and   
                 Judy Robertson   Big data is `buzzword du jour;' CS
                                  academics `have the best job'  . . . . . 10--11
                  Chris Edwards   Magnetic diversion for electronic
                                  switches . . . . . . . . . . . . . . . . 13--15
              Keith Kirkpatrick   Software-defined networking  . . . . . . 16--19
                   Esther Shein   Ephemeral data . . . . . . . . . . . . . 20--22
                    Laura DiDio   Remembering Douglas Engelbart  . . . . . 24--25
              James Grimmelmann   What to do about Google? . . . . . . . . 28--30
                   Thomas Haigh   Software and souls; programs and
                                  packages . . . . . . . . . . . . . . . . 31--34
               Peter J. Denning   The other side of language . . . . . . . 35--37
             Zeljko Obrenovi\'c   Research and practice: the curious case
                                  of `small' researchers-practitioners . . 38--40
                Lawrence Snyder   An interview with Hadi Partovi . . . . . 41--45
               Maged M. Michael   The balancing act of choosing
                                  nonblocking features . . . . . . . . . . 46--53
                      Sean Hull   20 obstacles to scalability  . . . . . . 54--59
              Christoph Lameter   An overview of non-uniform memory access 59--54
              Steve Benford and   
           Chris Greenhalgh and   
        Gabriella Giannachi and   
             Brendan Walker and   
               Joe Marshall and   
                     Tom Rodden   Uncomfortable user experience  . . . . . 66--73
                 Mark Braverman   Computing with real numbers, from
                                  Archimedes to Turing and beyond  . . . . 74--83
             Michael Fisher and   
              Louise Dennis and   
                   Matt Webster   Verifying autonomous systems . . . . . . 84--93
                  Pietro Perona   Progress in visual categorization:
                                  technical perspective  . . . . . . . . . 96--96
         Pedro Felzenszwalb and   
              Ross Girshick and   
           David McAllester and   
                   Deva Ramanan   Visual object detection with deformable
                                  part models  . . . . . . . . . . . . . . 97--105
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 110--110
                  Leah Hoffmann   Last Byte: Q&A: Big Challenge . . . . . . 112--ff

Communications of the ACM
Volume 56, Number 10, October, 2013

                     John White   On the future of ACM . . . . . . . . . . 5--5
                 Vinton G. Cerf   Revisiting the tragedy of the commons    7--7
                     CACM Staff   Deep accountability, beyond even
                                  liability  . . . . . . . . . . . . . . . 8--9
                     Philip Guo   Helping scientists, engineers to work up
                                  to 100 times faster  . . . . . . . . . . 12--13
                    Alex Wright   Tuning in to graphene  . . . . . . . . . 15--17
                     Tom Geller   Making the Internet safe for gadgets . . 18--20
                     Paul Hyman   Software helps linguists reconstruct,
                                  decipher ancient languages . . . . . . . 21--23
                Sarah Underwood   The Alan Turing Year leaves a rich
                                  legacy . . . . . . . . . . . . . . . . . 24--25
            Michael A. Cusumano   Evaluating a startup venture . . . . . . 26--29
              Phillip G. Armour   When faster is slower  . . . . . . . . . 30--32
         George V. Neville-Neil   Kode Vicious: The naming of hosts is a
                                  difficult matter . . . . . . . . . . . . 33--34
                   Kevin Fu and   
                     James Blum   Controlling for cybersecurity risks of
                                  medical device software  . . . . . . . . 35--37
                David H. Ackley   Beyond efficiency  . . . . . . . . . . . 38--40
                 Jacob Loveless   Barbarians at the gateways . . . . . . . 42--49
             Jacob Loveless and   
              Sasha Stoikov and   
                    Rolf Waeber   Online algorithms in high-frequency
                                  trading  . . . . . . . . . . . . . . . . 50--56
             Stephen D. Strowes   Passively measuring TCP round-trip times 57--64
                 Floris Bex and   
              John Lawrence and   
                Mark Snaith and   
                     Chris Reed   Implementing the argument web  . . . . . 66--73
             Apirak Hoonlor and   
      Boleslaw K. Szymanski and   
               Mohammed J. Zaki   Trends in computer science research  . . 74--83
           Rodney Van Meter and   
                  Clare Horsman   A blueprint for building a quantum
                                  computer . . . . . . . . . . . . . . . . 84--93
                    Rajeev Alur   Can we verify cyber-physical systems?:
                                  technical perspective  . . . . . . . . . 96--96
           Matthias Althoff and   
             Akshay Rajhans and   
             Bruce H. Krogh and   
               Soner Yaldiz and   
                     Xin Li and   
                  Larry Pileggi   Formal verification of phase-locked
                                  loops using reachability analysis and
                                  continuization . . . . . . . . . . . . . 97--104
                    Brian Clegg   Last byte: Future tense  . . . . . . . . 112--ff

Communications of the ACM
Volume 56, Number 11, November, 2013

                 Moshe Y. Vardi   The end of the American network  . . . . 5--5
                 Vinton G. Cerf   Heidelberg Laureate Forum  . . . . . . . 7--7
                     CACM Staff   Microprocessor architectures follow
                                  markets and silicon  . . . . . . . . . . 8--9
                     Jason Hong   Considering privacy issues in the
                                  context of Google Glass  . . . . . . . . 10--11
                   Gregory Mone   Future-proof encryption  . . . . . . . . 12--14
                    Neil Savage   More than a mouse  . . . . . . . . . . . 15--16
              Keith Kirkpatrick   Legal issues with robots . . . . . . . . 17--19
        Deirdre K. Mulligan and   
           Kenneth A. Bamberger   Privacy and security: What regulators
                                  can do to advance privacy through design 20--22
               Pamela Samuelson   Legally speaking: Is software
                                  patentable?  . . . . . . . . . . . . . . 23--25
             Katina Michael and   
                  M. G. Michael   Computing ethics: No limits to watching? 26--28
           Marshall Van Alstyne   Economic and business dimensions: Why
                                  not immortality? . . . . . . . . . . . . 29--31
                 Cameron Wilson   Education: Making computer science count 32--33
            Tobias Langlotz and   
               Jens Grubert and   
                Raphael Grasset   Viewpoint: Augmented reality browsers:
                                  essential products or only gadgets?  . . 34--36
                    James Roche   Adopting DevOps practices in quality
                                  assurance  . . . . . . . . . . . . . . . 38--43
                  Neil Mitchell   Leaking space  . . . . . . . . . . . . . 44--52
              Ivar Jacobson and   
                 Ian Spence and   
                     Pan-Wei Ng   Agile and SEMAT: perfect partners  . . . 53--59
                Neil Maiden and   
             Sonali D'Souza and   
                 Sara Jones and   
           Lars Müller and   
              Lucia Pannese and   
             Kristine Pitts and   
             Michael Prilla and   
               Kevin Pudney and   
               Malcolm Rose and   
                 Ian Turner and   
            Konstantinos Zachos   Computing technologies for reflective,
                                  creative care of people with dementia    60--67
             Evgeny Kaganer and   
        Gabriel A. Giordano and   
            Sebastien Brion and   
              Marco Tortoriello   Media tablets for mobile learning  . . . 68--75
           Philip Treleaven and   
               Michal Galas and   
                 Vidhi Lalchand   Algorithmic trading review . . . . . . . 76--85
      Mamadou Tourad Diallo and   
           Hassnaa Moustafa and   
               Hossam Afifi and   
               Nicolas Marechal   Adaptation of audiovisual contents and
                                  their delivery means . . . . . . . . . . 86--93
                 Shekhar Borkar   Centip$3$De demonstrates more than
                                  Moore\ldots: technical perspective . . . 96--96
       Ronald G. Dreslinski and   
                 David Fick and   
            Bharan Giridhar and   
                 Gyouho Kim and   
                Sangwon Seo and   
             Matthew Fojtik and   
            Sudhir Satpathy and   
              Yoonmyung Lee and   
                Daeyeon Kim and   
             Nurrachman Liu and   
         Michael Wieckowski and   
               Gregory Chen and   
           Dennis Sylvester and   
               David Blaauw and   
                   Trevor Mudge   Centip$3$De: a many-core prototype
                                  exploring $3$D integration and
                                  near-threshold computing . . . . . . . . 97--104
                  Peter Winkler   Last Byte: Puzzled: Coin flipping  . . . 120--120

Communications of the ACM
Volume 56, Number 12, December, 2013

             M. Tamer Özsu   ACM books to launch  . . . . . . . . . . 5--5
                 Vinton G. Cerf   Software at scale  . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Free the digital
                                  natives  . . . . . . . . . . . . . . . . 8--9
               Mark Guzdial and   
                   Valerie Barr   blog@CACM: The lure of live coding; the
                                  attraction of small data . . . . . . . . 10--11
                  Chris Edwards   News: Life points the way to a new
                                  template for chipmaking  . . . . . . . . 13--15
               Samuel Greengard   News: Seeing the big picture . . . . . . 16--18
               Karen A. Frenkel   News: CS enrollments rise \ldots at the
                                  expense of the humanities? . . . . . . . 19--21
                  Richard Heeks   Emerging markets: Information technology
                                  impact sourcing  . . . . . . . . . . . . 22--25
                 David Anderson   Historical reflections: Patrick
                                  Blackett: providing `white heat' to the
                                  British computing revolution . . . . . . 26--28
               Peter J. Denning   The profession of IT: Design thinking    29--31
         George V. Neville-Neil   Kode Vicious: A lesson in resource
                                  management . . . . . . . . . . . . . . . 32--33
             Wendy M. DuBow and   
               Ruthe Farmer and   
                    Zhen Wu and   
              Malia Fredrickson   Broadening participation: Bringing young
                                  women into computing through the NCWIT
                                  Aspirations in Computing program . . . . 34--37
                    Armando Fox   Viewpoint: From MOOCs to SPOCs . . . . . 38--40
                  Ilya Grigorik   Practice: Making the Web faster with
                                  HTTP 2.0 . . . . . . . . . . . . . . . . 42--49
                 David Chisnall   Practice: The challenge of
                                  cross-language interoperability  . . . . 50--56
                      Fred Chow   Practice: Intermediate representation    57--62
                    Vasant Dhar   Data science and prediction  . . . . . . 64--73
             Jonathan Lazar and   
               Harry Hochheiser   Legal aspects of interface accessibility
                                  in the U.S.  . . . . . . . . . . . . . . 74--80
                     Doug Terry   Replicated data consistency explained
                                  through baseball . . . . . . . . . . . . 82--89
               Gareth Tyson and   
            Nishanth Sastry and   
               Ruben Cuevas and   
                Ivica Rimac and   
                 Andreas Mauthe   A survey of mobility in
                                  information-centric networks . . . . . . 90--98
                     Eliot Moss   The cleanest garbage collection:
                                  technical perspective  . . . . . . . . . 100--100
             David F. Bacon and   
                Perry Cheng and   
                   Sunil Shukla   And then there were none: a stall-free
                                  real-time garbage collector for
                                  reconfigurable hardware  . . . . . . . . 101--109
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 126--126
                  Leah Hoffmann   Last Byte: Q&A: Securing the Risk . . . . 128--ff


Communications of the ACM
Volume 57, Number 1, January, 2014

                 Moshe Y. Vardi   Scalable conferences . . . . . . . . . . 5--5
                 Vinton G. Cerf   From the President; Virtual reality
                                  redux  . . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Nominees for elections and report of the
                                  ACM Nominating Committee . . . . . . . . 8--8
                     CACM Staff   ACM's FY13 annual report . . . . . . . . 9--14
                     CACM Staff   U.S. does not control the Internet . . . 16--17
               Mark Guzdial and   
                  Joel C. Adams   MOOCs need more work; so do CS graduates 18--19
                    Gary Anthes   French team invents faster code-breaking
                                  algorithm  . . . . . . . . . . . . . . . 21--23
                     Tom Geller   How do you feel?: your computer knows    24--26
                     Paul Hyman   `Peace technologies' enable eyewitness
                                  reporting when disasters strike  . . . . 27--29
            Michael A. Cusumano   The legacy of Steve Ballmer  . . . . . . 30--32
             Christopher S. Yoo   Toward a closer integration of law and
                                  computer science . . . . . . . . . . . . 33--35
                   Thomas Haigh   Actually, Turing did not invent the
                                  computer . . . . . . . . . . . . . . . . 36--41
              Phillip G. Armour   Estimation is not evil . . . . . . . . . 42--43
                     Doug Terry   Publish now, judge later . . . . . . . . 44--46
                   Alex E. Bell   The software inferno . . . . . . . . . . 48--53
                    Jason Lango   Toward software-defined SLAs . . . . . . 54--60
          Anil Madhavapeddy and   
                 David J. Scott   Unikernels: the rise of the virtual
                                  library operating system . . . . . . . . 61--69
              Kenton O'Hara and   
           Gerardo Gonzalez and   
             Abigail Sellen and   
              Graeme Penney and   
           Andreas Varnavas and   
              Helena Mentis and   
          Antonio Criminisi and   
              Robert Corish and   
           Mark Rouncefield and   
             Neville Dastur and   
                    Tom Carrell   Touchless interaction in surgery . . . . 70--77
                 Jessica Li and   
            Arun Vishwanath and   
                  H. Raghav Rao   Retweeting the Fukushima nuclear
                                  radiation disaster . . . . . . . . . . . 78--85
            Vincent Gramoli and   
               Rachid Guerraoui   Democratizing transactional programming  86--93
              Xuedong Huang and   
                James Baker and   
                      Raj Reddy   A historical perspective of speech
                                  recognition  . . . . . . . . . . . . . . 94--103
            Subramanian S. Iyer   Silicon stress: technical perspective    106--106
               Moongon Jung and   
              Joydeep Mitra and   
               David Z. Pan and   
                   Sung Kyu Lim   TSV stress-aware full-chip mechanical
                                  reliability analysis and optimization
                                  for $3$D IC  . . . . . . . . . . . . . . 107--115
                   Seth Shostak   Last byte: Future Tense: The second
                                  signal . . . . . . . . . . . . . . . . . 128--ff

Communications of the ACM
Volume 57, Number 2, February, 2014

              Andrew McGettrick   Education, always  . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cognitive implants . . . . . . . . . . . 7--7
                     CACM Staff   Contribute more than algorithmic
                                  speculation  . . . . . . . . . . . . . . 9--9
                     Philip Guo   Clarifying human-computer interaction    10--11
                     Don Monroe   A new type of mathematics? . . . . . . . 13--15
                   Esther Shein   Should everybody learn to code?  . . . . 16--18
               Samuel Greengard   Computational photography comes into
                                  focus  . . . . . . . . . . . . . . . . . 19--21
                     CACM Staff   ACM Fellows inducted . . . . . . . . . . 22--22
            Diana L. Burley and   
              Jon Eisenberg and   
             Seymour E. Goodman   Would cybersecurity professionalization
                                  help address the cybersecurity crisis?   24--27
                       Tim Bell   Establishing a nationwide CS curriculum
                                  in New Zealand high schools  . . . . . . 28--30
              William Young and   
               Nancy G. Leveson   An integrated approach to safety and
                                  security based on systems theory . . . . 31--35
         George V. Neville-Neil   Kode vicious: Bugs and bragging rights   36--37
           Marco Ceccagnoli and   
               Chris Forman and   
                 Peng Huang and   
                       D. J. Wu   Digital platforms: when is participation
                                  valuable?  . . . . . . . . . . . . . . . 38--39
            Stephen J. Andriole   Ready technology . . . . . . . . . . . . 40--42
                      Anonymous   Node at LinkedIn: the pursuit of
                                  thinner, lighter, faster . . . . . . . . 44--51
              Poul-Henning Kamp   Center wheel for success . . . . . . . . 52--54
            Zachary Hensley and   
         Jibonananda Sanyal and   
                     Joshua New   Provenance in sensor data management . . 55--62
             Gerard J. Holzmann   Mars code  . . . . . . . . . . . . . . . 64--73
        Thanassis Avgerinos and   
               Sang Kil Cha and   
           Alexandre Rebert and   
         Edward J. Schwartz and   
               Maverick Woo and   
                  David Brumley   Automatic exploit generation . . . . . . 74--84
              Silvio Micali and   
               Michael O. Rabin   Cryptography miracles, secure auctions,
                                  matching problem verification  . . . . . 85--93
           Reinhard Wilhelm and   
                   Daniel Grund   Computation takes time, but how much?    94--103
             Michael W. Mahoney   A new spin on an old algorithm:
                                  technical perspective  . . . . . . . . . 106--106
               Grey Ballard and   
               James Demmel and   
                 Olga Holtz and   
                  Oded Schwartz   Communication costs of Strassen's matrix
                                  multiplication . . . . . . . . . . . . . 107--114
                  Peter Winkler   Last byte: Puzzled: Lowest Number Wins   120--120

Communications of the ACM
Volume 57, Number 3, March, 2014

                 Moshe Y. Vardi   Boolean satisfiability: theory and
                                  engineering  . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Letter from the President: What if it's
                                  us?  . . . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Develop research
                                  culture in the Arab Middle East  . . . . 9--9
                Kate Matsudaira   Capturing and structuring data mined
                                  from the Web . . . . . . . . . . . . . . 10--11
                Erica Klarreich   News: Reading brains . . . . . . . . . . 12--14
              Keith Kirkpatrick   News: World without wires  . . . . . . . 15--17
                    Neil Savage   News: Playing at health  . . . . . . . . 18--19
               Pamela Samuelson   Legally speaking: Mass digitization as
                                  fair use . . . . . . . . . . . . . . . . 20--22
           Arvind Narayanan and   
                 Shannon Vallor   Computing ethics: Why software
                                  engineering courses should include
                                  ethics coverage  . . . . . . . . . . . . 23--25
               Peter J. Denning   The profession of IT: `Surfing toward
                                  the future'  . . . . . . . . . . . . . . 26--29
                 Richard Ladner   Broadening participation: The impact of
                                  the United Nations Convention on the
                                  Rights of Persons with Disabilities  . . 30--32
                David Patterson   Viewpoint: How to build a bad research
                                  center . . . . . . . . . . . . . . . . . 33--36
             Wojciech Golab and   
         Muntasir R. Rahman and   
              Alvin AuYoung and   
            Kimberly Keeton and   
            Xiaozhou (Steve) Li   Eventually consistent: not what you were
                                  expecting? . . . . . . . . . . . . . . . 38--44
          Robert F. Sproull and   
                      Jim Waldo   The API performance contract . . . . . . 45--51
                     Andi Kleen   Scaling existing lock-based applications
                                  with lock elision  . . . . . . . . . . . 52--56
               Junfeng Yang and   
                 Heming Cui and   
                 Jingyue Wu and   
                  Yang Tang and   
                        Gang Hu   Making parallel programs reliable with
                                  stable multithreading  . . . . . . . . . 58--69
         Christine Alvarado and   
                  Eugene Judson   Using targeted conferences to recruit
                                  women into computer science  . . . . . . 70--77
              Gang-Hoon Kim and   
              Silvana Trimi and   
                 Ji-Hyong Chung   Big-data applications in the government
                                  sector . . . . . . . . . . . . . . . . . 78--85
       Elzbieta Zieli\'nska and   
         Wojciech Mazurczyk and   
         Krzysztof Szczypiorski   Trends in steganography  . . . . . . . . 86--95
                    Dan Wallach   Smartphone security `taint' what it used
                                  to be: technical perspective . . . . . . 98--98
               William Enck and   
              Peter Gilbert and   
             Byung-Gon Chun and   
              Landon P. Cox and   
               Jaeyeon Jung and   
           Patrick McDaniel and   
                 Anmol N. Sheth   TaintDroid: an information flow tracking
                                  system for real-time privacy monitoring
                                  on smartphones . . . . . . . . . . . . . 99--106
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 109--109
                  Leah Hoffmann   Last Byte: Q&A: RISC and reward . . . . . 112--ff

Communications of the ACM
Volume 57, Number 4, April, 2014

                 Alfred Aho and   
                  Georg Gottlob   A front row seat to Communications'
                                  editorial transformation . . . . . . . . 5--5
                 Vinton G. Cerf   The Internet governance ecosystem  . . . 7--7
                     CACM Staff   Code that missed Mars  . . . . . . . . . 9--9
               Mark Guzdial and   
                    Daniel Reed   Eyes forward . . . . . . . . . . . . . . 10--11
                  Chris Edwards   Using patient data for personalized
                                  cancer treatments  . . . . . . . . . . . 13--15
                     Paul Hyman   Speech-to-speech translations stutter,
                                  but researchers see mellifluous future   16--19
                   Gregory Mone   New models in cosmetics replacing animal
                                  testing  . . . . . . . . . . . . . . . . 20--21
            Michael A. Cusumano   MOOCs revisited, with some policy
                                  suggestions  . . . . . . . . . . . . . . 24--26
                Michael L. Best   Thinking outside the continent . . . . . 27--29
         George V. Neville-Neil   Kode Vicious: This is the foo field  . . 30--31
                 Deborah Estrin   Small data, where $ n = \mbox {me} $ . . 32--34
                    Uzi Vishkin   Is multicore hardware for
                                  general-purpose parallel processing
                                  broken?  . . . . . . . . . . . . . . . . 35--39
                     Paul Vixie   Rate-limiting state  . . . . . . . . . . 40--43
              Ivar Jacobson and   
                 Pan-Wei Ng and   
                 Ian Spence and   
                Paul E. McMahon   Major-league SEMAT: why should an
                                  executive care?  . . . . . . . . . . . . 44--50
           Christoph Paasch and   
            Olivier Bonaventure   Multipath TCP  . . . . . . . . . . . . . 51--57
           Daniel T. Seaton and   
               Yoav Bergner and   
               Isaac Chuang and   
               Piotr Mitros and   
             David E. Pritchard   Who does what in a massive open online
                                  course?  . . . . . . . . . . . . . . . . 58--65
              Jeremy Avigad and   
                  John Harrison   Formally verified mathematics  . . . . . 66--75
             Martin Odersky and   
                    Tiark Rompf   Unifying functional and object-oriented
                                  programming with Scala . . . . . . . . . 76--86
          Franziska Roesner and   
            Tadayoshi Kohno and   
                   David Molnar   Security and privacy for augmented
                                  reality systems  . . . . . . . . . . . . 88--96
                     Joe Warren   A `reasonable' solution to deformation
                                  methods: technical perspective . . . . . 98--98
              Alec Jacobson and   
                 Ilya Baran and   
            Jovan Popovi\'c and   
           Olga Sorkine-Hornung   Bounded biharmonic weights for real-time
                                  deformation  . . . . . . . . . . . . . . 99--106
                    Ken MacLeod   Last Byte: Future Tense: Re: Search  . . 112--ff

Communications of the ACM
Volume 57, Number 5, May, 2014

                 Moshe Y. Vardi   Moore's law and the sand-heap paradox    5--5
                 Vinton G. Cerf   Sometimes it takes some time!  . . . . . 7--7
                     CACM Staff   Know your steganographic enemy . . . . . 8--8
                     CACM Staff   ACM's 2014 general election: please take
                                  this opportunity to vote . . . . . . . . 9--17
                 Judy Robertson   Rethinking how to teach programming to
                                  newcomers  . . . . . . . . . . . . . . . 18--19
               Samuel Greengard   How computers are changing biology . . . 21--23
                     Tom Geller   The forever disc . . . . . . . . . . . . 24--26
              Keith Kirkpatrick   Technology confounds the courts  . . . . 27--29
           Marshall Van Alstyne   Why Bitcoin has value  . . . . . . . . . 30--32
                  Ben Depoorter   What happened to video game piracy?  . . 33--34
                 David Anderson   Tom Kilburn: a tale of five computers    35--38
               Steve Cooper and   
              Shuchi Grover and   
                     Beth Simon   Building a virtual community of practice
                                  for K-12 CS teachers . . . . . . . . . . 39--41
                  Ruzena Bajcsy   Robots are coming  . . . . . . . . . . . 42--43
                      Bob Toxen   The NSA and Snowden: securing the
                                  all-seeing eye . . . . . . . . . . . . . 44--51
              Lucian Carata and   
              Sherif Akoush and   
      Nikilesh Balakrishnan and   
            Thomas Bytheway and   
             Ripduman Sohan and   
              Margo Seltzer and   
                    Andy Hopper   A primer on provenance . . . . . . . . . 52--60
                Wyatt Lloyd and   
        Michael J. Freedman and   
           Michael Kaminsky and   
              David G. Andersen   Don't settle for eventual consistency    61--68
             Mihir Nanavati and   
               Patrick Colp and   
                Bill Aiello and   
                Andrew Warfield   Cloud security: a gathering storm  . . . 70--79
               Shimeon Pass and   
                     Boaz Ronen   Reducing the software value gap  . . . . 80--87
                  Manlu Liu and   
                Sean Hansen and   
                       Qiang Tu   The community source approach to
                                  software development and the Kuali
                                  experience . . . . . . . . . . . . . . . 88--96
         Kevin Leyton-Brown and   
             Holger H. Hoos and   
               Frank Hutter and   
                         Lin Xu   Understanding the empirical hardness of
                                  NP-complete problems . . . . . . . . . . 98--107
                  Ari Juels and   
                    Bonnie Wong   The interplay of neuroscience and
                                  cryptography: technical perspective  . . 109--109
             Hristo Bojinov and   
             Daniel Sanchez and   
                 Paul Reber and   
                  Dan Boneh and   
                Patrick Lincoln   Neuroscience meets cryptography: crypto
                                  primitives secure against rubber hose
                                  attacks  . . . . . . . . . . . . . . . . 110--118
                  Peter Winkler   Last Byte: Puzzled: A Sort, of Sorts . . 120--120

Communications of the ACM
Volume 57, Number 6, June, 2014

              Mehran Sahami and   
                    Steve Roach   Computer science curricula 2013 released 5--5
                 Vinton G. Cerf   Letter from the President: The house
                                  elves of ACM . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Efficient code to
                                  counter dying Moore's Law  . . . . . . . 9--9
                Daniel Reed and   
               Chris Stephenson   BLOG@ACM: First impressions, unexpected
                                  benefits . . . . . . . . . . . . . . . . 10--11
                     Don Monroe   Neuromorphic computing gets ready for
                                  the (really) big time  . . . . . . . . . 13--15
                    Neil Savage   Time for a change  . . . . . . . . . . . 16--18
                     CACM Staff   Visualizations make big data meaningful  19--21
                    Neil Savage   General agreement  . . . . . . . . . . . 22--23
              Ross Anderson and   
              Steven J. Murdoch   Inside risks: EMV: why payment systems
                                  fail . . . . . . . . . . . . . . . . . . 24--28
              Phillip G. Armour   The business of software: Owning and
                                  using  . . . . . . . . . . . . . . . . . 29--30
      Dinei Florêncio and   
              Cormac Herley and   
                  Adam Shostack   Privacy and security: FUD: a plea for
                                  intolerance  . . . . . . . . . . . . . . 31--33
               Peter J. Denning   The profession of IT: Avalanches are
                                  coming . . . . . . . . . . . . . . . . . 34--36
         George V. Neville-Neil   Kode Vicious: The logic of logging . . . 37--38
               Charles K. Davis   Viewpoint: Beyond data and analysis  . . 39--41
                      Andy Gill   Domain-specific languages and code
                                  synthesis using Haskell  . . . . . . . . 42--49
                    Erik Meijer   The curse of the excluded middle . . . . 50--55
           Bo Joel Svensson and   
               Mary Sheeran and   
                 Ryan R. Newton   Design exploration through
                                  code-generating DSLs . . . . . . . . . . 56--63
         Christos Siaterlis and   
              Béla Genge   Cyber-physical testbeds  . . . . . . . . 64--73
                 Weiguo Fan and   
              Michael D. Gordon   The power of social media analytics  . . 74--81
             Daniela Rosner and   
             Marco Roccetti and   
                 Gustavo Marfia   The digitization of cultural practices   82--87
               Peter Musial and   
           Nicolas Nicolaou and   
        Alexander A. Shvartsman   Implementing distributed shared memory
                                  for dynamic networks . . . . . . . . . . 88--98
           Michiel van de Panne   Motion fields for interactive character
                                  animation: technical perspective . . . . 100--100
               Yongjoon Lee and   
              Kevin Wampler and   
          Gilbert Bernstein and   
            Jovan Popovi\'c and   
                Zoran Popovi\'c   Motion fields for interactive character
                                  locomotion . . . . . . . . . . . . . . . 101--108
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  Sources  . . . . . . . . . . . . . . . . 110--110
                  Leah Hoffmann   Last Byte: Q&A: Divide and Conquer  . . . 112--ff

Communications of the ACM
Volume 57, Number 7, July, 2014

               Vicki Hanson and   
               Reyyan Ayfer and   
                  Bev Bachmayer   European women in computing  . . . . . . 5--5
                 Vinton G. Cerf   Responsible programming  . . . . . . . . 7--7
                     CACM Staff   Snowden weak link: copying to USB device 8--9
               Mark Guzdial and   
                     Philip Guo   The difficulty of teaching programming
                                  languages, and the benefits of hands-on
                                  learning . . . . . . . . . . . . . . . . 10--11
                    Alex Wright   Big data meets big science . . . . . . . 13--15
                   Logan Kugler   Robots compete in disaster scenarios . . 16--18
                   Esther Shein   Holographic projection systems provide
                                  eternal life . . . . . . . . . . . . . . 19--21
               Pamela Samuelson   Legally speaking: Watching TV on
                                  Internet-connected devices . . . . . . . 22--24
                 Chuck Huff and   
                 Almut Furchert   Computing ethics: Toward a pedagogy of
                                  ethical practice . . . . . . . . . . . . 25--27
                      Mari Sako   Technology strategy and management: The
                                  business of the state  . . . . . . . . . 28--30
              Jane Margolis and   
               Joanna Goode and   
               Gail Chapman and   
                   Jean J. Ryoo   Broadening participation: That classroom
                                  `magic'  . . . . . . . . . . . . . . . . 31--33
                 Batya Friedman   Viewpoint: Structural challenges and the
                                  need to adapt  . . . . . . . . . . . . . 34--37
            Phillip A. Laplante   Viewpoint: Licensing professional
                                  software engineers: seize the
                                  opportunity  . . . . . . . . . . . . . . 38--40
                  Thomas Wadlow   Who must you trust?  . . . . . . . . . . 42--49
                      Anonymous   Automated QA testing at electronic arts  50--57
                     Mike Bland   Finding more than one worm in the apple  58--64
           Matthew Faulkner and   
             Robert Clayton and   
              Thomas Heaton and   
             K. Mani Chandy and   
              Monica Kohler and   
                Julian Bunn and   
                Richard Guy and   
                  Annie Liu and   
              Michael Olson and   
              MingHei Cheng and   
                 Andreas Krause   Community sense and response systems:
                                  your phone as quake detector . . . . . . 66--75
      Orna Agmon Ben-Yehuda and   
            Muli Ben-Yehuda and   
             Assaf Schuster and   
                    Dan Tsafrir   The rise of RaaS: the
                                  Resource-as-a-Service cloud  . . . . . . 76--84
             H. V. Jagadish and   
            Johannes Gehrke and   
      Alexandros Labrinidis and   
    Yannis Papakonstantinou and   
           Jignesh M. Patel and   
         Raghu Ramakrishnan and   
                  Cyrus Shahabi   Big data and its technical challenges    86--94
Konstantina (Dina) Papagiannaki   The power of joint multiuser
                                  beamforming: technical perspective . . . 96--96
            Hariharan Rahul and   
               Swarun Kumar and   
                    Dina Katabi   JMB: scaling wireless capacity with user
                                  demands  . . . . . . . . . . . . . . . . 97--106
             Geoffrey A. Landis   Last byte: Future Tense: The Chatbot and
                                  the Drone  . . . . . . . . . . . . . . . 112--ff

Communications of the ACM
Volume 57, Number 8, August, 2014

                 Moshe Y. Vardi   Editor's letter: Openism, IPism,
                                  fundamentalism, and pragmatism . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: ACM and the professional
                                  programmer . . . . . . . . . . . . . . . 7--7
                   Mark Guzdial   BLOG@CACM: Why the U.S. is not ready for
                                  mandatory CS education . . . . . . . . . 8--9
                  Chris Edwards   News: Researchers probe security through
                                  obscurity  . . . . . . . . . . . . . . . 11--13
              Keith Kirkpatrick   News: Surgical robots deliver care more
                                  precisely  . . . . . . . . . . . . . . . 14--16
                Erica Klarreich   News: Hello, my name is \ldots . . . . . 17--19
               Seda Gürses   Privacy and security: Can you engineer
                                  privacy? . . . . . . . . . . . . . . . . 20--23
               Uri Wilensky and   
             Corey E. Brady and   
                Michael S. Horn   Education: Fostering computational
                                  literacy in science classrooms . . . . . 24--28
                   Chris Coward   Global computing: Private then shared?   29--30
         George V. Neville-Neil   Kode Vicious: Forked over  . . . . . . . 31--32
                 Frank Levy and   
             Richard J. Murnane   Viewpoint: Researching the robot
                                  revolution . . . . . . . . . . . . . . . 33--35
               Jaime Teevan and   
     Kevyn Collins-Thompson and   
              Ryen W. White and   
                   Susan Dumais   Viewpoint: Slow search . . . . . . . . . 36--38
                Mark Cavage and   
                  David Pacheco   Bringing arbitrary compute to
                                  authoritative data . . . . . . . . . . . 40--48
              Poul-Henning Kamp   Quality software costs money ---
                                  Heartbleed was free  . . . . . . . . . . 49--51
            Michael J. Lutz and   
         J. Fernando Naveda and   
               James R. Vallino   Undergraduate software engineering . . . 52--58
         Francesca Spezzano and   
         V. S. Subrahmanian and   
                   Aaron Mannes   Reshaping terrorist networks . . . . . . 60--69
                  Sumit Gulwani   Example-based learning in computer-aided
                                  STEM education . . . . . . . . . . . . . 70--80
         Andrew V. Goldberg and   
               Robert E. Tarjan   Efficient maximum flow algorithms  . . . 82--89
            Philip A. Bernstein   Getting consensus for data replication:
                                  technical perspective  . . . . . . . . . 92--92
               Peter Bailis and   
      Shivaram Venkataraman and   
        Michael J. Franklin and   
      Joseph M. Hellerstein and   
                     Ion Stoica   Last byte: Quantifying eventual
                                  consistency with PBS . . . . . . . . . . 93--102
                  Peter Winkler   Last byte: Puzzled: Paths and Matchings  104--104

Communications of the ACM
Volume 57, Number 9, September, 2014

                 Moshe Y. Vardi   Editor's Letter: Would Turing have
                                  passed the Turing Test?  . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Augmented reality . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Provenance of
                                  British computing  . . . . . . . . . . . 8--9
                     Philip Guo   BLOG@CACM: Refining students' coding and
                                  reviewing skills . . . . . . . . . . . . 10--11
               Samuel Greengard   News: Weathering a new era of big data   12--14
                    Neil Savage   News: The power of memory  . . . . . . . 15--17
                   Gregory Mone   News: The new digital medicine . . . . . 18--20
            Stefan Bechtold and   
                  Adrian Perrig   Law and technology: Accountability in
                                  future Internet architectures  . . . . . 21--23
                   Thomas Haigh   Historical reflections: We have never
                                  been digital . . . . . . . . . . . . . . 24--28
               Peter J. Denning   The profession of IT: Learning for the
                                  new digital age  . . . . . . . . . . . . 29--31
           Luke Muehlhauser and   
                   Bill Hibbard   Viewpoint: Exploratory engineering in
                                  artificial intelligence  . . . . . . . . 32--34
           John Leslie King and   
                  Paul F. Uhlir   Viewpoint: Soft infrastructure
                                  challenges to scientific knowledge
                                  discovery  . . . . . . . . . . . . . . . 35--37
                 Christoph Kern   Securing the tangled web . . . . . . . . 38--47
               Peter Bailis and   
                 Kyle Kingsbury   The network is reliable  . . . . . . . . 48--55
              Jon P. Daries and   
               Justin Reich and   
                  Jim Waldo and   
             Elise M. Young and   
      Jonathan Whittinghill and   
             Andrew Dean Ho and   
       Daniel Thomas Seaton and   
                   Isaac Chuang   Privacy, anonymity, and big data in the
                                  social sciences  . . . . . . . . . . . . 56--63
                  Cormac Herley   Security, cybercrime, and scale  . . . . 64--71
        Michail Tsikerdekis and   
               Sherali Zeadally   Online deception in social media . . . . 72--80
          Jean-Paul Laumond and   
            Nicolas Mansard and   
          Jean-Bernard Lasserre   Optimality in robot motion: optimal
                                  versus optimized motion  . . . . . . . . 82--89
                Alexei A. Efros   Portraiture in the age of big data:
                                  technical perspective  . . . . . . . . . 92--92
 Ira Kemelmacher-Shlizerman and   
              Eli Shechtman and   
                 Rahul Garg and   
                Steven M. Seitz   Moving portraits . . . . . . . . . . . . 93--99
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 102--102
               Marina Krakovsky   Last byte: Q&A: Finding themes  . . . . . 104--ff

Communications of the ACM
Volume 57, Number 10, October, 2014

                     John White   ACM's challenges and opportunities . . . 5--5
                 Vinton G. Cerf   Cerf's up: Unconventional computing  . . 7--7
                     CACM Staff   Letters to the Editor: Responsible
                                  programming not a technical issue  . . . 8--9
              John Langford and   
                   Mark Guzdial   BLOG@CACM: Finding a research job, and
                                  teaching CS in high school . . . . . . . 10--11
                     Don Monroe   News: Still seeking the optical
                                  transistor . . . . . . . . . . . . . . . 13--15
                    Neil Savage   News: Gradual evolution  . . . . . . . . 16--18
               Nidhi Subbaraman   News: Museums go high-tech with digital
                                  forensics  . . . . . . . . . . . . . . . 19--21
            Michael A. Cusumano   Technology strategy and management: The
                                  Bitcoin ecosystem  . . . . . . . . . . . 22--24
               Peter G. Neumann   Inside risks: Risks and myths of cloud
                                  computing and cloud storage  . . . . . . 25--27
         George V. Neville-Neil   Kode vicious: Outsourcing responsibility 28--29
              Phillip G. Armour   The business of software: Vendor: vidi,
                                  vici . . . . . . . . . . . . . . . . . . 30--31
                    Henry Lucas   Viewpoint: Disrupting and transforming
                                  the university . . . . . . . . . . . . . 32--35
              Edgar G. Daylight   Viewpoint: A Turing tale . . . . . . . . 36--38
                     Ben Laurie   Certificate transparency . . . . . . . . 40--46
                Axel Arnbak and   
               Hadi Asghari and   
           Michel Van Eeten and   
                  Nico Van Eijk   Security collapse in the HTTPS market    47--55
                Sharon Goldberg   Why is it taking so long to secure
                                  Internet routing?  . . . . . . . . . . . 56--63
                Hanan Samet and   
     Jagan Sankaranarayanan and   
       Michael D. Lieberman and   
           Marco D. Adelfio and   
           Brendan C. Fruin and   
          Jack M. Lotkowski and   
            Daniele Panozzo and   
               Jon Sperling and   
            Benjamin E. Teitler   Reading news with maps by exploiting
                                  spatial synonyms . . . . . . . . . . . . 64--77
          Denny Vrandeci\'c and   
           Markus Krötzsch   Wikidata: a free collaborative
                                  knowledgebase  . . . . . . . . . . . . . 78--85
              Martin Casado and   
                Nate Foster and   
                     Arjun Guha   Abstractions for software-defined
                                  networks . . . . . . . . . . . . . . . . 86--95
                   Bart Preneel   Attacking a problem from the middle:
                                  technical perspective  . . . . . . . . . 97--97
                 Itai Dinur and   
              Orr Dunkelman and   
              Nathan Keller and   
                     Adi Shamir   Dissection: a new paradigm for solving
                                  bicomposite search problems  . . . . . . 98--105
               Daniel H. Wilson   Last byte: Future Tense: Garden of Life  112--ff

Communications of the ACM
Volume 57, Number 11, November, 2014

              Alexander L. Wolf   Dealing with the deep, long-term
                                  challenges facing ACM (part I) . . . . . 5--5
                 Vinton G. Cerf   Heidelberg Laureate Forum II . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Accountability is
                                  no excuse for surveillance . . . . . . . 9--9
               Mark Guzdial and   
             Lawrence M. Fisher   BLOG@CACM: Teach the teachers, and
                                  contribute to humanity . . . . . . . . . 10--11
                    Gary Anthes   News: Researchers simplify parallel
                                  programming  . . . . . . . . . . . . . . 13--15
                   Esther Shein   News: Computing what fits  . . . . . . . 16--19
                   Logan Kugler   News: Keeping online reviews honest  . . 20--23
            Arvind Malhotra and   
           Marshall Van Alstyne   Economic and business dimensions: The
                                  dark side of the sharing economy \ldots
                                  and how to lighten it  . . . . . . . . . 24--27
               Pamela Samuelson   Legally speaking: Updates on the
                                  intellectual property front  . . . . . . 28--30
              Solon Barocas and   
               Helen Nissenbaum   Computing ethics: Big data's end run
                                  around procedural privacy protections    31--33
               Steve Cooper and   
              Shuchi Grover and   
               Mark Guzdial and   
                     Beth Simon   Education: A future for computing
                                  education research . . . . . . . . . . . 34--36
                   Susan Landau   Privacy and security: Summing up . . . . 37--39
                 Mark Klein and   
            Gregorio Convertino   Viewpoint: An embarrassment of riches    40--42
            Terrence August and   
              Robert August and   
                    Hyoduk Shin   Viewpoint: Designing user incentives for
                                  cybersecurity  . . . . . . . . . . . . . 43--46
                    Ellen Chisa   Evolution of the product manager . . . . 48--52
                       Alex Liu   JavaScript and the Netflix user
                                  interface  . . . . . . . . . . . . . . . 53--59
           John T. Richards and   
            Jonathan Brezin and   
            Calvin B. Swart and   
         Christine A. Halverson   A decade of progress in parallel
                                  programming productivity . . . . . . . . 60--66
              Stephen Gould and   
                      Xuming He   Scene understanding by labeling pixels   68--77
            Pasquale De Meo and   
             Emilio Ferrara and   
            Giacomo Fiumara and   
            Alessandro Provetti   On Facebook, most ties are weak  . . . . 78--84
                   Beryl Nelson   The data on diversity  . . . . . . . . . 86--95
            Szymon Rusinkiewicz   The intricate dance of fabric and light:
                                  technical perspective  . . . . . . . . . 97--97
                Shuang Zhao and   
               Wenzel Jakob and   
            Steve Marschner and   
                    Kavita Bala   Building volumetric appearance models of
                                  fabric using micro CT imaging  . . . . . 98--105
                  Dennis Shasha   Last byte: Upstart puzzles . . . . . . . 120--120

Communications of the ACM
Volume 57, Number 12, December, 2014

             Bobby Schnabel and   
                     John White   Pathways to computing careers  . . . . . 5--5
                 Vinton G. Cerf   Cerf's Up: Does innovation create or
                                  destroy jobs?  . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: On the
                                  significance of Turing's test  . . . . . 8--9
                   Mark Guzdial   BLOG@CACM: Meeting student and teacher
                                  needs in computing education . . . . . . 10--11
                  Chris Edwards   News: Decoding the language of human
                                  movement . . . . . . . . . . . . . . . . 12--14
                   Gregory Mone   News: Intelligent living . . . . . . . . 15--16
              Keith Kirkpatrick   News: Sensors for seniors  . . . . . . . 17--19
                     CACM Staff   News: ACM's Turing Award prize raised to
                                  \$1 million  . . . . . . . . . . . . . . 20--20
                Michael L. Best   Global computing: The Internet that
                                  Facebook built . . . . . . . . . . . . . 21--23
               Peter J. Denning   The profession of IT: The whole
                                  professional . . . . . . . . . . . . . . 24--27
              Telle Whitney and   
                 Elizabeth Ames   Broadening participation: Innovation and
                                  inclusion  . . . . . . . . . . . . . . . 28--30
         George V. Neville-Neil   Kode vicious: Port squatting . . . . . . 31--32
             Martin Naedele and   
                Rick Kazman and   
                   Yuanfang Cai   Viewpoint: Making the case for a
                                  ``manufacturing execution system'' for
                                  software development . . . . . . . . . . 33--36
                Erik Meijer and   
                  Vikram Kapoor   The responsive enterprise: embracing the
                                  hacker way . . . . . . . . . . . . . . . 38--43
                 David Chisnall   No such thing as a general-purpose
                                  processor  . . . . . . . . . . . . . . . 44--48
              Ivar Jacobson and   
                   Ed Seidewitz   A new software engineering . . . . . . . 49--54
             Stacy Marsella and   
                Jonathan Gratch   Computationally modeling human emotion   56--67
           Mark Silberstein and   
                 Bryan Ford and   
                 Emmett Witchel   GPUfs: the case for operating system
                                  services on GPUs . . . . . . . . . . . . 68--79
             N. R. Jennings and   
                  L. Moreau and   
               D. Nicholson and   
                S. Ramchurn and   
                 S. Roberts and   
                  T. Rodden and   
                      A. Rogers   Human-agent collectives  . . . . . . . . 80--88
             Stephen W. Keckler   Rethinking caches for throughput
                                  processors: technical perspective  . . . 90--90
          Timothy G. Rogers and   
              Mike O'Connor and   
                  Tor M. Aamodt   Learning your limit: managing massively
                                  multithreaded caches through scheduling  91--98
                   Gregory Mone   Last byte: Q&A: From Esterel to HipHop    120--ff


Communications of the ACM
Volume 58, Number 1, January, 2015

                 Moshe Y. Vardi   Editor's letter: The rise and fall of
                                  industrial research labs . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's Up: A long way to have come and
                                  still to go  . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Toward a map
                                  interface not inherently related to
                                  geography  . . . . . . . . . . . . . . . 8--9
                     CACM Staff   Letters to the Editor: ACM's FY14 annual
                                  report . . . . . . . . . . . . . . . . . 11--15
               Valerie Barr and   
            Michael Stonebraker   BLOG@CACM: A valuable lesson, and
                                  whither Hadoop?  . . . . . . . . . . . . 18--19
                Erica Klarreich   News: In search of Bayesian inference    21--24
               Samuel Greengard   News: Smart transportation networks
                                  drive gains  . . . . . . . . . . . . . . 25--27
                    Gary Anthes   News: Data brokers are watching you  . . 28--30
             Lawrence M. Fisher   News: Google Boosts ACM's Turing Award
                                  prize to \$1 million . . . . . . . . . . 31--31
            Michael A. Cusumano   Technology strategy and management: How
                                  traditional firms must compete in the
                                  sharing economy  . . . . . . . . . . . . 32--34
                 Lee A. Bygrave   Law and technology: A right to be
                                  forgotten? . . . . . . . . . . . . . . . 35--37
              Phillip G. Armour   The business of software: A little queue
                                  theory . . . . . . . . . . . . . . . . . 38--39
                   Thomas Haigh   Historical reflections: The tears of
                                  Donald Knuth . . . . . . . . . . . . . . 40--44
          Reza Rawassizadeh and   
            Blaine A. Price and   
                   Marian Petre   Viewpoint: Wearables: has the age of
                                  smartwatches finally arrived?  . . . . . 45--47
                 Hermann Maurer   Viewpoint: Does the Internet make us
                                  stupid?  . . . . . . . . . . . . . . . . 48--51
                  Silvio Micali   Viewpoint: What it means to receive the
                                  Turing award . . . . . . . . . . . . . . 52--53
                Rick Richardson   Disambiguating databases . . . . . . . . 54--61
           Geetanjali Sampemane   Internal access controls . . . . . . . . 62--65
                Davidlohr Bueso   Scalability techniques for practical
                                  synchronization primitives . . . . . . . 66--74
             Virender Singh and   
          Alicia Perdigones and   
    José Luis Garcia and   
Ignacio Cañas-Guerroro and   
    Fernando R. Mazarrón   Analyzing worldwide research in hardware
                                  architecture, 1997--2011 . . . . . . . . 76--85
            Tuukka Ruotsalo and   
             Giulio Jacucci and   
       Petri Myllymäki and   
                   Samuel Kaski   Interactive intent modeling: information
                                  discovery beyond search  . . . . . . . . 86--92
             Saket Navlakha and   
                 Ziv Bar-Joseph   Distributed information processing in
                                  biological and computational systems . . 94--102
                      Ravi Nair   Big data needs approximate computing:
                                  technical perspective  . . . . . . . . . 104--104
          Hadi Esmaeilzadeh and   
             Adrian Sampson and   
                  Luis Ceze and   
                    Doug Burger   Neural acceleration for general-purpose
                                  approximate programs . . . . . . . . . . 105--115
        William Sims Bainbridge   Last byte: Future tense: Wow!  . . . . . 128--ff

Communications of the ACM
Volume 58, Number 2, February, 2015

                 Moshe Y. Vardi   Editor's letter: Is information
                                  technology destroying the middle class?  5--5
                 Vinton G. Cerf   Cerf's up: There is nothing new under
                                  the sun  . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Software
                                  engineering, like electrical engineering 8--9
                   Mark Guzdial   BLOG@CACM: What's the best way to teach
                                  computer science to beginners? . . . . . 12--13
                    Neil Savage   News: Visualizing sound  . . . . . . . . 15--17
                   Logan Kugler   News: Online privacy: regional
                                  differences  . . . . . . . . . . . . . . 18--20
              Keith Kirkpatrick   News: Using technology to help people    21--23
                  Carl Landwehr   Privacy and security: We need a building
                                  code for building code . . . . . . . . . 24--26
                      Ming Zeng   Economic and business dimensions: Three
                                  paradoxes of building platforms  . . . . 27--29
               Peter G. Neumann   Inside risks: Far-sighted thinking about
                                  deleterious computer-related events  . . 30--33
                 Diana Franklin   Education: Putting the computer science
                                  in computing education research  . . . . 34--36
         George V. Neville-Neil   Kode vicious: Too big to fail  . . . . . 37--39
                Armando Fox and   
                David Patterson   Viewpoint: Do-it-yourself textbook
                                  publishing . . . . . . . . . . . . . . . 40--43
          Benjamin Livshits and   
             Manu Sridharan and   
         Yannis Smaragdakis and   
       Ondrej Lhoták and   
           J. Nelson Amaral and   
         Bor-Yuh Evan Chang and   
            Samuel Z. Guyer and   
            Uday P. Khedker and   
       Anders Mòller and   
          Dimitrios Vardoulakis   Viewpoint: In defense of soundiness: a
                                  manifesto  . . . . . . . . . . . . . . . 44--46
                   Harlan Stenn   Securing Network Time Protocol . . . . . 48--51
           Robert V. Binder and   
              Bruno Legeard and   
                    Anne Kramer   Model-based testing: where does it
                                  stand? . . . . . . . . . . . . . . . . . 52--56
                Carlos Juiz and   
                    Mark Toomey   To govern IT, or not to govern IT? . . . 58--64
              Dalal Alrajeh and   
                Jeff Kramer and   
           Alessandra Russo and   
              Sebastian Uchitel   Automated support for diagnosis and
                                  repair . . . . . . . . . . . . . . . . . 65--72
            Michael Walfish and   
             Andrew J. Blumberg   Verifying computations without
                                  reexecuting them . . . . . . . . . . . . 74--84
        Thomas A. Henzinger and   
    Jean-François Raskin   The equivalence problem for finite
                                  automata: technical perspective  . . . . 86--86
             Filippo Bonchi and   
                    Damien Pous   Hacking nondeterminism with induction
                                  and coinduction  . . . . . . . . . . . . 87--95
                  Dennis Shasha   Last byte: Upstart Puzzles: Take Your
                                  Seats  . . . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 58, Number 3, March, 2015

                   Wayne Graves   Raising ACM's Digital Library  . . . . . 5--5
                     CACM Staff   Letters to the Editor: Make abstracts
                                  communicate results  . . . . . . . . . . 6--6
                 Vinton G. Cerf   Letters to the Editor: `As we may think' 7--7
               Valerie Barr and   
                   Mark Guzdial   BLOG@CACM: Advice on teaching CS, and
                                  the learnability of programming
                                  languages  . . . . . . . . . . . . . . . 8--9
              Keith Kirkpatrick   News: Automating organic synthesis . . . 13--15
                     Tom Geller   News: Car talk . . . . . . . . . . . . . 16--18
                   Esther Shein   News: Python for beginners . . . . . . . 19--21
               Pamela Samuelson   Legally speaking: Copyrightability of
                                  Java APIs revisited  . . . . . . . . . . 22--24
              Thomas J. Cortina   Broadening participation: Reaching a
                                  broader population of students through
                                  ``unplugged'' activities . . . . . . . . 25--27
           Peter J. Denning and   
               Edward E. Gordon   The profession of IT: A technician
                                  shortage . . . . . . . . . . . . . . . . 28--30
               John Leslie King   Computing ethics: Humans in computing:
                                  growing responsibilities for researchers 31--33
      Shriram Krishnamurthi and   
                      Jan Vitek   Viewpoint: The real software crisis:
                                  repeatability as a core value  . . . . . 34--36
           Maarten Bullynck and   
          Edgar G. Daylight and   
                Liesbeth De Mol   Viewpoint: Why did computer science make
                                  a hero out of Turing?  . . . . . . . . . 37--39
              Poul-Henning Kamp   HTTP\slash 2.0: the IETF is phoning it
                                  in . . . . . . . . . . . . . . . . . . . 40--42
                      Dave Long   META II: digital vellum in the digital
                                  scriptorium  . . . . . . . . . . . . . . 43--48
            Stephen J. Andriole   Who owns IT? . . . . . . . . . . . . . . 50--57
     Ashwin Machanavajjhala and   
                   Daniel Kifer   Designing statistical privacy for your
                                  data . . . . . . . . . . . . . . . . . . 58--67
                 Timothy Libert   Privacy implications of health
                                  information seeking on the web . . . . . 68--77
                 Edward Adelson   Image processing goes back to basics:
                                  technical perspective  . . . . . . . . . 80--80
              Sylvain Paris and   
         Samuel W. Hasinoff and   
                      Jan Kautz   Local Laplacian filters: edge-aware
                                  image processing with a Laplacian
                                  pyramid  . . . . . . . . . . . . . . . . 81--91
                  Leah Hoffmann   Last byte: Object Lessons: Q&A  . . . . . 96--ff

Communications of the ACM
Volume 58, Number 4, April, 2015

          Joseph A. Konstan and   
               Jack W. Davidson   Charting the future: scholarly
                                  publishing in CS . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   The human touch  . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Human or machine? 8--9
              John Langford and   
                   Mark Guzdial   BLOG@CACM: The arbitrariness of reviews,
                                  and advice for school administrators . . 12--13
                    Alex Wright   News: Molecular moonshots  . . . . . . . 15--17
                  Chris Edwards   News: Secure-system designers strive to
                                  stem data leaks  . . . . . . . . . . . . 18--20
                 Mark Broderick   News: What's the price now?  . . . . . . 21--23
             Dorothy E. Denning   Privacy and security: Toward more secure
                                  software . . . . . . . . . . . . . . . . 24--26
                      Mari Sako   Technology strategy and management:
                                  Competing in emerging markets  . . . . . 27--29
         George V. Neville-Neil   Kode Vicious: Raw networking . . . . . . 30--32
                    Len Shustek   Interview: An interview with Juris
                                  Hartmanis  . . . . . . . . . . . . . . . 33--37
                 Leslie Lamport   Viewpoint: Who builds a house without
                                  drawing blueprints?  . . . . . . . . . . 38--41
                     Paul Vixie   Go static or go home . . . . . . . . . . 42--45
            Neil J. Gunther and   
                Paul Puglia and   
            Kristofer Tomasette   Hadoop superlinear scalability . . . . . 46--55
            Philip R. Cohen and   
           Edward C. Kaiser and   
        M. Cecelia Buchanan and   
                 Scott Lind and   
        Michael J. Corrigan and   
             R. Matthews Wesson   Sketch-Thru-Plan: a multimodal interface
                                  for command and control  . . . . . . . . 56--65
             Chris Newcombe and   
                   Tim Rath and   
                  Fan Zhang and   
            Bogdan Munteanu and   
               Marc Brooker and   
              Michael Deardeuff   How Amazon web services uses formal
                                  methods  . . . . . . . . . . . . . . . . 66--73
        Johannes Sametinger and   
            Jerzy Rozenblit and   
              Roman Lysecky and   
                      Peter Ott   Security challenges for medical devices  74--82
                   Trevor Mudge   The specialization trend in computer
                                  hardware: technical perspective  . . . . 84--84
             Wajahat Qadeer and   
               Rehan Hameed and   
               Ofer Shacham and   
         Preethi Venkatesan and   
         Christos Kozyrakis and   
                  Mark Horowitz   Convolution engine: balancing efficiency
                                  and flexibility in specialized computing 85--93
          David Allen Batchelor   Last byte: Future tense  . . . . . . . . 96--ff

Communications of the ACM
Volume 58, Number 5, May, 2015

                 Moshe Y. Vardi   Incentivizing quality and impact in
                                  computing research . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cascade failure  . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Abolish software
                                  warranty disclaimers . . . . . . . . . . 8--9
                 Joel Adams and   
                 Daniel A. Reed   BLOG@CACM: Introducing young women to
                                  CS, and supporting advanced research
                                  environments . . . . . . . . . . . . . . 10--11
                   Logan Kugler   News: Is ``good enough'' computing good
                                  enough?  . . . . . . . . . . . . . . . . 12--14
              Keith Kirkpatrick   News: Putting the data science into
                                  journalism . . . . . . . . . . . . . . . 15--17
                   Gregory Mone   News: Robots with a human touch  . . . . 18--19
            Michael Schrage and   
           Marshall Van Alstyne   Economic and business dimensions: Life
                                  of IP  . . . . . . . . . . . . . . . . . 20--23
                  Sally Fincher   Education: What are we doing when we
                                  teach computing in schools?  . . . . . . 24--26
       Christopher Jon Sprigman   Law and technology: Oracle v. Google: a
                                  high-stakes legal fight for the software
                                  industry . . . . . . . . . . . . . . . . 27--29
                Thomas Ball and   
                  Benjamin Zorn   Viewpoint: Teach foundational language
                                  principles . . . . . . . . . . . . . . . 30--31
            Serge Abiteboul and   
      Benjamin André and   
                  Daniel Kaplan   Viewpoint: Managing your digital life    32--35
                  Justin Sheehy   There is no now  . . . . . . . . . . . . 36--41
                Spencer Rathbun   Parallel processing with promises  . . . 42--47
           Sören Preibusch   Privacy behaviors after Snowden  . . . . 48--55
                 Roli Varma and   
                   Deepak Kapur   Decoding femininity in computer science
                                  in India . . . . . . . . . . . . . . . . 56--62
          Jean-Paul Laumond and   
            Nicolas Mansard and   
          Jean Bernard Lasserre   Optimization as motion selection
                                  principle in robot action  . . . . . . . 64--74
                    James Larus   Programming multicore computers:
                                  technical perspective  . . . . . . . . . 76--76
            Nadathur Satish and   
               Changkyu Kim and   
             Jatin Chhugani and   
               Hideki Saito and   
         Rakesh Krishnaiyer and   
        Mikhail Smelyanskiy and   
              Milind Girkar and   
                  Pradeep Dubey   Can traditional programming bridge the
                                  ninja performance gap for parallel
                                  computing applications?  . . . . . . . . 77--86
                  Dennis Shasha   Last byte: Upstart Puzzles: Strategic
                                  Friendship . . . . . . . . . . . . . . . 88--88

Communications of the ACM
Volume 58, Number 6, June, 2015

                     John White   Thank you\ldots  . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   A celebration of accomplishments . . . . 7--7
                     CACM Staff   Letters to the Editor: To learn CS
                                  principles, start in the cafeteria line  8--9
                   Mark Guzdial   BLOG@CACM: Bringing evidence-based
                                  education to CS  . . . . . . . . . . . . 10--11
                    Neil Savage   News: Plenty of proteins . . . . . . . . 12--14
               Samuel Greengard   News: Between the lines  . . . . . . . . 15--17
                    Gary Anthes   News: Estonia: a model for e-government  18--20
                 Andreas Reuter   News: Klaus Tschira: 1940--2015  . . . . 21--21
                    Neil Savage   News: Forging relationships  . . . . . . 22--23
                   Vishal Misra   Inside risks: Routing money, not packets 24--27
               Peter J. Denning   The profession of IT: Emergent
                                  innovation . . . . . . . . . . . . . . . 28--31
         George V. Neville-Neil   Kode vicious: Lazarus code . . . . . . . 32--33
                 Meg Leta Jones   Viewpoint: Forgetting made (too) easy    34--35
        Yannis Papakonstantinou   Viewpoint: Created computed universe . . 36--38
                 Vinton G. Cerf   Interview: An interview with U.S. chief
                                  technology officer Megan Smith . . . . . 39--43
                Kate Matsudaira   The science of managing data science . . 44--47
    Stepán Davidovic and   
                 Kavita Guliani   Reliable Cron across the planet  . . . . 48--53
              Reza Zafarani and   
                       Huan Liu   Evaluation without ground truth in
                                  social media research  . . . . . . . . . 54--60
                Kurt Jensen and   
             Lars M. Kristensen   Colored Petri nets: a graphical language
                                  for formal modeling and validation of
                                  concurrent systems . . . . . . . . . . . 61--70
                 Leslie Lamport   Turing lecture: The computer science of
                                  concurrency: the early years . . . . . . 71--76
                Mark Berman and   
             Piet Demeester and   
                Jae Woo Lee and   
             Kiran Nagaraja and   
               Michael Zink and   
               Didier Colle and   
     Dilip Kumar Krishnappa and   
      Dipankar Raychaudhuri and   
        Henning Schulzrinne and   
                Ivan Seskar and   
                  Sachin Sharma   Future Internets escape the simulator    78--89
               Patrick Baudisch   Virtual reality in your living room:
                                  technical perspective  . . . . . . . . . 92--92
             Brett R. Jones and   
               Hrvoje Benko and   
                  Eyal Ofek and   
               Andrew D. Wilson   IllumiRoom: immersive experiences beyond
                                  the TV screen  . . . . . . . . . . . . . 93--100
                  Leah Hoffmann   Last byte: Q&A: The Path to Clean Data    104--ff

Communications of the ACM
Volume 58, Number 7, July, 2015

              Alexander L. Wolf   A new Chief Executive Officer and
                                  Executive Director of ACM  . . . . . . . 4--5
                 Vinton G. Cerf   Cerf's up: Milestones  . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Quality vs.
                                  quantity in faculty publications . . . . 8--9
              John Arquilla and   
                Duncan A. Buell   BLOG@CACM: The dangers of military
                                  robots, the risks of online voting . . . 12--13
                  Chris Edwards   News: Growing pains for deep learning    14--16
                   Gregory Goth   News: Bringing big data to the big tent  17--19
                   Gregory Mone   News: The new smart cities . . . . . . . 20--21
             Lawrence M. Fisher   News: ACM announces 2014 award
                                  recipients . . . . . . . . . . . . . . . 22--23
               Pamela Samuelson   Legally speaking: Anti-circumvention
                                  rules limit reverse engineering  . . . . 24--26
                   L. Jean Camp   Computing ethics: Respecting people and
                                  respecting privacy . . . . . . . . . . . 27--28
                 David Anderson   Historical reflections: Preserving the
                                  digital record of computing history  . . 29--31
              Phillip G. Armour   The business of software: An updated
                                  software almanac . . . . . . . . . . . . 32--34
            Juan E. Gilbert and   
     Jerlando F. L. Jackson and   
      Edward C. Dillon, Jr. and   
            LaVar J. Charleston   Broadening participation: African
                                  Americans in the U.S. computing sciences
                                  workforce  . . . . . . . . . . . . . . . 35--38
                Vijay Kumar and   
                Thomas A. Kalil   Viewpoint: The future of computer
                                  science and engineering is in your hands 39--41
                   Andrew Brook   Low-latency distributed applications in
                                  finance  . . . . . . . . . . . . . . . . 42--50
             Phelim Dowling and   
                  Kevin McGrath   Using free and open source tools to
                                  manage software quality  . . . . . . . . 51--55
             Daniel A. Reed and   
                  Jack Dongarra   Exascale computing and big data  . . . . 56--68
        Alexander Hogenboom and   
          Flavius Frasincar and   
          Franciska de Jong and   
                    Uzay Kaymak   Using rhetorical structure in sentiment
                                  analysis . . . . . . . . . . . . . . . . 69--77
             Joseph Bonneau and   
              Cormac Herley and   
       Paul C. van Oorschot and   
                  Frank Stajano   Passwords and the evolution of imperfect
                                  authentication . . . . . . . . . . . . . 78--87
                 Stuart Russell   Unifying logic and probability . . . . . 88--97
             William D. Clinger   The simplicity of cache efficient
                                  functional algorithms: technical
                                  perspective  . . . . . . . . . . . . . . 100--100
            Guy E. Blelloch and   
                  Robert Harper   Cache efficient functional algorithms    101--108
                    Brian Clegg   Last byte: Future Tense: Toy Box Earth   112--ff

Communications of the ACM
Volume 58, Number 8, August, 2015

                 Moshe Y. Vardi   Editor's Letter: Why doesn't ACM have a
                                  SIG for theoretical computer science?    5--5
                 Vinton G. Cerf   Cerf's up: Invention . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Not so easy to
                                  forget . . . . . . . . . . . . . . . . . 8--9
                   Mark Guzdial   BLOG@CACM: Plain talk on computing
                                  education  . . . . . . . . . . . . . . . 10--11
                   Esther Shein   News: Teaching computers with illusions  13--15
                   Logan Kugler   News: Touching the virtual . . . . . . . 16--18
              Keith Kirkpatrick   News: The moral challenges of driverless
                                  cars . . . . . . . . . . . . . . . . . . 19--20
                 David Kotz and   
                   Kevin Fu and   
                Carl Gunter and   
                      Avi Rubin   Privacy and security: Security for
                                  mobile and cloud frontiers in healthcare 21--23
           Henry Chesbrough and   
           Marshall Van Alstyne   Economic and business dimensions:
                                  Permissionless innovation  . . . . . . . 24--26
         George V. Neville-Neil   Kode Vicious: Hickory dickory doc  . . . 27--28
          Susanne Hambrusch and   
        Ran Libeskind-Hadas and   
                     Eric Aaron   Education: Understanding the U.S.
                                  domestic computer science Ph.D. pipeline 29--32
              Leen-Kiat Soh and   
             Duane F. Shell and   
         Elizabeth Ingraham and   
             Stephen Ramsay and   
                    Brian Moore   Viewpoint: Learning through
                                  computational creativity . . . . . . . . 33--35
               Arie van Deursen   Testing web applications with state
                                  objects  . . . . . . . . . . . . . . . . 36--43
                 Daniel C. Wang   From the EDVAC to WEBVACs  . . . . . . . 44--51
          Beno\^\it Valiron and   
               Neil J. Ross and   
             Peter Selinger and   
         D. Scott Alexander and   
              Jonathan M. Smith   Programming the quantum future . . . . . 52--61
        Petra Saskia Bayerl and   
                   Babak Akhgar   Surveillance and falsification
                                  implications for open source
                                  intelligence investigations  . . . . . . 62--69
             Rua-Huan Tsaih and   
               David C. Yen and   
                 Yu-Chien Chang   Challenges deploying complex
                                  technologies in a traditional
                                  organization . . . . . . . . . . . . . . 70--75
        Thanassis Tiropanis and   
                 Wendy Hall and   
              Jon Crowcroft and   
          Noshir Contractor and   
             Leandros Tassiulas   Network science, web science, and
                                  Internet science . . . . . . . . . . . . 76--82
           Aniket (Niki) Kittur   Corralling crowd power: technical
                                  perspective  . . . . . . . . . . . . . . 84--84
       Michael S. Bernstein and   
                Greg Little and   
           Robert C. Miller and   
        Björn Hartmann and   
           Mark S. Ackerman and   
            David R. Karger and   
              David Crowell and   
               Katrina Panovich   Soylent: a word processor with a crowd
                                  inside . . . . . . . . . . . . . . . . . 85--94
                  Dennis Shasha   Last byte: Upstart puzzles . . . . . . . 96--96

Communications of the ACM
Volume 58, Number 9, September, 2015

          Joseph A. Konstan and   
               Jack W. Davidson   Should conferences meet journals and
                                  where? A proposal for `PACM' . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: On (computing) artifacts  . . 7--7
                     CACM Staff   Letters to the Editor: May the
                                  computational force be with you  . . . . 8--9
                  John Arquilla   BLOG@CACM: Moving beyond the cold war    10--11
                    Neil Savage   News: Split second . . . . . . . . . . . 12--14
                   Gregory Mone   News: Sensing emotions . . . . . . . . . 15--16
                   Logan Kugler   News: New news aggregator apps . . . . . 17--19
               Thomas Haigh and   
                 Mark Priestley   Historical reflections: Innovators
                                  assemble: Ada Lovelace, Walter Isaacson,
                                  and the superheroines of computing . . . 20--27
              Joe Karaganis and   
                 Jennifer Urban   Law and technology: The rise of the robo
                                  notice . . . . . . . . . . . . . . . . . 28--30
                Dorothea Kleine   Global computing: The value of social
                                  theories for global computing  . . . . . 31--33
               Peter J. Denning   The profession of IT: Automated
                                  education and the professional . . . . . 34--36
              Jeffrey D. Ullman   Viewpoint: Experiments as research
                                  validation: have we gone too far?  . . . 37--39
           Michael Mitzenmacher   Viewpoint: Theory without experiments:
                                  have we gone too far?  . . . . . . . . . 40--42
            Kathryn S. McKinley   Point/Counterpoint: The pros and cons of
                                  the 'PACM' proposal: point . . . . . . . 43--44
             David S. Rosenblum   Point/Counterpoint: The pros and cons of
                                  the 'PACM' proposal: counterpoint  . . . 44--45
               Spence Green and   
               Jeffrey Heer and   
         Christopher D. Manning   Natural language translation at the
                                  intersection of AI and HCI . . . . . . . 46--53
                  Philip Maddox   Testing a distributed system . . . . . . 54--58
        Simha Sethumadhavan and   
               Adam Waksman and   
             Matthew Suozzo and   
               Yipeng Huang and   
                   Julianna Eum   Trustworthy hardware from untrusted
                                  components . . . . . . . . . . . . . . . 60--71
             Ignacio Laguna and   
                Dong H. Ahn and   
      Bronis R. de Supinski and   
               Todd Gamblin and   
             Gregory L. Lee and   
              Martin Schulz and   
             Saurabh Bagchi and   
            Milind Kulkarni and   
                 Bowen Zhou and   
                Zhezhe Chen and   
                       Feng Qin   Debugging high-performance computing
                                  applications at massive scales . . . . . 72--81
         Tanmoy Chakraborty and   
            Suhansanu Kumar and   
                Pawan Goyal and   
              Niloy Ganguly and   
              Animesh Mukherjee   On the categorization of scientific
                                  citation profiles in computer science    82--90
               Ernest Davis and   
                    Gary Marcus   Commonsense reasoning and commonsense
                                  knowledge in artificial intelligence . . 92--103
                     Aviv Zohar   Bitcoin: under the hood  . . . . . . . . 104--113
                     Marc Alexa   A woodworker's easy fix: technical
                                  perspective  . . . . . . . . . . . . . . 115--115
          Nobuyuki Umentani and   
             Takeo Igarashi and   
                 Niloy J. Mitra   Guided exploration of physically valid
                                  shapes for furniture design  . . . . . . 116--124
                  Leah Hoffmann   Last byte: Q&A: A Passion for Pairings    128--ff

Communications of the ACM
Volume 58, Number 10, October, 2015

                 Moshe Y. Vardi   What can be done about gender diversity
                                  in computing?: a lot!  . . . . . . . . . 5--5
                 Vinton G. Cerf   The Third Heidelberg Laureate Forum  . . 7--7
                     CACM Staff   Letters to the Editor: Ban `naked'
                                  braces!  . . . . . . . . . . . . . . . . 10--11
              John Arquilla and   
                 Daniel A. Reed   BLOG@CACM: The morality of online war;
                                  the fates of data analytics, HPC . . . . 12--13
                    Gary Anthes   News: Scientists update views of light   15--17
               Samuel Greengard   News: Automotive systems get smarter . . 18--20
              Keith Kirkpatrick   News: Cyber policies on the rise . . . . 21--23
       Harold `Hal' Abelson and   
              Ross Anderson and   
         Steven M. Bellovin and   
               Josh Benaloh and   
                 Matt Blaze and   
    Whitfield `Whit' Diffie and   
               John Gilmore and   
              Matthew Green and   
               Susan Landau and   
           Peter G. Neumann and   
           Ronald L. Rivest and   
        Jeffrey I. Schiller and   
             Bruce Schneier and   
         Michael A. Specter and   
             Daniel J. Weitzner   Inside risks: Keys under doormats  . . . 24--26
            Michael A. Cusumano   Technology strategy and management: In
                                  defense of IBM . . . . . . . . . . . . . 27--28
         George V. Neville-Neil   Kode Vicious: Storming the cubicle . . . 29--31
              Phillip G. Armour   The business of software: Thinking
                                  thoughts . . . . . . . . . . . . . . . . 32--34
                 Thomas J. Misa   Historical reflections: Computing is
                                  history  . . . . . . . . . . . . . . . . 35--37
       Thomas G. Dietterich and   
                Eric J. Horvitz   Viewpoint: Rise of concerns about AI:
                                  reflections and directions . . . . . . . 38--40
            Phillip Compeau and   
               Pavel A. Pevzner   Viewpoint: Life after MOOCs  . . . . . . 41--44
               T. S. Pillai and   
             V. Chidambaram and   
               R. Alagappan and   
              S. Al-Kiswany and   
       A. C. Arpaci-Dusseau and   
           R. H. Arpaci-Dusseau   Crash consistency  . . . . . . . . . . . 46--51
                    Rich Harris   Dismantling the barriers to entry  . . . 52--57
            Joan Feigenbaum and   
                     Bryan Ford   Seeking anonymity in an Internet
                                  panopticon . . . . . . . . . . . . . . . 58--69
              Patricia Lago and   
  Sedef Akinli Koçak and   
             Ivica Crnkovic and   
           Birgit Penzenstadler   Framing sustainability as a property of
                                  software quality . . . . . . . . . . . . 70--78
                  Eleazar Eskin   Discovering genes involved in disease
                                  and the mystery of missing heritability  80--87
                    Cleve Moler   Technical Perspective: Not just a matrix
                                  laboratory anymore . . . . . . . . . . . 90--90
             Lloyd N. Trefethen   Computing numerically with functions
                                  instead of numbers . . . . . . . . . . . 91--97
        William Sims Bainbridge   Last byte: Future Tense: Processional    104--ff

Communications of the ACM
Volume 58, Number 11, November, 2015

                 Bobby Schnabel   A tale of ACM visions  . . . . . . . . . 5--5
                 Vinton G. Cerf   Memory with a twist  . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Who will read
                                  PACM?  . . . . . . . . . . . . . . . . . 8--9
               Valerie Barr and   
            Michael Stonebraker   BLOG@CACM: How men can help women in CS;
                                  winning `computing's Nobel prize'  . . . 10--11
                    Alex Wright   News: Algorithmic authors  . . . . . . . 12--14
                   Esther Shein   News: Companies proactively seek out
                                  internal threats . . . . . . . . . . . . 15--17
                  Chris Edwards   News: Brain science helps computers
                                  separate speakers in a crowded room  . . 18--20
                     CACM Staff   News: John H. Holland 1929--2015 . . . . 21--21
               Steven B. Lipner   Privacy and security: Security assurance 24--26
               Pamela Samuelson   Legally speaking: Software patents are
                                  falling down . . . . . . . . . . . . . . 27--29
        Muhammad Zia Hydari and   
               Rahul Telang and   
             William M. Marella   Economic and business dimensions:
                                  Electronic health records and patient
                                  safety . . . . . . . . . . . . . . . . . 30--32
            Pratim Sengupta and   
              Amanda Dickes and   
            Amy Voss Farris and   
               Ashlyn Karan and   
               David Martin and   
                   Mason Wright   Education: Programming in K--12 science
                                  classrooms . . . . . . . . . . . . . . . 33--35
                    Len Shustek   Interview: An interview with Fred Brooks 36--40
            Rafael A. Calvo and   
              Dorian Peters and   
                 Sidney D'Mello   Viewpoints: When technologies manipulate
                                  our emotions . . . . . . . . . . . . . . 41--42
                     Ben Maurer   Fail at scale  . . . . . . . . . . . . . 44--49
                 Tyler Mcmullen   It probably works  . . . . . . . . . . . 50--54
                  Taylor Savage   Componentizing the web . . . . . . . . . 55--61
               Dafna Shahaf and   
            Carlos Guestrin and   
               Eric Horvitz and   
                  Jure Leskovec   Information cartography  . . . . . . . . 62--73
                So-Hyun Lee and   
                  Hee-Woong Kim   Why people post benevolent and malicious
                                  comments online  . . . . . . . . . . . . 74--79
                 Chenyan Xu and   
                    Yang Yu and   
                 Chun-Keung Hoi   Hidden in-game intelligence in NBA
                                  players' tweets  . . . . . . . . . . . . 80--89
              Sumit Gulwani and   
José Hernández-Orallo and   
         Emanuel Kitzelmann and   
       Stephen H. Muggleton and   
                 Ute Schmid and   
                  Benjamin Zorn   Inductive programming meets the real
                                  world  . . . . . . . . . . . . . . . . . 90--99
            Frédo Durand   Technical Perspective: The Path to Light
                                  Transport  . . . . . . . . . . . . . . . 102--102
               Wenzel Jakob and   
                Steve Marschner   Geometric tools for exploring manifolds
                                  of light transport paths . . . . . . . . 103--111
                George Varghese   Technical Perspective: Treating Networks
                                  Like Programs  . . . . . . . . . . . . . 112--112
             Mihai Dobrescu and   
              Katerina Argyraki   Software dataplane verification  . . . . 113--121
                  Dennis Shasha   Last byte: Upstart Puzzles: Auction
                                  Triplets . . . . . . . . . . . . . . . . 136--136

Communications of the ACM
Volume 58, Number 12, December, 2015

                 Moshe Y. Vardi   On lethal autonomous weapons . . . . . . 5--5
                 Vinton G. Cerf   Advancing the ACM agenda . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: What about
                                  statistical relational learning? . . . . 8--9
             Moshe Y. Vardi and   
                   Mark Guzdial   BLOG@CACM: What do we do when the jobs
                                  are gone, and why we must embrace active
                                  learning . . . . . . . . . . . . . . . . 10--11
                     Don Monroe   News: When data is not enough  . . . . . 12--14
                   Gregory Mone   News: The hyper-intelligent bandage  . . 15--16
              Keith Kirkpatrick   News: Technology brings online education
                                  in line with campus programs . . . . . . 17--19
                 David Anderson   Historical reflections: The digital dark
                                  age  . . . . . . . . . . . . . . . . . . 20--23
           Peter J. Denning and   
                   Nicholas Dew   The profession of IT: Why our theories
                                  of innovation fail us  . . . . . . . . . 24--26
                    Nancy Tuana   Computing ethics: Coupled
                                  ethical-epistemic analysis in teaching
                                  ethics . . . . . . . . . . . . . . . . . 27--29
         George V. Neville-Neil   Kode vicious: Pickled patches  . . . . . 30--32
          Richard E. Ladner and   
             Sheryl Burgstahler   Broadening participation: Increasing the
                                  participation of individuals with
                                  disabilities in computing  . . . . . . . 33--36
               Jeremy Scott and   
                     Alan Bundy   Viewpoint: Creating a new generation of
                                  computational thinkers . . . . . . . . . 37--40
                  Cory Doctorow   Viewpoint: I can't let you do that, Dave 41--42
                  Stephen Goose   Point/Counterpoint: The case for banning
                                  killer robots: point . . . . . . . . . . 43--45
                   Ronald Arkin   Point/Counterpoint: The case for banning
                                  killer robots: counterpoint  . . . . . . 46--47
             Olivia Angiuli and   
             Joe Blitzstein and   
                      Jim Waldo   How to de-identify your data . . . . . . 48--55
                Kate Matsudaira   Lean software development: building and
                                  shipping two versions  . . . . . . . . . 56--58
                Fabien Gaud and   
            Baptiste Lepers and   
             Justin Funston and   
            Mohammad Dashti and   
         Alexandra Fedorova and   
        Vivien Quéma and   
            Renaud Lachaize and   
                      Mark Roth   Challenges of memory management on
                                  modern NUMA systems  . . . . . . . . . . 59--66
           Andrea Ballatore and   
             Michela Bertolotto   Personalizing maps . . . . . . . . . . . 68--74
                  Philip Wadler   Propositions as types  . . . . . . . . . 75--84
                 Soumya Sen and   
            Carlee Joe-Wong and   
                 Sangtae Ha and   
                    Mung Chiang   Smart data pricing: using economics to
                                  manage network congestion  . . . . . . . 86--93
               Robert Kraut and   
                    Moira Burke   Internet use and psychological
                                  well-being: effects of activity and
                                  audience . . . . . . . . . . . . . . . . 94--100
                   Noah Snavely   Technical Perspective: Paris Beyond
                                  Frommer's  . . . . . . . . . . . . . . . 102--102
               Carl Doersch and   
              Saurabh Singh and   
              Abhinav Gupta and   
                Josef Sivic and   
                Alexei A. Efros   What makes Paris look like Paris?  . . . 103--110
                    David Maier   Technical Perspective: In-Situ Database
                                  Management . . . . . . . . . . . . . . . 111--111
         Ioannis Alagiannis and   
      Renata Borovica-Gajic and   
              Miguel Branco and   
             Stratos Idreos and   
             Anastasia Ailamaki   NoDB: efficient query execution on raw
                                  data files . . . . . . . . . . . . . . . 112--121
                  Leah Hoffmann   Last byte: Q&A: Redefining Architectures  136--ff


Communications of the ACM
Volume 59, Number 1, January, 2016

                 Mark R. Nelson   Focusing on teacher needs in K--12 CS
                                  education  . . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   On the road in Latin America . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Let the liable
                                  pay  . . . . . . . . . . . . . . . . . . 8--9
                 Vinton G. Cerf   Letters to the Editor: ACM's 2016
                                  general election . . . . . . . . . . . . 10--10
              Alexander L. Wolf   Letters to the Editor: ACM's annual
                                  report for FY15  . . . . . . . . . . . . 11--16
              John Arquilla and   
                  Joel C. Adams   BLOG@CACM: Controlling cyber arms, and
                                  creating new LEGOs . . . . . . . . . . . 18--19
                    Neil Savage   News: Seeing more clearly  . . . . . . . 20--22
               Samuel Greengard   News: Better memory  . . . . . . . . . . 23--25
                   Esther Shein   News: Preserving the internet  . . . . . 26--28
                     CACM Staff   News: Gene Amdahl, 1922--2015  . . . . . 29--29
           Jonathan T. Weinberg   Law and technology: Biometric identity   30--32
        Michael A. Cusumano and   
                David B. Yoffie   Technology strategy and management:
                                  Extrapolating from Moore's law . . . . . 33--35
              Phillip G. Armour   The business of software: The chaos
                                  machine  . . . . . . . . . . . . . . . . 36--38
               Thomas Haigh and   
                 Mark Priestley   Historical reflections: Where code comes
                                  from: architectures of automatic control
                                  from Babbage to Algol  . . . . . . . . . 39--44
                 Gio Wiederhold   Viewpoint: Unbalanced data leads to
                                  obsolete economic advice . . . . . . . . 45--46
                    Yoav Shoham   Viewpoint: Why knowledge representation
                                  matters  . . . . . . . . . . . . . . . . 47--49
         George V. Neville-Neil   Time is an illusion lunchtime doubly so  50--55
             Mihir Nanavati and   
          Malte Schwarzkopf and   
                 Jake Wires and   
                Andrew Warfield   Non-volatile storage . . . . . . . . . . 56--63
                    Pat Helland   Immutability changes everything  . . . . 64--70
             Shashi Shekhar and   
           Steven K. Feiner and   
                  Walid G. Aref   Spatial computing  . . . . . . . . . . . 72--81
                Melissa Lee and   
            Esteve Almirall and   
               Jonathan Wareham   Open data and civic apps:
                                  first-generation failures,
                                  second-generation improvements . . . . . 82--89
             Lazaros Goutas and   
            Juliana Sutanto and   
              Hassan Aldarbesti   The building blocks of a cloud strategy:
                                  evidence from three SaaS providers . . . 90--97
             Ioannis Koutis and   
                  Ryan Williams   Algebraic fingerprints for faster
                                  algorithms . . . . . . . . . . . . . . . 98--105
                     Steve Hand   Technical Perspective: High-performance
                                  virtualization: are we done? . . . . . . 107--107
                 Nadav Amit and   
                Abel Gordon and   
               Nadav Har'El and   
            Muli Ben-Yehuda and   
                Alex Landau and   
             Assaf Schuster and   
                    Dan Tsafrir   Bare-metal performance for virtual
                                  machines with exitless interrupts  . . . 108--116
                      Tova Milo   Technical Perspective: Enlisting the
                                  power of the crowd . . . . . . . . . . . 117--117
           Beth Trushkowsky and   
                 Tim Kraska and   
        Michael J. Franklin and   
              Purnamrita Sarkar   Answering enumeration queries with the
                                  crowd  . . . . . . . . . . . . . . . . . 118--127
                  Dennis Shasha   Last byte: Upstart Puzzles: Ice Trap . . 136--136

Communications of the ACM
Volume 59, Number 2, February, 2016

                 Moshe Y. Vardi   Editor's Letter: The moral hazard of
                                  complexity-theoretic assumptions . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Apps and the Web  . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Expect
                                  `ungoverned actors' to use AI-supported
                                  weapons, too . . . . . . . . . . . . . . 8--9
                   Mark Guzdial   BLOG@CACM: Drumming up support for AP CS
                                  principles . . . . . . . . . . . . . . . 12--13
                  Chris Edwards   News: Self-repair techniques point to
                                  robots that design themselves  . . . . . 15--17
                   Logan Kugler   News: How a supervillain (or a hacker in
                                  his basement) could destroy the Internet 18--20
                     Tom Geller   News: In privacy law, it's the U.S. vs.
                                  the world  . . . . . . . . . . . . . . . 21--23
                     CACM Staff   News: ACM inducts Fellows  . . . . . . . 24--24
             Peter C. Evans and   
                Rahul C. Basole   Economic and business dimensions:
                                  Revealing the API ecosystem and
                                  enterprise strategy via visual analytics 26--28
                  Carl Landwehr   Privacy and security: Privacy research
                                  directions . . . . . . . . . . . . . . . 29--31
                Rick Adrion and   
                 Renee Fall and   
            Barbara Ericson and   
                   Mark Guzdial   Education: Broadening access to
                                  computing education state by state . . . 32--34
         George V. Neville-Neil   Kode Vicious: Code hoarding  . . . . . . 35--36
             Satish Chandra and   
       Suresh Thummalapenta and   
                  Saurabh Sinha   Viewpoint: Lessons from the tech
                                  transfer trenches  . . . . . . . . . . . 37--39
                    Herbert Lin   Viewpoint: Having a conversation about
                                  bulk surveillance  . . . . . . . . . . . 40--42
                 R. V. Guha and   
               Dan Brickley and   
                  Steve Macbeth   Schema.org: evolution of structured data
                                  on the web . . . . . . . . . . . . . . . 44--51
               Caitie McCaffrey   The verification of a distributed system 52--55
           Nicholas Diakopoulos   Accountability in algorithmic decision
                                  making . . . . . . . . . . . . . . . . . 56--62
                Bart Thomee and   
            David A. Shamma and   
           Gerald Friedland and   
          Benjamin Elizalde and   
                    Karl Ni and   
             Douglas Poland and   
               Damian Borth and   
                      Li-Jia Li   YFCC100M: the new data in multimedia
                                  research . . . . . . . . . . . . . . . . 64--73
            Michael Stonebraker   Turing Lecture: The land sharks are on
                                  the squawk box . . . . . . . . . . . . . 74--83
                 J. P. Shim and   
                     J. Koh and   
                  S. Fister and   
                      H. Y. Seo   Phonetic analytics technology and big
                                  data: real-world cases . . . . . . . . . 84--90
               Daniel Abadi and   
             Rakesh Agrawal and   
         Anastasia Ailamaki and   
       Magdalena Balazinska and   
        Philip A. Bernstein and   
           Michael J. Carey and   
          Surajit Chaudhuri and   
               Jeffrey Dean and   
                 AnHai Doan and   
        Michael J. Franklin and   
            Johannes Gehrke and   
              Laura M. Haas and   
             Alon Y. Halevy and   
      Joseph M. Hellerstein and   
        Yannis E. Ioannidis and   
             H. V. Jagadish and   
            Donald Kossmann and   
              Samuel Madden and   
            Sharad Mehrotra and   
                  Tova Milo and   
        Jeffrey F. Naughton and   
         Raghu Ramakrishnan and   
               Volker Markl and   
         Christopher Olston and   
              Beng Chin Ooi and   
      Christopher Ré and   
                  Dan Suciu and   
        Michael Stonebraker and   
                Todd Walter and   
                 Jennifer Widom   The Beckman report on database research  92--99
       Michael Mitzenmacher and   
                  Justin Thaler   Technical Perspective: Catching lies
                                  (and mistakes) in offloaded computation  102--102
                Bryan Parno and   
                 Jon Howell and   
               Craig Gentry and   
                Mariana Raykova   Pinocchio: nearly practical verifiable
                                  computation  . . . . . . . . . . . . . . 103--112
                  Sumit Gulwani   Technical Perspective: Program synthesis
                                  using stochastic techniques  . . . . . . 113--113
              Eric Schkufza and   
               Rahul Sharma and   
                     Alex Aiken   Stochastic program optimization  . . . . 114--122
                    Ken MacLeod   Last byte: Future Tense: Chatterbox  . . 128--ff

Communications of the ACM
Volume 59, Number 3, March, 2016

             Eugene H. Spafford   The strength of encryption . . . . . . . 5--5
                 Vinton G. Cerf   Computer science in the curriculum . . . 7--7
                     CACM Staff   Letters to the Editor: ACM moral
                                  imperatives vs. lethal autonomous
                                  weapons  . . . . . . . . . . . . . . . . 8--9
                   Valerie Barr   BLOG@CACM: The value of Ada  . . . . . . 10--11
                   Gregory Goth   News: Deep or shallow, NLP is breaking
                                  out  . . . . . . . . . . . . . . . . . . 13--16
                     Tom Geller   News: Rich data, poor fields . . . . . . 17--18
                    Neil Savage   News: When computers stand in the
                                  schoolhouse door . . . . . . . . . . . . 19--21
                     CACM Staff   News: Peter Naur: 1928--2016 . . . . . . 22--23
               Pamela Samuelson   Legally speaking: New exemptions to
                                  anti-circumvention rules . . . . . . . . 24--26
                Jeffrey Johnson   Computing ethics: The question of
                                  information justice  . . . . . . . . . . 27--29
               Peter J. Denning   The profession of IT: Fifty years of
                                  operating systems  . . . . . . . . . . . 30--32
             Tiffany Barnes and   
        George K. Thiruvathukal   Broadening participation: The need for
                                  research in broadening participation . . 33--34
               Maja Vukovic and   
                 Jim Laredo and   
            Vinod Muthusamy and   
       Aleksander Slominski and   
              Roman Vaculin and   
                    Wei Tan and   
                 Vijay Naik and   
         Ignacio Silva-Lepe and   
                 Arun Kumar and   
          Biplav Srivastava and   
                 Joel W. Branch   Viewpoint: Riding and thriving on the
                                  API hype cycle . . . . . . . . . . . . . 35--37
                 H. V. Jagadish   Viewpoint: Paper presentation at
                                  conferences: time for a reset  . . . . . 38--39
                David Patterson   Interview: An interview with Stanford
                                  University President John Hennessy . . . 40--45
                     CACM Staff   A purpose-built global network: Google's
                                  move to SDN  . . . . . . . . . . . . . . 46--54
                Kate Matsudaira   The paradox of autonomy and recognition  55--57
                 Tom Limoncelli   Automation should be like Iron Man, not
                                  Ultron . . . . . . . . . . . . . . . . . 58--61
         Christian Collberg and   
             Todd A. Proebsting   Repeatability in computer systems
                                  research . . . . . . . . . . . . . . . . 62--69
            Andrew S. Tanenbaum   Lessons learned from 30 years of MINIX   70--78
          Antonio De Nicola and   
              Michele Missikoff   A lightweight methodology for rapid
                                  ontology engineering . . . . . . . . . . 79--86
                     Boaz Barak   Hopes, fears, and software obfuscation   88--96
                    John Regehr   Technical Perspective: STACKing up
                                  undefined behaviors  . . . . . . . . . . 98--98
                    Xi Wang and   
         Nickolai Zeldovich and   
          M. Frans Kaashoek and   
           Armando Solar-Lezama   A differential approach to undefined
                                  behavior detection . . . . . . . . . . . 99--106
                  David Forsyth   Technical Perspective: Taming the name
                                  game . . . . . . . . . . . . . . . . . . 107--107
            Vicente Ordonez and   
                    Wei Liu and   
                   Jia Deng and   
                 Yejin Choi and   
          Alexander C. Berg and   
                 Tamara L. Berg   Learning to name objects . . . . . . . . 108--115
                  Leah Hoffmann   Last byte: Q&A: A Graphics and Hypertext
                                  Innovator  . . . . . . . . . . . . . . . 120--ff

Communications of the ACM
Volume 59, Number 4, April, 2016

                 Moshe Y. Vardi   Are we headed toward another global tech
                                  bust?  . . . . . . . . . . . . . . . . . 5--5
             Vinton G. Cerf and   
                 Maggie Johnson   Enrollments explode! but diversity
                                  students are leaving\ldots . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Chaos is no
                                  catastrophe  . . . . . . . . . . . . . . 8--9
               Mark Guzdial and   
                  John Arquilla   BLOG@CACM: Sampling bias in CS
                                  education, and where's the cyber
                                  strategy?  . . . . . . . . . . . . . . . 10--11
                  Chris Edwards   News: Automating proofs  . . . . . . . . 13--15
              Keith Kirkpatrick   News: Existing technologies can assist
                                  the disabled . . . . . . . . . . . . . . 16--18
                    Gary Anthes   News: Search engine agendas  . . . . . . 19--21
             Lawrence M. Fisher   News: Marvin Minsky: 1927--2016  . . . . 22--24
             Lawrence M. Fisher   News: A decade of ACM efforts contribute
                                  to computer science for all  . . . . . . 25--27
                 Kentaro Toyama   Global computing: The Internet and
                                  inequality . . . . . . . . . . . . . . . 28--30
         George V. Neville-Neil   Kode Vicious: GNL is not Linux . . . . . 31--32
                      Mari Sako   Technology strategy and management: The
                                  need for corporate diplomacy . . . . . . 33--35
             Manuel Cebrian and   
                Iyad Rahwan and   
        Alex ``Sandy'' Pentland   Viewpoint: Beyond viral  . . . . . . . . 36--39
              Poul-Henning Kamp   More encryption means less privacy . . . 40--42
             Carlos Baquero and   
           Nuno Preguiça   Why logical clocks are easy  . . . . . . 43--47
           Thomas A. Limoncelli   How SysAdmins devalue themselves . . . . 48--49
                    Palash Bera   How colors in business dashboards affect
                                  users' decision making . . . . . . . . . 50--57
          Mikhail I. Gofman and   
                  Sinjini Mitra   Multimodal biometrics for enhanced
                                  mobile device security . . . . . . . . . 58--65
         Alberto Apostolico and   
          Maxime Crochemore and   
       Martin Farach-Colton and   
                  Zvi Galil and   
               S. Muthukrishnan   40 years of suffix trees . . . . . . . . 66--73
                   David Wagner   Technical Perspective: Fairness and the
                                  coin flip  . . . . . . . . . . . . . . . 75--75
        Marcin Andrychowicz and   
         Stefan Dziembowski and   
          Daniel Malinowski and   
                 Lukasz Mazurek   Secure multiparty computations on
                                  Bitcoin  . . . . . . . . . . . . . . . . 76--84
            Emin Gün Sirer   Technical Perspective: The state (and
                                  security) of the Bitcoin economy . . . . 85--85
           Sarah Meiklejohn and   
           Marjori Pomarole and   
               Grant Jordan and   
           Kirill Levchenko and   
                Damon McCoy and   
        Geoffrey M. Voelker and   
                  Stefan Savage   A fistful of Bitcoins: characterizing
                                  payments among men with no names . . . . 86--93
                  Dennis Shasha   Last byte: Upstart Puzzles: Sleep No
                                  More . . . . . . . . . . . . . . . . . . 96--96

Communications of the ACM
Volume 59, Number 5, May, 2016

                 Moshe Y. Vardi   The moral imperative of artificial
                                  intelligence . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   The IANA transition  . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Why All Writs is
                                  a Trojan horse . . . . . . . . . . . . . 8--9
                     CACM Staff   Letters to the Editor: ACM's 2016
                                  general election: please take this
                                  opportunity to vote  . . . . . . . . . . 11--22
                   Mark Guzdial   BLOG@CACM: Bringing computer science to
                                  U.S. schools, state by state . . . . . . 24--25
                     Don Monroe   News: Silicon photonics: ready to go the
                                  distance?  . . . . . . . . . . . . . . . 26--28
               Samuel Greengard   News: Cybersecurity gets smart . . . . . 29--31
              Keith Kirkpatrick   News: Coding as sport  . . . . . . . . . 32--33
                  Jason Schultz   Law and technology: The Internet of
                                  Things we don't own? . . . . . . . . . . 36--38
        R. Benjamin Shapiro and   
                 Matthew Ahrens   Education: Beyond blocks: syntax and
                                  semantics  . . . . . . . . . . . . . . . 39--41
                    Wen Wen and   
                   Chris Forman   Economic and business dimensions: Do
                                  patent commons and standards-setting
                                  organizations help navigate patent
                                  thickets?  . . . . . . . . . . . . . . . 42--43
              David P. Anderson   Historical reflections: Preserving
                                  hybrid objects . . . . . . . . . . . . . 44--46
                Steffen Wendzel   Viewpoint: How to increase the security
                                  of smart buildings?  . . . . . . . . . . 47--49
              Brendan Burns and   
                Brian Grant and   
          David Oppenheimer and   
                Eric Brewer and   
                    John Wilkes   Borg, Omega, and Kubernetes  . . . . . . 50--57
                Kate Matsudaira   Delegation as art  . . . . . . . . . . . 58--60
              Ivar Jacobson and   
                 Ian Spence and   
                     Brian Kerr   Use-case 2.0 . . . . . . . . . . . . . . 61--69
          Stephen M. Casner and   
          Edwin L. Hutchins and   
                     Don Norman   The challenges of partially automated
                                  driving  . . . . . . . . . . . . . . . . 70--77
            Andrew Lenharth and   
              Donald Nguyen and   
                 Keshav Pingali   Parallel graph analytics . . . . . . . . 78--87
                Hanan Samet and   
            Sarana Nutanong and   
               Brendan C. Fruin   Static presentation consistency issues
                                  in smartphone mapping apps . . . . . . . 88--98
               Mason Bretan and   
                   Gil Weinberg   A survey of robotic musicianship . . . . 100--109
                     Boaz Barak   Technical Perspective: a breakthrough in
                                  software obfuscation . . . . . . . . . . 112--112
                Sanjam Garg and   
               Craig Gentry and   
                Shai Halevi and   
            Mariana Raykova and   
                 Amit Sahai and   
                   Brent Waters   Hiding secrets in software: a
                                  cryptographic approach to program
                                  obfuscation  . . . . . . . . . . . . . . 113--120
                 Gail C. Murphy   Technical Perspective: Software is
                                  natural  . . . . . . . . . . . . . . . . 121--121
               Abram Hindle and   
               Earl T. Barr and   
                 Mark Gabel and   
                Zhendong Su and   
              Premkumar Devanbu   On the naturalness of software . . . . . 122--131
                 Louis Friedman   Last byte: Future Tense: Becoming a
                                  Multi-Planet Species . . . . . . . . . . 136--ff

Communications of the ACM
Volume 59, Number 6, June, 2016

              Alexander L. Wolf   Moving forward . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Celebrations!  . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: No backdoor
                                  required or expected . . . . . . . . . . 8--9
              John Langford and   
             Bertrand Meyer and   
                   Mark Guzdial   BLOG@CACM: The solution to AI, what real
                                  researchers do, and expectations for CS
                                  classrooms . . . . . . . . . . . . . . . 10--11
                    Neil Savage   News: The key to privacy . . . . . . . . 12--14
                   Logan Kugler   News: What happens when big data
                                  blunders?  . . . . . . . . . . . . . . . 15--16
                    Alex Wright   News: Reimagining search . . . . . . . . 17--19
                   Gregory Mone   News: What's next for digital
                                  humanities?  . . . . . . . . . . . . . . 20--21
         Rebecca T. Mercuri and   
               Peter G. Neumann   Inside risks: The risks of self-auditing
                                  systems  . . . . . . . . . . . . . . . . 22--25
         George V. Neville-Neil   Kode Vicious: What are you trying to
                                  pull?  . . . . . . . . . . . . . . . . . 26--27
               Peter J. Denning   The profession of IT: How to produce
                                  innovations  . . . . . . . . . . . . . . 28--30
                    Derek Chiou   Interview: An interview with Yale Patt   31--36
                     Boaz Barak   Viewpoint: Computer science should stay
                                  young  . . . . . . . . . . . . . . . . . 37--38
         Jean-Pierre Hubaux and   
                      Ari Juels   Viewpoint: Privacy is dead, long live
                                  privacy  . . . . . . . . . . . . . . . . 39--41
                   Ankita Mitra   Viewpoint: A byte is all we need . . . . 42--44
                Kate Matsudaira   Nine things I didn't know I would learn
                                  being an engineer manager  . . . . . . . 45--47
                  Brendan Gregg   The flame graph  . . . . . . . . . . . . 48--57
                    Pat Helland   Standing on distributed shoulders of
                                  giants . . . . . . . . . . . . . . . . . 58--61
              Brad A. Myers and   
                 Jeffrey Stylos   Improving API usability  . . . . . . . . 62--69
              Daniel Genkin and   
              Lev Pachmanov and   
              Itamar Pipman and   
                 Adi Shamir and   
                    Eran Tromer   Physical key extraction attacks on PCs   70--79
             Petros Drineas and   
             Michael W. Mahoney   RandNLA: randomized numerical linear
                                  algebra  . . . . . . . . . . . . . . . . 80--90
                    Koushik Sen   Veritesting tackles path-explosion
                                  problem  . . . . . . . . . . . . . . . . 92--92
        Thanassis Avgerinos and   
           Alexandre Rebert and   
               Sang Kil Cha and   
                  David Brumley   Enhancing symbolic execution with
                                  veritesting  . . . . . . . . . . . . . . 93--100
                 Siddharth Suri   Computing with the crowd . . . . . . . . 101--101
           Daniel W. Barowy and   
         Charlie Curtsinger and   
            Emery D. Berger and   
                Andrew McGregor   AutoMan: a platform for integrating
                                  human-based and digital computation  . . 102--109
                  Leah Hoffmann   Last byte: Q&A: Finding new directions in
                                  cryptography: Whitfield Diffie and
                                  Martin Hellman on their meeting, their
                                  research, and the results that billions
                                  use every day  . . . . . . . . . . . . . 112--ff

Communications of the ACM
Volume 59, Number 7, July, 2016

                 Moshe Y. Vardi   The ritual of academic-unit review . . . 5--5
                 Vinton G. Cerf   The power of big ideas . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Rethinking
                                  computational thinking . . . . . . . . . 8--8
          Jeannette M. Wing and   
                  Dan Stanzione   BLOG@CACM: Progress in computational
                                  thinking, and expanding the HPC
                                  community  . . . . . . . . . . . . . . . 10--11
                    Neil Savage   News: Graph matching in theory and
                                  practice . . . . . . . . . . . . . . . . 12--14
               Marina Krakovsky   News: Accelerating search  . . . . . . . 15--16
             Lawrence M. Fisher   News: Booming enrollments  . . . . . . . 17--18
              Keith Kirkpatrick   News: Legal advice on the smartphone . . 19--21
               Pamela Samuelson   Legally speaking: Apple v. Samsung and
                                  the upcoming design patent wars? . . . . 22--24
                   Thomas Haigh   Historical reflections: How Charles
                                  Bachman invented the DBMS, a foundation
                                  of our digital world . . . . . . . . . . 25--30
                  Jacob Metcalf   Computing ethics: Big data analytics and
                                  revision of the common rule  . . . . . . 31--33
                     Toby Walsh   Viewpoint: Turing's red flag . . . . . . 34--37
              Yuri Gurevich and   
                 Efim Hudis and   
              Jeannette M. Wing   Viewpoint: Inverse privacy . . . . . . . 38--42
                    Sachin Date   Should you upload or ship big data to
                                  the cloud? . . . . . . . . . . . . . . . 44--51
           Thomas A. Limoncelli   The small batches principle  . . . . . . 52--57
              Heinrich Hartmann   Statistics for engineers . . . . . . . . 58--66
         Abhik Roychoudhury and   
                 Satish Chandra   Formula-based software debugging . . . . 68--77
              Rachel Potvin and   
                 Josh Levenberg   Why Google stores billions of lines of
                                  code in a single repository  . . . . . . 78--87
              Gill Barequet and   
           Günter Rote and   
                    Mira Shalah   $ \lambda > 4 $: an improved lower bound
                                  on the growth constant of polyominoes    88--95
             Emilio Ferrara and   
                 Onur Varol and   
              Clayton Davis and   
            Filippo Menczer and   
            Alessandro Flammini   The rise of social bots  . . . . . . . . 96--104
                Henry Kautz and   
                   Parag Singla   Technical Perspective: Combining logic
                                  and probability  . . . . . . . . . . . . 106--106
              Vibhav Gogate and   
                 Pedro Domingos   Probabilistic theorem proving  . . . . . 107--115
                     Sam Madden   Technical Perspective: Mesa takes data
                                  warehousing to new heights . . . . . . . 116--116
               Ashish Gupta and   
                   Fan Yang and   
                Jason Govig and   
                Adam Kirsch and   
                Kelvin Chan and   
                  Kevin Lai and   
                    Shuo Wu and   
              Sandeep Dhoot and   
      Abhilash Rajesh Kumar and   
               Ankur Agiwal and   
            Sanjay Bhansali and   
             Mingsheng Hong and   
              Jamie Cameron and   
             Masood Siddiqi and   
                David Jones and   
                 Jeff Shute and   
             Andrey Gubarev and   
    Shivakumar Venkataraman and   
              Divyakant Agrawal   Mesa: a geo-replicated online data
                                  warehouse for Google's advertising
                                  system . . . . . . . . . . . . . . . . . 117--125
                  Dennis Shasha   Last byte: Upstart Puzzles: Chair Games  128--128

Communications of the ACM
Volume 59, Number 8, August, 2016

                Vicki L. Hanson   From the new ACM President . . . . . . . 5--5
                 Vinton G. Cerf   Star struck in Lindau  . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Future
                                  cyberdefenses will defeat cyberattacks
                                  on PCs . . . . . . . . . . . . . . . . . 8--9
                     Jason Hong   BLOG@CACM: Inside the Great Wall . . . . 10--11
               Marina Krakovsky   News: Reinforcement renaissance  . . . . 12--14
                    Gary Anthes   News: Open source software no longer
                                  optional . . . . . . . . . . . . . . . . 15--17
                   Logan Kugler   News: Smartphone apps for social good    18--20
                    Paul Kocher   Privacy and security: Computer security
                                  is broken: can better hardware help fix
                                  it?  . . . . . . . . . . . . . . . . . . 22--25
                Yasmin B. Kafai   Education: From computational thinking
                                  to computational participation in K--12
                                  education  . . . . . . . . . . . . . . . 26--27
         George V. Neville-Neil   Kode Vicious: Chilling the messenger . . 28--29
                Ben Shneiderman   Viewpoint: Teamwork in computing
                                  research . . . . . . . . . . . . . . . . 30--31
          Ivan Beschastnikh and   
                 Patty Wang and   
                 Yuriy Brun and   
               Michael D. Ernst   Debugging distributed systems  . . . . . 32--37
                    Pat Helland   The singular success of SQL  . . . . . . 38--41
                   Tom Killalea   The hidden dividends of microservices    42--45
               Rida Khatoun and   
               Sherali Zeadally   Smart cities: concepts, architectures,
                                  research opportunities . . . . . . . . . 46--57
          Stephanie Forrest and   
               Melanie Mitchell   Adaptive computation: the
                                  multidisciplinary legacy of John H.
                                  Holland  . . . . . . . . . . . . . . . . 58--63
             Leon Kappelman and   
              Mary C. Jones and   
               Vess Johnson and   
          Ephraim R. McLean and   
               Kittipong Boonme   Skills for success at different stages
                                  of an IT professional's career . . . . . 64--70
              Bonnie Berger and   
            Noah M. Daniels and   
                  Y. William Yu   Computational biology in the 21st
                                  century: scaling with compressive
                                  algorithms . . . . . . . . . . . . . . . 72--80
                 Todd Millstein   Technical Perspective: Toward reliable
                                  programming for unreliable hardware  . . 82--82
             Michael Carbin and   
            Sasa Misailovic and   
               Martin C. Rinard   Verifying quantitative reliability for
                                  programs that execute on unreliable
                                  hardware . . . . . . . . . . . . . . . . 83--91
                  Philip Wadler   Technical Perspective: Why didn't I
                                  think of that? . . . . . . . . . . . . . 92--92
                  Adam Chlipala   Ur/Web: a simple model for programming
                                  the web  . . . . . . . . . . . . . . . . 93--100
                    Ken MacLeod   Last byte: Future Tense: Gut Feelings    104--ff

Communications of the ACM
Volume 59, Number 9, September, 2016

                 Moshe Y. Vardi   Academic rankings considered harmful!    5--5
                 Vinton G. Cerf   Keeping the Internet open  . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Election auditing
                                  and verifiability  . . . . . . . . . . . 8--9
                  Chris Edwards   News: Reconciling quantum physics with
                                  math . . . . . . . . . . . . . . . . . . 11--13
               Samuel Greengard   News: GPUs reshape computing . . . . . . 14--16
                   Gregory Mone   News: The edge of the uncanny  . . . . . 17--19
                       Felix Wu   Law and Technology: No easy answers in
                                  the fight over iPhone decryption . . . . 20--22
               Peter J. Denning   The profession of IT: Software quality   23--25
          Richard E. Ladner and   
                    Maya Israel   Broadening participation: ``For all'' in
                                  ``computer science for all'' . . . . . . 26--28
             Amitai Etzioni and   
                   Oren Etzioni   Viewpoint: Designing AI systems that
                                  obey our laws and values . . . . . . . . 29--31
         Ethan Katz-Bassett and   
             Justine Sherry and   
              Te-Yuan Huang and   
          Maria Kazandjieva and   
            Craig Partridge and   
                    Fahad Dogar   Viewpoint: Helping conference attendees
                                  better understand research presentations 32--34
          Abraham Bernstein and   
              James Hendler and   
                    Natalya Noy   Viewpoint: A new look at the Semantic
                                  Web  . . . . . . . . . . . . . . . . . . 35--37
               Peter Bailis and   
                Simon Peter and   
                 Justine Sherry   Introducing research for practice  . . . 38--41
                Kate Matsudaira   Bad software architecture is a people
                                  problem  . . . . . . . . . . . . . . . . 42--43
           Thomas A. Limoncelli   10 optimizations on linear search  . . . 44--48
              Peter Buneman and   
             Susan Davidson and   
                     James Frew   Why data citation is a computational
                                  problem  . . . . . . . . . . . . . . . . 50--57
                Hanan Samet and   
            Sarana Nutanong and   
               Brendan C. Fruin   Dynamic presentation consistency issues
                                  in smartphone mapping apps . . . . . . . 58--67
                    Percy Liang   Learning executable semantic parsers for
                                  natural language understanding . . . . . 68--76
                Kyros Kutulakos   The dawn of computational light
                                  transport: technical perspective . . . . 78--78
             Andreas Velten and   
                      Di Wu and   
                Belen Masia and   
              Adrian Jarabo and   
          Christopher Barsi and   
             Chinmaya Joshi and   
             Everett Lawson and   
             Moungi Bawendi and   
            Diego Gutierrez and   
                  Ramesh Raskar   Imaging the propagation of light through
                                  scenes at picosecond resolution  . . . . 79--86
                Andrew W. Moore   Jupiter rising: technical perspective    87--87
                Arjun Singh and   
                   Joon Ong and   
               Amit Agarwal and   
              Glen Anderson and   
            Ashby Armistead and   
                 Roy Bannon and   
                 Seb Boving and   
               Gaurav Desai and   
              Bob Felderman and   
             Paulie Germano and   
             Anand Kanagala and   
                   Hong Liu and   
               Jeff Provost and   
              Jason Simmons and   
               Eiichi Tanda and   
               Jim Wanderer and   
            Urs Hölzle and   
             Stephen Stuart and   
                    Amin Vahdat   Jupiter rising: a decade of Clos
                                  topologies and centralized control in
                                  Google's datacenter network  . . . . . . 88--97
                  Leah Hoffmann   Last byte: Q&A  . . . . . . . . . . . . . 104--ff

Communications of the ACM
Volume 59, Number 10, October, 2016

             Ronald F. Boisvert   Departments: Incentivizing
                                  reproducibility  . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Departments: 'We're going backward!' . . 7--7
                  Perry R. Cook   BLOG@CACM: Adding art to STEM  . . . . . 8--9
                     Don Monroe   News: Optical fibers getting full  . . . 10--12
               Marina Krakovsky   News: Bringing holography to light . . . 13--15
              Keith Kirkpatrick   News: Battling algorithmic bias: how do
                                  we ensure algorithms treat us fairly?    16--17
            Michael A. Cusumano   Technology strategy and management: The
                                  puzzle of Japanese innovation and
                                  entrepreneurship . . . . . . . . . . . . 18--20
                Michael L. Best   Global computing: Mobile computing and
                                  political transformation . . . . . . . . 21--23
         George V. Neville-Neil   Kode vicious: Cloud calipers . . . . . . 24--25
               Peter G. Neumann   Inside risks: Risks of automation: a
                                  cautionary total-system perspective of
                                  our cyberfuture  . . . . . . . . . . . . 26--30
             Kathrin Conrad and   
              Nysret Musliu and   
           Reinhard Pichler and   
                Hannes Werthner   Viewpoint: Universities and computer
                                  science in the European crisis of
                                  refugees . . . . . . . . . . . . . . . . 31--33
             Ulan Degenbaev and   
            Jochen Eisinger and   
              Manfred Ernst and   
               Ross Mcilroy and   
                   Hannes Payer   Idle-time garbage-collection scheduling  34--39
                Kate Matsudaira   Fresh starts . . . . . . . . . . . . . . 40--41
                 Andre Medeiros   Dynamics of change: why reactivity
                                  matters  . . . . . . . . . . . . . . . . 42--46
              Robert Lychev and   
           Michael Schapira and   
                Sharon Goldberg   Rethinking security for Internet routing 48--57
            Craig Partridge and   
                    Mark Allman   Ethical considerations in network
                                  measurement papers . . . . . . . . . . . 58--64
                A. J. Burns and   
            M. Eric Johnson and   
                 Peter Honeyman   A brief chronology of medical device
                                  security . . . . . . . . . . . . . . . . 66--72
                Johannes Gehrke   Technical Perspective: Naiad . . . . . . 74--74
            Derek G. Murray and   
             Frank McSherry and   
              Michael Isard and   
             Rebecca Isaacs and   
                Paul Barham and   
            Martín Abadi   Incremental, iterative data processing
                                  with timely dataflow . . . . . . . . . . 75--83
                    James Larus   Technical Perspective: The power of
                                  parallelizing computations . . . . . . . 84--84
               Saeed Maleki and   
         Madanlal Musuvathi and   
                 Todd Mytkowicz   Efficient parallelization using rank
                                  convergence in dynamic programming
                                  algorithms . . . . . . . . . . . . . . . 85--92
                  Dennis Shasha   Last byte: Find me quickly . . . . . . . 96--96

Communications of the ACM
Volume 59, Number 11, November, 2016

                 Moshe Y. Vardi   Departments: Globalization, computing,
                                  and their political impact . . . . . . . 5--5
                 Vinton G. Cerf   Departments: Heidelberg anew . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Learn to live
                                  with academic rankings . . . . . . . . . 8--9
               Valerie Barr and   
                   Mark Guzdial   BLOG@CACM: Introducing CS to newcomers,
                                  and JES as a teaching tool . . . . . . . 10--11
                Erica Klarreich   News: Learning securely  . . . . . . . . 12--14
                Sarah Underwood   News: Blockchain beyond Bitcoin  . . . . 15--17
                     Tom Geller   News: Farm automation gets smarter . . . 18--19
                Roger R. Schell   Privacy and security: Cyber defense
                                  triad for where security matters . . . . 20--23
               Pamela Samuelson   Legally speaking: Fair use prevails in
                                  Oracle v. Google . . . . . . . . . . . . 24--28
               Bala R. Iyer and   
                Rahul C. Basole   Economic and business dimensions:
                                  Visualization to understand ecosystems   27--30
               Mark Guzdial and   
                Briana Morrison   Education: Growing computer science
                                  education into a STEM education
                                  discipline . . . . . . . . . . . . . . . 31--33
              Jack Copeland and   
                Eli Dresner and   
            Diane Proudfoot and   
                   Oron Shagrir   Viewpoint: Time to reinspect the
                                  foundations? . . . . . . . . . . . . . . 34--38
                Jonathan Grudin   Viewpoint: Technology and academic lives 37--39
                    Pat Helland   The power of babble  . . . . . . . . . . 40--43
                  Adam Morrison   Scaling synchronization in multicore
                                  programs . . . . . . . . . . . . . . . . 44--51
               Peter Bailis and   
           Camille Fournier and   
                Joy Arulraj and   
                   Andrew Pavlo   Research for practice: distributed
                                  consensus and implications of NVM on
                                  database management systems  . . . . . . 52--55
              Matei Zaharia and   
             Reynold S. Xin and   
            Patrick Wendell and   
              Tathagata Das and   
           Michael Armbrust and   
                 Ankur Dave and   
              Xiangrui Meng and   
                 Josh Rosen and   
      Shivaram Venkataraman and   
        Michael J. Franklin and   
                 Ali Ghodsi and   
            Joseph Gonzalez and   
              Scott Shenker and   
                     Ion Stoica   Apache Spark: a unified engine for big
                                  data processing  . . . . . . . . . . . . 56--65
      Dinei Florêncio and   
              Cormac Herley and   
           Paul C. Van Oorschot   Pushing on string: the `don't care'
                                  region of password strength  . . . . . . 66--74
               Enrico Bozzo and   
            Massimo Franceschet   A theory on power in networks  . . . . . 75--83
                 Adi Livnat and   
         Christos Papadimitriou   Sex as an algorithm: the theory of
                                  evolution under the lens of computation  84--93
            Dietmar Jannach and   
               Paul Resnick and   
         Alexander Tuzhilin and   
                  Markus Zanker   Recommender systems --- : beyond matrix
                                  completion . . . . . . . . . . . . . . . 94--102
                   Kurt Keutzer   If I could only design one circuit
                                  \ldots: technical perspective  . . . . . 104--104
                 Yunji Chen and   
               Tianshi Chen and   
                  Zhiwei Xu and   
                Ninghui Sun and   
                  Olivier Temam   DianNao family: energy-efficient
                                  hardware accelerators for machine
                                  learning . . . . . . . . . . . . . . . . 105--112
                   James C. Hoe   FPGA compute acceleration is first about
                                  energy efficiency: technical perspective 113--113
              Andrew Putnam and   
        Adrian M. Caulfield and   
              Eric S. Chung and   
                Derek Chiou and   
      Kypros Constantinides and   
                 John Demme and   
          Hadi Esmaeilzadeh and   
              Jeremy Fowers and   
       Gopi Prashanth Gopal and   
                   Jan Gray and   
           Michael Haselman and   
                Scott Hauck and   
               Stephen Heil and   
               Amir Hormati and   
              Joo-Young Kim and   
              Sitaram Lanka and   
                James Larus and   
              Eric Peterson and   
                 Simon Pope and   
                Aaron Smith and   
                Jason Thong and   
            Phillip Yi Xiao and   
                    Doug Burger   A reconfigurable fabric for accelerating
                                  large-scale datacenter services  . . . . 114--122
                    Brian Clegg   Last byte: The candidate . . . . . . . . 136--ff

Communications of the ACM
Volume 59, Number 12, December, 2016

                  Marty J. Wolf   Departments: The ACM code of ethics: a
                                  call to action . . . . . . . . . . . . . 6--6
                Bo Brinkman and   
             Don Gotterbarn and   
               Keith Miller and   
                  Marty J. Wolf   Departments: Making a positive impact:
                                  updating the ACM code of ethics  . . . . 7--13
                 Vinton G. Cerf   Departments: When email isn't private    15--15
                     CACM Staff   Letters to the Editor: Reclaim the lost
                                  promise of the Semantic Web  . . . . . . 17--17
               Mark Guzdial and   
                    Daniel Reed   BLOG@CACM: ICER 2016, and Star Trek at
                                  50 . . . . . . . . . . . . . . . . . . . 18--19
               Samuel Greengard   News: Cracking the code on biology . . . 21--23
                  Chris Edwards   News: Containers push toward the Mayfly
                                  server . . . . . . . . . . . . . . . . . 24--26
              Keith Kirkpatrick   News: Can we trust autonomous weapons?   27--29
           Peter J. Denning and   
                  Gloria Flores   The profession of IT: Learning to learn  32--36
              David P. Anderson   Historical reflections: Nailing smoke    37--39
                       Yan Chen   Broadening participation: Mentoring
                                  female assistant professors enhances
                                  their success  . . . . . . . . . . . . . 40--42
                Orit Hazzan and   
                    Jeff Kramer   Viewpoint: Assessing abstraction skills  43--45
      Jesper Larsson Träff   Viewpoint: (Mis)managing parallel
                                  computing research through EU project
                                  funding  . . . . . . . . . . . . . . . . 46--48
                 Marius Eriksen   Functional at scale  . . . . . . . . . . 50--55
                     CACM Staff   React: Facebook's functional turn on
                                  writing Javascript . . . . . . . . . . . 56--62
              Ivar Jacobson and   
                 Ian Spence and   
                   Ed Seidewitz   Industrial-scale agile: from craft to
                                  engineering  . . . . . . . . . . . . . . 63--71
            Anders Ynnerman and   
              Thomas Rydell and   
             Daniel Antoine and   
               David Hughes and   
             Anders Persson and   
                   Patric Ljung   Interactive visualization of $3$D
                                  scanned mummies at public venues . . . . 72--81
                 Mark Sagar and   
               Mike Seymour and   
              Annette Henderson   Creating connection with autonomous
                                  facial animation . . . . . . . . . . . . 82--91
              Katie Shilton and   
           Jeffrey A. Burke and   
                  kc claffy and   
                    Lixia Zhang   Anticipating policy and social
                                  implications of named data networking    92--101
                Yiling Chen and   
               Arpita Ghosh and   
             Michael Kearns and   
            Tim Roughgarden and   
       Jennifer Wortman Vaughan   Mathematical foundations for social
                                  computing  . . . . . . . . . . . . . . . 102--108
              Srinivasan Keshav   The chemistry of software-defined
                                  batteries: technical perspective . . . . 110--110
              Anirudh Badam and   
            Ranveer Chandra and   
                  Jon Dutra and   
            Anthony Ferrese and   
               Steve Hodges and   
                     Pan Hu and   
         Julia Meinershagen and   
          Thomas Moscibroda and   
            Bodhi Priyantha and   
               Evangelia Skiani   Software-defined batteries . . . . . . . 111--119
                 Takeo Igarashi   $3$D image editing made easy: technical
                                  perspective  . . . . . . . . . . . . . . 120--120
                   Tao Chen and   
                    Zhe Zhu and   
                 Shi-Min Hu and   
            Daniel Cohen-Or and   
                   Ariel Shamir   Extracting $3$D objects from photographs
                                  using $3$-sweep  . . . . . . . . . . . . 121--129
                  Leah Hoffmann   Last byte: A view to the future  . . . . 144--ff


Communications of the ACM
Volume 60, Number 1, January, 2017

                 Moshe Y. Vardi   Technology for the most effective use of
                                  mankind  . . . . . . . . . . . . . . . . 5--5
                Vicki L. Hanson   The ACM future of computing academy  . . 7--7
                 Vinton G. Cerf   Information and misinformation on the
                                  Internet . . . . . . . . . . . . . . . . 9--9
               Valerie Barr and   
        Michael Stonebraker and   
      Raul Castro Fernandez and   
                  Dong Deng and   
                 Michael Brodie   BLOG@CACM: How we teach CS2All, and what
                                  to do about database decay . . . . . . . 10--11
                     Don Monroe   News: Pure randomness extracted from two
                                  poor sources . . . . . . . . . . . . . . 13--15
                    Alex Wright   News: Mapping the Internet of Things . . 16--18
                   Gregory Mone   News: Bias in technology . . . . . . . . 19--20
            Michael A. Cusumano   Technology strategy and management: Is
                                  Google's Alphabet a good bet?  . . . . . 22--25
                  Michael Geist   Law and technology: Why less is more
                                  when it comes to Internet jurisdiction   26--28
                   Thomas Haigh   Historical reflections: Colossal genius:
                                  Tutte, Flowers, and a bad imitation of
                                  Turing . . . . . . . . . . . . . . . . . 29--35
                   Jerry Kaplan   Viewpoint: Artificial intelligence:
                                  think again  . . . . . . . . . . . . . . 36--38
                  Jeremy Straub   Viewpoint: Effects of international
                                  trafficking in arms regulations changes  39--41
                Kate Matsudaira   Resolving conflict . . . . . . . . . . . 42--44
                Josh Bailey and   
                 Stephen Stuart   Faucet: deploying SDN in the enterprise  45--49
               Peter Bailis and   
                  Jean Yang and   
         Vijay Janapa Reddi and   
                      Yuhao Zhu   Research for practice: Web security and
                                  mobile Web computing . . . . . . . . . . 50--53
           Peter J. Denning and   
                   Ted G. Lewis   Exponential laws of computing growth . . 54--65
       Cecil Eng Huang Chua and   
                 Veda C. Storey   Bottom-up enterprise information
                                  systems: rethinking the roles of central
                                  IT departments . . . . . . . . . . . . . 66--72
              Bülent Yener   Cell-graphs: image-driven modeling of
                                  structure-function relationship  . . . . 74--84
               Richard Szeliski   Magnifying motions the right way:
                                  technical perspective  . . . . . . . . . 86--86
                Neal Wadhwa and   
                  Hao-Yu Wu and   
                  Abe Davis and   
         Michael Rubinstein and   
                Eugene Shih and   
          Gautham J. Mysore and   
             Justin G. Chen and   
           Oral Buyukozturk and   
             John V. Guttag and   
         William T. Freeman and   
            Frédo Durand   Eulerian video magnification and
                                  analysis . . . . . . . . . . . . . . . . 87--95
             Valentina Salapura   Mapping the universe: technical
                                  perspective  . . . . . . . . . . . . . . 96--96
               Salman Habib and   
             Vitali Morozov and   
         Nicholas Frontiere and   
                 Hal Finkel and   
                Adrian Pope and   
            Katrin Heitmann and   
             Kalyan Kumaran and   
       Venkatram Vishwanath and   
                Tom Peterka and   
                 Joe Insley and   
               David Daniel and   
             Patricia Fasel and   
                 Zarija Luki\'c   HACC: extreme scaling and performance
                                  across diverse architectures . . . . . . 97--104
                  Dennis Shasha   Last byte: Open field tic-tac-toe  . . . 112--112

Communications of the ACM
Volume 60, Number 2, February, 2017

                Vicki L. Hanson   Departments: Celebrating 50 years of the
                                  Turing award . . . . . . . . . . . . . . 5--5
            Francine Berman and   
                 Vinton G. Cerf   Departments: Social and ethical behavior
                                  in the Internet of Things  . . . . . . . 6--7
                     CACM Staff   Letters to the Editor: Use the
                                  scientific method in computer science    8--9
                     CACM Staff   Panels in print: Artificial intelligence 10--11
                    Janet Davis   BLOG@CACM: Liberal arts academia wants
                                  YOU! . . . . . . . . . . . . . . . . . . 12--13
                  Chris Edwards   News: Secure quantum communications  . . 15--17
               Samuel Greengard   News: Are computer chips the new
                                  security threat? . . . . . . . . . . . . 18--19
              Keith Kirkpatrick   News: It's not the algorithm, it's the
                                  data . . . . . . . . . . . . . . . . . . 21--23
              Ulf Lindqvist and   
               Peter G. Neumann   Inside risks: The future of the Internet
                                  of Things  . . . . . . . . . . . . . . . 26--30
                 Aman Yadav and   
                   Steve Cooper   Education: Fostering creativity through
                                  computing  . . . . . . . . . . . . . . . 31--33
         George V. Neville-Neil   Kode vicious: The unholy trinity of
                                  software development . . . . . . . . . . 34--36
             Azer Bestavros and   
              Andrei Lapets and   
                   Mayank Varia   Privacy and security: User-centric
                                  distributed solutions for
                                  privacy-preserving analytics . . . . . . 37--39
                     Alan Bundy   Viewpoint: Smart machines are not a
                                  threat to humanity . . . . . . . . . . . 40--42
           Devdatt Dubhashi and   
                  Shalom Lappin   Viewpoint: AI dangers: imagined and real 43--45
                    Pat Helland   Life beyond distributed transactions . . 46--54
           Thomas A. Limoncelli   Are you load balancing wrong?  . . . . . 55--57
              Neal Cardwell and   
              Yuchung Cheng and   
            C. Stephen Gunn and   
      Soheil Hassas Yeganeh and   
                   Van Jacobson   BBR: congestion-based congestion control 58--66
              Brett Danaher and   
           Michael D. Smith and   
                   Rahul Telang   Copyright enforcement in the digital
                                  age: empirical evidence and policy
                                  implications . . . . . . . . . . . . . . 68--75
               Herbert Bruderer   Computing history beyond the U.K. and
                                  U.S.: selected landmarks from
                                  continental Europe . . . . . . . . . . . 76--84
               Frits Vaandrager   Model learning . . . . . . . . . . . . . 86--95
                  Eric Rescorla   Technical Perspective: Cleaning up flaws
                                  in TLS implementations . . . . . . . . . 98--98
        Benjamin Beurdouche and   
      Karthikeyan Bhargavan and   
    Antoine Delignat-Lavaud and   
      Cédric Fournet and   
          Markulf Kohlweiss and   
            Alfredo Pironti and   
          Pierre-Yves Strub and   
        Jean Karim Zinzindohoue   A messy state of the union: taming the
                                  composite state machines of TLS  . . . . 99--107
            Ivan Martinovic and   
           Kasper Rasmussen and   
             Marc Roeschlin and   
                    Gene Tsudik   Authentication using pulse-response
                                  biometrics . . . . . . . . . . . . . . . 108--115
        William Sims Bainbridge   Last byte: Fatal guidance  . . . . . . . 120--ff

Communications of the ACM
Volume 60, Number 3, March, 2017

                 Moshe Y. Vardi   Departments: ACM's open-conference
                                  principle and political reality  . . . . 5--5
                Vicki L. Hanson   Departments: ACM's commitment to
                                  accessibility  . . . . . . . . . . . . . 7--7
                 Vinton G. Cerf   Departments: Grumpy old cells  . . . . . 9--9
                     CACM Staff   Letters to the Editor: Address the
                                  consequences of AI in advance  . . . . . 10--11
               Mark Guzdial and   
                  Robin K. Hill   BLOG@CACM: The slow evolution of CS for
                                  all, the beauty of programs  . . . . . . 12--13
                    Neil Savage   News: Thinking deeply to make better
                                  speech . . . . . . . . . . . . . . . . . 15--17
               Samuel Greengard   News: The future of semiconductors . . . 18--20
              Keith Kirkpatrick   News: Financing the dark web . . . . . . 21--22
                     CACM Staff   News: ACM recognizes new Fellows . . . . 23--23
               Pamela Samuelson   Legally speaking: Supreme Court on
                                  design patent damages in Samsung v.
                                  Apple  . . . . . . . . . . . . . . . . . 26--28
                Elizabeth Varki   Computing ethics: Where review goes
                                  wrong  . . . . . . . . . . . . . . . . . 29--30
           Peter J. Denning and   
                Matti Tedre and   
                 Pat Yongpradit   The profession of IT: Misconceptions
                                  about computer science . . . . . . . . . 31--33
               Thomas M. Philip   Viewpoint: Learning with mobile
                                  technologies . . . . . . . . . . . . . . 34--36
              Theo Schlossnagle   Time, but faster . . . . . . . . . . . . 38--41
                 Mohamed Zahran   Heterogeneous computing: here to stay    42--45
               Peter Bailis and   
                Irene Zhang and   
                     Fadel Adib   Research for practice: distributed
                                  transactions and networks as physical
                                  sensors  . . . . . . . . . . . . . . . . 46--49
             Jonathan Lazar and   
     Elizabeth F. Churchill and   
              Tovi Grossman and   
        Gerrit van der Veer and   
          Philippe Palanque and   
    John ``Scooter'' Morris and   
               Jennifer Mankoff   Making the field of computing more
                                  inclusive  . . . . . . . . . . . . . . . 50--59
          Daniel J. Mazzola and   
        Robert D. St. Louis and   
               Mohan R. Tanniru   The path to the top: insights from
                                  career histories of top CIOs . . . . . . 60--68
                Simon Price and   
                 Peter A. Flach   Computational support for academic peer
                                  review: a perspective from artificial
                                  intelligence . . . . . . . . . . . . . . 70--79
              Srinivasan Keshav   The power of wi-fi to deliver power:
                                  technical perspective  . . . . . . . . . 82--82
                Vamsi Talla and   
              Bryce Kellogg and   
          Benjamin Ransford and   
         Saman Naderiparizi and   
            Joshua R. Smith and   
            Shyamnath Gollakota   Powering the next billion devices with
                                  wi-fi  . . . . . . . . . . . . . . . . . 83--91
                  Leonid Libkin   Data distribution for fast joins:
                                  technical perspective  . . . . . . . . . 92--92
             Tom J. Ameloot and   
               Gaetano Geck and   
                Bas Ketsman and   
                Frank Neven and   
              Thomas Schwentick   Reasoning on data partitioning for
                                  single-round multi-join evaluation in
                                  massively parallel systems . . . . . . . 93--100
                  Leah Hoffmann   Last byte: Out of bounds . . . . . . . . 104--ff

Communications of the ACM
Volume 60, Number 4, April, 2017

                   Valerie Barr   Departments: Gender diversity in
                                  computing: are we making any progress?   5--5
                 Vinton G. Cerf   Departments: A genetic theory of the
                                  Silicon Valley phenomenon  . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Consider indirect
                                  threats of AI, too . . . . . . . . . . . 8--9
              John Arquilla and   
                   Mark Guzdial   BLOG@CACM: Crafting a national
                                  cyberdefense, and preparing to support
                                  computational literacy . . . . . . . . . 10--11
                   Gregory Mone   News: Sensors on the brain . . . . . . . 12--14
                  Chris Edwards   News: Digitizing the world . . . . . . . 15--16
                   Esther Shein   News: Computing the arts . . . . . . . . 17--19
                     CACM Staff   News: Cybersecurity  . . . . . . . . . . 20--21
                  Ineke Buskens   Global computing: Online social networks
                                  and global women's empowerment . . . . . 22--23
         George V. Neville-Neil   Kode vicious: The chess player who
                                  couldn't pass the salt . . . . . . . . . 24--25
                  William Regli   Viewpoint: Wanted: toolsmiths  . . . . . 26--28
               Yancey Strickler   Viewpoint: What it means to be an
                                  entrepreneur today . . . . . . . . . . . 29--31
       Meng-Day (Mandel) Yu and   
               Srinivas Devadas   Pervasive, dynamic authentication of
                                  physical items . . . . . . . . . . . . . 32--39
              Robert C. Seacord   Uninitialized reads  . . . . . . . . . . 40--44
                Kate Matsudaira   Does anybody listen to you?  . . . . . . 45--46
               Luiz Barroso and   
                 Mike Marty and   
            David Patterson and   
      Parthasarathy Ranganathan   Attack of the killer microseconds  . . . 48--54
                 Aman Yadav and   
           Chris Stephenson and   
                       Hai Hong   Computational thinking for teacher
                                  education  . . . . . . . . . . . . . . . 55--62
         Athman Bouguettaya and   
             Munindar Singh and   
              Michael Huhns and   
              Quan Z. Sheng and   
                   Hai Dong and   
                      Qi Yu and   
         Azadeh Ghari Neiat and   
               Sajib Mistry and   
         Boualem Benatallah and   
            Brahim Medjahed and   
             Mourad Ouzzani and   
               Fabio Casati and   
                  Xumin Liu and   
              Hongbing Wang and   
   Dimitrios Georgakopoulos and   
                 Liang Chen and   
                Surya Nepal and   
                 Zaki Malik and   
          Abdelkarim Erradi and   
                   Yan Wang and   
                Brian Blake and   
           Schahram Dustdar and   
              Frank Leymann and   
             Michael Papazoglou   A service computing manifesto: the next
                                  10 years . . . . . . . . . . . . . . . . 64--72
                  Gernot Heiser   Technical Perspective: Proving file
                                  systems meet expectations  . . . . . . . 74--74
                 Tej Chajed and   
               Haogang Chen and   
              Adam Chlipala and   
          M. Frans Kaashoek and   
         Nickolai Zeldovich and   
                 Daniel Ziegler   Certifying a file system using Crash
                                  Hoare logic: correctness in the presence
                                  of crashes . . . . . . . . . . . . . . . 75--84
                Jonathan Ullman   Technical Perspective: Building a safety
                                  net for data reuse . . . . . . . . . . . 85--85
              Cynthia Dwork and   
             Vitaly Feldman and   
               Moritz Hardt and   
            Toniann Pitassi and   
              Omer Reingold and   
                     Aaron Roth   Guilt-free data reuse  . . . . . . . . . 86--93
                  Dennis Shasha   Last byte: Stacking the deck . . . . . . 96--96

Communications of the ACM
Volume 60, Number 5, May, 2017

                 Moshe Y. Vardi   Editor's letter: Cyber insecurity and
                                  cyber libertarianism . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Can liberty survive the
                                  digital age? . . . . . . . . . . . . . . 7--7
                 Bertrand Meyer   BLOG@CACM: Ending null pointer crashes   8--9
                   Esther Shein   News: Combating cancer with data . . . . 10--12
               Samuel Greengard   News: Making chips smarter . . . . . . . 13--15
              Keith Kirkpatrick   News: Bionics in competition . . . . . . 16--17
                     CACM Staff   News: The Internet of Things . . . . . . 18--19
            Woodrow Hartzog and   
                 Ira Rubinstein   Law and Technology: The anonymization
                                  debate should be about risk, not
                                  perfection . . . . . . . . . . . . . . . 22--24
                 Leo Porter and   
                Cynthia Lee and   
                 Beth Simon and   
                   Mark Guzdial   Education: Preparing tomorrow's faculty
                                  to address challenges in teaching
                                  computer science . . . . . . . . . . . . 25--27
                Wendell Wallach   Viewpoint: Toward a ban on lethal
                                  autonomous weapons: surmounting the
                                  obstacles  . . . . . . . . . . . . . . . 28--34
                    Erik Meijer   Making money using math  . . . . . . . . 36--42
                     Robert Guo   MongoDB's JavaScript fuzzer  . . . . . . 43--47
               Peter Bailis and   
           Arvind Narayanan and   
              Andrew Miller and   
                       Song Han   Research for practice: cryptocurrencies,
                                  blockchains, and smart contracts;
                                  hardware for deep learning . . . . . . . 48--51
      Catherine C. Marshall and   
               Frank M. Shipman   Who owns the social web? . . . . . . . . 52--61
             Marina Jirotka and   
             Barbara Grimpe and   
                Bernd Stahl and   
                 Grace Eden and   
                 Mark Hartswood   Responsible research and innovation in
                                  the digital age  . . . . . . . . . . . . 62--68
               Milan Vojnovi\'c   Contest theory . . . . . . . . . . . . . 70--80
                   Guy Blelloch   Technical Perspective: Functional
                                  compilers  . . . . . . . . . . . . . . . 82--82
          Geoffrey Mainland and   
         Roman Leshchinskiy and   
             Simon Peyton Jones   Exploiting vector instructions with
                                  generalized stream fusion  . . . . . . . 83--91
                    Alon Halevy   Technical Perspective: Building
                                  knowledge bases from messy data  . . . . 92--92
                   Ce Zhang and   
      Christopher Ré and   
          Michael Cafarella and   
          Christopher De Sa and   
                Alex Ratner and   
                 Jaeho Shin and   
                Feiran Wang and   
                         Sen Wu   DeepDive: declarative knowledge base
                                  construction . . . . . . . . . . . . . . 93--102
          David Allen Batchelor   Last byte: Beyond `Star Trek'  . . . . . 104--ff
                Bo Brinkman and   
            Catherine Flick and   
             Don Gotterbarn and   
               Keith Miller and   
              Kate Vazansky and   
                  Marty J. Wolf   Departments: Listening to professional
                                  voices: draft 2 of the ACM code of
                                  ethics and professional conduct  . . . . 105--111

Communications of the ACM
Volume 60, Number 6, June, 2017

                 Moshe Y. Vardi   Editor's letter: Ten years at the helm
                                  of \booktitleCommunications of the ACM   5--5
                 Vinton G. Cerf   Cerf's up: Open access to academic
                                  research . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Technologies do
                                  have ethics  . . . . . . . . . . . . . . 8--9
                   Mark Guzdial   BLOG@CACM: Balancing teaching CS
                                  efficiently with motivating students . . 10--11
                     Don Monroe   News: Deep learning takes on translation 12--14
                  Chris Edwards   News: Optimization search finds a heart
                                  of glass . . . . . . . . . . . . . . . . 15--16
                Sarah Underwood   News: Potential and peril  . . . . . . . 17--19
                    Neil Savage   News: Weaving the web  . . . . . . . . . 20--22
                     CACM Staff   News: Big data . . . . . . . . . . . . . 24--25
               Peter G. Neumann   Inside risks: Trustworthiness and
                                  truthfulness are essential . . . . . . . 26--28
            Leslie Goodyear and   
           Gary Silverstein and   
              Linda P. Thurston   Broadening participation: The influence
                                  and promise of alliances . . . . . . . . 29--30
         George V. Neville-Neil   Kode Vicious: Forced exception handling  31--32
               Peter J. Denning   Viewpoint: Remaining trouble spots with
                                  computational thinking . . . . . . . . . 33--39
                Devon H. O'Dell   The debugging mind-set . . . . . . . . . 40--45
                Pat Helland and   
               Simon Weaver and   
                      Ed Harris   Too big NOT to fail  . . . . . . . . . . 46--50
            Kate Matsudaira and   
                    Erik Meijer   Conversations with technology leaders:
                                  Erik Meijer  . . . . . . . . . . . . . . 51--54
              David Barrera and   
              Laurent Chuat and   
              Adrian Perrig and   
        Raphael M. Reischuk and   
             Pawel Szalachowski   The SCION Internet architecture  . . . . 56--65
                   Yili Liu and   
                      Lina Zhou   The dynamics of work-family conflict . . 66--70
                  David Bau and   
                  Jeff Gray and   
           Caitlin Kelleher and   
               Josh Sheldon and   
                Franklyn Turbak   Learnable programming: blocks and beyond 72--80
                 Jitendra Malik   Technical Perspective: What led computer
                                  vision to deep learning? . . . . . . . . 82--83
            Alex Krizhevsky and   
             Ilya Sutskever and   
             Geoffrey E. Hinton   ImageNet classification with deep
                                  convolutional neural networks  . . . . . 84--90
                  Avi Wigderson   Technical Perspective: Low-depth
                                  arithmetic circuits  . . . . . . . . . . 91--91
                Ankit Gupta and   
             Pritish Kamath and   
               Neeraj Kayal and   
          Ramprasad Saptharishi   Unexpected power of low-depth arithmetic
                                  circuits . . . . . . . . . . . . . . . . 93--100
                  Leah Hoffmann   Last byte: This is for everyone  . . . . 104--ff

Communications of the ACM
Volume 60, Number 7, July, 2017

                Andrew A. Chien   Editor's letter: Today's
                                  \booktitleCommunications of the ACM  . . 5--5
                 Vinton G. Cerf   Cerf's up: A brittle and fragile future  7--7
                   Mark Guzdial   BLOG@CACM: 'Generation CS' drives growth
                                  in enrollments . . . . . . . . . . . . . 10--11
                    Neil Savage   News: Building a brain may mean going
                                  analog . . . . . . . . . . . . . . . . . 13--15
               Samuel Greengard   News: Cracking the code on DNA storage   16--18
                    Gary Anthes   News: Artificial intelligence poised to
                                  ride a new wave  . . . . . . . . . . . . 19--21
             Lawrence M. Fisher   News: Jean E. Sammet 1928--2017  . . . . 22--22
              Adam L. Young and   
                      Moti Yung   Privacy and security: Cryptovirology:
                                  the birth, neglect, and explosion of
                                  ransomware . . . . . . . . . . . . . . . 24--26
             Brad Greenwood and   
              Gordon Burtch and   
                  Seth Carnahan   Economic and business dimensions:
                                  Unknowns of the gig-economy  . . . . . . 27--29
               Peter J. Denning   The profession of IT: The beginner's
                                  creed  . . . . . . . . . . . . . . . . . 30--31
                      Marc Snir   Viewpoint: The informal guide to ACM
                                  Fellow nominations . . . . . . . . . . . 32--34
                    Pat Helland   Side effects, front and center . . . . . 36--39
                Mark A. Overton   The IDAR graph . . . . . . . . . . . . . 40--45
               Peter Bailis and   
               Peter Alvaro and   
                  Sumit Gulwani   Research for practice: tracing and
                                  debugging distributed systems;
                                  programming by examples  . . . . . . . . 46--49
             D. Fox Harrell and   
                    Chong-U Lim   Reimagining the avatar dream: modeling
                                  social identity in digital media . . . . 50--61
       Pantelis Koutroumpis and   
              Aija Leiponen and   
         Llewellyn D. W. Thomas   How important is IT? . . . . . . . . . . 62--68
            Denis Nekipelov and   
                     Tammy Wang   Inference and auction design in online
                                  advertising  . . . . . . . . . . . . . . 70--79
              Fred B. Schneider   IronFleet simplifies proving safety and
                                  liveness properties: technical
                                  perspective  . . . . . . . . . . . . . . 82--82
           Chris Hawblitzel and   
                 Jon Howell and   
            Manos Kapritsos and   
             Jacob R. Lorch and   
                Bryan Parno and   
         Michael L. Roberts and   
              Srinath Setty and   
                     Brian Zill   IronFleet: proving safety and liveness
                                  of practical distributed systems . . . . 83--92
           Michael Mitzenmacher   Building a better hash function:
                                  technical perspective  . . . . . . . . . 93--93
                  Mikkel Thorup   Fast and powerful hashing using
                                  tabulation . . . . . . . . . . . . . . . 94--101
                  Dennis Shasha   Last byte: Ruby risks  . . . . . . . . . 104--104

Communications of the ACM
Volume 60, Number 8, August, 2017

                Andrew A. Chien   Editor's letter: Building the future:
                                  Communications of the ACM  . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: In praise of
                                  under-specification? . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Embed ethical
                                  guidelines in autonomous weapons . . . . 8--9
                     Philip Guo   BLOG@CACM: How adults ages 60+ are
                                  learning to code . . . . . . . . . . . . 10--11
                   Esther Shein   News: Hacker-proof coding  . . . . . . . 12--14
                   Logan Kugler   News: Why virtual reality will transform
                                  a workplace near you . . . . . . . . . . 15--17
              Keith Kirkpatrick   News: AI in contact centers  . . . . . . 18--19
             Lawrence M. Fisher   News: Charles P. `Chuck' Thacker:
                                  1943--2017 . . . . . . . . . . . . . . . 20--21
              David P. Anderson   Historical reflections: Prophets, seers,
                                  and pioneers . . . . . . . . . . . . . . 22--25
                  Jennifer Wang   Education: Is the U.S. education system
                                  ready for CS for all?  . . . . . . . . . 26--28
         George V. Neville-Neil   Kode Vicious: The observer effect  . . . 29--30
            Dominic Horsman and   
              Vivien Kendon and   
                  Susan Stepney   Viewpoint: The natural science of
                                  computing  . . . . . . . . . . . . . . . 31--34
            Ricardo Olenewa and   
              Gary M. Olson and   
            Judith S. Olson and   
              Daniel M. Russell   Now that we can write simultaneously,
                                  how do we use that to our advantage? . . 36--43
                  Hans-J. Boehm   Small-data computing: correct calculator
                                  arithmetic . . . . . . . . . . . . . . . 44--49
                      Leo Corry   Turing's pre-war analog computers: the
                                  fatherhood of the modern computer
                                  revisited  . . . . . . . . . . . . . . . 50--58
                   Longbing Cao   Data science: challenges and directions  59--68
         Marijn J. H. Heule and   
                Oliver Kullmann   The science of brute force . . . . . . . 70--79
                   Marc Shapiro   Unexpected connections: technical
                                  perspective  . . . . . . . . . . . . . . 82--82
         Austin T. Clements and   
          M. Frans Kaashoek and   
               Eddie Kohler and   
           Robert T. Morris and   
             Nickolai Zeldovich   The scalable commutativity rule:
                                  designing scalable software for
                                  multicore processors . . . . . . . . . . 83--90
                Helmut Pottmann   Linking form, function, and fabrication:
                                  technical perspective  . . . . . . . . . 91--91
         Moritz Bächer and   
               Bernd Bickel and   
              Emily Whiting and   
           Olga Sorkine-Hornung   Spin-it: optimizing moment of inertia
                                  for spinnable objects  . . . . . . . . . 92--99
                    Brian Clegg   Last byte: Turing's taxi . . . . . . . . 104--ff

Communications of the ACM
Volume 60, Number 9, September, 2017

           Simson Garfinkel and   
            Jeanna Matthews and   
          Stuart S. Shapiro and   
              Jonathan M. Smith   Letter from USACM: Toward algorithmic
                                  transparency and accountability  . . . . 5--5
                 Vinton G. Cerf   Cerf's Up: Take two aspirin and call me
                                  in the morning . . . . . . . . . . . . . 6--6
                 Moshe Y. Vardi   Vardi's Insights: Divination by program
                                  committee  . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Computational
                                  thinking is not necessarily
                                  computational  . . . . . . . . . . . . . 8--9
                  Robin K. Hill   BLOG@CACM: Assuring software quality by
                                  preventing neglect . . . . . . . . . . . 10--11
               Samuel Greengard   News: It's all about image . . . . . . . 13--15
                   Gregory Mone   News: Broadband to Mars  . . . . . . . . 16--17
                   Logan Kugler   News: Why GPS spoofing is a threat to
                                  companies, countries . . . . . . . . . . 18--19
             Lawrence M. Fisher   News: Turing laureates celebrate award's
                                  50th anniversary . . . . . . . . . . . . 20--23
             Lawrence M. Fisher   News: Charles W. Bachman: 1924--2017 . . 24--25
             Joel R. Reidenberg   Law and technology: Digitocracy  . . . . 26--28
Carolina Alves de Lima Salge and   
               Nicholas Berente   Computing ethics: Is that social bot
                                  behaving unethically?  . . . . . . . . . 29--31
               Peter J. Denning   The profession of IT: Multitasking
                                  without thrashing  . . . . . . . . . . . 32--34
        Gregorio Convertino and   
                Nancy Frishberg   Viewpoint: Why agile teams fail without
                                  UX research  . . . . . . . . . . . . . . 35--37
              Andrew Conway and   
                Peter Eckersley   Viewpoint: When does law enforcement's
                                  demand to read your data become a demand
                                  to read your mind? . . . . . . . . . . . 38--40
                Ben Treynor and   
                Mike Dahlin and   
                  Vivek Rau and   
                    Betsy Beyer   The calculus of service availability . . 42--47
                 Graham Cormode   Data sketching . . . . . . . . . . . . . 48--55
                Kate Matsudaira   10 ways to be a better interviewer . . . 56--58
          Carissa Schoenick and   
                Peter Clark and   
             Oyvind Tafjord and   
               Peter Turney and   
                   Oren Etzioni   Moving beyond the Turing Test with the
                                  Allen AI Science Challenge . . . . . . . 60--64
      Petter Bae Brandtzaeg and   
  Asbjòrn Fòlstad   Trust and distrust in online
                                  fact-checking services . . . . . . . . . 65--71
                   Sean Peisert   Security in high-performance computing
                                  environments . . . . . . . . . . . . . . 72--80
        Charles (Chuck) Thacker   Technical perspective: a gloomy look at
                                  the integrity of hardware  . . . . . . . 82--82
               Kaiyuan Yang and   
              Matthew Hicks and   
                  Qing Dong and   
                Todd Austin and   
               Dennis Sylvester   Exploiting the analog properties of
                                  digital circuits for malicious hardware  83--91
                      Ed H. Chi   Technical perspective: Humans and
                                  computers working together on hard tasks 92--92
          Walter S. Lasecki and   
      Christopher D. Miller and   
              Iftekhar Naim and   
           Raja Kushalnagar and   
               Adam Sadilek and   
              Daniel Gildea and   
              Jeffrey P. Bigham   Scribe: deep integration of human and
                                  machine intelligence to caption speech
                                  in real time . . . . . . . . . . . . . . 93--100
                  Leah Hoffmann   Last byte: All the pretty pictures . . . 104--ff

Communications of the ACM
Volume 60, Number 10, October, 2017

                Andrew A. Chien   Editor's letter: Computing is a
                                  profession . . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Editor's letter: Six education . . . . . 7--7
                     CACM Staff   Letters to the Editor: Beyond brute
                                  force  . . . . . . . . . . . . . . . . . 8--9
              Robin K. Hill and   
                   Mark Guzdial   BLOG@CACM: Manipulating word
                                  representations, and preparing students
                                  for coding jobs? . . . . . . . . . . . . 12--13
              Keith Kirkpatrick   News: $3$D-printing human body parts . . 15--17
                     Don Monroe   News: Digital hearing  . . . . . . . . . 18--20
                  Chris Edwards   News: Portable device fears show power
                                  of social development  . . . . . . . . . 21--22
            Michael A. Cusumano   Technology strategy and management:
                                  Amazon and whole foods: follow the
                                  strategy (and the money) . . . . . . . . 24--26
             David Lorge Parnas   Inside risks: The real risks of
                                  artificial intelligence  . . . . . . . . 27--31
                Vasant Dhar and   
                 Roger M. Stein   Economic and business dimensions:
                                  FinTech platforms and strategy . . . . . 32--35
         George V. Neville-Neil   Kode vicious: IoT: the Internet of
                                  Terror . . . . . . . . . . . . . . . . . 36--37
           Roderick Chapman and   
                 Neil White and   
                   Jim Woodcock   Viewpoint: What can agile methods bring
                                  to high-integrity software development?  38--41
                  Alvaro Videla   Metaphors we compute by  . . . . . . . . 42--45
               Peter Bailis and   
          Tawanna Dillahunt and   
           Stefanie Mueller and   
               Patrick Baudisch   Research for practice: technology for
                                  underserved communities; personal
                                  fabrication  . . . . . . . . . . . . . . 46--49
           Thomas A. Limoncelli   Four ways to make CS and IT more
                                  immersive  . . . . . . . . . . . . . . . 50--52
               Ewan Tempero and   
              Tony Gorschek and   
               Lefteris Angelis   Barriers to refactoring  . . . . . . . . 54--61
               Heiko Gewald and   
                Xuequn Wang and   
                Andy Weeger and   
      Mahesh S. Raisinghani and   
               Gerald Grant and   
             Otavio Sanchez and   
           Siddhi Pittayachawan   Millennials' attitudes toward IT
                                  consumerization in the workplace . . . . 62--69
          Stephen B. Wicker and   
              Kolbeinn Karlsson   Internet advertising: technology,
                                  ethics, and a serious difference of
                                  opinion  . . . . . . . . . . . . . . . . 70--79
            Jeffrey F. Naughton   Broadening and deepening query
                                  optimization yet still making progress:
                                  technical perspective  . . . . . . . . . 80--80
           Immanuel Trummer and   
                 Christoph Koch   Multi-objective parametric query
                                  optimization . . . . . . . . . . . . . . 81--89
              Jeffrey S. Foster   Shedding new light on an old language
                                  debate: technical perspective  . . . . . 90--90
              Baishakhi Ray and   
              Daryl Posnett and   
          Premkumar Devanbu and   
                Vladimir Filkov   A large-scale study of programming
                                  languages and code quality in GitHub . . 91--100

Communications of the ACM
Volume 60, Number 11, November, 2017

            Laurie Williams and   
                   Doug Baldwin   Departments: Highlights of the ACM
                                  student research competition . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Heidelberg laureate forum . . 6--6
                 Moshe Y. Vardi   Vardi's insights: Would Turing have won
                                  the Turing award?  . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the Editor: They see what you
                                  see  . . . . . . . . . . . . . . . . . . 8--9
                  Mei Kobayashi   BLOG@CACM: Opportunities for women,
                                  minorities in information retrieval  . . 10--11
                    Neil Savage   News: A block on the old chip  . . . . . 12--14
                    Alex Wright   News: Censoring sensors  . . . . . . . . 15--16
                   Esther Shein   News: Overcoming disabilities  . . . . . 17--19
               Pamela Samuelson   Legally speaking: Disgorging profits in
                                  design patent cases  . . . . . . . . . . 20--22
              Solon Barocas and   
                     Danah Boyd   Computing ethics: Engaging the ethics of
                                  data science in practice . . . . . . . . 23--25
             Richard Connor and   
              Quintin Cutts and   
                 Judy Robertson   Education: Keeping the machinery in
                                  computing education  . . . . . . . . . . 26--28
               Martin Spann and   
                Lucas Stich and   
               Klaus M. Schmidt   Viewpoint: Pay what you want as a
                                  pricing model for open access
                                  publishing?  . . . . . . . . . . . . . . 29--31
                Virginia Dignum   Viewpoint: Social agents: bridging
                                  simulation and engineering . . . . . . . 32--34
                     CACM Staff   Hootsuite: in pursuit of reactive
                                  systems  . . . . . . . . . . . . . . . . 36--43
                Kate Matsudaira   Breadth and depth  . . . . . . . . . . . 44--45
              Ivar Jacobson and   
                 Ian Spence and   
                     Pan-Wei Ng   Is there a single method for the
                                  Internet of Things?  . . . . . . . . . . 46--53
             Makoto Odamaki and   
                 Shree K. Nayar   Cambits: a reconfigurable camera system  54--61
             Stuart Mcilroy and   
                Weiyi Shang and   
                  Nasir Ali and   
                Ahmed E. Hassan   User reviews of top mobile apps in Apple
                                  and Google app stores  . . . . . . . . . 62--67
                 Laurel D. Riek   Healthcare robotics  . . . . . . . . . . 68--78
                   David Silver   Solving imperfect information games:
                                  technical perspective  . . . . . . . . . 80--80
            Michael Bowling and   
                 Neil Burch and   
           Michael Johanson and   
                Oskari Tammelin   Heads-up limit hold'em poker is solved   81--88
                     Marc Alexa   Exploring a kingdom by geodesic
                                  measures: technical perspective  . . . . 89--89
               Keenan Crane and   
        Clarisse Weischedel and   
                  Max Wardetzky   The heat method for distance computation 90--99
                   Seth Shostak   Last byte: Butterfly effect  . . . . . . 112--112

Communications of the ACM
Volume 60, Number 12, December, 2017

                Andrew A. Chien   Computing Is the Secret Ingredient
                                  (well, not so secret)  . . . . . . . . . 5--5
                     CACM Staff   Start CS Students Off with Industry Best
                                  Practices  . . . . . . . . . . . . . . . 6--6
                 Vinton G. Cerf   Cerf's up: Now for Something Entirely
                                  Different  . . . . . . . . . . . . . . . 7--7
                     Philip Guo   Building Tools to Help Students Learn to
                                  Program  . . . . . . . . . . . . . . . . 8--9
                     Don Monroe   Perovskites Boost Solar-Cell Potential   11--13
               Samuel Greengard   Gaming Machine Learning  . . . . . . . . 14--16
              Keith Kirkpatrick   Parallel Computational Thinking  . . . . 17--19
               Peter J. Denning   The Forgotten Engineer . . . . . . . . . 20--23
            Louise Ann Lyon and   
                    Jill Denner   Community Colleges: A Resource for
                                  Increasing Equity and Inclusion in
                                  Computer Science Education . . . . . . . 24--26
         George V. Neville-Neil   Cold, Hard Cache . . . . . . . . . . . . 27--28
            Stephen J. Andriole   The Death of Big Software  . . . . . . . 29--32
                   Ernest Davis   Lousy Advice to the Lovelorn . . . . . . 33--35
           Arvind Narayanan and   
                   Jeremy Clark   Bitcoin's Academic Pedigree  . . . . . . 36--45
                    Pat Helland   XML and JSON Are Like Cardboard  . . . . 46--47
                John Regehr and   
                   Peter Bailis   Research for Practice: Vigorous Public
                                  Debates in Academic Computer Science . . 48--50
              Martin E. Hellman   Turing Lecture: Cybersecurity, Nuclear
                                  Security, Alan Turing, and Illogical
                                  Logic  . . . . . . . . . . . . . . . . . 52--59
         Ramiro Montealegre and   
                Wayne F. Cascio   Technology-Driven Changes in Work and
                                  Employment . . . . . . . . . . . . . . . 60--67
              Gustavo Pinto and   
                Fernando Castor   Energy Efficiency: A New Concern for
                                  Application Software Developers  . . . . 68--75
                     Aaron Roth   Technical Perspective: Pricing
                                  Information (and Its Implications) . . . 78--78
                    Chao Li and   
             Daniel Yang Li and   
              Gerome Miklau and   
                      Dan Suciu   A Theory of Pricing Private Data . . . . 79--86
                    James Larus   Technical Perspective: A Simple, Elegant
                                  Approach to Non-Numeric Parallelization  87--87
           Simone Campanoni and   
             Kevin Brownell and   
               Svilen Kanev and   
           Timothy M. Jones and   
                Gu-Yeon Wei and   
                   David Brooks   Automatically Accelerating Non-Numerical
                                  Programs by Architecture-Compiler
                                  Co-Design  . . . . . . . . . . . . . . . 88--97
                  Leah Hoffmann   Last Byte: Grooming the Leaders of
                                  Tomorrow . . . . . . . . . . . . . . . . 112, 111


Communications of the ACM
Volume 61, Number 1, January, 2018

                 Vinton G. Cerf   Cerf's up: The role of archives in
                                  digital preservation . . . . . . . . . . 7--7
                 Moshe Y. Vardi   Vardi's insights: Computer professionals
                                  for social responsibility  . . . . . . . 9--9
                     CACM Staff   Letters to the editor: A leap from
                                  artificial to intelligence . . . . . . . 10--11
                 Mark R. Nelson   BLOG@CACM: The big IDEA and the PD
                                  pipeline . . . . . . . . . . . . . . . . 12--13
                   Gregory Mone   News: Feeling sounds, hearing sights . . 15--17
                    Alex Wright   News: Smartphone science . . . . . . . . 18--20
               Marina Krakovsky   News: The new jobs . . . . . . . . . . . 21--23
            Michael A. Cusumano   Technology strategy and management: The
                                  sharing economy meets reality  . . . . . 26--28
                  Chris Marsden   Law and technology: How law and computer
                                  science can work together to improve the
                                  information society  . . . . . . . . . . 29--31
                   Thomas Haigh   Historical reflections: Defining
                                  American greatness: IBM from Watson to
                                  Trump  . . . . . . . . . . . . . . . . . 32--37
            Henry C. Lucas, Jr.   Viewpoint: Technology and the failure of
                                  the university . . . . . . . . . . . . . 38--41
               Chitta Baral and   
              Shih-Fu Chang and   
              Brian Curless and   
            Partha Dasgupta and   
           Julia Hirschberg and   
                    Anita Jones   Viewpoint: Ask not what your postdoc can
                                  do for you \ldots  . . . . . . . . . . . 42--44
                Antony Alappatt   Network applications are interactive . . 46--53
               Peter Alvaro and   
                 Severine Tymon   Abstracting the geniuses away from
                                  failure testing  . . . . . . . . . . . . 54--61
                 Jacob Loveless   Cache me if you can  . . . . . . . . . . 62--68
                 Michele Coscia   Popularity spikes hurt future chances
                                  for viral propagation of protomemes  . . 70--77
             Hemang Subramanian   Decentralized blockchain-based
                                  electronic marketplaces  . . . . . . . . 78--84
         Wojciech Mazurczyk and   
                Steffen Wendzel   Information hiding: challenges for
                                  forensic experts . . . . . . . . . . . . 86--94
                David C. Parkes   Moving spectrum: technical perspective   96--96
                Neil Newman and   
 Alexandre Fréchette and   
             Kevin Leyton-Brown   Deep optimization for spectrum repacking 97--104
             Manuel Chakravarty   Can high performance be portable?:
                                  technical perspective  . . . . . . . . . 105--105
      Jonathan Ragan-Kelley and   
               Andrew Adams and   
             Dillon Sharlet and   
            Connelly Barnes and   
              Sylvain Paris and   
                 Marc Levoy and   
          Saman Amarasinghe and   
            Frédo Durand   Halide: decoupling algorithms from
                                  schedules for high-performance image
                                  processing . . . . . . . . . . . . . . . 106--115
                  Dennis Shasha   Last byte: Polychromatic choreography    120--120
             Don Gotterbarn and   
               Amy Bruckman and   
            Catherine Flick and   
               Keith Miller and   
                  Marty J. Wolf   ACM code of ethics and professional
                                  conduct: ACM code of ethics: a guide for
                                  positive action  . . . . . . . . . . . . 121--128

Communications of the ACM
Volume 61, Number 2, February, 2018

                   Jodi L. Tims   From the chair of ACM-W: Achieving
                                  gender equity: ACM-W can't do it alone   5--5
                 Vinton G. Cerf   Cerf's up: A comprehensive self-driving
                                  car test . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Toward an
                                  equation that anticipates AI risks . . . 8--9
              John Arquilla and   
                   Mark Guzdial   BLOG@CACM: Protecting the power grid,
                                  and finding bias in student evaluations  10--11
                  Chris Edwards   News: Quantum technology forgoes
                                  unconditional security to extend its
                                  reach  . . . . . . . . . . . . . . . . . 12--14
                    Neil Savage   News: Going serverless . . . . . . . . . 15--16
                   Logan Kugler   News: The war over the value of personal
                                  data . . . . . . . . . . . . . . . . . . 17--19
                   Kevin Fu and   
                     Wenyuan Xu   Inside risks: Risks of trusting the
                                  physics of sensors . . . . . . . . . . . 20--23
                Sarah Wille and   
            Daphne Sajous-Brady   Education: The inclusive and accessible
                                  workplace  . . . . . . . . . . . . . . . 24--26
         George V. Neville-Neil   Kode Vicious: Reducing the attack
                                  surface  . . . . . . . . . . . . . . . . 27--28
           Jennifer Keating and   
               Illah Nourbakhsh   Viewpoint: Teaching artificial
                                  intelligence and humanity  . . . . . . . 29--32
               Shane Greenstein   Viewpoint: Innovation from the edges . . 33--36
               Andrew Leung and   
              Andrew Spyker and   
                    Tim Bozarth   Titus: introducing containers to the
                                  Netflix cloud  . . . . . . . . . . . . . 38--45
                Albert Kwon and   
            James R. Wilcox and   
                   Peter Bailis   Research for practice: private online
                                  communication; highlights in systems
                                  verification . . . . . . . . . . . . . . 46--49
                Kate Matsudaira   Views from the top . . . . . . . . . . . 50--52
                John Zysman and   
                  Martin Kenney   The next phase in the digital
                                  revolution: intelligent tools,
                                  platforms, growth, employment  . . . . . 54--63
             Vlasta Stavova and   
              Lenka Dedkova and   
               Martin Ukrop and   
                  Vashek Matyas   A large-scale comparative study of beta
                                  testers and regular users  . . . . . . . 64--71
              Othon Michail and   
               Paul G. Spirakis   Elements of the theory of dynamic
                                  networks . . . . . . . . . . . . . . . . 72--72
                Steve Zdancewic   Building bug-free compilers: technical
                                  perspective  . . . . . . . . . . . . . . 83--83
              Nuno P. Lopes and   
             David Menendez and   
        Santosh Nagarakatte and   
                    John Regehr   Practical verification of peephole
                                  optimizations with Alive . . . . . . . . 84--91
               Vincent Conitzer   Designing algorithms and the fairness
                                  criteria they should satisfy: technical
                                  perspective  . . . . . . . . . . . . . . 92--92
                   Kobi Gal and   
         Ariel D. Procaccia and   
                 Moshe Mash and   
                      Yair Zick   Which is the fairest (rent division) of
                                  them all?  . . . . . . . . . . . . . . . 93--100
          David Allen Batchelor   Last byte: Welcome to the singularity    104--ff

Communications of the ACM
Volume 61, Number 3, March, 2018

                Andrew A. Chien   Editor's letter: Here comes everybody
                                  \ldots to \booktitleCommunications . . . 5--5
                 Vinton G. Cerf   Cerf's up: Unintended consequences . . . 7--7
                 Moshe Y. Vardi   Vardi's insights: A declaration of the
                                  dependence of cyberspace . . . . . . . . 9--9
                     CACM Staff   Letters to the Editor: Keep the ACM Code
                                  of Ethics as it is . . . . . . . . . . . 10--11
               Mark Guzdial and   
                 Bertrand Meyer   BLOG@CACM: The costs and pleasures of a
                                  computer science teacher . . . . . . . . 12--13
               Samuel Greengard   News: In pursuit of virtual life . . . . 15--17
              Keith Kirkpatrick   News: The construction industry in the
                                  21st century . . . . . . . . . . . . . . 18--20
                   Esther Shein   News: The state of fakery  . . . . . . . 21--23
                  Ross Anderson   Privacy and security: Making security
                                  sustainable  . . . . . . . . . . . . . . 24--26
               Pamela Samuelson   Legally speaking: Will the Supreme Court
                                  nix reviews of bad patents?  . . . . . . 27--29
                 Simon Rogerson   Computing ethics: Ethics omission
                                  increases gases emission . . . . . . . . 30--32
               Peter J. Denning   The profession of IT: The computing
                                  profession . . . . . . . . . . . . . . . 33--35
              Fred B. Schneider   Viewpoint: Impediments with policy
                                  interventions to foster cybersecurity    36--38
            M. S. Silberman and   
               B. Tomlinson and   
                R. LaPlante and   
                    J. Ross and   
                   L. Irani and   
                    A. Zaldivar   Viewpoint: Responsible research with
                                  crowds: pay crowdworkers at least
                                  minimum wage . . . . . . . . . . . . . . 39--41
                  Hanna Wallach   Viewpoint: Computational social science
                                  $ \neq $ computer science $+$ social
                                  data . . . . . . . . . . . . . . . . . . 42--44
        Yonatan Sompolinsky and   
                     Aviv Zohar   Bitcoin's underlying incentives  . . . . 46--53
           Thomas A. Limoncelli   Operational excellence in April Fools'
                                  pranks . . . . . . . . . . . . . . . . . 54--57
              Theo Schlossnagle   Monitoring in a DevOps world . . . . . . 58--61
         Matthias Felleisen and   
       Robert Bruce Findler and   
              Matthew Flatt and   
      Shriram Krishnamurthi and   
               Eli Barzilay and   
               Jay McCarthy and   
            Sam Tobin-Hochstadt   A programmable programming language  . . 62--71
               Bran Knowles and   
                Vicki L. Hanson   The wisdom of older technology
                                  (non)users . . . . . . . . . . . . . . . 72--77
                  Tony Gorschek   Evolution toward soft(er) products . . . 78--84
               Benjamin Kuipers   How can we trust a robot?  . . . . . . . 86--95
               Nicole Immorlica   A graph-theoretic framework traces task
                                  planning: technical perspective  . . . . 98--98
              Jon Kleinberg and   
                     Sigal Oren   Time-inconsistent planning: a
                                  computational problem in behavioral
                                  economics  . . . . . . . . . . . . . . . 99--107
                 Kenny Paterson   On Heartbleed: a hard beginnyng makth a
                                  good endyng John Heywood (1497--1580):
                                  technical perspective  . . . . . . . . . 108--108
                Liang Zhang and   
             David Choffnes and   
             Tudor Dumitras and   
                 Dave Levin and   
               Alan Mislove and   
             Aaron Schulman and   
                 Christo Wilson   Analysis of SSL certificate reissues and
                                  revocations in the wake of Heartbleed    109--116
                  Leah Hoffmann   Last byte: The network effect  . . . . . 120--ff

Communications of the ACM
Volume 61, Number 4, April, 2018

                Andrew A. Chien   Department: Editor's letter: Go big! . . 5--5
                 Vinton G. Cerf   Department: Editor's letter: The sound
                                  of programming . . . . . . . . . . . . . 6--6
                 Moshe Y. Vardi   Departments: Open access and ACM . . . . 7--7
                     CACM Staff   Letters to the editor: Predicting
                                  failure of the university  . . . . . . . 8--9
                  Jodi Tims and   
                 Daniel A. Reed   BLOG@CACM: Fostering inclusion, keeping
                                  the net neutral  . . . . . . . . . . . . 10--11
                    Neil Savage   News: Always out of balance  . . . . . . 12--14
                     Don Monroe   News: Chips for artificial intelligence  15--17
               Marina Krakovsky   News: Artificial (emotional)
                                  intelligence . . . . . . . . . . . . . . 18--19
                      Mari Sako   Technology strategy and management:
                                  Business ecosystems: how do they matter
                                  for innovation?  . . . . . . . . . . . . 20--22
         George V. Neville-Neil   Kode vicious: Popping kernels  . . . . . 23--24
            Sheldon H. Jacobson   Viewpoint: Push versus pull  . . . . . . 25--27
              Stephen B. Wicker   Viewpoint: Smartphones, contents of the
                                  mind, and the Fifth Amendment  . . . . . 28--31
                Nicole Forsgren   DevOps delivers  . . . . . . . . . . . . 32--33
                     Jez Humble   Continuous delivery sounds great, but
                                  will it work here? . . . . . . . . . . . 34--39
               Bridget Kromhout   Containers will not fix your broken
                                  culture (and other hard truths)  . . . . 40--43
            Nicole Forsgren and   
                    Mik Kersten   DevOps metrics . . . . . . . . . . . . . 44--48
    Mila Gascó-Hernandez   Building a smart city: lessons from
                                  Barcelona  . . . . . . . . . . . . . . . 50--57
           Caitlin Sadowski and   
         Edward Aftandilian and   
                 Alex Eagle and   
         Liam Miller-Cushon and   
                   Ciera Jaspan   Lessons from building static analysis
                                  tools at Google  . . . . . . . . . . . . 58--66
            Francine Berman and   
               Rob Rutenbar and   
             Brent Hailpern and   
         Henrik Christensen and   
             Susan Davidson and   
             Deborah Estrin and   
           Michael Franklin and   
         Margaret Martonosi and   
             Padma Raghavan and   
           Victoria Stodden and   
            Alexander S. Szalay   Realizing the potential of data science  67--72
             Mordechai Guri and   
                  Yuval Elovici   Bridgeware: the air-gap malware  . . . . 74--82
                  David M. Blei   Expressive probabilistic models and
                                  scalable method of moments: technical
                                  perspective  . . . . . . . . . . . . . . 84--84
              Sanjeev Arora and   
                    Rong Ge and   
               Yoni Halpern and   
                David Mimno and   
               Ankur Moitra and   
               David Sontag and   
                  Yichen Wu and   
                    Michael Zhu   Learning topic models --- provably and
                                  efficiently  . . . . . . . . . . . . . . 85--93
                  Dennis Shasha   Last byte: Finding October . . . . . . . 96--ff

Communications of the ACM
Volume 61, Number 5, May, 2018

                 Vinton G. Cerf   Cerf's up: Turing test 2 . . . . . . . . 5--5
              Jack Davidson and   
             Joseph Konstan and   
            Andrew A. Chien and   
                   Scott Delman   Editorial: Toward sustainable access:
                                  where are we now?  . . . . . . . . . . . 6--7
                 Moshe Y. Vardi   Vardi's insights: How we lost the women
                                  in computing . . . . . . . . . . . . . . 9--9
                     CACM Staff   ACM's election: ACM's 2018 general
                                  election: please take this opportunity
                                  to vote  . . . . . . . . . . . . . . . . 13--21
                     CACM Staff   Letters to the editor: Get ACM (and
                                  \booktitleCommunications) out of
                                  politics . . . . . . . . . . . . . . . . 20--11
               Edwin Torres and   
                     Walid Saba   BLOG@CACM: Commenting on code,
                                  considering data's bottleneck  . . . . . 24--25
                   Gregory Mone   News: Shrinking machines, cellular
                                  computers  . . . . . . . . . . . . . . . 26--28
                    Neil Savage   News: Using functions for easier
                                  programming  . . . . . . . . . . . . . . 29--30
               Samuel Greengard   News: Finding a healthier approach to
                                  managing medical data  . . . . . . . . . 31--33
                      Ryan Calo   Law and technology: Is the law ready for
                                  driverless cars? . . . . . . . . . . . . 34--36
              Fred B. Schneider   Privacy and security: Putting trust in
                                  security engineering . . . . . . . . . . 37--39
            Alexander Repenning   Education: Scale or fail . . . . . . . . 40--42
          Harold ``Bud'' Lawson   Viewpoint: The march into the black hole
                                  of complexity  . . . . . . . . . . . . . 43--45
             Margaret Martonosi   Viewpoint: Science, policy, and service  46--48
          Malte Schwarzkopf and   
                   Peter Bailis   Research for practice: cluster
                                  scheduling for datacenters . . . . . . . 50--53
    Stepán Davidovic and   
                    Betsy Beyer   Canary analysis service  . . . . . . . . 54--62
                Kate Matsudaira   How is your week going so far? . . . . . 63--64
             Josh Tenenberg and   
         Wolff-Michael Roth and   
               Donald Chinn and   
             Alfredo Jornet and   
                David Socha and   
                    Skip Walter   More than the code: learning rules of
                                  rejection in writing programs  . . . . . 66--71
          Richard R. Brooks and   
                      Lu Yu and   
                      Yu Fu and   
          Oluwakemi Hambolu and   
               John Gaynard and   
                Julie Owono and   
            Archippe Yepmou and   
                    Felix Blanc   Internet freedom in West Africa:
                                  technical support for journalists and
                                  democracy advocates  . . . . . . . . . . 72--82
                   Xiaonan Wang   Data acquisition in vehicular ad hoc
                                  networks . . . . . . . . . . . . . . . . 83--88
         Björn W. Schuller   Speech emotion recognition: two decades
                                  in a nutshell, benchmarks, and ongoing
                                  trends . . . . . . . . . . . . . . . . . 90--99
                   Oren Etzioni   Technical perspective: Breaking the mold
                                  of machine learning  . . . . . . . . . . 102--102
                T. Mitchell and   
                   W. Cohen and   
                E. Hruschka and   
                P. Talukdar and   
                    B. Yang and   
              J. Betteridge and   
                 A. Carlson and   
                   B. Dalvi and   
                 M. Gardner and   
                  B. Kisiel and   
           J. Krishnamurthy and   
                     N. Lao and   
                K. Mazaitis and   
                 T. Mohamed and   
               N. Nakashole and   
               E. Platanios and   
                  A. Ritter and   
                  M. Samadi and   
                 B. Settles and   
                    R. Wang and   
                  D. Wijaya and   
                   A. Gupta and   
                    X. Chen and   
                 A. Saparov and   
                 M. Greaves and   
                     J. Welling   Never-ending learning  . . . . . . . . . 103--115
                    Ken MacLeod   Last byte: Free press  . . . . . . . . . 120--ff

Communications of the ACM
Volume 61, Number 6, June, 2018

                 Vinton G. Cerf   Cerf's up: Celebrating excellence  . . . 5--5
                     CACM Staff   Letters to the editor: When to hold 'em  6--7
               Mark Guzdial and   
                   Susan Landau   BLOG@CACM: Programming programming
                                  languages, and analyzing Facebook's
                                  failure  . . . . . . . . . . . . . . . . 8--9
                    Neil Savage   News: Rewarded for RISC  . . . . . . . . 10--12
                  Chris Edwards   News: Deep learning hunts for signals
                                  among the noise  . . . . . . . . . . . . 13--14
              Keith Kirkpatrick   News: $3$D sensors provide security,
                                  better games . . . . . . . . . . . . . . 15--17
                   Logan Kugler   News: Getting hooked on tech . . . . . . 18--19
                Nicholas Weaver   Inside risks: Risks of cryptocurrencies  20--24
               Peter J. Denning   The profession of IT: An interview with
                                  Dave Parnas  . . . . . . . . . . . . . . 25--27
         George V. Neville-Neil   Kode Vicious: Watchdogs vs. snowflakes   28--29
                C. Le Goues and   
                    Y. Brun and   
                    S. Apel and   
                  E. Berger and   
                S. Khurshid and   
                 Y. Smaragdakis   Viewpoint: Effectiveness of
                                  anonymization in double-blind review . . 30--33
      Diptanu Gon Choudhury and   
                Timothy Perrett   Designing cluster schedulers for
                                  Internet-scale services  . . . . . . . . 34--40
            Tobias Lauinger and   
         Abdelberi Chaabane and   
              Christo B. Wilson   Thou shalt not depend on me  . . . . . . 41--47
           Thomas A. Limoncelli   Documentation is automation  . . . . . . 48--53
            Ricardo Baeza-Yates   Bias on the web  . . . . . . . . . . . . 54--61
          Jacob O. Wobbrock and   
         Krzysztof Z. Gajos and   
              Shaun K. Kane and   
          Gregg C. Vanderheiden   Ability-based design . . . . . . . . . . 62--71
                David Gefen and   
                Jake Miller and   
   Johnathon Kyle Armstrong and   
       Frances H. Cornelius and   
           Noreen Robertson and   
       Aaron Smith-McLallen and   
             Jennifer A. Taylor   Identifying patterns in medical records
                                  through latent semantic analysis . . . . 72--77
              Daniel Genkin and   
     Dimitrios Papadopoulos and   
        Charalampos Papamanthou   Privacy in decentralized
                                  cryptocurrencies . . . . . . . . . . . . 78--88
                  Landon P. Cox   Technical perspective: Measuring
                                  optimization potential with Coz  . . . . 90--90
         Charlie Curtsinger and   
                Emery D. Berger   Coz: finding code that counts with
                                  causal profiling . . . . . . . . . . . . 91--99
                  Leah Hoffmann   Last byte: RISC management . . . . . . . 104--ff

Communications of the ACM
Volume 61, Number 7, July, 2018

                Vicki L. Hanson   Departments: Reflections on my two years 5--5
                 Vinton G. Cerf   Cerf's up: On neural networks  . . . . . 7--7
                 Moshe Y. Vardi   Vardi's insights: How the hippies
                                  destroyed the Internet . . . . . . . . . 9--9
                     CACM Staff   Letters to the editor: Teach the law
                                  (and the AI) `foreseeability'  . . . . . 10--11
                Yegor Bugayenko   BLOG@CACM: We are done with `hacking'    12--13
                   Logan Kugler   News: Why cryptocurrencies use so much
                                  energy: and what to do about it  . . . . 15--17
                    Gary Anthes   News: You've got mail! . . . . . . . . . 18--19
              Keith Kirkpatrick   News: Bringing the Internet to the
                                  (developing) world . . . . . . . . . . . 20--21
               Pamela Samuelson   Legally speaking: Copyright blocks a
                                  news-monitoring technology . . . . . . . 24--26
                Hanna Halaburda   Economic and business dimensions:
                                  Blockchain revolution without the
                                  blockchain?  . . . . . . . . . . . . . . 27--29
                     Alex Ahmed   Broadening participation: Beyond
                                  diversity  . . . . . . . . . . . . . . . 30--32
                    Osman Yasar   Viewpoint: A new perspective on
                                  computational thinking . . . . . . . . . 33--39
             Josiah Dykstra and   
             Eugene H. Spafford   Viewpoint: The case for disappearing
                                  cyber security . . . . . . . . . . . . . 40--42
                 David Chisnall   C is not a low-level language  . . . . . 44--48
                Kate Matsudaira   How to come up with great ideas  . . . . 49--51
             Deepak Vasisht and   
                   Peter Bailis   Research for practice: toward a network
                                  of connected things  . . . . . . . . . . 52--54
             Ian Goodfellow and   
           Patrick McDaniel and   
               Nicolas Papernot   Making machine learning robust against
                                  adversarial inputs . . . . . . . . . . . 56--66
        Christoph Schneider and   
            Markus Weinmann and   
                 Jan vom Brocke   Digital nudging: guiding online user
                                  choices through interface design . . . . 67--73
                John Ousterhout   Always measure one level deeper  . . . . 74--83
    Carlo Gabriel Porto Bellini   The ABCs of effectiveness in the digital
                                  society  . . . . . . . . . . . . . . . . 84--91
            Sharon Goldberg and   
                  Ethan Heilman   The rewards of selfish mining: technical
                                  perspective  . . . . . . . . . . . . . . 94--94
                 Ittay Eyal and   
            Emin Gün Sirer   Majority is not enough: Bitcoin mining
                                  is vulnerable  . . . . . . . . . . . . . 95--102
                  Dennis Shasha   Last byte: String wars . . . . . . . . . 104--104

Communications of the ACM
Volume 61, Number 8, August, 2018

                James Larus and   
                   Chris Hankin   Informatics Europe and ACM Europe
                                  Council: Regulating automated decision
                                  making . . . . . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Traceability  . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Encourage ACM to
                                  address U.S. election integrity  . . . . 10--11
                  Robin K. Hill   BLOG@CACM: Assessing responsibility for
                                  program output . . . . . . . . . . . . . 12--13
                  Chris Edwards   News: Animals teach robots to find their
                                  way  . . . . . . . . . . . . . . . . . . 14--16
                     Don Monroe   News: Electronics are leaving the plane  17--18
                   Esther Shein   News: Broadening the path for women in
                                  STEM . . . . . . . . . . . . . . . . . . 19--21
                 Kashif Ali and   
                 Kurtis Heimerl   Global computing: Designing sustainable
                                  rural infrastructure through the lens of
                                  OpenCellular . . . . . . . . . . . . . . 22--25
               Mark Guzdial and   
                   Amy Bruckman   Education: Providing equitable access to
                                  computing education  . . . . . . . . . . 26--28
         George V. Neville-Neil   Kode vicious: Every silver lining has a
                                  cloud  . . . . . . . . . . . . . . . . . 29--30
                   Ehud Shapiro   Pointg/counterpoint: democracy and
                                  e-democracy: Point: foundations of
                                  e-democracy  . . . . . . . . . . . . . . 31--34
                Douglas Schuler   Point/counterpoint: democracy and
                                  e-democracy: Counterpoint: e-democracy
                                  won't save democracy. democracy will
                                  save democracy . . . . . . . . . . . . . 34--36
                    Alex Petrov   Algorithms behind modern storage systems 38--44
              Dan Crankshaw and   
            Joseph Gonzalez and   
                   Peter Bailis   Research for practice:
                                  prediction-serving systems . . . . . . . 45--49
                    Pat Helland   Consistently eventual  . . . . . . . . . 50--52
           Emanuelle Burton and   
             Judy Goldsmith and   
                Nicholas Mattei   How to teach computer ethics through
                                  science fiction  . . . . . . . . . . . . 54--64
       Christina Delimitrou and   
             Christos Kozyrakis   Amdahl's law for tail latency  . . . . . 65--72
               Jose M. Such and   
                 Natalia Criado   Multiparty privacy in social media . . . 74--81
                  John D. Owens   Technical perspective: Graphs,
                                  betweenness centrality, and the GPU  . . 84--84
            Adam McLaughlin and   
                 David A. Bader   Accelerating GPU betweenness centrality  85--92
        William Sims Bainbridge   Last byte: Deadlock  . . . . . . . . . . 96--ff
                Michael L. Best   Global computing: Session details:
                                  Global computing . . . . . . . . . . . . ??

Communications of the ACM
Volume 61, Number 9, September, 2018

                Andrew A. Chien   Editor's letter: Computer architecture:
                                  disruption from above  . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: The Peace of Westphalia . . . 6--6
                 Moshe Y. Vardi   Vardi's insights: Move fast and break
                                  things . . . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Hippie values
                                  really did build the Internet  . . . . . 9--11
                Yegor Bugayenko   BLOG@CACM: Discovering bugs, or ensuring
                                  success? . . . . . . . . . . . . . . . . 12--13
                     Don Monroe   News: AI holds the better hand . . . . . 14--16
                   Gregory Mone   News: Robotic implants . . . . . . . . . 17--18
              Keith Kirkpatrick   News: Borders in the cloud . . . . . . . 19--21
             Alan R. Wagner and   
           Jason Borenstein and   
                  Ayanna Howard   Computing ethics: Overtrust in the
                                  robotic age  . . . . . . . . . . . . . . 22--24
                 Frank Pasquale   Law and technology: When machine
                                  learning is facially invalid . . . . . . 25--27
               Peter J. Denning   The profession of IT: Navigating with
                                  accelerating technology change . . . . . 28--30
                    Adam Barker   Viewpoint: An academic's observations
                                  from a sabbatical at Google  . . . . . . 31--33
                  Edward A. Lee   Viewpoint: Is software the result of
                                  top-down intelligent design or
                                  evolution? . . . . . . . . . . . . . . . 34--36
           Thomas A. Limoncelli   GitOps: a path to more self-service IT   38--42
                    Noor Mubeen   Workload frequency scaling law:
                                  derivation and verification  . . . . . . 43--47
             Gustavo Alonso and   
                   Peter Bailis   Research for practice: FPGAs in
                                  datacenters  . . . . . . . . . . . . . . 48--49
           Norman P. Jouppi and   
                Cliff Young and   
              Nishant Patil and   
                David Patterson   A domain-specific architecture for deep
                                  neural networks  . . . . . . . . . . . . 50--59
           Robert Perricone and   
               X. Sharon Hu and   
               Joseph Nahas and   
                Michael Niemier   Can beyond-CMOS devices illuminate dark
                                  silicon? . . . . . . . . . . . . . . . . 60--69
           Slobodan Vucetic and   
         Ashis Kumar Chanda and   
             Shanshan Zhang and   
                   Tian Bai and   
                Aniruddha Maiti   Peer assessment of CS doctoral programs
                                  shows strong correlation with faculty
                                  citations  . . . . . . . . . . . . . . . 70--76
            Daniel J. Abadi and   
                Jose M. Faleiro   An overview of deterministic database
                                  systems  . . . . . . . . . . . . . . . . 78--88
            Romit Roy Choudhury   Technical perspective: Is your WiFi a
                                  sensor?  . . . . . . . . . . . . . . . . 90--90
               Mingmin Zhao and   
                 Fadel Adib and   
                    Dina Katabi   Emotion recognition using wireless
                                  signals  . . . . . . . . . . . . . . . . 91--100
                  Dennis Shasha   Last byte: Bounce blockchain . . . . . . 104--ff

Communications of the ACM
Volume 61, Number 10, October, 2018

                 Vinton G. Cerf   Cerf's up: The Internet in the 21st
                                  century  . . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: Hennessy and
                                  Patterson on the roots of RISC . . . . . 6--7
                Amir Banifatemi   BLOG@CACM: Can we use AI for global
                                  good?  . . . . . . . . . . . . . . . . . 8--9
                  Chris Edwards   News: Floating voxels provide new hope
                                  for $3$D displays  . . . . . . . . . . . 11--13
               Samuel Greengard   News: Transient electronics take shape   14--16
                   Esther Shein   News: The dangers of automating social
                                  programs . . . . . . . . . . . . . . . . 17--19
            Michael A. Cusumano   Technology strategy and management: The
                                  business of quantum computing  . . . . . 20--22
                    Peter Swire   Privacy and security: A pedagogic
                                  cybersecurity framework  . . . . . . . . 23--26
         George V. Neville-Neil   Kode vicious: The obscene coupling known
                                  as spaghetti code  . . . . . . . . . . . 27--28
Jean-François Abramatic and   
           Roberto Di Cosmo and   
             Stefano Zacchiroli   Viewpoint: Building the universal
                                  archive of source code . . . . . . . . . 29--31
                Jordi Cabot and   
Javier Luis Cánovas Izquierdo and   
              Valerio Cosentino   Viewpoint: Are CS conferences (too)
                                  closed communities?  . . . . . . . . . . 32--34
              Zachary C. Lipton   The mythos of model interpretability . . 36--43
                Kate Matsudaira   The secret formula for choosing the
                                  right next role  . . . . . . . . . . . . 44--46
                    Pat Helland   Mind your state for your state of mind   47--54
                 Adnan Darwiche   Human-level intelligence or animal-like
                                  abilities? . . . . . . . . . . . . . . . 56--67
               Gerwin Klein and   
             June Andronick and   
          Matthew Fernandez and   
                   Ihor Kuz and   
                Toby Murray and   
                  Gernot Heiser   Formally verified software in the real
                                  world  . . . . . . . . . . . . . . . . . 68--77
          Quang ``Neo'' Bui and   
                Sean Hansen and   
                  Manlu Liu and   
                Qiang (John) Tu   The productivity paradox in health
                                  information technology . . . . . . . . . 78--85
               Bonnie Nardi and   
             Bill Tomlinson and   
        Donald J. Patterson and   
                   Jay Chen and   
             Daniel Pargman and   
            Barath Raghavan and   
           Birgit Penzenstadler   Computing within limits  . . . . . . . . 86--93
                 John Baillieul   A control theorist's view on reactive
                                  control for autonomous drones: technical
                                  perspective  . . . . . . . . . . . . . . 95--95
               Luca Mottola and   
               Kamin Whitehouse   Fundamental concepts of reactive control
                                  for autonomous drones  . . . . . . . . . 96--104
                      Marc Snir   The future of MPI: technical perspective 105--105
       Robert Gerstenberger and   
               Maciej Besta and   
                Torsten Hoefler   Enabling highly scalable remote memory
                                  access programming with MPI-3 one sided  106--113
                  Leah Hoffmann   Last byte: Reaping the benefits of a
                                  diverse background . . . . . . . . . . . 120--ff

Communications of the ACM
Volume 61, Number 11, November, 2018

                 Vinton G. Cerf   Cerf's up: The upper layers of the
                                  internet . . . . . . . . . . . . . . . . 5--5
                 Moshe Y. Vardi   Departments: Self-reference and section
                                  230  . . . . . . . . . . . . . . . . . . 7--7
                Carl Hewitt and   
                    Vijay Kumar   The gap in CS, mulling irrational
                                  exuberance . . . . . . . . . . . . . . . 8--9
                     Don Monroe   News: AI, explain yourself . . . . . . . 11--13
                    Neil Savage   News: A new movement in seismology . . . 14--15
               Samuel Greengard   News: Weighing the impact of GDPR  . . . 16--18
               Pamela Samuelson   Legally speaking: The EU's controversial
                                  digital single market directive  . . . . 20--23
         Steven M. Bellovin and   
               Peter G. Neumann   Inside risks: The big picture  . . . . . 24--26
        R. Benjamin Shapiro and   
           Rebecca Fiebrink and   
                   Peter Norvig   Education: How machine learning impacts
                                  the undergraduate computing curriculum   27--29
                 C. Liaskos and   
            A. Tsioliaridou and   
             A. Pitsillides and   
               S. Ioannidis and   
                    I. Akyildiz   Viewpoint: Using any surface to realize
                                  a new paradigm for wireless
                                  communications . . . . . . . . . . . . . 30--33
           Janne Lahtiranta and   
                Sami Hyrynsalmi   Viewpoint: Crude and rude? . . . . . . . 34--35
                Andrew A. Chien   China region: Introducing
                                  \booktitleCommunications' regional
                                  special sections . . . . . . . . . . . . 36--37
              Wenguang Chen and   
                  Xiang-Yang Li   China Region Special Section: Hot
                                  Topics: Welcome to the China region
                                  special section  . . . . . . . . . . . . 38--38
                Elliott Zaagman   China Region Special Section: Hot
                                  Topics: China's computing ambitions  . . 40--41
               Chao-Yang Lu and   
             Cheng-Zhi Peng and   
                   Jian-Wei Pan   China Region Special Section: Hot
                                  Topics: Quantum communication at 7,600km
                                  and beyond . . . . . . . . . . . . . . . 42--43
                    Jun Zhu and   
               Tiejun Huang and   
              Wenguang Chen and   
                        Wen Gao   China Region Special Section: Hot
                                  Topics: The future of artificial
                                  intelligence in China  . . . . . . . . . 44--45
                      Peter Guy   China Region Special Section: Hot
                                  Topics: Consumers, corporations, and
                                  government: computing in China . . . . . 46--47
                      San Zhang   China Region Special Section: Hot
                                  Topics: Regional computing culture and
                                  personalities  . . . . . . . . . . . . . 48--49
              Xiang-Yang Li and   
               Jianwei Qian and   
                  Xiaoyang Wang   China Region Special Section: Hot
                                  Topics: Can China lead the development
                                  of data trading and sharing markets? . . 50--51
                        Luyi Xu   China Region Special Section: Hot
                                  Topics: Exploiting psychology and social
                                  behavior for game stickiness . . . . . . 52--53
                  Wanli Min and   
                   Liang Yu and   
                     Lei Yu and   
                       Shubo He   China Region Special Section: Big
                                  Trends: People logistics in smart cities 54--59
                    Hai Jin and   
                 Haibo Chen and   
                   Hong Gao and   
              Xiang-Yang Li and   
                        Song Wu   China Region Special Section: Big
                                  Trends: Cloud bursting for the world's
                                  largest consumer market  . . . . . . . . 60--64
                    Yuan Qi and   
                      Jing Xiao   China Region Special Section: Big
                                  Trends: Fintech: AI powers financial
                                  services to improve people's lives . . . 65--69
                 Huaxia Xia and   
                   Haiming Yang   China Region Special Section: Big
                                  Trends: Is last-mile delivery a `killer
                                  app' for self-driving vehicles?  . . . . 70--75
                      Yue Zhuge   China Region Special Section: Big
                                  Trends: Video consumption, social
                                  networking, and influence  . . . . . . . 76--81
                  Yutong Lu and   
                 Depei Qian and   
                 Haohuan Fu and   
                  Wenguang Chen   China Region Special Section: Big
                                  Trends: Will supercomputers be
                                  super-data and super-AI machines?  . . . 82--87
                  Matt Fata and   
      Philippe-Joseph Arida and   
               Patrick Hahn and   
                    Betsy Beyer   Corp to cloud: Google's virtual desktops 88--94
                Alex Ratner and   
            Chris Ré and   
                   Peter Bailis   Research for practice: knowledge base
                                  construction in the machine-learning era 95--97
Silvia Esparrachiari Ghirotti and   
               Tanya Reilly and   
                 Ashleigh Rentz   Tracking and controlling microservice
                                  dependencies . . . . . . . . . . . . . . 98--104
                  Ryen W. White   Skill discovery in virtual assistants    106--113
      Roberto Ierusalimschy and   
Luiz Henrique De Figueiredo and   
                 Waldemar Celes   A look at the design of Lua  . . . . . . 114--123
             Diomidis Spinellis   Modern debugging: the art of finding a
                                  needle in a haystack . . . . . . . . . . 124--134
          Daniel Waddington and   
                     Jim Harris   Software challenges for the changing
                                  storage landscape  . . . . . . . . . . . 136--145
                 Markus G. Kuhn   Backdoor engineering: technical
                                  perspective  . . . . . . . . . . . . . . 147--147
          Stephen Checkoway and   
           Jacob Maskiewicz and   
           Christina Garman and   
               Joshua Fried and   
             Shaanan Cohney and   
              Matthew Green and   
             Nadia Heninger and   
      Ralf-Philipp Weinmann and   
              Eric Rescorla and   
                  Hovav Shacham   Where did I leave my keys?: lessons from
                                  the Juniper Dual EC incident . . . . . . 148--155
              Tanzeem Choudhury   Making sleep tracking more user
                                  friendly: technical perspective  . . . . 156--156
                 Anh Nguyen and   
           Raghda Alqurashi and   
             Zohreh Raghebi and   
    Farnoush Banaei-Kashani and   
            Ann C. Halbower and   
                         Tam Vu   LIBS: a bioelectrical sensing system
                                  from human ears for staging whole-night
                                  sleep study  . . . . . . . . . . . . . . 157--165
                    Brian Clegg   Last byte: Between the abbey and the
                                  edge of time . . . . . . . . . . . . . . 176--ff

Communications of the ACM
Volume 61, Number 12, December, 2018

                 Vinton G. Cerf   Cerf's up: Self-authenticating
                                  identifiers  . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: Reclaim Internet
                                  greatness  . . . . . . . . . . . . . . . 7--8
              John Arquilla and   
                Yegor Bugayenko   BLOG@CACM: Securing agent 111, and the
                                  job of software architect  . . . . . . . 10--11
                  Chris Edwards   News: Learning to see  . . . . . . . . . 13--15
              Keith Kirkpatrick   News: Technology for the deaf  . . . . . 16--18
                   Logan Kugler   News: AI judges and juries . . . . . . . 19--21
               Ted G. Lewis and   
               Peter J. Denning   The profession of IT: Learning machine
                                  learning . . . . . . . . . . . . . . . . 24--27
         George V. Neville-Neil   Kode vicious: A chance gardener  . . . . 28--29
                   Oren Etzioni   Point/counterpoint: Point: Should AI
                                  technology be regulated?: yes, and
                                  here's how . . . . . . . . . . . . . . . 30--32
          Andrea O'Sullivan and   
                   Adam Thierer   Point/counterpoint: Counterpoint:
                                  Regulators should allow the greatest
                                  space for AI innovation  . . . . . . . . 33--35
                  Ryen W. White   Viewpoint: Opportunities and challenges
                                  in search interaction  . . . . . . . . . 36--38
               Rich Bennett and   
             Craig Callahan and   
                Stacy Jones and   
                Matt Levine and   
             Merrill Miller and   
                    Andy Ozment   How to live in a post-Meltdown and
                                  -Spectre world . . . . . . . . . . . . . 40--44
             Shylaja Nukala and   
                      Vivek Rau   Why SRE documents matter . . . . . . . . 45--51
                Kate Matsudaira   How to get things done when you don't
                                  feel like it . . . . . . . . . . . . . . 52--54
               Junyeong Lee and   
            Jaylyn Jeonghyun Oh   What motivates a citizen to take the
                                  initiative in e-participation?: the case
                                  of a South Korean parliamentary hearing  56--61
               Bran Knowles and   
        Alison Smith-Renner and   
  Forough Poursabzi-Sangdeh and   
                      Di Lu and   
                  Halimat Alabi   Uncertainty in current and future health
                                  wearables  . . . . . . . . . . . . . . . 62--67
           Barbara J. Grosz and   
                    Peter Stone   A century-long commitment to assessing
                                  artificial intelligence and its impact
                                  on society . . . . . . . . . . . . . . . 68--73
              Daniel McDuff and   
                Mary Czerwinski   Designing emotionally sentient agents    74--83
                Rajeev Alur and   
              Rishabh Singh and   
                Dana Fisman and   
           Armando Solar-Lezama   Search-based program synthesis . . . . . 84--93
                     Tim Harris   Technical perspective: Node replication
                                  divides to conquer . . . . . . . . . . . 96--96
               Irina Calciu and   
             Siddhartha Sen and   
        Mahesh Balakrishnan and   
             Marcos K. Aguilera   How to implement any concurrent data
                                  structure  . . . . . . . . . . . . . . . 97--105
           Anders Mòller   Technical perspective: WebAssembly: a
                                  quiet revolution of the web  . . . . . . 106--106
           Andreas Rossberg and   
              Ben L. Titzer and   
               Andreas Haas and   
            Derek L. Schuff and   
                 Dan Gohman and   
                Luke Wagner and   
                 Alon Zakai and   
              J. F. Bastien and   
                 Michael Holman   Bringing the web up to speed with
                                  WebAssembly  . . . . . . . . . . . . . . 107--115
                  Leah Hoffmann   Last byte: Promoting common sense,
                                  reality, dependable engineering  . . . . 128--ff


Communications of the ACM
Volume 62, Number 1, January, 2019

                Andrew A. Chien   Editor's letter: Open collaboration in
                                  an age of distrust . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: A people-centered economy . . 6--6
                 Moshe Y. Vardi   Departments: Are we having an ethical
                                  crisis in computing? . . . . . . . . . . 7--7
                 Judy Robertson   BLOG@CACM: Answering children's
                                  questions about computers  . . . . . . . 8--9
                     Don Monroe   News: Quantum leap . . . . . . . . . . . 10--12
                  Chris Edwards   News: Hidden messages fool AI  . . . . . 13--14
                   Esther Shein   News: Who owns $3$D scans of historic
                                  sites? . . . . . . . . . . . . . . . . . 15--17
                  Michal S. Gal   Law and technology: Illegal pricing
                                  algorithms . . . . . . . . . . . . . . . 18--20
            Michael A. Cusumano   Technology strategy and management:
                                  CRISPR: an emerging platform for gene
                                  editing  . . . . . . . . . . . . . . . . 21--23
                   Thomas Haigh   Historical reflections: Hey Google,
                                  what's a moonshot?: how Silicon Valley
                                  mocks Apollo . . . . . . . . . . . . . . 24--30
      Niels Da Vitoria Lobo and   
                Mubarak A. Shah   Viewpoint: UCF's 30-year REU site in
                                  computer vision  . . . . . . . . . . . . 31--34
                  Edward A. Lee   Viewpoint: Modeling in engineering and
                                  science  . . . . . . . . . . . . . . . . 35--36
                      Alpha Lam   Using remote cache service for Bazel . . 38--42
                Jessie Frazelle   Research for practice: security for the
                                  modern age . . . . . . . . . . . . . . . 43--45
           Thomas A. Limoncelli   SQL is no excuse to avoid DevOps . . . . 46--49
              Stefan Seidel and   
           Nicholas Berente and   
              Aron Lindberg and   
             Kalle Lyytinen and   
           Jeffrey V. Nickerson   Autonomous tools and design: a
                                  triple-loop approach to human-machine
                                  learning . . . . . . . . . . . . . . . . 50--57
 Sergio Orenga-Roglá and   
               Ricardo Chalmeta   Framework for implementing a big data
                                  ecosystem in organizations . . . . . . . 58--65
           B. Jack Copeland and   
                   Oron Shagrir   The Church--Turing thesis: logical limit
                                  or breachable barrier? . . . . . . . . . 66--74
                Yolanda Gil and   
          Suzanne A. Pierce and   
              Hassan Babaie and   
           Arindam Banerjee and   
                 Kirk Borne and   
                  Gary Bust and   
          Michelle Cheatham and   
          Imme Ebert-Uphoff and   
                Carla Gomes and   
                  Mary Hill and   
                 John Horel and   
                 Leslie Hsu and   
                 Jim Kinter and   
             Craig Knoblock and   
                 David Krum and   
                Vipin Kumar and   
          Pierre Lermusiaux and   
                    Yan Liu and   
                Chris North and   
          Victor Pankratius and   
              Shanan Peters and   
                 Beth Plale and   
                 Allen Pope and   
                 Sai Ravela and   
              Juan Restrepo and   
               Aaron Ridley and   
                Hanan Samet and   
                 Shashi Shekhar   Intelligent systems for geosciences: an
                                  essential research agenda  . . . . . . . 76--84
              William Casey and   
             Ansgar Kellner and   
       Parisa Memarmoshrefi and   
         Jose Andre Morales and   
                     Bud Mishra   Deception, identity, and security: the
                                  game theory of sybil attacks . . . . . . 85--93
                         Hao Li   Photorealistic facial digitization and
                                  manipulation: technical perspective  . . 95--95
               Justus Thies and   
     Michael Zollhöfer and   
            Marc Stamminger and   
         Christian Theobalt and   
         Matthias Nießner   Face2Face: real-time face capture and
                                  reenactment of RGB videos  . . . . . . . 96--104
                      Dan Boneh   Attacking cryptographic key exchange
                                  with precomputation: technical
                                  perspective  . . . . . . . . . . . . . . 105--105
               David Adrian and   
      Karthikeyan Bhargavan and   
            Zakir Durumeric and   
            Pierrick Gaudry and   
              Matthew Green and   
          J. Alex Halderman and   
             Nadia Heninger and   
             Drew Springall and   
      Emmanuel Thomé and   
               Luke Valenta and   
       Benjamin VanderSloot and   
               Eric Wustrow and   
Santiago Zanella-Béguelin and   
                Paul Zimmermann   Imperfect forward secrecy: how
                                  Diffie--Hellman fails in practice  . . . 106--114
                  Dennis Shasha   Last byte: Randomized
                                  anti-counterfeiting  . . . . . . . . . . 120--ff

Communications of the ACM
Volume 62, Number 2, February, 2019

                 Vinton G. Cerf   Cerf's up: Libraries considered
                                  hazardous  . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: Between the lines
                                  in the China region special section  . . 6--7
           Herbert Bruderer and   
                  Robin K. Hill   BLOG@CACM: Seeking digital humanities,
                                  IT tech support  . . . . . . . . . . . . 8--9
               Samuel Greengard   News: A brave new world of genetic
                                  engineering  . . . . . . . . . . . . . . 11--13
              Keith Kirkpatrick   News: Technologizing agriculture . . . . 14--16
                   Logan Kugler   News: Being recognized everywhere  . . . 17--19
                  Carl Landwher   Privacy and security: 2018: a big year
                                  for privacy  . . . . . . . . . . . . . . 20--22
               Carol Frieze and   
           Jeria L. Quesenberry   Broadening participation: How computer
                                  science at CMU is attracting and
                                  retaining women  . . . . . . . . . . . . 23--26
         George V. Neville-Neil   Kode Vicious: Writing a test plan  . . . 27--27
              Dror G. Feitelson   Viewpoint: Tony's law  . . . . . . . . . 28--31
                Enrico Nardelli   Viewpoint: Do we really need
                                  computational thinking?  . . . . . . . . 32--35
                     CACM Staff   CodeFlow: improving the code review
                                  process at Microsoft . . . . . . . . . . 36--44
                Kate Matsudaira   The importance of a great finish . . . . 45--47
           John L. Hennessy and   
             David A. Patterson   A new golden age for computer
                                  architecture . . . . . . . . . . . . . . 48--60
                   Chao Gao and   
                    Zhen Su and   
                 Jiming Liu and   
             Jürgen Kurths   Even central users do not always drive
                                  information diffusion  . . . . . . . . . 61--67
              Juan P. Bello and   
              Claudio Silva and   
                   Oded Nov and   
             R. Luke Dubois and   
                Anish Arora and   
             Justin Salamon and   
            Charles Mydlarz and   
              Harish Doraiswamy   SONYC: a system for monitoring,
                                  analyzing, and mitigating urban noise
                                  pollution  . . . . . . . . . . . . . . . 68--77
                Maurice Herlihy   Blockchains from a distributed computing
                                  perspective  . . . . . . . . . . . . . . 78--85
                  Peter O'Hearn   Separation logic . . . . . . . . . . . . 86--95
              Thomas F. Wenisch   How economic theories can help computers
                                  beat the heat: technical perspective . . 97--97
               Songchun Fan and   
         Seyed Majid Zahedi and   
                Benjamin C. Lee   Distributed strategies for computational
                                  sprints  . . . . . . . . . . . . . . . . 98--106
              Surajit Chaudhuri   To do or not to do: extending SQL with
                                  integer linear programming?: technical
                                  perspective  . . . . . . . . . . . . . . 107--107
             Matteo Brucato and   
              Azza Abouzied and   
               Alexandra Meliou   Scalable computation of high-order
                                  optimization queries . . . . . . . . . . 108--116
          David Allen Batchelor   Last byte: Hawking's nightmare . . . . . 120--ff

Communications of the ACM
Volume 62, Number 3, March, 2019

                Andrew A. Chien   Editor's letter: Owning computing's
                                  environmental impact . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Ownership vs. stewardship . . 6--6
                 Moshe Y. Vardi   Departments: Lost in math? . . . . . . . 7--7
                  Mary Hall and   
             Richard Ladner and   
               Diane Levitt and   
Manuel A. Pérez Quiñones and   
                 Saurabh Bagchi   BLOG@CACM: Smoothing the path to
                                  computing: pondering uses for big data   8--9
                   Logan Kugler   News: Building a better battery  . . . . 11--13
                   Esther Shein   News: Exoskeletons today . . . . . . . . 14--16
              Keith Kirkpatrick   News: Electronics need rare earths . . . 17--18
               Pamela Samuelson   Legally speaking: Questioning a new
                                  intellectual property right for press
                                  publishers . . . . . . . . . . . . . . . 20--23
                     Ofir Turel   Economic and business dimensions:
                                  Potential `dark sides' of leisure
                                  technology use in youth  . . . . . . . . 24--27
               Peter J. Denning   The profession of IT: An interview with
                                  William Hugh Murray  . . . . . . . . . . 28--30
               Sepehr Vakil and   
                 Jennifer Higgs   Education: It's about power  . . . . . . 31--33
            Mike Tissenbaum and   
               Josh Sheldon and   
                    Hal Abelson   Viewpoint: From computational thinking
                                  to computational action  . . . . . . . . 34--36
                      Jim Waldo   A hitchhiker's guide to the blockchain
                                  universe . . . . . . . . . . . . . . . . 38--42
                Kate Matsudaira   Design patterns for managing up  . . . . 43--45
           Simson Garfinkel and   
              John M. Abowd and   
           Christian Martindale   Understanding database reconstruction
                                  attacks on public data . . . . . . . . . 46--53
                    Judea Pearl   The seven tools of causal inference,
                                  with reflections on machine learning . . 54--60
              Zhi Quan Zhou and   
                      Liqun Sun   Metamorphic testing of driverless cars   61--67
        Advaith Siddharthan and   
        Kapila Ponnamperuma and   
              Chris Mellish and   
                  Chen Zeng and   
         Daniel Heptinstall and   
             Annie Robinson and   
                Stuart Benn and   
        René Van Der Wal   Blogging birds: telling informative
                                  stories about the lives of birds from
                                  telemetric data  . . . . . . . . . . . . 68--77
                Pamela Zave and   
               Jennifer Rexford   The compositional architecture of the
                                  Internet . . . . . . . . . . . . . . . . 78--87
                Tim Roughgarden   Beyond worst-case analysis . . . . . . . 88--96
               Martin C. Rinard   Technical perspective: Borrowing big
                                  code to automate programming activities  98--98
            Veselin Raychev and   
              Martin Vechev and   
                 Andreas Krause   Predicting program properties from `big
                                  code'  . . . . . . . . . . . . . . . . . 99--107
            Nisheeth K. Vishnoi   Technical perspective: Isolating a
                                  matching when your coins go missing  . . 108--108
             Stephen Fenner and   
               Rohit Gurjar and   
                Thomas Thierauf   A deterministic parallel algorithm for
                                  bipartite perfect matching . . . . . . . 109--115
                  Leah Hoffmann   Last byte: Guiding computers, robots to
                                  see and think  . . . . . . . . . . . . . 120--ff

Communications of the ACM
Volume 62, Number 4, April, 2019

                 Vinton G. Cerf   Cerf's up: In debt to the NSF  . . . . . 5--5
              Robin K. Hill and   
                   Mark Guzdial   BLOG@CACM: Pondering variables and
                                  direct instruction . . . . . . . . . . . 6--6
                  Chris Edwards   News: Soft robots look to new
                                  environments . . . . . . . . . . . . . . 9--9
               Samuel Greengard   News: The future of data storage . . . . 12--12
                Sarah Underwood   News: The fine line between coercion and
                                  care . . . . . . . . . . . . . . . . . . 15--15
                      Mari Sako   Technology strategy and management: Free
                                  trade in a digital world . . . . . . . . 18--18
         George V. Neville-Neil   Kode Vicious: Know your algorithms . . . 22--22
               Dirk Lewandowski   Viewpoint: The web is missing an
                                  essential part of infrastructure: an
                                  open web index . . . . . . . . . . . . . 24--24
         Panagiota Fatourou and   
                   Chris Hankin   Europe region: Welcome to the Europe
                                  region special section . . . . . . . . . 28--28
                 Lisa Korrigane   Europe Region Special Section: Hot
                                  topics: A demographic snapshot of the IT
                                  workforce in Europe  . . . . . . . . . . 32--32
                  David Pringle   Europe Region Special Section: Hot
                                  topics: Enterprises lead ICT innovation
                                  in Europe  . . . . . . . . . . . . . . . 34--34
                  David Pringle   Europe Region Special Section: Hot
                                  topics: Europe's ambitious ICT agenda    35--35
                  David Pringle   Europe Region Special Section: Hot
                                  topics: Europe's well-connected
                                  consumers  . . . . . . . . . . . . . . . 36--36
                Laurence Kalman   Europe Region Special Section: Hot
                                  topics: New European data privacy and
                                  cyber security laws: one year later  . . 38--38
                  Jan Gulliksen   Europe Region Special Section: Hot
                                  topics: Incorporating Europe's values in
                                  future research  . . . . . . . . . . . . 40--40
          Koen De Bosschere and   
              Marc Duranton and   
                 Madeleine Gray   Europe Region Special Section: Hot
                                  topics: HiPEAC: a European network built
                                  to last  . . . . . . . . . . . . . . . . 42--42
              Joaquim Jorge and   
         Mashhuda Glencross and   
                  Aaron Quigley   Europe Region Special Section: Hot
                                  topics: ACM Europe Council's best paper
                                  awards . . . . . . . . . . . . . . . . . 44--44
            Julie A. McCann and   
          Gian Pietro Picco and   
                Alex Gluhak and   
      Karl Henrik Johansson and   
       Martin Törngren and   
                     Laila Gide   Europe Region Special Section: Big
                                  trends: Connected things connecting
                                  Europe . . . . . . . . . . . . . . . . . 46--46
         Panagiota Fatourou and   
          Yota Papageorgiou and   
               Vasiliki Petousi   Europe Region Special Section: Big
                                  trends: Women are needed in STEM:
                                  European policies and incentives . . . . 52--52
       Michael E. Caspersen and   
            Judith Gal-Ezer and   
          Andrew McGettrick and   
                Enrico Nardelli   Europe Region Special Section: Big
                                  trends: Informatics as a fundamental
                                  discipline for the 21st century  . . . . 58--58
                Paola Inverardi   Europe Region Special Section: Big
                                  trends: The European perspective on
                                  responsible computing  . . . . . . . . . 64--64
                 Thomas Skordas   Europe Region Special Section: Big
                                  trends: Toward a European exascale
                                  ecosystem: the EuroHPC joint undertaking 70--70
              Steffen Staab and   
              Susan Halford and   
                     Wendy Hall   Europe Region Special Section: Big
                                  trends: Web science in Europe: beyond
                                  boundaries . . . . . . . . . . . . . . . 74--74
                    Pat Helland   Identity by any other name . . . . . . . 80--80
     Benjamin Treynor Sloss and   
             Shylaja Nukala and   
                      Vivek Rau   Metrics that matter  . . . . . . . . . . 88--88
                     Nitesh Mor   Research for practice: edge computing    95--95
               Vijay Khatri and   
                Binny M. Samuel   Analytics for managerial work  . . . . . 100--100
                James B. Aimone   Neural algorithms and computing beyond
                                  Moore's law  . . . . . . . . . . . . . . 110--110
             Petros Wallden and   
                  Elham Kashefi   Cyber security in the quantum era  . . . 120--120
                Gilles Brassard   Technical perspective: Was Edgar Allan
                                  Poe wrong after all? . . . . . . . . . . 132--132
             Umesh Vazirani and   
                  Thomas Vidick   Fully device independent quantum key
                                  distribution . . . . . . . . . . . . . . 133--133
                  Dennis Shasha   Last byte: Fighting for lava . . . . . . 144--144

Communications of the ACM
Volume 62, Number 5, May, 2019

                 Vinton G. Cerf   Cerf's up: APIs, standards, and enabling
                                  infrastructure . . . . . . . . . . . . . 5--5
                 Moshe Y. Vardi   Departments: Quantum hype and quantum
                                  skepticism . . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Don't ignore the
                                  cost of `embedded energy'  . . . . . . . 10--11
                   Ryan Carrier   BLOG@CACM: Implementing guidelines for
                                  governance, oversight of AI, and
                                  automation . . . . . . . . . . . . . . . 12--13
                  Chris Edwards   News: Questioning quantum  . . . . . . . 15--17
                    Neil Savage   News: Code talkers . . . . . . . . . . . 18--19
               Samuel Greengard   News: Deep insecurities: the Internet of
                                  Things shifts technology risk  . . . . . 20--22
              James Grimmelmann   Law and technology: Continuity and
                                  change in Internet law . . . . . . . . . 24--26
                Joan Feigenbaum   Privacy and security: Encryption and
                                  surveillance . . . . . . . . . . . . . . 27--29
          Emmanuel Schanzer and   
      Shriram Krishnamurthi and   
                   Kathi Fisler   Education: What does it mean for a
                                  computing curriculum to succeed? . . . . 30--32
            Alberto Bartoli and   
                Eric Medvet and   
          Andrea De Lorenzo and   
                 Fabiano Tarlao   Viewpoint: Enterprise wi-fi: we need
                                  devices that are secure by default . . . 33--35
               Raymond Blum and   
                    Betsy Beyer   Achieving digital permanence . . . . . . 36--42
           Martin Kleppmann and   
      Alastair R. Beresford and   
                 Boerge Svingen   Online event processing  . . . . . . . . 43--49
          Aleksandar Kuzmanovic   Net neutrality: unexpected solution to
                                  blockchain scaling . . . . . . . . . . . 50--55
            Fay Cobb Payton and   
                    Eleni Berki   Countering the negative image of women
                                  in computing . . . . . . . . . . . . . . 56--63
                Yongge Wang and   
            Qutaibah M. Malluhi   The limit of blockchains: infeasibility
                                  of a smart Obama--Trump contract . . . . 64--69
                 Rod Downey and   
           Denis R. Hirschfeldt   Algorithmic randomness . . . . . . . . . 70--80
                Zachary G. Ives   Technical perspective: Compressing
                                  matrices for large-scale machine
                                  learning . . . . . . . . . . . . . . . . 82--82
             Ahmed Elgohary and   
             Matthias Boehm and   
              Peter J. Haas and   
         Frederick R. Reiss and   
              Berthold Reinwald   Compressed linear algebra for
                                  declarative large-scale machine learning 83--91
                    Ken MacLeod   Last byte: Like old times  . . . . . . . 96--ff

Communications of the ACM
Volume 62, Number 6, June, 2019

              Cherri M. Pancake   Editor's letter: ACM awards honor CS
                                  contributions  . . . . . . . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Back to the future  . . . . . 7--7
               Mark Guzdial and   
                  John Arquilla   BLOG@CACM: Is CS really for all, and
                                  defending democracy in cyberspace  . . . 8--9
                    Neil Savage   News: Neural net worth . . . . . . . . . 10--12
                    Gary Anthes   News: Lifelong learning in artificial
                                  neural networks  . . . . . . . . . . . . 13--15
                   Logan Kugler   The Trouble with SMS Two-Factor
                                  Authentication . . . . . . . . . . . . . 14--14
                     Don Monroe   News: And then, there were three . . . . 16--18
              Keith Kirkpatrick   News: Ethics in technology jobs  . . . . 19--20
                  Linnet Taylor   Global computing: Global data justice    22--24
            A. T. Markettos and   
            R. N. M. Watson and   
                S. W. Moore and   
                  P. Sewell and   
                  P. G. Neumann   Inside risks: Through computer
                                  architecture, darkly . . . . . . . . . . 25--27
               Peter J. Denning   The profession of IT: An interview with
                                  David Brin on resiliency . . . . . . . . 28--31
            Thomas Pasquier and   
                David Eyers and   
                     Jean Bacon   Viewpoint: Personal data and the
                                  Internet of Things . . . . . . . . . . . 32--34
             Ulan Degenbaev and   
           Michael Lippautz and   
                   Hannes Payer   Garbage collection as a joint venture    36--41
                Kate Matsudaira   How to create a great team culture (and
                                  why it matters)  . . . . . . . . . . . . 42--44
          Zachary C. Lipton and   
               Jacob Steinhardt   Research for practice: troubling trends
                                  in machine-learning scholarship  . . . . 45--53
                Jaeyoung Do and   
           Sudipta Sengupta and   
                 Steven Swanson   Programmable solid-state storage in
                                  future cloud datacenters . . . . . . . . 54--62
               O. Sami Saydjari   Engineering trustworthy systems: a
                                  principled approach to cybersecurity . . 63--69
             Daniel S. Weld and   
                   Gagan Bansal   The challenge of crafting intelligible
                                  intelligence . . . . . . . . . . . . . . 70--79
             Rishiyur S. Nikhil   Technical perspective: back to the edge  82--82
              Tony Nowatzki and   
            Vinay Gangadhar and   
      Karthikeyan Sankaralingam   Heterogeneous Von Neumann/dataflow
                                  microprocessors  . . . . . . . . . . . . 83--91
                  Leah Hoffmann   Last byte: Reaching new heights with
                                  artificial neural networks . . . . . . . 96--ff

Communications of the ACM
Volume 62, Number 7, July, 2019

                Andrew A. Chien   Editor's letter: Halfway round!: growing
                                  the regional special sections  . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Back to the future, part II   6--6
                 Moshe Y. Vardi   Departments: To serve humanity . . . . . 7--7
            Gloria Townsend and   
                  Sheldon Waite   BLOG@CACM: Bringing more women,
                                  immigrants, to computer science  . . . . 8--9
                Erica Klarreich   News: Good algorithms make good
                                  neighbors  . . . . . . . . . . . . . . . 11--13
              Keith Kirkpatrick   News: The edge of computational
                                  photography  . . . . . . . . . . . . . . 14--16
                   Logan Kugler   News: Protecting the 2020 census . . . . 17--19
               Pamela Samuelson   Legally speaking: API copyrights
                                  revisited  . . . . . . . . . . . . . . . 20--22
                Susan J. Winter   Computing ethics: Who benefits?  . . . . 23--25
             David Nordfors and   
            Chally Grundwag and   
                   V. R. Ferose   Broadening participation: A new labor
                                  market for people with 'coolabilities'   26--28
               Emery Berger and   
       Stephen M. Blackburn and   
              Carla Brodley and   
             H. V. Jagadish and   
        Kathryn S. McKinley and   
        Mario A. Nascimento and   
              Minjeong Shin and   
               Kuansan Wang and   
                     Lexing Xie   Viewpoint: GOTO rankings considered
                                  helpful  . . . . . . . . . . . . . . . . 29--30
                    Pat Helland   Extract, shoehorn, and load  . . . . . . 32--33
           Thomas A. Limoncelli   The top 10 things executives should know
                                  about software . . . . . . . . . . . . . 34--40
                     CACM Staff   Access controls and healthcare records:
                                  who owns the data? . . . . . . . . . . . 41--46
                     Micah Beck   On the hourglass model . . . . . . . . . 48--57
   Christopher Frauenberger and   
              Peter Purgathofer   Ways of thinking in informatics  . . . . 58--64
           Nguyen Khoi Tran and   
              Quan Z. Sheng and   
               M. Ali Babar and   
                   Lina Yao and   
             Wei Emma Zhang and   
               Schahram Dustdar   Internet of Things search engine . . . . 66--73
             Pedro Domingos and   
                    Daniel Lowd   Unifying logical and statistical AI with
                                  Markov logic . . . . . . . . . . . . . . 74--83
                  Costin Raiciu   Technical perspective: Do you know why
                                  your web pages load faster?  . . . . . . 85--85
        Arash Molavi Kakhki and   
                Samuel Jero and   
             David Choffnes and   
       Cristina Nita-Rotaru and   
                   Alan Mislove   Taking a long look at QUIC: an approach
                                  for rigorous evaluation of rapidly
                                  evolving transport protocols . . . . . . 86--94
                  Dennis Shasha   Last byte: Opioid games  . . . . . . . . 96--ff

Communications of the ACM
Volume 62, Number 8, August, 2019

              Cherri M. Pancake   From the President: Dispelling common
                                  myths about ACM awards and honors  . . . 5--5
                 Vinton G. Cerf   Cerf's up: Undo, redo, and regrets . . . 7--7
                     CACM Staff   Letters to the editor: A case against
                                  mission-critical applications of machine
                                  learning . . . . . . . . . . . . . . . . 9--9
                   Mark Guzdial   BLOG@CACM: Cutting the wait for CS
                                  advice . . . . . . . . . . . . . . . . . 12--13
               Samuel Greengard   News: The algorithm that changed quantum
                                  machine learning . . . . . . . . . . . . 15--17
                     Don Monroe   News: I don't understand my car  . . . . 18--19
                   Gregory Mone   News: What makes a robot likable?  . . . 20--21
                 David Weintrop   Education: Block-based programming in
                                  computer science education . . . . . . . 22--25
        Marshall W. Van Alstyne   Economic and business dimensions: A
                                  response to fake news as a response to
                                  Citizens United  . . . . . . . . . . . . 26--29
         George V. Neville-Neil   Kode vicious: MUST and MUST NOT  . . . . 30--31
                   Marco Aiello   Viewpoint: The success of the web: a
                                  triumph of the amateurs  . . . . . . . . 32--34
                Natasha Noy and   
                 Yuqing Gao and   
                 Anshu Jain and   
            Anant Narayanan and   
             Alan Patterson and   
                   Jamie Taylor   Industry-scale knowledge graphs: lessons
                                  and challenges . . . . . . . . . . . . . 36--43
             Anna Wiedemann and   
            Nicole Forsgren and   
             Manuel Wiesche and   
               Heiko Gewald and   
                  Helmut Krcmar   Research for practice: the DevOps
                                  phenomenon . . . . . . . . . . . . . . . 44--49
                Kate Matsudaira   Overly attached  . . . . . . . . . . . . 50--52
           Barbara J. Grosz and   
           David Gray Grant and   
           Kate Vredenburgh and   
              Jeff Behrends and   
                    Lily Hu and   
             Alison Simmons and   
                      Jim Waldo   Embedded EthiCS: integrating ethics
                                  across CS education  . . . . . . . . . . 54--61
             Dino Distefano and   
      Manuel Fähndrich and   
          Francesco Logozzo and   
               Peter W. O'Hearn   Scaling static analyses at Facebook  . . 62--70
           Jakob E. Bardram and   
              Steven Jeuris and   
                 Paolo Tell and   
              Steven Houben and   
                  Stephen Voida   Activity-centric computing systems . . . 72--81
                 Emilio Ferrara   The history of digital spam  . . . . . . 82--91
                 Graham Cormode   Technical perspective: the true cost of
                                  popularity . . . . . . . . . . . . . . . 94--94
        Kasper Green Larsen and   
              Jelani Nelson and   
      Huy L. Nguy\~ên and   
                  Mikkel Thorup   Heavy hitters via cluster-preserving
                                  clustering . . . . . . . . . . . . . . . 95--100
        William Sims Bainbridge   Last byte: Fluid democracy . . . . . . . 104--ff

Communications of the ACM
Volume 62, Number 9, September, 2019

                Andrew A. Chien   Editor's letter: Sustaining open
                                  collaboration in universities  . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: Polyglot! . . . . . . . . . . 6--6
                 Moshe Y. Vardi   Departments: The long game of research   7--7
                     CACM Staff   Letters to the editor: On being `random
                                  enough'  . . . . . . . . . . . . . . . . 9--9
            Yegor Bugayenko and   
                   Mark Guzdial   BLOG@CACM: Why programmers should curb
                                  their enthusiasm, and thinking about
                                  computational thinking . . . . . . . . . 10--11
               Samuel Greengard   News: An inability to reproduce  . . . . 13--15
                    Gary Anthes   News: Augmented reality gets real  . . . 16--18
                Sarah Underwood   News: Can you locate your location data? 19--21
                   Eric Goldman   Law and technology: Internet immunity
                                  and the freedom to code  . . . . . . . . 22--24
                  Hilarie Orman   Privacy and security: Online voting: we
                                  can do it! (we have to)  . . . . . . . . 25--27
           Peter J. Denning and   
                 Andrew Odlyzko   The profession of IT: An interview with
                                  Andrew Odlyzko on cyber security . . . . 28--30
                 David Auerbach   Viewpoint: Bitwise: a life in code . . . 31--33
                       Russ Cox   Surviving software dependencies  . . . . 36--43
                   Tom Killalea   Velocity in software engineering . . . . 44--47
                 Shaul Kfir and   
               Camille Fournier   DAML: the contract language of
                                  distributed ledgers  . . . . . . . . . . 48--54
                Carla Gomes and   
          Thomas Dietterich and   
        Christopher Barrett and   
                 Jon Conrad and   
             Bistra Dilkina and   
              Stefano Ermon and   
                   Fei Fang and   
          Andrew Farnsworth and   
                  Alan Fern and   
                Xiaoli Fern and   
                Daniel Fink and   
             Douglas Fisher and   
          Alexander Flecker and   
              Daniel Freund and   
              Angela Fuller and   
              John Gregoire and   
              John Hopcroft and   
              Steve Kelling and   
                Zico Kolter and   
              Warren Powell and   
              Nicole Sintov and   
                John Selker and   
                Bart Selman and   
             Daniel Sheldon and   
               David Shmoys and   
               Milind Tambe and   
             Weng-Keen Wong and   
           Christopher Wood and   
                Xiaojian Wu and   
                Yexiang Xue and   
               Amulya Yadav and   
          Abdul-Aziz Yakubu and   
                Mary Lou Zeeman   Computational sustainability: computing
                                  for a better world and a sustainable
                                  future . . . . . . . . . . . . . . . . . 56--65
                 Daniel Jackson   Alloy: a language and tool for exploring
                                  software designs . . . . . . . . . . . . 66--76
              Jason Freeman and   
              Brian Magerko and   
               Doug Edwards and   
                 Tom Mcklin and   
               Taneisha Lee and   
                  Roxanne Moore   EarSketch: engaging broad populations in
                                  computing through music  . . . . . . . . 78--85
                    Yossi Gilad   Metadata-private communication for the
                                  99%  . . . . . . . . . . . . . . . . . . 86--93
               Sylvain Lefebvre   From virtual worlds to digital
                                  fabrication: technical perspective . . . 96--96
              Kiril Vidimce and   
                Szu-Po Wang and   
      Jonathan Ragan-Kelley and   
               Wojciech Matusik   OpenFab: a programmable pipeline for
                                  multimaterial fabrication  . . . . . . . 97--105
                  Leah Hoffmann   Last byte: Inspired by the home of the
                                  future . . . . . . . . . . . . . . . . . 112--ff

Communications of the ACM
Volume 62, Number 10, October, 2019

              Cherri M. Pancake   From the President: How ACM evolves in
                                  response to community needs  . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: AI is not an excuse!  . . . . 7--7
              Robin K. Hill and   
                   Edwin Torres   BLOG@CACM: Pinning down variables, and
                                  taking an agile approach . . . . . . . . 8--9
                     Don Monroe   News: Closing in on quantum error
                                  correction . . . . . . . . . . . . . . . 11--13
              Keith Kirkpatrick   News: Protecting industrial control
                                  systems  . . . . . . . . . . . . . . . . 14--16
                   Esther Shein   News: The CS teacher shortage  . . . . . 17--18
            Michael A. Cusumano   Technology strategy and management: The
                                  cloud as an innovation platform for
                                  software development . . . . . . . . . . 20--22
               Peter G. Neumann   Inside risks: How might we increase
                                  system trustworthiness?  . . . . . . . . 23--25
         George V. Neville-Neil   Kode Vicious: What is a chief security
                                  officer good for?  . . . . . . . . . . . 26--27
              Ryen W. White and   
               Adam Fourney and   
              Allen Herring and   
            Paul N. Bennett and   
    Nirupama Chandrasekaran and   
                 Robert Sim and   
                Elnaz Nouri and   
     Mark J. Encarnación   Viewpoint: Multi-device digital
                                  assistance . . . . . . . . . . . . . . . 28--31
                 Jesse Frazelle   Open source firmware . . . . . . . . . . 34--38
           Thomas A. Limoncelli   Demo data as code  . . . . . . . . . . . 39--41
                Kate Matsudaira   The evolution of management  . . . . . . 42--47
        Justine S. Hastings and   
               Mark Howison and   
                Ted Lawless and   
                 John Ucles and   
                  Preston White   Unlocking data to improve public policy  48--53
                   Oren Salzman   Sampling-based robot motion planning . . 54--63
           Jennifer Mankoff and   
              Megan Hofmann and   
       Xiang 'Anthony' Chen and   
            Scott E. Hudson and   
                  Amy Hurst and   
                     Jeeeun Kim   Consumer-grade fabrication and its
                                  potential to revolutionize accessibility 64--75
             Mark A. Hallen and   
                Bruce R. Donald   Protein design by provable algorithms    76--84
                Andrew W. Appel   The scalability of CertiKOS: technical
                                  perspective  . . . . . . . . . . . . . . 88--88
                 Ronghui Gu and   
                 Zhong Shao and   
                   Hao Chen and   
                 Jieung Kim and   
Jérémie Koenig and   
       Xiongnan (Newman) Wu and   
       Vilhelm Sjöberg and   
                 David Costanzo   Building certified concurrent OS kernels 89--99
                  Dennis Shasha   Last byte: Dust wars . . . . . . . . . . 104--ff

Communications of the ACM
Volume 62, Number 11, November, 2019

                 Vinton G. Cerf   Cerf's up: Hazards of the information
                                  superhighway . . . . . . . . . . . . . . 5--5
                 Moshe Y. Vardi   Departments: The winner-takes-all tech
                                  corporation  . . . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: You can publish
                                  it!: (you have to) . . . . . . . . . . . 8--9
                Yegor Bugayenko   BLOG@CACM: The benefits of indolence . . 10--11
                     Don Monroe   News: Information is physics . . . . . . 13--15
               Samuel Greengard   News: When drones fly  . . . . . . . . . 16--18
                   Logan Kugler   News: Real-world applications for drones 19--21
               Pamela Samuelson   Legally speaking: Europe's controversial
                                  digital copyright directive finalized    24--27
               Mark Guzdial and   
                   Alan Kay and   
              Cathie Norris and   
                 Elliot Soloway   Education: Computational thinking should
                                  just be good thinking  . . . . . . . . . 28--30
                George Varghese   Interview: An interview with Leonard
                                  Kleinrock  . . . . . . . . . . . . . . . 31--36
               Selena Silva and   
                  Martin Kenney   Viewpoint: Algorithms, platforms, and
                                  ethnic bias  . . . . . . . . . . . . . . 37--39
            P. J. Narayanan and   
              Pankaj Jalote and   
                Anand Deshpande   India Region Special Section: Welcome to
                                  the India region special section . . . . 40--42
                    Manik Varma   India Region Special Section: Hot
                                  topics: Extreme classification . . . . . 44--45
             Maryam Mustafa and   
                Amna Batool and   
                  Agha Ali Raza   India Region Special Section: Hot
                                  topics: Designing ICT interventions for
                                  women in Pakistan  . . . . . . . . . . . 46--47
          Jayant R. Haritsa and   
                   S. Sudarshan   India Region Special Section: Hot
                                  topics: Turbocharging database query
                                  processing and testing . . . . . . . . . 48--49
                Neeta Verma and   
                   Savita Dawar   India Region Special Section: Hot
                                  topics: Digital transformation in the
                                  Indian government  . . . . . . . . . . . 50--53
                     Vipul Shah   India Region Special Section: Hot
                                  topics: CSpathshala: bringing
                                  computational thinking to schools  . . . 54--55
          Ajit Samaranayake and   
         Sampath Tilakumara and   
        Thayaparan Sripavan and   
            Rasika Withanawasam   India Region Special Section: Hot
                                  topics: Creative disruption in fintech
                                  from Sri Lanka . . . . . . . . . . . . . 56--57
              C. V. Jawahar and   
         Venkata N. Padmanabhan   India Region Special Section: Hot
                                  topics: Technology interventions for
                                  road safety and beyond . . . . . . . . . 58--59
           Shashank Srikant and   
               Rohit Takhar and   
           Vishal Venugopal and   
                 Varun Aggarwal   India Region Special Section: Hot
                                  topics: Skill evaluation . . . . . . . . 60--61
              Gautam Shroff and   
             K. Ananth Krishnan   India Region Special Section: Hot
                                  topics: Computing research at Tata
                                  Consultancy Services . . . . . . . . . . 62--63
              Pankaj Jalote and   
                 Pari Natarajan   India Region Special Section: Big
                                  trends: The growth and evolution of
                                  India's software industry  . . . . . . . 64--69
      Pushpak Bhattacharyya and   
                Hema Murthy and   
       Surangika Ranathunga and   
              Ranjiva Munasingh   India Region Special Section: Big
                                  trends: Indic language computing . . . . 70--75
             Vivek Raghavan and   
                Sanjay Jain and   
                   Pramod Varma   India Region Special Section: Big
                                  trends: India stack --- digital
                                  infrastructure as public good  . . . . . 76--81
         Subhashis Banerjee and   
                  Subodh Sharma   India Region Special Section: Big
                                  trends: Privacy concerns with Aadhaar    80--80
             Charles Assisi and   
            Avinash Raghava and   
                     NS Ramnath   India Region Special Section: Big
                                  trends: The rise of the Indian start-up
                                  ecosystem  . . . . . . . . . . . . . . . 82--87
       Supratik Chakraborty and   
                 Vasudeva Varma   India Region Special Section: Big
                                  trends: Highlights of software R&D in
                                  India  . . . . . . . . . . . . . . . . . 88--91
              Meena Mahajan and   
            Madhavan Mukund and   
                   Nitin Saxena   India Region Special Section: Big
                                  trends: Research in theoretical computer
                                  science  . . . . . . . . . . . . . . . . 92--95
              Niloy Ganguly and   
         Ponnurangam Kumaraguru   India Region Special Section: Big
                                  trends: The positive and negative
                                  effects of social media in India . . . . 98--99
           Aditya Vashistha and   
                  Umar Saif and   
                  Agha Ali Raza   India Region Special Section: Big
                                  trends: The Internet of the orals  . . . 100--103
           Michelle Vaccaro and   
                      Jim Waldo   The effects of mixing machine learning
                                  and human judgment . . . . . . . . . . . 104--110
                    Pat Helland   The trade-offs between write and read    111--113
             Raja Appuswamy and   
               Goetz Graefe and   
      Renata Borovica-Gajic and   
             Anastasia Ailamaki   The five-minute rule 30 years later and
                                  its impact on the storage hierarchy  . . 114--120
                    Yan Pei and   
           Swarnendu Biswas and   
          Donald S. Fussell and   
                 Keshav Pingali   An elementary introduction to Kalman
                                  filtering  . . . . . . . . . . . . . . . 122--133
              David G. Andersen   A whitebox solution for blackbox-like
                                  behaviors: technical perspective . . . . 136--136
                  Kexin Pei and   
                 Yinzhi Cao and   
               Junfeng Yang and   
                     Suman Jana   DeepXplore: automated whitebox testing
                                  of deep learning systems . . . . . . . . 137--145
                      Anonymous   Last byte: Cantando con la Corrente
                                  (singing with current) . . . . . . . . . 160--ff

Communications of the ACM
Volume 62, Number 12, December, 2019

              Cherri M. Pancake   Editor's letter: Engaging future
                                  generations of ACM leaders . . . . . . . 5--5
                 Vinton G. Cerf   Cerf's up: A hands-free ride . . . . . . 7--7
                     CACM Staff   Letters to the Editor: Online voting
                                  still security pipedream . . . . . . . . 9--9
               Mark Guzdial and   
                  Robin K. Hill   BLOG@CACM: Getting high school, college
                                  students interested in CS  . . . . . . . 10--11
                  Chris Edwards   News: Malevolent machine learning  . . . 13--15
                     Paul Marks   News: Robots aim to boost astronaut
                                  efficiency . . . . . . . . . . . . . . . 16--18
              Keith Kirkpatrick   News: Regulating information technology  19--21
               David M. Douglas   Computing ethics: Should researchers use
                                  data from security breaches? . . . . . . 22--24
         George V. Neville-Neil   Kode vicious: Koding academies . . . . . 25--25
           Peter J. Denning and   
                   Ted G. Lewis   The profession of IT: Uncertainty  . . . 26--28
             Beth Simone Noveck   Viewpoint: Public entrepreneurship and
                                  policy engineering . . . . . . . . . . . 29--31
                  Ariana Mirian   Hack for hire  . . . . . . . . . . . . . 32--37
           Thomas A. Limoncelli   API practices if you hate your customers 38--42
                Paul Castro and   
            Vatche Ishakian and   
            Vinod Muthusamy and   
           Aleksander Slominski   The rise of serverless computing . . . . 44--54
            Claire Le Goues and   
             Michael Pradel and   
             Abhik Roychoudhury   Automated program repair . . . . . . . . 56--65
          Moshe Tennenholtz and   
                   Oren Kurland   Rethinking search engines and
                                  recommendation systems: a game theoretic
                                  perspective  . . . . . . . . . . . . . . 66--75
              Michael B. Taylor   Bootstrapping a future of open source,
                                  specialized hardware: technical
                                  perspective  . . . . . . . . . . . . . . 78--78
           Jonathan Balkind and   
            Michael McKeown and   
                Yaosheng Fu and   
                 Tri Nguyen and   
                 Yanqi Zhou and   
              Alexey Lavrov and   
           Mohammad Shahrad and   
                  Adi Fuchs and   
               Samuel Payne and   
              Xiaohua Liang and   
               Matthew Matl and   
                David Wentzlaff   OpenPiton: an open source hardware
                                  platform for your research . . . . . . . 79--87
                  Leah Hoffmann   Last byte: RISCy beginnings  . . . . . . 96--ff