Last update:
Thu Apr 24 11:34:07 MDT 2025
Moshe Y. Vardi Editor's letter: More debate, please! 5--5
CACM Staff Letters to the Editor: Software still as
much an art as science . . . . . . . . . 7--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Wendy Hall ACM's annual report . . . . . . . . . . 9--13
Greg Linden and
Ruben Ortega and
Jason Hong blog@CACM: Software engineering,
smartphones and health systems, and
security warnings . . . . . . . . . . . 16--17
David Roman CACM online: The corollary of
empowerment . . . . . . . . . . . . . . 18--18
Tom Geller News: Rebuilding for eternity . . . . . 19--21
Leah Hoffmann News: Amir Pnueli: ahead of his time . . 22--23
Gary Anthes News: Automated translation of Indian
languages . . . . . . . . . . . . . . . 24--26
Neil Savage News: New search challenges and
opportunities . . . . . . . . . . . . . 27--28
Kirk L. Kroeker News: Future Internet design summit . . 29--29
Karen A. Frenkel News: Robert Lovett Ashenhurst:
1929--2009 . . . . . . . . . . . . . . . 30--30
Samuel Greengard News: ACM and India . . . . . . . . . . 31--31
Michael Cusumano Viewpoints: Technology strategy and
management: The evolution of platform
thinking . . . . . . . . . . . . . . . . 32--34
Phillip G. Armour Viewpoints: The business of software: In
praise of bad programmers . . . . . . . 35--36
Arti Rai Viewpoints: Law and technology:
Unstandard standardization: the case of
biology . . . . . . . . . . . . . . . . 37--39
Bjarne Stroustrup Viewpoint: What should we teach new
software developers? Why? . . . . . . . 40--42
William Aspray and
Len Shustek and
Norbert Ryska Viewpoints: Computer museum series:
Great computing museums of the world,
part one . . . . . . . . . . . . . . . . 43--46
Julian Hyde Data in flight . . . . . . . . . . . . . 48--52
Stephen Petschulat Other people's data . . . . . . . . . . 53--57
Adam Leventhal Triple-parity RAID and beyond . . . . . 58--63
Michael Stonebraker and
Daniel Abadi and
David J. DeWitt and
Sam Madden and
Erik Paulson and
Andrew Pavlo and
Alexander Rasin MapReduce and parallel DBMSs: friends or
foes? . . . . . . . . . . . . . . . . . 64--71
Jeffrey Dean and
Sanjay Ghemawat MapReduce: a flexible data processing
tool . . . . . . . . . . . . . . . . . . 72--77
Raz Lin and
Sarit Kraus Can automated agents proficiently
negotiate with humans? . . . . . . . . . 78--88
Dan Wallach Technical perspective: Native Client: a
clever alternative . . . . . . . . . . . 90--90
Bennet Yee and
David Sehr and
Gregory Dardyk and
J. Bradley Chen and
Robert Muth and
Tavis Ormandy and
Shiki Okasaka and
Neha Narula and
Nicholas Fullagar Native Client: a sandbox for portable,
untrusted x86 native code . . . . . . . 91--99
Alon Halevy Technical perspective: Schema mappings:
rules for mixing data . . . . . . . . . 100--100
Balder ten Cate and
Phokion G. Kolaitis Structural characterizations of
schema-mapping languages . . . . . . . . 101--110
Leah Hoffmann Last Byte: Q&A: HP's running man . . . . 120--ff
Dongback Seo and
King-Tim Mak Using the thread-fabric perspective to
analyze industry dynamics . . . . . . . 121--125
Randal Burns and
Zachary Peterson Security constructs for
regulatory-compliant storage . . . . . . 126--130
Wonchang Hur and
Dongsoo Kim The future of digital imaging . . . . . 131--135
Seongwoon Kim and
Inseong Lee and
Kiho Lee and
Seungki Jung and
Joonah Park and
Yeun Bae Kim and
Sang Ryong Kim and
Jinwoo Kim Mobile Web 2.0 with multi-display
buttons . . . . . . . . . . . . . . . . 136--141
Paul D. Witman and
Terry Ryan Think big for reuse . . . . . . . . . . 142--147
Vijay Khatri and
Carol V. Brown Designing data governance . . . . . . . 148--152
Vittorio Miori and
Dario Russo and
Massimo Aliberti Domotic technologies incompatibility
becomes user transparent . . . . . . . . 153--157
Zvi Drezner Technical opinion: Random selection from
a stream of events . . . . . . . . . . . 158--159
Diane Crawford An issue of teamwork . . . . . . . . . . 5--5
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Valerie Barr blog@CACM: Connecting women and
technology . . . . . . . . . . . . . . . 10--11
David Roman CACM online: Where the data is . . . . . 12--12
Kirk L. Kroeker News: Alternate interface technologies
emerge . . . . . . . . . . . . . . . . . 13--15
Alex Wright News: Type theory comes of age . . . . . 16--17
Sarah Underwood News: Improving disaster management . . 18--20
CACM Staff News: ACM Fellows honored . . . . . . . 21--21
M. Angela Sasse Privacy and security: Not seeing the
crime for the cameras? . . . . . . . . . 22--25
Dennis P. Groth and
Jeffrey K. MacKie-Mason Education: Why an informatics degree? 26--28
Douglas Maughan Inside risks: The need for a national
cybersecurity research and development
agenda . . . . . . . . . . . . . . . . . 29--31
Michel Beaudouin-Lafon Open access to scientific publications 32--34
George V. Neville-Neil Kode Vicious: Taking your network's
temperature . . . . . . . . . . . . . . 35--36
Dennis Shasha An interview with Michael Rabin . . . . 37--42
Eric Saxe Power-efficient software . . . . . . . . 44--48
Alexandra Fedorova and
Sergey Blagodurov and
Sergey Zhuravlev Managing contention for shared resources
on multicore processors . . . . . . . . 49--57
Steven P. Miller and
Michael W. Whalen and
Darren D. Cofer Software model checking takes off . . . 58--64
Al Bessey and
Ken Block and
Ben Chelf and
Andy Chou and
Bryan Fulton and
Seth Hallem and
Charles Henri-Gros and
Asya Kamsky and
Scott McPeak and
Dawson Engler A few billion lines of code later: using
static analysis to find bugs in the real
world . . . . . . . . . . . . . . . . . 66--75
Eric Benhamou and
Jon Eisenberg and
Randy H. Katz Assessing the changing U.S. IT R&D
ecosystem . . . . . . . . . . . . . . . 76--83
Dave Bacon and
Wim van Dam Recent progress in quantum algorithms 84--93
Sanjoy Dasgupta Strange effects in high dimension . . . 96--96
Nir Ailon and
Bernard Chazelle Faster dimension reduction . . . . . . . 97--104
Shekhar Y. Borkar Want to be a bug buster? . . . . . . . . 105--105
Sung-Boem Park and
Subhasish Mitra Post-silicon bug localization for
processors using IFRA . . . . . . . . . 106--113
Peter Winkler Last Byte: Puzzled: Breaking chocolate
bars . . . . . . . . . . . . . . . . . . 120--120
Dongmin Kim and
Izak Benbasat Designs for effective implementation of
trust assurances in Internet stores . . 121--126
Irma Becerra-Fernandez and
Joyce Elam and
Susan Clemmons Reversing the landslide in
computer-related degree programs . . . . 127--133
Tim Chenoweth and
Robert Minch and
Sharon Tabor Wireless insecurity: examining user
security behavior on public networks . . 134--138
Farheen Altaf and
David Schuff Taking a flexible approach to ASPs . . . 139--143
John Minor Ross Informatics creativity: a role for
abductive reasoning? . . . . . . . . . . 144--148
Damien Joseph and
Soon Ang and
Roger H. L. Chang and
Sandra A. Slaughter Practical intelligence in IT: assessing
soft skills of IT professionals . . . . 149--154
Vijay K. Gurbani and
Anita Garvert and
James D. Herbsleb Managing a corporate open source
software asset . . . . . . . . . . . . . 155--159
Nikhil Mehta and
Anju Mehta It takes two to tango: how relational
investments improve IT outsourcing
partnerships . . . . . . . . . . . . . . 160--164
Moshe Y. Vardi Revisiting the publication culture in
computing research . . . . . . . . . . . 5--5
CACM Staff Letters to the Editor: Too much debate? 6--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Mark Guzdial and
Judy Robertson BLOG@CACM: Too much programming too
soon? . . . . . . . . . . . . . . . . . 10--11
David Roman CACM online: Granting a second life . . 12--12
Gregory Goth News: CS and biology's growing pains . . 13--15
Kirk L. Kroeker News: Engineering the Web's third decade 16--18
Samuel Greengard News: Tracking garbage . . . . . . . . . 19--20
CACM Staff News: Katayanagi prizes and other CS
awards . . . . . . . . . . . . . . . . . 21--21
Tim Chang Economic and business dimensions: Gaming
will save us all . . . . . . . . . . . . 22--24
Pamela Samuelson Legally speaking: Only technological
processes are patentable . . . . . . . . 25--27
Rachelle Hollander Computing ethics: The ethics beat . . . 28--29
Peter J. Denning and
Fernando Flores and
Peter Luzmore The Profession of IT: Orchestrating
coordination in pluralistic networks . . 30--32
Richard Tapia Broadening participation: Hiring and
developing minority faculty at research
universities . . . . . . . . . . . . . . 33--35
Cameron Wilson and
Peter Harsha IT Policy: Making the case for computing 36--38
Kieron O'Hara and
Nigel Shadbolt Privacy: Privacy on the data web . . . . 39--41
Kirk McKusick and
Sean Quinlan GFS: evolution on fast-forward . . . . . 42--49
David J. Brown and
Charles Reams Toward energy-efficient computing . . . 50--58
Siew Kien Sia and
Christina Soh and
Peter Weill Global IT management: structuring for
scale, responsiveness, and innovation 59--64
Thomas Lengauer and
André Altmann and
Alexander Thielen and
Rolf Kaiser Chasing the AIDS virus . . . . . . . . . 66--74
Cameron Seay and
Gary Tucker Virtual computing initiative at a small
public university . . . . . . . . . . . 75--83
Vincent Conitzer Making decisions based on the
preferences of multiple agents . . . . . 84--94
Daniele Micciancio A first glimpse of cryptography's Holy
Grail . . . . . . . . . . . . . . . . . 96--96
Craig Gentry Computing arbitrary functions of
encrypted data . . . . . . . . . . . . . 97--105
Pietro Perona Seeing the trees, the forest, and much
more . . . . . . . . . . . . . . . . . . 106--106
A. Torralba and
K. P. Murphy and
W. T. Freeman Using the forest to see the trees:
exploiting context for visual object
detection and localization . . . . . . . 107--114
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 118--118
Ari Juels Last Byte: Future tense: The Primal Cue 120--ff
Fabio Arduini and
Vincenzo Morabito Business continuity and the banking
industry . . . . . . . . . . . . . . . . 121--125
Sherrie Drye Cannoy and
A. F. Salam A framework for health care information
assurance policy and compliance . . . . 126--131
Lin Lin and
Paul Jen-Hwa Hu and
Olivia R. Liu Sheng and
Johnny Lee Is stickiness profitable for electronic
retailers? . . . . . . . . . . . . . . . 132--136
Ramanath Subramanyam and
Fei Lee Weisstein and
M. S. Krishnan User participation in software
development projects . . . . . . . . . . 137--141
S. T. Parkinson and
R. M. Hierons and
M. Lycett and
M. Norman Practitioner-based measurement: a
collaborative approach . . . . . . . . . 142--147
Del Nagy and
Areej M. Yassin and
Anol Bhattacherjee Organizational adoption of open source
software: barriers and remedies . . . . 148--151
John H. Benamati and
Zafer D. Ozdemir and
H. Jeff Smith Aligning undergraduate IS curricula with
industry needs . . . . . . . . . . . . . 152--156
Hing Kai Chan Agent-oriented embedded electronic
measuring systems . . . . . . . . . . . 157--162
Calvin Gotlieb and
James Horning The work of ACM's awards committee . . . 5--5
CACM Staff Letters to the Editor: Computing
paradigm not a branch of science . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Michael Stonebraker BLOG@CACM: SQL databases v. NoSQL
databases . . . . . . . . . . . . . . . 10--11
David Roman CACM Online: Going mobile . . . . . . . 12--12
Alex Wright News: Data streaming 2.0 . . . . . . . . 13--14
Gary Anthes News: Robots gear up for disaster
response . . . . . . . . . . . . . . . . 15--16
Samuel Greengard News: Spies among us? . . . . . . . . . 17--19
Richard Heeks Emerging Markets: Development 2.0: the
IT-enabled transformation of
international development . . . . . . . 22--24
Martin Campbell-Kelly Historical reflection: Be careful what
you wish for . . . . . . . . . . . . . . 25--26
Michael Cusumano Technology strategy and management:
Cloud computing and SaaS as new
computing platforms . . . . . . . . . . 27--29
Paul Ohm Viewpoint: When network neutrality met
privacy . . . . . . . . . . . . . . . . 30--32
George V. Neville-Neil Kode Vicious: The data-structure canon 33--34
Andy Woods Cooling the data center . . . . . . . . 36--42
Mache Creeger CTO roundtable: malware defense . . . . 43--49
Michael Armbrust and
Armando Fox and
Rean Griffith and
Anthony D. Joseph and
Randy Katz and
Andy Konwinski and
Gunho Lee and
David Patterson and
Ariel Rabkin and
Ion Stoica and
Matei Zaharia A view of cloud computing . . . . . . . 50--58
Parthasarathy Ranganathan Recipe for efficiency: principles of
power-aware computing . . . . . . . . . 60--67
Sergey Yekhanin Private information retrieval . . . . . 68--73
Sergio Antoy and
Michael Hanus Functional logic programming . . . . . . 74--85
Padhraic Smyth and
Charles Elkan Technical perspective: Creativity helps
influence prediction precision . . . . . 88--88
Yehuda Koren Collaborative filtering with temporal
dynamics . . . . . . . . . . . . . . . . 89--97
Leslie Pack Kaelbling Technical perspective New bar set for
intelligent vehicles . . . . . . . . . . 98--98
Sebastian Thrun Toward robotic cars . . . . . . . . . . 99--106
Leah Hoffmann Last Byte: Q&A: Systematic Thinking:
Andrew S. Tanenbaum talks about MINIX,
microkernels, and electronic voting
systems . . . . . . . . . . . . . . . . 112--ff
Pak-Lok Poon and
Sau-Fun Tang and
T. H. Tse and
T. Y. Chen CHOC'LATE: a framework for
specification-based testing . . . . . . 113--118
Robert J. Aalberts and
Percy S. Poon and
Paul D. Thistle A tale of two Internet service providers 119--123
Keith Wright Capstone programming courses considered
harmful . . . . . . . . . . . . . . . . 124--127
Surya Rebbapragada and
Amit Basu and
John Semple Data mining and revenue management
methodologies in college admissions . . 128--133
Dawn G. Gregg Designing for collective intelligence 134--138
Stefano Ferretti and
Marco Furini and
Claudio E. Palazzi and
Marco Roccetti and
Paola Salomoni WWW recycling for a better world . . . . 139--143
Rhoda C. Joseph Individual resistance to IT innovations 144--146
Moshe Y. Vardi \em Globalization and Offshoring of
Software revisited . . . . . . . . . . . 5--5
CACM Staff Letters to the Editor: Roots of
publication delay . . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Jeannette M. Wing and
Daniel Reed BLOG@CACM: NSF funding advice: 21st
century innovation . . . . . . . . . . . 10--11
David Roman CACM Online: Looking for control . . . . 12--12
Jeff Kanipe News: Modeling the astronomical . . . . 13--15
Gary Anthes News: Happy Birthday, RDBMS! . . . . . . 16--17
Samuel Greengard News: Cloud computing and developing
nations . . . . . . . . . . . . . . . . 18--20
Jack Rosenberger News: Thacker wins Turing Award . . . . 21--21
CACM Staff ACM's 2010 general election . . . . . . 23--31
Erik Brynjolfsson and
Paul Hofmann and
John Jordan Economic and business dimensions: Cloud
computing and electricity: beyond the
utility model . . . . . . . . . . . . . 32--34
Cameron Wilson and
Mark Guzdial Education: How to make progress in
computing education . . . . . . . . . . 35--37
Roman Beck Viewpoint: Can IT lean against the wind? 38--40
Ofir Turel and
Alexander Serenko Viewpoint: Is mobile email addiction
overlooked? . . . . . . . . . . . . . . 41--43
William Aspray Computer museum series: Great computing
museums of the world, part two . . . . . 45--49
Peter Phillips Enhanced debugging with traces . . . . . 50--53
Julien Ridoux and
Darryl Veitch Principles of robust timing over the
Internet . . . . . . . . . . . . . . . . 54--61
Dave Durkee Why cloud computing will never be free 62--69
Abigail J. Sellen and
Steve Whittaker Beyond total capture: a constructive
critique of lifelogging . . . . . . . . 70--77
Clayton Lewis and
Michele H. Jackson and
William M. Waite Student and faculty attitudes and
beliefs about computer science . . . . . 78--85
Susanne Albers Energy-efficient algorithms . . . . . . 86--96
Peter L. Bartlett Learning to act in uncertain
environments: technical perspective . . 98--98
Kuzman Ganchev and
Yuriy Nevmyvaka and
Michael Kearns and
Jennifer Wortman Vaughan Censored exploration and the dark pool
problem . . . . . . . . . . . . . . . . 99--107
Mark Harman Automated patching techniques: the fix
is in: technical perspective . . . . . . 108--108
Westley Weimer and
Stephanie Forrest and
Claire Le Goues and
ThanhVu Nguyen Automatic program repair with
evolutionary computation . . . . . . . . 109--116
Peter Winkler Last Byte: Puzzled: Variations on the
Ham Sandwich Theorem . . . . . . . . . . 120--120
Paul P. Tallon Understanding the dynamics of
information management costs . . . . . . 121--125
Blaize Horner Reich and
Chris Sauer Roles of the external IT project manager 126--129
Wonil Hwang and
Gavriel Salvendy Number of people required for usability
evaluation: the $10 \pm 2$ rule . . . . 130--133
Charles E. Downing Is Web-based supply chain integration
right for your company? . . . . . . . . 134--137
Demin Wang and
Dharma P. Agrawal and
Wassana Toruksa and
Chaichana Chaiwatpongsakorn and
Mingming Lu and
Tim C. Keener Monitoring ambient air quality with
carbon monoxide sensor-based wireless
network . . . . . . . . . . . . . . . . 138--141
Theophanis C. Stratopoulos and
Jee-Hae Lim IT innovation persistence: an oxymoron? 142--146
E. Vance Wilson and
Bengisu Tulu The rise of a health-IT academic focus 147--150
Hyeyoung Kim and
Jae-Nam Lee and
Jaemin Han The role of IT in business ecosystems 151--156
Patricia Ryan A tour of ACM's HQ . . . . . . . . . . . 5--5
CACM Staff Workflow tools for distributed teams? 6--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Greg Linden and
Ed H. Chi and
Mark Guzdial The chaos of the Internet as an external
brain; and more . . . . . . . . . . . . 10--11
David Roman CACM online: Interact naturally . . . . 12--12
Neil Savage News: Straightening out heavy tails . . 13--15
Tom Geller News: Beyond the Smart Grid . . . . . . 16--17
Leah Hoffmann News: Mine your business . . . . . . . . 18--19
Leah Hoffmann News: Robin Milner: the elegant
pragmatist . . . . . . . . . . . . . . . 20--21
Jack Rosenberger News: CS and technology leaders honored 22--22
Arvind Narayanan and
Vitaly Shmatikov Privacy and security: Myths and
fallacies of `personally identifiable
information' . . . . . . . . . . . . . . 24--26
Stuart S. Shapiro Inside risks: Privacy by design: moving
from art to practice . . . . . . . . . . 27--29
Peter J. Denning and
Jack B. Dennis The profession of IT: The resurgence of
parallelism . . . . . . . . . . . . . . 30--32
George V. Neville-Neil Kode Vicious: Plotting away . . . . . . 33--34
François Lévêque Law and technology: Intel's rebates:
above board or below the belt? . . . . . 35--37
Simson L. Garfinkel and
Lorrie Faith Cranor Viewpoint: Institutional review boards
and your research . . . . . . . . . . . 38--40
Len Shustek Interview: An interview with Ed
Feigenbaum . . . . . . . . . . . . . . . 41--45
Dustin Owens Securing elasticity in the cloud . . . . 46--51
George Phillips Simplicity betrayed . . . . . . . . . . 52--58
Jeffrey Heer and
Michael Bostock and
Vadim Ogievetsky A tour through the visualization zoo . . 59--67
Anastasia Ailamaki and
Verena Kantere and
Debabrata Dash Managing scientific data . . . . . . . . 68--78
Jilin Chen and
Joseph A. Konstan Conference paper selectivity and impact 79--83
Kristen Grauman Efficiently searching for similar images 84--94
Vivek Sarkar Building confidence in multicore
software . . . . . . . . . . . . . . . . 96--96
Jacob Burnim and
Koushik Sen Asserting and checking determinism for
multithreaded programs . . . . . . . . . 97--105
K. Rustan M. Leino Learning to do program verification . . 106--106
Gerwin Klein and
June Andronick and
Kevin Elphinstone and
Gernot Heiser and
David Cock and
Philip Derrin and
Dhammika Elkaduwe and
Kai Engelhardt and
Rafal Kolanski and
Michael Norrish and
Thomas Sewell and
Harvey Tuch and
Simon Winwood seL4: formal verification of an
operating-system kernel . . . . . . . . 107--115
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 118--118
David Brin Last Byte: Future tense: How the Net
ensures our cosmic survival . . . . . . 120, 119
Jun Sun and
Marshall Scott Poole Beyond connection: situated wireless
communities . . . . . . . . . . . . . . 121--125
Sergio de Cesare and
Mark Lycett and
Robert D. Macredie and
Chaitali Patel and
Ray Paul Examining perceptions of agility in
software development practice . . . . . 126--130
Alexander Nill and
John Schibrowsky and
James W. Peltier Factors that influence software piracy:
a view from Germany . . . . . . . . . . 131--134
Jan Kietzmann and
Ian Angell Panopticon revisited . . . . . . . . . . 135--138
Benoit Baudry and
Sudipto Ghosh and
Franck Fleurey and
Robert France and
Yves Le Traon and
Jean-Marie Mottu Barriers to systematic model
transformation testing . . . . . . . . . 139--143
Kevin P. Gallagher and
Kate M. Kaiser and
Judith C. Simon and
Cynthia M. Beath and
Tim Goles The requisite variety of skills for IT
professionals . . . . . . . . . . . . . 144--148
Sandra A. Vannoy and
Prashant Palvia The social influence model of technology
adoption . . . . . . . . . . . . . . . . 149--153
Cheul Rhee and
G. Lawrence Sanders and
Natalie C. Simpson I, myself and e-myself . . . . . . . . . 154--157
Moshe Y. Vardi Hypercriticality . . . . . . . . . . . . 5--5
CACM Staff Letters to the Editor: Don't ignore
security offshore, or in the cloud . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Ruben Ortega and
Mark Guzdial and
Daniel Reed BLOG@CACM: Software development and
crunch time; and more . . . . . . . . . 10--11
David Roman CACM online: In case you missed it . . . 12--12
David Lindley News: Sharing computational perspectives 13--15
Samuel Greengard News: Censored! . . . . . . . . . . . . 16--18
Kirk L. Kroeker News: Mainstreaming augmented reality 19--21
Gary Anthes News: Committed to success . . . . . . . 22--23
Gregory Goth News: Eric Brewer: change agent . . . . 24--24
Sarah Underwood News: Visions of the future . . . . . . 25--25
Mari Sako Outsourcing versus shared services . . . 27--29
Jason Borenstein Computing ethics: Work life in the
robotic age . . . . . . . . . . . . . . 30--31
Pamela Samuelson Legally speaking: Should the Google book
settlement be approved? . . . . . . . . 32--34
Valerie E. Taylor Broadening participation: Cultivating
cultural diversity in information
technology . . . . . . . . . . . . . . . 35--36
Gonzalo Génova Viewpoint: Is computer science truly
scientific? . . . . . . . . . . . . . . 37--39
Marc Snir and
Telle Whitney Distinguished members: Advice to members
seeking ACM distinction . . . . . . . . 40--41
Eugene Loh The ideal HPC programming language . . . 42--47
Brendan Gregg Visualizing system latency . . . . . . . 48--54
Poul-Henning Kamp You're doing it wrong . . . . . . . . . 55--59
Gary Lewandowski and
Dennis J. Bouvier and
Tzu-Yi Chen and
Robert McCartney and
Kate Sanders and
Beth Simon and
Tammy VanDeGrift Commonsense understanding of
concurrency: computing students and
concert tickets . . . . . . . . . . . . 60--70
Takeo Igarashi Computer graphics for all . . . . . . . 71--77
Tim Roughgarden Algorithmic game theory . . . . . . . . 78--86
Hans-J. Boehm A solid foundation for x86 shared
memory: technical perspective . . . . . 88--88
Peter Sewell and
Susmit Sarkar and
Scott Owens and
Francesco Zappa Nardelli and
Magnus O. Myreen x86-TSO: a rigorous and usable
programmer's model for x86
multiprocessors . . . . . . . . . . . . 89--97
Mary Jane Irwin Technology scaling redirects main
memories: technical perspective . . . . 98--98
Benjamin C. Lee and
Engin Ipek and
Onur Mutlu and
Doug Burger Phase change memory architecture and the
quest for scalability . . . . . . . . . 99--106
Leah Hoffmann Last Byte: Q&A: From Single Core to
Multicore . . . . . . . . . . . . . . . 112, 111
Yurong Yao and
Edward Watson and
Beverly K. Kahn Application service providers: market
and adoption decisions . . . . . . . . . 113--117
Jorge A. Romero and
Nirup Menon and
Rajiv D. Banker and
Mark Anderson ERP: drilling for profit in the oil and
gas industry . . . . . . . . . . . . . . 118--121
Wei-Lun Chang and
Soe-Tsyr Yuan and
Carol W. Hsu Creating the experience economy in
e-commerce . . . . . . . . . . . . . . . 122--127
Oded Nov and
Chen Ye Why do people tag?: motivations for
photo tagging . . . . . . . . . . . . . 128--131
Domenico Talia and
Paolo Trunfio How distributed data mining tasks can
thrive as knowledge services . . . . . . 132--137
Alan R. Dennis and
Thomas M. Duffy and
Hasan Cakir IT programs in high schools: lessons
from the Cisco Networking Academy
program . . . . . . . . . . . . . . . . 138--141
John C. Ruhnka and
John W. Bagby Using ESI discovery teams to manage
electronic data discovery . . . . . . . 142--144
Victor Vianu JACM at the start of a new decade . . . 5--5
CACM Staff In the Virtual Extension . . . . . . . . 6--6
CACM Staff Letters to the Editor: CS expertise for
institutional review boards . . . . . . 7--7
Greg Linden and
Michael Bernstein and
Erika Shehan Poole BLOG@CACM: The war against spam: and
more . . . . . . . . . . . . . . . . . . 8--9
David Roman CACM online: Print is not just ink
anymore . . . . . . . . . . . . . . . . 10--10
Gary Anthes News: Mechanism design meets computer
science . . . . . . . . . . . . . . . . 11--13
Kirk L. Kroeker News: Looking beyond stereoscopic $3$D's
revival . . . . . . . . . . . . . . . . 14--16
Sarah Underwood News: Making sense of real-time behavior 17--18
Kirk L. Kroeker News: Celebrating the legacy of PLATO 19--20
Jack Rosenberger News: Gödel Prize and other CS awards . . 21--21
Christopher S. Yoo Is the Internet a maturing market? . . . 24--26
David S. Touretzky Preparing computer science students for
the robotics revolution . . . . . . . . 27--29
Ping Gao and
Jiang Yu Has China caught up in IT? . . . . . . . 30--32
George V. Neville-Neil Kode Vicious: Presenting your project 33--34
Eugene H. Spafford Privacy and security: Remembrances of
things pest . . . . . . . . . . . . . . 35--37
Samir Chopra Rights for autonomous artificial agents? 38--40
Thomas J. Misa An interview with Edsger W. Dijkstra . . 41--47
Robert DeLine and
Gina Venolia and
Kael Rowan Software development with code maps . . 48--54
Mache Creeger Moving to the edge: a CTO roundtable on
network virtualization . . . . . . . . . 55--62
Jan Damsgaard and
Jan Karlsbjerg Seven principles for selecting software
packages . . . . . . . . . . . . . . . . 63--71
James Larus and
Galen Hunt The Singularity system . . . . . . . . . 72--79
Gabor Szabo and
Bernardo A. Huberman Predicting the popularity of online
content . . . . . . . . . . . . . . . . 80--88
Sarita V. Adve and
Hans-J. Boehm Memory models: a case for rethinking
parallel languages and hardware . . . . 90--101
Helen Wang Attacks target Web server logic and prey
on XCS weaknesses: technical perspective 104--104
Hristo Bojinov and
Elie Bursztein and
Dan Boneh The emergence of cross channel scripting 105--113
Fritz Henglein Large-scale sound and precise program
analysis: technical perspective . . . . 114--114
Isil Dillig and
Thomas Dillig and
Alex Aiken Reasoning about the unknown in static
analysis . . . . . . . . . . . . . . . . 115--123
Peter Winkler Last Byte: Puzzled: Figures on a Plane 128--128
Wei-Fung Tung and
Soe-Tsyr Yuan Intelligent service machine . . . . . . 129--134
Marc N. Haines and
Marcus A. Rothenberger How a service-oriented architecture may
change the software development process 135--140
Eugenio Tisselli thinkflickrthink: a case study on
strategic tagging . . . . . . . . . . . 141--145
Lutz Prechelt Plat\_Forms: is there one best Web
development technology? . . . . . . . . 146--149
Moshe Y. Vardi Science has only two legs . . . . . . . 5--5
CACM Staff Letters to the Editor: More than one way
to annotate metadata . . . . . . . . . . 7--7
Ed H. Chi and
Ruben Ortega BLOG@CACM: Expanding CS education;
improving software development . . . . . 8--9
David Roman CACM online: More \em Communications . . 12--12
David Lindley News: Brains and bytes . . . . . . . . . 13--15
Samuel Greengard Obituary: Carl Adam Petri, 1926--2010 14--14
Phil Scott Security: New Passwords Approach . . . . 15--15
Neil Savage News: Cycling through data . . . . . . . 16--17
Marina Krakovsky News: Degrees, distance, and dollars . . 18--19
Tom Geller News: ACM China nearing launch . . . . . 20--20
Jack Rosenberger News: Kyoto prize and other CS awards 21--21
Phillip G. Armour The business of software: Return at risk 23--25
Robert A. Hillman and
Maureen A. O'Rourke Law and Technology: Principles of the
law of software contracts . . . . . . . 26--28
Peter J. Denning and
Dorothy E. Denning The profession of IT: Discussing cyber
attack . . . . . . . . . . . . . . . . . 29--31
Mordechai Ben-Ari Viewpoint: Objects never?: well, hardly
ever! . . . . . . . . . . . . . . . . . 32--35
Jennifer Rexford and
Constantine Dovrolis Point/Counterpoint: Future Internet
architecture: clean-slate versus
evolutionary research . . . . . . . . . 36--40
Stephen V. Cantrill Computers in patient care: the promise
and the challenge . . . . . . . . . . . 42--47
Steve Chessin Injecting errors for fun and profit . . 48--54
Cary Millsap Thinking clearly about performance, part
1 . . . . . . . . . . . . . . . . . . . 55--60
Dag I. K. Sjòberg Confronting the myth of rapid
obsolescence in computing research . . . 62--67
Joe Armstrong Erlang . . . . . . . . . . . . . . . . . 68--75
Christel Baier and
Boudewijn R. Haverkort and
Holger Hermanns and
Joost-Pieter Katoen Performance evaluation and model
checking join forces . . . . . . . . . . 76--85
Johannes Gehrke Programming with differential privacy:
technical perspective . . . . . . . . . 88--88
Frank McSherry Privacy integrated queries: an
extensible platform for
privacy-preserving data analysis . . . . 89--97
Mark Jerrum Constraint satisfaction problems and
computational complexity: technical
perspective . . . . . . . . . . . . . . 98--98
Andrei A. Bulatov and
Dániel Marx Constraint satisfaction problems and
global cardinality constraints . . . . . 99--106
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 110--110
Greg Bear Last Byte: Future tense: Little Brother
is Watching . . . . . . . . . . . . . . 112--ff
Alain Chesnais ACM is built on volunteers' shoulders 5--5
CACM Staff Letters to the Editor: How to celebrate
Codd's RDBMS vision . . . . . . . . . . 7--7
Michael Stonebraker BLOG@CACM: In search of database
consistency . . . . . . . . . . . . . . 8--9
David Roman CACM online: The mobile road ahead . . . 10--10
Alex Wright News: Linear logic . . . . . . . . . . . 11--13
Graeme Stemp-Morlock News: Personal fabrication . . . . . . . 14--15
Dennis McCafferty News: Should code be released? . . . . . 16--17
Martin Campbell-Kelly Victorian data processing . . . . . . . 19--21
Michael A. Cusumano Platforms and services: understanding
the resurgence of Apple . . . . . . . . 22--24
David L. Parnas Inside Risks: Risks of undisciplined
development . . . . . . . . . . . . . . 25--27
George V. Neville-Neil Kode Vicious: Version aversion . . . . . 28--29
Michael Hicks and
Jeffrey S. Foster Viewpoint: SCORE: agile research group
management . . . . . . . . . . . . . . . 30--31
ACM Case Study Photoshop scalability: keeping it simple 32--38
Cary Millsap Thinking clearly about performance, part
2 . . . . . . . . . . . . . . . . . . . 39--45
Kevin Montagne Tackling architectural complexity with
modeling . . . . . . . . . . . . . . . . 46--52
Thomas Serre and
Tomaso Poggio A neuromorphic approach to computer
vision . . . . . . . . . . . . . . . . . 54--61
Prasanna B. Tambe and
Lorin M. Hitt How offshoring affects IT workers . . . 62--70
Rodrigo Rodrigues and
Peter Druschel Peer-to-peer systems . . . . . . . . . . 72--82
Carl Waldspurger A VM `Engine' that makes a difference:
technical perspective . . . . . . . . . 84--84
Diwaker Gupta and
Sangmin Lee and
Michael Vrable and
Stefan Savage and
Alex C. Snoeren and
George Varghese and
Geoffrey M. Voelker and
Amin Vahdat Difference engine: harnessing memory
redundancy in virtual machines . . . . . 85--93
Yair Weiss and
Judea Pearl Belief propagation: technical
perspective . . . . . . . . . . . . . . 94--94
Erik B. Sudderth and
Alexander T. Ihler and
Michael Isard and
William T. Freeman and
Alan S. Willsky Nonparametric belief propagation . . . . 95--103
Leah Hoffmann Last Byte: Q&A: Gray's Paradigm . . . . . 112--ff
Moshe Y. Vardi On P, NP, and computational complexity 5--5
CACM Staff Letters to the Editor: How to think
about objects . . . . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Tessa Lau BLOG@CACM: Rethinking the systems review
process . . . . . . . . . . . . . . . . 10--11
David Roman CACM online: a preference for PDF . . . 12--12
Gregory Goth News: Turning data into knowledge . . . 13--15
Gary Anthes News: Security in the cloud . . . . . . 16--18
Leah Hoffmann News: Career opportunities . . . . . . . 19--21
Neil Savage News: Wide open spaces . . . . . . . . . 23--23
Pablo J. Boczkowski Economic and business dimensions: The
divergent online news preferences of
journalists and readers . . . . . . . . 24--25
Stephen Cooper and
Lance C. Pérez and
Daphne Rainey Education: K--12 computational learning 27--29
Pamela Samuelson Legally speaking: Why do software
startups patent (or not)? . . . . . . . 30--32
Joel F. Brenner Privacy and security: Why isn't
cyberspace more secure? . . . . . . . . 33--35
Matt Welsh Viewpoint: Sensor networks for the
sciences . . . . . . . . . . . . . . . . 36--39
Brian W. Fitzpatrick and
JJ Lueck The case against data lock-in . . . . . 42--46
David S. H. Rosenthal Keeping bits safe: how hard can it be? 47--55
Poul-Henning Kamp Sir, please step away from the ASR-33! 56--57
Michael Garland and
David B. Kirk Understanding throughput-oriented
architectures . . . . . . . . . . . . . 58--66
Patrick Vogl and
Michael Barrett Regulating the information gatekeepers 67--72
Piotr Faliszewski and
Edith Hemaspaandra and
Lane A. Hemaspaandra Using complexity to protect elections 74--82
Sarita Adve Data races are evil with no exceptions:
technical perspective . . . . . . . . . 84--84
Tayfun Elmas and
Shaz Qadeer and
Serdar Tasiran Goldilocks: a race-aware Java runtime 85--92
Cormac Flanagan and
Stephen N. Freund FastTrack: efficient and precise dynamic
race detection . . . . . . . . . . . . . 93--101
Peter Winkler Last Byte: Puzzled: Rectangles Galore 112--112
Duncan Buell Viewpoints: Virtual extension: In
support of computer science teachers and
the CSTA . . . . . . . . . . . . . . . . 113--115
Massimo Ficco and
Roberto Pietrantuono and
Stefano Russo Virtual extension: Supporting ubiquitous
location information in interworking 3G
and wireless networks . . . . . . . . . 116--123
Jill Freyne and
Lorcan Coyle and
Barry Smyth and
Padraig Cunningham Virtual extension: Relative status of
journal and conference publications in
computer science . . . . . . . . . . . . 124--132
David A. Patterson Diverse connections . . . . . . . . . . 5--5
CACM Staff Science has four legs . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Greg Linden and
Jason Hong and
Mark Guzdial Security advice; malvertisements; and CS
education in Qatar . . . . . . . . . . . 10--11
David Roman School grades need improvement . . . . . 12--12
Gregory Goth The eyes have it . . . . . . . . . . . . 13--15
Gary Anthes Topic models vs. unstructured data . . . 16--18
Marina Krakovsky CSEdWeek expands its reach . . . . . . . 19--19
Samuel Greengard The new face of war . . . . . . . . . . 20--22
David Lindley A matter of privacy . . . . . . . . . . 23--23
Seymour Goodman and
Andrew Harris The coming African tsunami of
information insecurity . . . . . . . . . 24--27
Mark Smotherman and
Dag Spicer IBM's single-processor supercomputer
efforts . . . . . . . . . . . . . . . . 28--30
Ann Quiroz Gates The role of Hispanic-serving
institutions in contributing to an
educated work force . . . . . . . . . . 31--33
Peter J. Denning and
Robert E. Kahn The long quest for universal information
access . . . . . . . . . . . . . . . . . 34--36
George V. Neville-Neil Literate coding . . . . . . . . . . . . 37--38
Francine Berman We need a research data census . . . . . 39--41
CACM Staff A conversation with Ed Catmull . . . . . 42--47
Mache Creeger The theft of business innovation: an
ACM--BCS roundtable on threats to global
competitiveness . . . . . . . . . . . . 48--55
Zhong Shao Certified software . . . . . . . . . . . 56--66
Stephen J. Andriole Business impact of Web 2.0 technologies 67--79
Adnan Darwiche Bayesian networks . . . . . . . . . . . 80--90
Michael Elad and
Raja Giryes Iterative signal recovery from
incomplete samples: technical
perspective . . . . . . . . . . . . . . 92--92
Deanna Needell and
Joel A. Tropp CoSaMP: iterative signal recovery from
incomplete and inaccurate samples . . . 93--100
Scott Aaronson QIP = PSPACE breakthrough: technical
perspective . . . . . . . . . . . . . . 101--101
Rahul Jain and
Zhengfeng Ji and
Sarvagya Upadhyay and
John Watrous QIP $=$ PSPACE . . . . . . . . . . . . . 102--109
Peter Winkler Last Byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 126--126
Rumilisoun Future tense: Rebirth of worlds . . . . 128--ff
Massimo Franceschet The role of conference publications in
CS . . . . . . . . . . . . . . . . . . . 129--132
Barry Lunt and
J. Ekstrom and
Han Reichgelt and
Michael Bailey and
Richard Leblanc IT 2008: the history of a new computing
discipline . . . . . . . . . . . . . . . 133--141
Ralph Morelli and
Chamindra de Silva and
Trishan de Lanerolle and
Rebecca Curzon and
Xin Sheng Mao A global collaboration to deploy help to
China . . . . . . . . . . . . . . . . . 142--149
Moshe Y. Vardi Where have all the workshops gone? . . . 5--5
CACM Staff To change the world, take a chance . . . 6--7
Anonymous In the Virtual Extension . . . . . . . . 8--8
Wendy Hall ACM's annual report . . . . . . . . . . 9--13
Jack Rosenberger and
Judy Robertson Smart career advice: laptops as a
classroom distraction . . . . . . . . . 14--15
David Roman Scholarly publishing model needs an
update . . . . . . . . . . . . . . . . . 16--ff
Gary Anthes Nonlinear systems made easy . . . . . . 17--19
Alex Wright The touchy subject of haptics . . . . . 20--22
Marina Krakovsky India's elephantine effort . . . . . . . 23--24
Jack Rosenberger EMET prize and other awards . . . . . . 25--25
Phillip G. Armour Don't bring me a good idea . . . . . . . 27--29
Stefan Bechtold Google AdWords and European trademark
law . . . . . . . . . . . . . . . . . . 30--32
Michael A. Cusumano Reflections on the Toyota debacle . . . 33--35
Mark D. Ryan Cloud computing privacy concerns on our
doorstep . . . . . . . . . . . . . . . . 36--38
Guy L. Steele Jr. An interview with Frances E. Allen . . . 39--45
Eben M. Haber and
Eser Kandogan and
Paul P. Maglio Collaboration in system administration 46--53
Anonymous UX design and agile: a natural fit? . . 54--60
Evangelos Kotsovinos Virtualization: blessing or curse? . . . 61--65
Gio Wiederhold Follow the intellectual property . . . . 66--74
Uzi Vishkin Using simple abstraction to reinvent
computing for parallelism . . . . . . . 75--85
Cynthia Dwork A firm foundation for private data
analysis . . . . . . . . . . . . . . . . 86--95
Dina Katabi Sora promises lasting impact: technical
perspective . . . . . . . . . . . . . . 98--98
Kun Tan and
He Liu and
Jiansong Zhang and
Yongguang Zhang and
Ji Fang and
Geoffrey M. Voelker Sora: high-performance software radio
using general-purpose multi-core
processors . . . . . . . . . . . . . . . 99--107
Damon Wischik Multipath: a new control architecture
for the Internet: technical perspective 108--108
Peter Key and
Laurent Massoulié and
Don Towsley Path selection and multipath congestion
control . . . . . . . . . . . . . . . . 109--116
Dennis McCafferty Last Byte: Q&A: a Journey of Discovery 128--ff
Michael E. Locasto and
Anup K. Ghosh and
Sushil Jajodia and
Angelos Stavrou The ephemeral legion: producing an
expert cyber-security work force from
thin air . . . . . . . . . . . . . . . . 129--131
Peter Fröhlich and
Antti Oulasvirta and
Matthias Baldauf and
Antti Nurminen On the move, wirelessly connected to the
world . . . . . . . . . . . . . . . . . 132--138
Matthias Häsel Opensocial: an enabler for social
applications on the Web . . . . . . . . 139--144
Tom Rodden ICPS offers major research venue . . . . 5--5
CACM Staff Shine the light of computational
complexity . . . . . . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Jason Hong Matters of design . . . . . . . . . . . 10--11
David Roman End of days for Communications in print? 12--12
Gregory Goth Chipping away at greenhouse gases . . . 13--15
Neil Savage Information theory after Shannon . . . . 16--18
Leah Hoffmann Maurice Wilkes: the last pioneer . . . . 19--19
Samuel Greengard Following the crowd . . . . . . . . . . 20--22
Gary Anthes ACM launches new Digital Library . . . . 23--24
CACM Staff ACM Fellows honored . . . . . . . . . . 25--25
Maura Conway Against cyberterrorism . . . . . . . . . 26--28
Gregory Rosston and
Scott Savage and
Donald Waldman Household demand for broadband Internet
service . . . . . . . . . . . . . . . . 29--31
George Ledin, Jr. The growing harm of not teaching malware 32--34
George V. Neville-Neil Forest for the trees . . . . . . . . . . 35--36
Mark Guzdial From science to engineering . . . . . . 37--39
Jonathan Grudin Technology, conferences, and community 41--43
Julian Harty Finding usability bugs with automated
tests . . . . . . . . . . . . . . . . . 44--49
Thomas A. Limoncelli A plea from sysadmins to software
vendors: 10 do's and don'ts . . . . . . 50--51
Christina Lear System administration soft skills . . . 52--58
Juan Pablo Wachs and
Mathias Kölsch and
Helman Stern and
Yael Edan Vision-based hand-gesture applications 60--71
Michael J. Cafarella and
Alon Halevy and
Jayant Madhavan Structured data on the Web . . . . . . . 72--79
Stephen Davies Still building the Memex . . . . . . . . 80--88
Fernando Pereira Markov meets Bayes: technical
perspective . . . . . . . . . . . . . . 90--90
Frank Wood and
Jan Gasthaus and
Cédric Archambeau and
Lancelot James and
Yee Whye Teh The sequence memoizer . . . . . . . . . 91--98
Norman P. Jouppi DRAM errors in the wild: technical
perspective . . . . . . . . . . . . . . 99--99
Bianca Schroeder and
Eduardo Pinheiro and
Wolf-Dietrich Weber DRAM errors in the wild: a large-scale
field study . . . . . . . . . . . . . . 100--107
Peter Winkler Last Byte: Puzzled: Parsing Partitions 112--112
John K. Estell and
Ken Christensen The need for a new graduation rite of
passage . . . . . . . . . . . . . . . . 113--115
Qinping Zhao 10 scientific problems in virtual
reality . . . . . . . . . . . . . . . . 116--118
David Wright and
Paul De Hert and
Serge Gutwirth Are the OECD guidelines at 30 showing
their age? . . . . . . . . . . . . . . . 119--127
Moshe Y. Vardi Fumbling the future . . . . . . . . . . 5--5
CACM Staff Free speech for algorithms? . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 11--11
Mark Guzdial and
Greg Linden Scientists, engineers, and computer
science; industry and research groups 12--13
David Roman Time to change . . . . . . . . . . . . . 14--14
Kirk L. Kroeker Grid computing's future . . . . . . . . 15--17
Neil Savage Twitter as medium and message . . . . . 18--20
Tom Geller Evaluating government funding . . . . . 21--21
Gary Anthes Memristors: pass or fail? . . . . . . . 22--24
Samuel Greengard Gary Chapman, technologist: 1952--2010 25--25
Pamela Samuelson Do you own the software you buy? . . . . 26--28
Kenneth D. Pimple Surrounded by machines . . . . . . . . . 29--31
Peter J. Denning Managing time . . . . . . . . . . . . . 32--34
Daryl E. Chubin and
Roosevelt Y. Johnson A program greater than the sum of its
parts: the BPC alliances . . . . . . . . 35--37
Marc Snir Computer and information science and
engineering: one discipline, many
specialties . . . . . . . . . . . . . . 38--43
Mark Burgess Testable system administration . . . . . 44--49
Ross Stapleton-Gray and
William Woodcock National Internet defense---small states
on the skirmish line . . . . . . . . . . 50--55
Poul-Henning Kamp B.Y.O.C (1,342 times and counting) . . . 56--58
Katy Börner Plug-and-play macroscopes . . . . . . . 60--69
Frank Stajano and
Paul Wilson Understanding scam victims: seven
principles for systems security . . . . 70--75
Nir Shavit Data structures in the multicore age . . 76--84
Juan Bello and
Yann LeCun and
Robert Rowe Concerto for violin and Markov model:
technical perspective . . . . . . . . . 86--86
Christopher Raphael The informatics philharmonic . . . . . . 87--93
Jennifer Rexford VL2: technical perspective . . . . . . . 94--94
Albert Greenberg and
James R. Hamilton and
Navendu Jain and
Srikanth Kandula and
Changhoon Kim and
Parantap Lahiri and
David A. Maltz and
Parveen Patel and
Sudipta Sengupta VL2: a scalable and flexible data center
network . . . . . . . . . . . . . . . . 95--104
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 109--109
Gregory Benford Future tense . . . . . . . . . . . . . . 112--ff
Frances Rosamond and
Roswitha Bardohl and
Stephan Diehl and
Uwe Geisler and
Gordon Bolduan and
Annette Lessmöllmann and
Andreas Schwill and
Ulrike Stege Reaching out to the media: become a
computer science ambassador . . . . . . 113--116
R. Kelly Garrett and
James N. Danziger The Internet electorate . . . . . . . . 117--123
Steven De Hertogh and
Stijn Viaene and
Guido Dedene Governing Web 2.0 . . . . . . . . . . . 124--130
Robert B. Schnabel Educating computing's next generation 5--5
CACM Staff In the Virtual Extension . . . . . . . . 8--8
CACM Staff I want a personal information pod . . . 9--9
Jason Hong Matters of design, part II . . . . . . . 10--11
Scott E. Delman ACM on the move . . . . . . . . . . . . 12--12
Gary Anthes The quest for randomness . . . . . . . . 13--15
Kirk L. Kroeker Engineering sensation in artificial
limbs . . . . . . . . . . . . . . . . . 16--18
Samuel Greengard Social games, virtual goods . . . . . . 19--22
Sarah Underwood British computer scientists reboot . . . 23--23
Fred Niederman and
Felix B. Tan Managing global IT teams: considering
cultural dynamics . . . . . . . . . . . 24--27
Nathan Ensmenger Building castles in the air . . . . . . 28--30
Michael A. Cusumano Platform wars come to social media . . . 31--33
George V. Neville-Neil Coder's block . . . . . . . . . . . . . 34--35
José Luis Gómez-Barroso and
Claudio Feijóo Asymmetries and shortages of the network
neutrality principle . . . . . . . . . . 36--37
Jonathan Parri and
Daniel Shapiro and
Miodrag Bolic and
Voicu Groza Returning control to the programmer:
SIMD intrinsics for virtual machines . . 38--43
Thomas A. Limoncelli and
Vinton G. Cerf Successful strategies for IPv6 rollouts:
Really . . . . . . . . . . . . . . . . . 44--48
Erik Meijer and
Gavin Bierman A co-relational model of data for large
shared data banks . . . . . . . . . . . 49--58
Maneesh Agrawala and
Wilmot Li and
Floraine Berthouzoz Design principles for visual
communication . . . . . . . . . . . . . 60--69
Aleksandar Dragojevik and
Pascal Felber and
Vincent Gramoli and
Rachid Guerraoui Why STM can be more than a research toy 70--77
John C. Tang and
Manuel Cebrian and
Nicklaus A. Giacobe and
Hyun-Woo Kim and
Taemie Kim and
Douglas ``Beaker'' Wickert Reflecting on the DARPA Red Balloon
Challenge . . . . . . . . . . . . . . . 78--85
Anhai Doan and
Raghu Ramakrishnan and
Alon Y. Halevy Crowdsourcing systems on the World-Wide
Web . . . . . . . . . . . . . . . . . . 86--96
Daniel M. Berry Liability issues in software
engineering: technical perspective . . . 98--98
Daniel Le Métayer and
Manuel Maarek and
Eduardo Mazza and
Marie-Laure Potet and
Stéphane Frénot and
Valérie Viet Triem Tong and
Nicolas Craipeau and
Ronan Hardouin Liability issues in software
engineering: the use of formal methods
to reduce legal uncertainties . . . . . 99--106
Madhu Sudan Patterns hidden from simple algorithms:
technical perspective . . . . . . . . . 107--107
Mark Braverman Poly-logarithmic independence fools
bounded-depth Boolean circuits . . . . . 108--115
Leah Hoffmann Last Byte: Q&A: The Chief Computer . . . 120--ff
Patricia Morreale and
David Joiner Reaching future computer scientists . . 121--124
Ann Majchrzak and
Philip H. B. More Emergency! Web 2.0 to the rescue! . . . 125--132
Fred Grossman and
Charles Tappert and
Joe Bergin and
Susan M. Merritt A research doctorate for computing
professionals . . . . . . . . . . . . . 133--141
Gerardo Canfora and
Massimiliano Di Penta and
Luigi Cerulo Achievements and challenges in software
reverse engineering . . . . . . . . . . 142--151
Moshe Y. Vardi Technology has social consequences . . . 5--5
CACM Staff Preserve privacy in statistical
correlations . . . . . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Michael Stonebraker Stonebraker on data warehouses . . . . . 10--11
Scott E. Delman Let ACM help you find your next job
`online' . . . . . . . . . . . . . . . . 12--12
Neil Savage Sorting through photos . . . . . . . . . 13--15
Gregory Goth I, domestic robot . . . . . . . . . . . 16--17
Leah Hoffmann Data optimization in developing nations 18--20
Marina Krakovsky Deus ex machina . . . . . . . . . . . . 22--22
Alex Wright Web science meets network science . . . 23--23
Avi Goldfarb and
Catherine E. Tucker Online advertising, behavioral
targeting, and privacy . . . . . . . . . 25--27
Brian Dorn Reaching learners beyond our hallowed
halls . . . . . . . . . . . . . . . . . 28--30
Tim Wu Bell Labs and centralized innovation . . 31--33
Jason Fitzpatrick An interview with Steve Furber . . . . . 34--39
Juan A. Añel The importance of reviewing the code . . 40--41
Poul-Henning Kamp The one-second war . . . . . . . . . . . 44--48
Andre Charland and
Brian Leroux Mobile application development: Web vs.
native . . . . . . . . . . . . . . . . . 49--53
Patrick McKenzie Weapons of mass assignment . . . . . . . 54--59
Dennis J. McFarland and
Jonathan R. Wolpaw Brain-computer interfaces for
communication and control . . . . . . . 60--66
Shekhar Borkar and
Andrew A. Chien The future of microprocessors . . . . . 67--77
Mikhail Afanasyev and
Tadayoshi Kohno and
Justin Ma and
Nick Murphy and
Stefan Savage and
Alex C. Snoeren and
Geoffrey M. Voelker Privacy-preserving network forensics . . 78--87
Byron Cook and
Andreas Podelski and
Andrey Rybalchenko Proving program termination . . . . . . 88--98
David C. Parkes Complex financial products: caveat
emptor: technical perspective . . . . . 100--100
Sanjeev Arora and
Boaz Barak and
Markus Brunnermeier and
Rong Ge Computational complexity and information
asymmetry in financial products . . . . 101--107
Guillermo Sapiro Images everywhere: looking for models:
technical perspective . . . . . . . . . 108--108
Antoni Buades and
Bartomeu Coll and
Jean-Michel Morel Self-similarity-based image denoising 109--117
Peter Winkler Last Byte: Puzzled: Games, Roles, Turns 120--120
Subhankar Dhar and
Upkar Varshney Challenges and business models for
mobile location-based services and
advertising . . . . . . . . . . . . . . 121--128
Guido Schryen Is open source security a myth? . . . . 130--140
Jacques Wainer and
Cleo Billa and
Siome Goldenstein Invisible work in standard bibliometric
evaluation of computer science . . . . . 141--146
P. J. Narayanan and
Anand Deshpanda Computing and India . . . . . . . . . . 5--5
CACM Staff Why concurrent objects are recurrently
complicated . . . . . . . . . . . . . . 6--6
CACM Staff In the Virtual Extension . . . . . . . . 7--7
Daniel Reed and
Mark Guzdial and
Judy Robertson Simple design; research vs. teaching;
and quest to learn . . . . . . . . . . . 8--9
Scott E. Delman Say it with video . . . . . . . . . . . 10--10
Kirk L. Kroeker Biology-inspired networking . . . . . . 11--13
Gary Anthes Beauty and elegance: Leslie Valiant
talks about machine learning, parallel
computing, and his quest for simplicity 14--15
Tom Geller The promise of flexible displays . . . . 16--18
Gregory Goth Unlimited possibilities . . . . . . . . 19--19
Marina Krakovsky All the news that's fit for you . . . . 20--21
Ari Schwartz Identity management and privacy: a rare
opportunity to get it right . . . . . . 22--24
Peter J. Denning and
Dennis J. Frailey Who are we---now? . . . . . . . . . . . 25--27
Phillip G. Armour Practical application of theoretical
estimation . . . . . . . . . . . . . . . 28--30
David Lorge Parnas The risks of stopping too soon . . . . . 31--33
George V. Neville-Neil Think before you fork . . . . . . . . . 34--35
Clayton T. Morrison and
Richard T. Snodgrass Computer science can use more science 36--38
Pat Helland If you have too much data, then `good
enough' is good enough . . . . . . . . . 40--47
Michael Rys Scalable SQL . . . . . . . . . . . . . . 48--53
Qing Hu and
Zhengchuan Xu and
Tamara Dinev and
Hong Ling Does deterrence work in reducing
information security policy abuse by
employees? . . . . . . . . . . . . . . . 54--60
W. Keith Edwards and
Rebecca E. Grinter and
Ratul Mahajan and
David Wetherall Advancing the state of home networking 62--71
Michael Stonebraker and
Rick Cattell 10 rules for scalable performance in
`simple operation' datastores . . . . . 72--80
Mike Barnett and
Manuel Fähndrich and
K. Rustan M. Leino and
Peter Müller and
Wolfram Schulte and
Herman Venter Specification and verification: the
Spec# experience . . . . . . . . . . . . 81--91
Massimo Franceschet PageRank: standing on the shoulders of
giants . . . . . . . . . . . . . . . . . 92--101
Phokion G. Kolaitis The quest for a logic for
polynomial-time computation: technical
perspective . . . . . . . . . . . . . . 103--103
Martin Grohe From polynomial time queries to graph
structure theory . . . . . . . . . . . . 104--112
Michael J. Franklin Data analysis at astonishing speed:
technical perspective . . . . . . . . . 113--13
Sergey Melnik and
Andrey Gubarev and
Jing Jing Long and
Geoffrey Romer and
Shiva Shivakumar and
Matt Tolton and
Theo Vassilakis Dremel: interactive analysis of
Web-scale datasets . . . . . . . . . . . 114--123
Peter Winkler Last Byte: Puzzled: a Lifelong Learner 126--126
Leah Hoffmann Last Byte: Q&A: a Lifelong Learner:
Leslie Valiant discusses machine
learning, parallel computing, and
computational neuroscience . . . . . . . 128, 127
Paolo Boldi and
Francesco Bonchi and
Carlos Castillo and
Sebastiano Vigna Viscous democracy for social networks 129--137
Denise Mcmanus and
Houston Carr and
Benjamin Adams Wireless on the precipice: The 14th
century revisited . . . . . . . . . . . 138--143
Moshe Y. Vardi Solving the unsolvable . . . . . . . . . 5--5
CACM Staff Practical research yields fundamental
insight, too . . . . . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Jeannette M. Wing and
Ed H. Chi Reviewing peer review . . . . . . . . . 10--11
Scott E. Delman ACM aggregates publication statistics in
the ACM Digital Library . . . . . . . . 12--12
Kirk L. Kroeker Weighing Watson's impact . . . . . . . . 13--15
Alex Wright Automotive autonomy . . . . . . . . . . 16--18
Dennis McCafferty Brave, new social world . . . . . . . . 19--21
CACM Staff ACM award recipients . . . . . . . . . . 22--22
Mari Sako Driving power in global supply chains 23--25
Cory Knobel and
Geoffrey C. Bowker Values in design . . . . . . . . . . . . 26--28
Pamela Samuelson Too many copyrights? . . . . . . . . . . 29--31
Maria (Mia) Ong The status of women of color in computer
science . . . . . . . . . . . . . . . . 32--34
Mordechai (Moti) Ben-Ari Non-myths about programming . . . . . . 35--37
Roberto Ierusalimschy and
Luiz Henrique De Figueiredo and
Waldemar Celes Passing a language through the eye of a
needle . . . . . . . . . . . . . . . . . 38--43
Debasish Ghosh DSL for the uninitiated . . . . . . . . 44--50
CACM Staff Microsoft's protocol documentation
program: interoperability testing at
scale . . . . . . . . . . . . . . . . . 51--57
Michael Edwards Algorithmic composition: computational
thinking in music . . . . . . . . . . . 58--67
Thomas Ball and
Vladimir Levin and
Sriram K. Rajamani A decade of software model checking with
SLAM . . . . . . . . . . . . . . . . . . 68--76
Joseph M. Hellerstein and
David L. Tennenhouse Searching for Jim Gray: a technical
overview . . . . . . . . . . . . . . . . 77--87
Stephen B. Wicker Cellular telephony and the question of
privacy . . . . . . . . . . . . . . . . 88--98
Luiz André Barroso FAWN: a Fast Array of Wimpy Nodes:
technical perspective . . . . . . . . . 100--100
David G. Andersen and
Jason Franklin and
Michael Kaminsky and
Amar Phanishayee and
Lawrence Tan and
Vijay Vasudevan FAWN: a Fast Array of Wimpy Nodes . . . 101--109
John Ousterhout Is scale your enemy, or is scale your
friend?: technical perspective . . . . . 110--110
Kinshuman Kinshumann and
Kirk Glerum and
Steve Greenberg and
Gabriel Aul and
Vince Orgovan and
Greg Nichols and
David Grant and
Gretchen Loihle and
Galen Hunt Debugging in the (very) large: ten years
of implementation and experience . . . . 111--116
Rudy Rucker Future tense . . . . . . . . . . . . . . 120--ff
John Ousterhout and
Parag Agrawal and
David Erickson and
Christos Kozyrakis and
Jacob Leverich and
David Mazi\`eres and
Subhasish Mitra and
Aravind Narayanan and
Diego Ongaro and
Guru Parulkar and
Mendel Rosenblum and
Stephen M. Rumble and
Eric Stratmann and
Ryan Stutsman The case for RAMCloud . . . . . . . . . 121--130
Gargi Dasgupta and
Amit Sharma and
Akshat Verma and
Anindya Neogi and
Ravi Kothari Workload management for power efficiency
in virtualized data centers . . . . . . 131--141
Sorel Reisman and
Alain Chesnais From the Presidents of the IEEE Computer
Society and ACM . . . . . . . . . . . . 5--5
CACM Staff A policy that deters violation of
security policy . . . . . . . . . . . . 7--7
CACM Staff In the Virtual Extension . . . . . . . . 8--8
Michael Stonebraker Stonebraker on NoSQL and enterprises . . 10--11
Scott E. Delman Why you should be happy to sign in! . . 12--12
Kirk L. Kroeker A new benchmark for artificial
intelligence . . . . . . . . . . . . . . 13--15
Tom Geller Supercomputing's exaflop target . . . . 16--18
Samuel Greengard Life, translated . . . . . . . . . . . . 19--21
Jonathon N. Cummings Geography is alive and well in virtual
teams . . . . . . . . . . . . . . . . . 24--26
Betsy DiSalvo and
Amy Bruckman From interests to values . . . . . . . . 27--29
S. M. Bellovin and
S. O. Bradner and
W. Diffie and
S. Landau and
J. Rexford Privacy and Security: As simple as
possible---but not more so: An
assessment of the U.S. government's
EINSTEIN project . . . . . . . . . . . . 30--33
George V. Neville-Neil Storage strife . . . . . . . . . . . . . 34--35
Joseph Y. Halpern and
David C. Parkes Journals for certification, conferences
for rapid dissemination . . . . . . . . 36--38
Eric Allman The robustness principle reconsidered 40--45
Satnam Singh Computing without processors . . . . . . 46--54
Oren Eini The pain of implementing LINQ providers 55--61
Dharmendra S. Modha and
Rajagopal Ananthanarayanan and
Steven K. Esser and
Anthony Ndirango and
Anthony J. Sherbondy and
Raghavendra Singh Cognitive computing . . . . . . . . . . 62--71
J. McGrath Cohoon and
Sergey Nigai and
Joseph ``Jofish'' Kaye Gender and computing conference papers 72--80
Luca De Alfaro and
Ashutosh Kulshreshtha and
Ian Pye and
B. Thomas Adler Reputation systems for open
collaboration . . . . . . . . . . . . . 81--87
Surajit Chaudhuri and
Umeshwar Dayal and
Vivek Narasayya An overview of business intelligence
technology . . . . . . . . . . . . . . . 88--98
Peter J. Haas Sketches get sketchier . . . . . . . . . 100--100
Ping Li and
Arnd Christian König Theory and applications of $b$-bit
minwise hashing . . . . . . . . . . . . 101--109
Scott Klemmer Skintroducing the future . . . . . . . . 110--110
Chris Harrison and
Desney Tan and
Dan Morris Skinput: appropriating the skin as an
interactive canvas . . . . . . . . . . . 111--118
Peter Winkler Last Byte: Puzzled: Uncommon Divisors 120--120
David Wright Should privacy impact assessments be
mandatory? . . . . . . . . . . . . . . . 121--131
Sanjay Goel Cyberwarfare: connecting the dots in
cyber intelligence . . . . . . . . . . . 132--140
Moshe Y. Vardi Are you talking to me? . . . . . . . . . 5--5
CACM Staff Solved, for all practical purposes . . . 7--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Jeannette M. Wing and
Valerie Barr Jeannette M. Wing @ PCAST; Barbara
Liskov keynote . . . . . . . . . . . . . 10--11
Kirk L. Kroeker A breakthrough in algorithm design . . . 13--15
Gary Anthes Invasion of the mobile apps . . . . . . 16--18
Samuel Greengard In Memoriam: Robert Morris, 1932--2011 17--17
Neil Savage Remaking American medicine . . . . . . . 19--21
Rebecca Tushnet Remix nation . . . . . . . . . . . . . . 22--24
Martin Campbell-Kelly In praise of 'Wilkes, Wheeler, and Gill' 25--27
Ron Babin and
Steve Briggs and
Brian Nicholson Corporate social responsibility and
global IT outsourcing . . . . . . . . . 28--30
Peter J. Denning and
Ritu Raj Managing time, part 2 . . . . . . . . . 31--33
Ben Shneiderman and
Jennifer Preece and
Peter Pirolli Realizing the value of social media
requires innovative computing research 34--37
Paul Vixie Arrogance in business planning . . . . . 38--41
Poul-Henning Kamp The most expensive one-byte mistake . . 42--44
Mache Creeger ACM CTO roundtable on mobile devices in
the enterprise . . . . . . . . . . . . . 45--53
Stephen J. Lukasik Protecting users of the cyber commons 54--61
Craig Partridge Realizing the future of wireless data
communications . . . . . . . . . . . . . 62--68
Leonardo De Moura and
Nikolaj Bjòrner Satisfiability modulo theories:
introduction and applications . . . . . 69--77
Patricia Bouyer and
Uli Fahrenberg and
Kim G. Larsen and
Nicolas Markey Quantitative analysis of real-time
systems using priced timed automata . . 78--87
Christopher Kruegel Making browser extensions secure:
technical perspective . . . . . . . . . 90--90
Sruthi Bandhakavi and
Nandit Tiku and
Wyatt Pittman and
Samuel T. King and
P. Madhusudan and
Marianne Winslett Vetting browser extensions for security
vulnerabilities with VEX . . . . . . . . 91--99
Olivier Danvy and
Jan Midtgaard Abstracting abstract machines: technical
perspective . . . . . . . . . . . . . . 100--100
David Van Horn and
Matthew Might Abstracting abstract machines: a
systematic approach to higher-order
program analysis . . . . . . . . . . . . 101--109
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 110--110
Leah Hoffmann Last Byte: Q&A: Scaling Up . . . . . . . 112--ff
Monideepa Tarafdar and
Qiang Tu and
T. S. Ragu-Nathan and
Bhanu S. Ragu-Nathan Crossing to the dark side: examining
creators, outcomes, and inhibitors of
technostress . . . . . . . . . . . . . . 113--120
Murray Cantor Calculating and improving ROI in
software and system programs . . . . . . 121--130
Ronald F. Boisvert and
Jack W. Davidson ACM's copyright policy . . . . . . . . . 5--6
CACM Staff In the Virtual Extension . . . . . . . . 7--7
Daniel Reed and
Mark Guzdial From idea to product: how schools of
education can help CS . . . . . . . . . 8--9
Scott E. Delman ACM TechNews now available in the
Android Market . . . . . . . . . . . . . 10--10
Kirk L. Kroeker Improving brain-computer interfaces . . 11--14
Tom Geller Seeing is not enough . . . . . . . . . . 15--16
Samuel Greengard Living in a digital world . . . . . . . 17--19
Marina Krakovsky Success at 16 . . . . . . . . . . . . . 20--20
Michael A. Cusumano The platform leader's dilemma . . . . . 21--24
George V. Neville-Neil File-system litter . . . . . . . . . . . 25--26
Carsten Schürmann Modernizing the Danish democratic
process . . . . . . . . . . . . . . . . 27--29
Phillip G. Armour Testing: failing to succeed . . . . . . 30--31
Dan S. Wallach Rebooting the CS publication process . . 32--35
Rishiyur S. Nikhil Abstraction in hardware system design 36--44
Erik Meijer The world according to LINQ . . . . . . 45--51
B. Scott Andersen and
George Romanski Verification of safety-critical software 52--57
John Arquilla From blitzkrieg to bitskrieg: the
military encounter with computers . . . 58--65
Sarah Cohen and
James T. Hamilton and
Fred Turner Computational journalism . . . . . . . . 66--71
Jasmin Fisher and
David Harel and
Thomas A. Henzinger Biology as reactivity . . . . . . . . . 72--82
Charles Moore Power efficiency as the #1 design
constraint: technical perspective . . . 84--84
Rehan Hameed and
Wajahat Qadeer and
Megan Wachs and
Omid Azizi and
Alex Solomatnikov and
Benjamin C. Lee and
Stephen Richardson and
Christos Kozyrakis and
Mark Horowitz Understanding sources of inefficiency in
general-purpose chips . . . . . . . . . 85--93
Geoffrey E. Hinton A better way to learn features:
technical perspective . . . . . . . . . 94--94
Honglak Lee and
Roger Grosse and
Rajesh Ranganath and
Andrew Y. Ng Unsupervised learning of hierarchical
representations with convolutional deep
belief networks . . . . . . . . . . . . 95--103
Carlo Tomasi Visual reconstruction: technical
perspective . . . . . . . . . . . . . . 104--104
Sameer Agarwal and
Yasutaka Furukawa and
Noah Snavely and
Ian Simon and
Brian Curless and
Steven M. Seitz and
Richard Szeliski Building Rome in a day . . . . . . . . . 105--112
Shumeet Baluja Future tense . . . . . . . . . . . . . . 120--ff
Daniel Gayo-Avello Don't turn social media into another
`Literary Digest' poll . . . . . . . . . 121--128
Zhiwei Xu and
Guojie Li Computing for the masses . . . . . . . . 129--137
Moshe Y. Vardi Is Moore's Party over? . . . . . . . . . 5--5
CACM Staff Justice for Jahromi . . . . . . . . . . 6--7
CACM Staff In the Virtual Extension . . . . . . . . 9--9
Bertrand Meyer and
Greg Linden In support of open reviews: better
teaching through large-scale data mining 12--13
Scott E. Delman ACM offers a new approach to
self-archiving . . . . . . . . . . . . . 14--14
Kirk L. Kroeker Modeling chaotic storms . . . . . . . . 15--17
Alex Wright Hacking cars . . . . . . . . . . . . . . 18--19
Leah Hoffmann Risky business . . . . . . . . . . . . . 20--22
Hannes Tschofenig Security risks in next-generation
emergency services . . . . . . . . . . . 23--25
Scott Wallsten What gets measured gets done . . . . . . 26--28
Pamela Samuelson Why the Google book settlement failed:
and what comes next? . . . . . . . . . . 29--31
Michael Davis Will software engineering ever be
engineering? . . . . . . . . . . . . . . 32--34
SIGCSE Teaching-Oriented Faculty Working Group Teaching-oriented faculty at research
universities . . . . . . . . . . . . . . 35--37
Douglas Baumann and
Susanne Hambrusch and
Jennifer Neville Gender demographics trends and changes
in U.S. CS departments . . . . . . . . . 38--42
Poul-Henning Kamp The software industry is the problem . . 44--47
Li Gong Java security architecture revisited . . 48--52
Yaron Minsky OCaml for the masses . . . . . . . . . . 53--58
Marti A. Hearst 'Natural' search user interfaces . . . . 60--67
DongBack Seo and
Albert Boonstra and
Marjolein Offenbeek Managing IS adoption in ambivalent
groups . . . . . . . . . . . . . . . . . 68--73
Ken Kennedy and
Charles Koelbel and
Hans Zima The rise and fall of High Performance
Fortran . . . . . . . . . . . . . . . . 74--82
Ian F. Akyildiz and
Josep Miquel Jornet and
Massimiliano Pierobon Nanonetworks: a new frontier in
communications . . . . . . . . . . . . . 84--89
Butler Lampson Making untrusted code useful: technical
perspective . . . . . . . . . . . . . . 92--92
Nickolai Zeldovich and
Silas Boyd-Wickizer and
Eddie Kohler and
David Mazi\`eres Making information flow explicit in
HiStar . . . . . . . . . . . . . . . . . 93--101
William T. Freeman A perfect `match': technical perspective 102--102
Connelly Barnes and
Dan B. Goldman and
Eli Shechtman and
Adam Finkelstein The PatchMatch randomized matching
algorithm for image manipulation . . . . 103--110
Peter Winkler Last Byte: Puzzled: Distances Between
Points on the Plane . . . . . . . . . . 120--120
Hector Garcia-Molina and
Georgia Koutrika and
Aditya Parameswaran Information seeking: convergence of
search, recommendations, and advertising 121--130
Moshe Y. Vardi Computing for humans . . . . . . . . . . 5--5
CACM Staff To boost presentation quality, ask
questions . . . . . . . . . . . . . . . 7--7
John Langford and
Judy Robertson Conferences and video lectures;
scientific educational games . . . . . . 8--9
CACM Staff Nominees for elections and report of the
ACM Nominating Committee . . . . . . . . 10--10
Kirk L. Kroeker The rise of molecular machines . . . . . 11--13
Gregory Goth Brave NUI world . . . . . . . . . . . . 14--16
Dennis McCafferty Activism vs. slacktivism . . . . . . . . 17--19
Samuel Greengard CSEdWeek takes hold . . . . . . . . . . 20--20
Paul Hyman Dennis Ritchie, 1941--2011 . . . . . . . 21--21
Jaron Lanier The most ancient marketing . . . . . . . 22--23
Genevieve Bell Life, death, and the iPad: cultural
symbols and Steve Jobs . . . . . . . . . 24--25
Michael A. Cusumano The legacy of Steve Jobs . . . . . . . . 26--28
Kentaro Toyama On turbocharged, heat-seeking, robotic
fishing poles . . . . . . . . . . . . . 29--31
George V. Neville-Neil Debugging on live systems . . . . . . . 32--33
Valerie Taylor and
Richard Ladner Data trends on minorities and people
with disabilities in computing . . . . . 34--37
Peter J. Denning The grounding practice . . . . . . . . . 38--40
Andrew Bernat and
Eric Grimson Doctoral program rankings for U.S.
computing programs: the National
Research Council strikes out . . . . . . 41--43
David Pacheco Postmortem debugging in dynamic
environments . . . . . . . . . . . . . . 44--51
G. Bruce Berriman and
Steven L. Groom How will astronomy archives survive the
data tsunami? . . . . . . . . . . . . . 52--56
Robert Green and
Henry Ledgard Coding guidelines: finding the art in
the science . . . . . . . . . . . . . . 57--63
Brian E. Moore and
Saad Ali and
Ramin Mehran and
Mubarak Shah Visual crowd surveillance through a
hydrodynamics lens . . . . . . . . . . . 64--73
Manuel Sojer and
Joachim Henkel License risks from ad hoc reuse of code
from the Internet . . . . . . . . . . . 74--81
Ganesh Gopalakrishnan and
Robert M. Kirby and
Stephen Siegel and
Rajeev Thakur and
William Gropp and
Ewing Lusk and
Bronis R. De Supinski and
Martin Schulz and
Greg Bronevetsky Formal analysis of MPI-based parallel
programs . . . . . . . . . . . . . . . . 82--91
Gerhard Brewka and
Thomas Eiter and
Miros\law Truszczy\'nski Answer set programming at a glance . . . 92--103
Xavier Leroy Safety first!: technical perspective . . 122--122
Jean Yang and
Chris Hawblitzel Safe to the last instruction: automated
verification of a type-safe operating
system . . . . . . . . . . . . . . . . . 123--131
Vitaly Shmatikov Anonymity is not privacy: technical
perspective . . . . . . . . . . . . . . 132--132
Lars Backstrom and
Cynthia Dwork and
Jon Kleinberg Wherefore art thou R3579X?: anonymized
social networks, hidden patterns, and
structural steganography . . . . . . . . 133--141
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 142--142
Leah Hoffmann Last Byte: Q&A: Scaling Up: M. Frans
Kaashoek talks about multicore
computing, security, and operating
system design . . . . . . . . . . . . . 144, 143
Moshe Y. Vardi Artificial intelligence: past and future 5--5
CACM Staff Software engineering is engineering . . 6--7
Alain Chesnais ACM President's letter . . . . . . . . . 8--8
Alain Chesnais ACM's annual report . . . . . . . . . . 9--13
Mark Guzdial and
Bertrand Meyer Understanding CS1 students; defective
software . . . . . . . . . . . . . . . . 14--15
Scott Delman eBooks will abound in the ACM Digital
Library . . . . . . . . . . . . . . . . 16--16
Neil Savage Better medicine through machine learning 17--19
Gary Anthes Revamping storage performance . . . . . 20--22
Samuel Greengard Law and disorder . . . . . . . . . . . . 23--25
Sarah Underwood Celebration time . . . . . . . . . . . . 26--26
Alex Wright Analyzing Apple products . . . . . . . . 27--27
Paul Hyman John McCarthy, 1927--2011 . . . . . . . 28--29
Randal C. Picker The yin and yang of copyright and
technology . . . . . . . . . . . . . . . 30--32
Phillip G. Armour The difference engine . . . . . . . . . 33--34
Thomas Haigh The IBM PC: from beige box to industry
standard . . . . . . . . . . . . . . . . 35--37
Kai A. Olsen and
Alessio Malizia Interfaces for the ordinary user: can we
hide too much? . . . . . . . . . . . . . 38--40
Philip L. Frana An interview with Stephen A. Cook . . . 41--46
Matthew Flatt Creating languages in Racket . . . . . . 48--56
Jim Gettys and
Kathleen Nichols Bufferbloat: dark buffers in the
Internet . . . . . . . . . . . . . . . . 57--65
Carl Waldspurger and
Mendel Rosenblum I/O virtualization . . . . . . . . . . . 66--73
Jason Hong The state of phishing attacks . . . . . 74--81
Geoff Coulson and
Barry Porter and
Ioannis Chatzigiannakis and
Christos Koninis and
Stefan Fischer and
Dennis Pfisterer and
Daniel Bimschas and
Torsten Braun and
Philipp Hurni and
Markus Anwander and
Gerald Wagenknecht and
Sándor P. Fekete and
Alexander Kröller and
Tobias Baumgartner Flexible experimentation in wireless
sensor networks . . . . . . . . . . . . 82--90
Chi-Sung Laih and
Shang-Ming Jen and
Chia-Yu Lu Long-term confidentiality of PKI . . . . 91--95
Roberto Manduchi and
James Coughlan (Computer) vision without sight . . . . 96--104
Frédo Durand Where do people draw lines?: technical
perspective . . . . . . . . . . . . . . 106--106
Forrester Cole and
Aleksey Golovinskiy and
Alex Limpaecher and
Heather Stoddart Barros and
Adam Finkelstein and
Thomas Funkhouser and
Szymon Rusinkiewicz Where do people draw lines? . . . . . . 107--115
Jim Kurose Content-centric networking: technical
perspective . . . . . . . . . . . . . . 116--116
Van Jacobson and
Diana K. Smetters and
James D. Thornton and
Michael Plass and
Nick Briggs and
Rebecca Braynard Networking named content . . . . . . . . 117--124
Daniel H. Wilson Future tense . . . . . . . . . . . . . . 136--ff
Fabrizio Gagliardi Revisiting ACM Europe . . . . . . . . . 5--5
Phil Brooke and
Vladik Kreinovich Letters: Credit non-anonymous reviewers
with a name . . . . . . . . . . . . . . 6--7
Lawrence C. Paulson and
Poul-Henning Kamp Letters: What Liability for Faulty
Software? . . . . . . . . . . . . . . . 6--7
Ian Joyner Letters: The [Steve] Jobs Factor . . . . 6--7
August Schau and
Charles H. Lindsey Letters: Give Me Competent Communication 6--7
Michael Stonebraker and
Jason Hong Researchers' big data crisis;
understanding design and functionality 10--11
Gregory Goth The science of better science . . . . . 13--15
Samuel Greengard The war against botnets . . . . . . . . 16--18
Alex Wright The social life of robots . . . . . . . 19--21
CACM Staff ACM Fellows inducted . . . . . . . . . . 23--23
Gregory Rosston Incentive auctions . . . . . . . . . . . 24--26
Beth Simon and
Quintin Cutts Peer instruction: a teaching method to
foster deep understanding . . . . . . . 27--29
Donald A. Norman Yet another technology cusp: confusion,
vendor wars, and opportunities . . . . . 30--32
George V. Neville-Neil Wanton acts of debuggery . . . . . . . . 33--34
Rose McDermott Emotion and security . . . . . . . . . . 35--37
Marvin V. Zelkowitz What have we learned about software
engineering? . . . . . . . . . . . . . . 38--39
Vint Cerf and
Van Jacobson and
Nick Weaver and
Jim Gettys BufferBloat: what's wrong with the
Internet? . . . . . . . . . . . . . . . 40--47
Hans-J. Boehm and
Sarita V. Adve You don't know jack about shared
variables or memory models . . . . . . . 48--54
Adam Oliner and
Archana Ganapathi and
Wei Xu Advances and challenges in log analysis 55--61
Nicholas Evangelopoulos and
Lucian Visinescu Text-mining the voice of the people . . 62--69
Holger H. Hoos Programming by optimization . . . . . . 70--80
Bryce Allen and
John Bresnahan and
Lisa Childers and
Ian Foster and
Gopi Kandaswamy and
Raj Kettimuthu and
Jack Kordas and
Mike Link and
Stuart Martin and
Karl Pickett and
Steven Tuecke Software as a service for data
scientists . . . . . . . . . . . . . . . 81--88
Miad Faezipour and
Mehrdad Nourani and
Adnan Saeed and
Sateesh Addepalli Progress and challenges in intelligent
vehicle area networks . . . . . . . . . 90--100
Rastislav Bodik Compiling what to how: technical
perspective . . . . . . . . . . . . . . 102--102
Viktor Kuncak and
Mikaël Mayer and
Ruzica Piskac and
Philippe Suter Software synthesis procedures . . . . . 103--111
Santosh S. Vempala Modeling high-dimensional data:
technical perspective . . . . . . . . . 112--112
Adam Tauman Kalai and
Ankur Moitra and
Gregory Valiant Disentangling Gaussians . . . . . . . . 113--120
Peter Winkler Last Byte: Puzzled: Where Sets Meet
(Venn Diagrams) . . . . . . . . . . . . 128--128
Moshe Y. Vardi What is an algorithm? . . . . . . . . . 5--5
CACM Staff From syntax to semantics for AI . . . . 6--7
Bertrand Meyer Knowledgeable beginners . . . . . . . . 10--11
Neil Savage Gaining wisdom from crowds . . . . . . . 13--15
Gary Anthes Computing with magnets . . . . . . . . . 16--18
Samuel Greengard Policing the future . . . . . . . . . . 19--21
Paul Hyman Stanford schooling---gratis! . . . . . . 22--22
Jack Rosenberger Computer science awards . . . . . . . . 23--23
Patrick Lin and
Fritz Allhoff and
Neil C. Rowe War 2.0: cyberweapons and ethics . . . . 24--26
Pamela Samuelson Legally Speaking: Do software copyrights
protect what programs do? . . . . . . . 27--29
Peter J. Denning Viewpoint: The Profession of IT: The
idea idea . . . . . . . . . . . . . . . 30--32
Vassilis Kostakos Viewpoint: Training users vs. training
soldiers: experiences from the
battlefield . . . . . . . . . . . . . . 33--35
Alessio Malizia and
Andrea Bellucci Viewpoint: The artificiality of natural
user interfaces . . . . . . . . . . . . 36--38
Patrice Godefroid and
Michael Y. Levin and
David Molnar SAGE: whitebox fuzzing for security
testing . . . . . . . . . . . . . . . . 40--44
Luigi Rizzo Revisiting network I/O APIs: the netmap
framework . . . . . . . . . . . . . . . 45--51
Poul-Henning Kamp The hyperdimensional tar pit . . . . . . 52--53
Youngki Lee and
S. S. Iyengar and
Chulhong Min and
Younghyun Ju and
Seungwoo Kang and
Taiwoo Park and
Jinwon Lee and
Yunseok Rhee and
Junehwa Song MobiCon: a mobile context-monitoring
platform . . . . . . . . . . . . . . . . 54--65
Seung Hyun Kim and
Qiu-Hong Wang and
Johannes B. Ullrich A comparative study of cyberattacks . . 66--73
S. Barry Cooper Turing's Titanic machine? . . . . . . . 74--83
J. Y. Huang and
C. H. Tsai and
S. T. Huang The next generation of GPS navigation
systems . . . . . . . . . . . . . . . . 84--93
Steven D. Gribble The benefits of capability-based
protection: technical perspective . . . 96--96
Robert N. M. Watson and
Jonathan Anderson and
Ben Laurie and
Kris Kennaway A taste of Capsicum: practical
capabilities for UNIX . . . . . . . . . 97--104
Michael L. Littman A new way to search game trees:
technical perspective . . . . . . . . . 105--105
Sylvain Gelly and
Levente Kocsis and
Marc Schoenauer and
Mich\`ele Sebag and
David Silver and
Csaba Szepesvári and
Olivier Teytaud The grand challenge of computer Go:
Monte Carlo tree search and extensions 106--113
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 118--118
Leah Hoffmann Q&A: Chief Strategiest . . . . . . . . . 120--ff
Yunhao Liu and
Vincent Shen ACM China Council . . . . . . . . . . . 5--5
CACM Staff The beauty of simplicity . . . . . . . . 6--7
Daniel Reed and
Mark Guzdial The power of computing; design
guidelines in CS education . . . . . . . 8--9
Gregory Goth Preserving digital data . . . . . . . . 11--13
Tom Geller Talking to machines . . . . . . . . . . 14--16
Leah Hoffmann Open for business . . . . . . . . . . . 17--19
Michael A. Cusumano Can services and platform thinking help
the U.S. Postal Service? . . . . . . . . 21--23
Richard Heeks Information technology and gross
national happiness . . . . . . . . . . . 24--26
George V. Neville-Neil The network protocol battle . . . . . . 27--28
Jill Ross and
Elizabeth Litzler and
J. McGrath Cohoon and
Lucy Sanders Improving gender composition in
computing . . . . . . . . . . . . . . . 29--31
Selma Tekir Reading CS classics . . . . . . . . . . 32--34
Daniel Soper Is human mobility tracking a good idea? 35--37
Brian Beckman Why LINQ matters: cloud composability
guaranteed . . . . . . . . . . . . . . . 38--44
Jeffrey Heer and
Ben Shneiderman Interactive dynamics for visual analysis 45--54
Andrew Danowitz and
Kyle Kelley and
James Mao and
John P. Stevenson and
Mark Horowitz CPU DB: recording microprocessor history 55--63
Martin Schmettow Sample size in usability studies . . . . 64--70
Laurie Williams What agile teams think of agile
principles . . . . . . . . . . . . . . . 71--76
David M. Blei Probabilistic topic models . . . . . . . 77--84
Sarvapali D. Ramchurn and
Perukrishnen Vytelingum and
Alex Rogers and
Nicholas R. Jennings Putting the `smarts' into the smart
grid: a grand challenge for artificial
intelligence . . . . . . . . . . . . . . 86--97
Dinesh Manocha Building robust dynamical simulation
systems: technical perspective . . . . . 101--101
David Harmon and
Etienne Vouga and
Breannan Smith and
Rasmus Tamstorf and
Eitan Grinspun Asynchronous contact mechanics . . . . . 102--109
Ed H. Chi Who knows?: searching for expertise on
the social web: technical perspective 110--110
Damon Horowitz and
Sepandar D. Kamvar Searching the village: models and
methods for social search . . . . . . . 111--118
Brian Clegg Future tense . . . . . . . . . . . . . . 120--ff
Moshe Y. Vardi Fair access . . . . . . . . . . . . . . 5--5
Judy Robertson Likert-type scales, statistical methods,
and effect sizes . . . . . . . . . . . . 6--7
Neil Savage Automating scientific discovery . . . . 9--11
Alex Wright Robots like us . . . . . . . . . . . . . 12--13
Samuel Greengard Digitally possessed . . . . . . . . . . 14--16
Paul Hyman A workshop revival . . . . . . . . . . . 17--17
Gerald Segal ACM's 2012 general election . . . . . . 19--29
Peter S. Menell Design for symbiosis . . . . . . . . . . 30--32
David Anderson The future of the past . . . . . . . . . 33--34
Joel Waldfogel Digitization and copyright: some recent
evidence from music . . . . . . . . . . 35--37
Alexander Repenning Programming goes back to school . . . . 38--40
Abraham Bernstein and
Mark Klein and
Thomas W. Malone Programming the global brain . . . . . . 41--43
Armando Fox and
David Patterson Crossing the software education chasm 44--49
Eric Allman Managing technical debt . . . . . . . . 50--55
Pat Helland Idempotence is not a medical condition 56--65
Erik Meijer Your mouse is a database . . . . . . . . 66--73
Alok Choudhary and
William Hendrix and
Kathy Lee and
Diana Palsetia and
Wei-Keng Liao Social media evolution of the Egyptian
revolution . . . . . . . . . . . . . . . 74--80
Daniel S. Soper and
Ofir Turel An $n$-gram analysis of Communications
2000--2010 . . . . . . . . . . . . . . . 81--87
Nir Atias and
Roded Sharan Comparative analysis of protein
networks: hard problems, practical
solutions . . . . . . . . . . . . . . . 88--97
William Gropp Best algorithms $+$ best computers $=$
powerful match . . . . . . . . . . . . . 100--100
Ilya Lashuk and
Aparna Chandramowlishwaran and
Harper Langston and
Tuan-Anh Nguyen and
Rahul Sampath and
Aashay Shringarpure and
Richard Vuduc and
Lexing Ying and
Denis Zorin and
George Biros A massively parallel adaptive fast
multipole method on heterogeneous
architectures . . . . . . . . . . . . . 101--109
Steven Hand An experiment in determinism . . . . . . 110--110
Amittai Aviram and
Shu-Chun Weng and
Sen Hu and
Bryan Ford Efficient system-enforced deterministic
parallelism . . . . . . . . . . . . . . 111--119
Peter Winkler Last Byte: Puzzled: Designs on Square
Grids . . . . . . . . . . . . . . . . . 120--120
Eugene H. Spafford USACM and U.S. legislation . . . . . . . 5--5
CACM Staff The halting problem in the clear light
of probability . . . . . . . . . . . . . 6--7
Jason Hong and
Greg Linden Protecting against data breaches; living
with mistakes . . . . . . . . . . . . . 10--11
Scott E. Delman Don't throw the baby out with the
bathwater . . . . . . . . . . . . . . . 12--12
Gregory Goth Analyzing medical data . . . . . . . . . 13--15
Gary Anthes Smarter photography . . . . . . . . . . 16--18
Leah Hoffmann Data mining meets city hall . . . . . . 19--21
Neil Savage Game changer . . . . . . . . . . . . . . 22--23
Paul Hyman An influential theoretician . . . . . . 24--24
Phillip G. Armour A measure of control . . . . . . . . . . 26--28
Simson L. Garfinkel The cybersecurity risk . . . . . . . . . 29--32
George V. Neville-Neil Scale failure . . . . . . . . . . . . . 33--34
Chris Hall Security of the Internet and the known
unknowns . . . . . . . . . . . . . . . . 35--37
Peter J. Denning and
Nicholas Dew The myth of the elevator pitch . . . . . 38--40
Herbert Lin Why computer scientists should care
about cyber conflict and U.S. national
security policy . . . . . . . . . . . . 41--43
Dennis Abts and
Bob Felderman A guided tour of data-center networking 44--51
David Crandall and
Noah Snavely Modeling people and places with Internet
photo collections . . . . . . . . . . . 52--60
Kari Pulli and
Anatoly Baksheev and
Kirill Kornyakov and
Victor Eruhimov Real-time computer vision with OpenCV 61--69
Benjamin Doer and
Mahmoud Fouz and
Tobias Friedrich Why rumors spread so quickly in social
networks . . . . . . . . . . . . . . . . 70--75
Bryan Parno Trust extension for commodity computers 76--85
Michael J. Carey and
Nicola Onose and
Michalis Petropoulos Data services . . . . . . . . . . . . . 86--97
Ketan D. Mulmuley The GCT program toward the P vs. NP
problem . . . . . . . . . . . . . . . . 98--107
Pablo A. Parrilo Reconstructing the unknown, balancing
structure and uncertainty: technical
perspective . . . . . . . . . . . . . . 110--110
Emmanuel Cand\`es and
Benjamin Recht Exact matrix completion via convex
optimization . . . . . . . . . . . . . . 111--119
Peter Lee The fox and the hedgehog: technical
perspective . . . . . . . . . . . . . . 120--120
Tiark Rompf and
Martin Odersky Lightweight modular staging: a pragmatic
approach to runtime code generation and
compiled DSLs . . . . . . . . . . . . . 121--130
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 133--133
Leah Hoffmann Last Byte: Q&A: a Sure Thing . . . . . . 136, 135
Moshe Y. Vardi Predatory scholarly publishing . . . . . 5--5
CACM Staff An integral number and its consequences 7--8
Mark Guzdial and
Judy Robertson CS and popular culture; learning from
console games . . . . . . . . . . . . . 10--11
Gregory Goth Degrees of separation . . . . . . . . . 13--15
Gary Anthes HTML5 leads a Web revolution . . . . . . 16--17
Marina Krakovsky Patently inadequate . . . . . . . . . . 18--20
Paul Hyman Lost and found . . . . . . . . . . . . . 21--21
Mari Sako Business models for strategy and
innovation . . . . . . . . . . . . . . . 22--24
Pamela Samuelson Can online piracy be stopped by laws? 25--27
R. T. Watson and
J. Corbett and
M. C. Boudreau and
J. Webster An information strategy for
environmental sustainability . . . . . . 28--30
Martin Campbell-Kelly Alan Turing's other universal machine 31--33
Alfred Spector and
Peter Norvig and
Slav Petrov Google's hybrid approach to research . . 34--37
Sarah Spiekermann The challenges of privacy by design . . 38--40
Kathleen Nichols and
Van Jacobson Controlling queue delay . . . . . . . . 42--50
Poul-Henning Kamp My compiler does not understand me . . . 51--53
Eric Bouwers and
Joost Visser and
Arie van Deursen Getting what you measure . . . . . . . . 54--59
James Abello and
Peter Broadwell and
Timothy R. Tangherlini Computational folkloristics . . . . . . 60--70
Ian Sommerville and
Dave Cliff and
Radu Calinescu and
Justin Keen and
Tim Kelly and
Marta Kwiatkowska and
John Mcdermid and
Richard Paige Large-scale complex IT systems . . . . . 71--77
Milo M. K. Martin and
Mark D. Hill and
Daniel J. Sorin Why on-chip cache coherence is here to
stay . . . . . . . . . . . . . . . . . . 78--89
David Harel and
Assaf Marron and
Gera Weiss Behavioral programming . . . . . . . . . 90--100
David Patterson For better or worse, benchmarks shape a
field: technical perspective . . . . . . 104--104
Hadi Esmaeilzadeh and
Ting Cao and
Xi Yang and
Stephen M. Blackburn and
Kathryn S. McKinley Looking back and looking forward: power,
performance, and upheaval . . . . . . . 105--114
Amos Fiat Why study the price of anarchy?:
technical perspective . . . . . . . . . 115--115
Tim Roughgarden Intrinsic robustness of the price of
anarchy . . . . . . . . . . . . . . . . 116--123
Ken MacLeod Future Tense: They Just Click . . . . . 128--ff
Matthew Swinarski and
Diane H. Parente and
Rajiv Kishore Do small IT firms benefit from higher
process capability? . . . . . . . . . . 129--134
Bill Poucher Giving students the competitive edge . . 5--5
CACM Staff Composable trees for configurable
behavior . . . . . . . . . . . . . . . . 7--7
John Langford and
Ruben Ortega Machine learning and algorithms: agile
development . . . . . . . . . . . . . . 10--11
Jeff Kanipe Cosmic simulations . . . . . . . . . . . 13--15
Tom Geller DARPA Shredder challenge solved . . . . 16--17
Samuel Greengard Advertising gets personal . . . . . . . 18--20
Karen A. Frenkel Broader horizons . . . . . . . . . . . . 21--21
Paul Tjia Inside the hermit kingdom: IT and
outsourcing in North Korea . . . . . . . 22--25
Fred G. Martin Will massive open online courses change
how we teach? . . . . . . . . . . . . . 26--28
Danah Boyd The politics of ``real names'' . . . . . 29--31
George V. Neville-Neil A system is not a product . . . . . . . 32--33
Chris Forman and
Avi Goldfarb and
Shane Greenstein The Internet is everywhere, but the
payoff is not . . . . . . . . . . . . . 34--35
Kai A. Olsen and
Hans Fredrik Nordhaug Internet elections: unsafe in any home? 36--38
Neil McBride The ethics of software engineering
should be an ethics for the client . . . 39--41
Thomas A. Limoncelli OpenFlow: a radical new idea in
networking . . . . . . . . . . . . . . . 42--47
Rafael Vanoni Polanczyk Extending the semantics of scheduling
priorities . . . . . . . . . . . . . . . 48--52
Manuel Serrano and
Gérard Berry Multitier programming in Hop . . . . . . 53--59
Stephen B. Wicker The loss of location privacy in the
cellular age . . . . . . . . . . . . . . 60--68
Bjorn De Sutter and
Aäron Van Den Oord To be or not to be cited in computer
science . . . . . . . . . . . . . . . . 69--75
Wil Van Der Aalst Process mining . . . . . . . . . . . . . 76--83
Scott Aaronson and
Edward Farhi and
David Gosset and
Avinatan Hassidim and
Jonathan Kelner and
Andrew Lutomirski Quantum money . . . . . . . . . . . . . 84--92
Martin C. Rinard Example-driven program synthesis for
end-user programming: technical
perspective . . . . . . . . . . . . . . 96--96
Sumit Gulwani and
William R. Harris and
Rishabh Singh Spreadsheet data manipulation using
examples . . . . . . . . . . . . . . . . 97--105
Andreas Zeller Proving programs continuous: technical
perspective . . . . . . . . . . . . . . 106--106
Swarat Chaudhuri and
Sumit Gulwani and
Roberto Lublinerman Continuity and robustness of programs 107--115
Peter Winkler Last Byte: Puzzled: Find the Magic Set 120--120
Moshe Y. Vardi Why ACM? . . . . . . . . . . . . . . . . 5--5
CACM Staff Operationalizing privacy by design . . . 7--7
Bertrand Meyer Incremental research vs. paradigm-shift
mania . . . . . . . . . . . . . . . . . 8--9
Gregory Goth Atomic-level computing . . . . . . . . . 11--13
Gary Anthes Chips go upscale . . . . . . . . . . . . 14--16
Marina Krakovsky Garbage in, info out . . . . . . . . . . 17--19
Paul Hyman In honor of Alan Turing . . . . . . . . 20--23
Thomas Haigh Seven lessons from bad history . . . . . 26--29
Peter J. Denning Don't feel bad if you can't predict the
future . . . . . . . . . . . . . . . . . 30--32
Tal Z. Zarsky Automated prediction: perception, law,
and policy . . . . . . . . . . . . . . . 33--35
Richard E. Ladner and
Elizabeth Litzler The need to balance innovation and
implementation in broadening
participation . . . . . . . . . . . . . 36--38
Esperanza Marcos and
Juan Manuel Vara and
Valeria de Castro Author order: what science can learn
from the arts . . . . . . . . . . . . . 39--41
Christos H. Papadimitriou Alan and I: a personal account of Alan
Turing's life and impact . . . . . . . . 42--43
David Chisnall A new Objective-C runtime: from research
to production . . . . . . . . . . . . . 44--47
Emery D. Berger Software needs seatbelts and airbags . . 48--53
Erik Meijer All your database are belong to us . . . 54--60
Gary Garrison and
Sanghyun Kim and
Robin L. Wakefield Success factors for deploying cloud
computing . . . . . . . . . . . . . . . 62--68
Radu Calinescu and
Carlo Ghezzi and
Marta Kwiatkowska and
Raffaela Mirandola Self-adaptive software needs
quantitative verification at runtime . . 69--77
Doug A. Bowman and
Ryan P. McMahan and
Eric D. Ragan Questioning naturalism in $3$D user
interfaces . . . . . . . . . . . . . . . 78--88
William A. Buxton Innovative interaction: from concept to
the wild: technical perspective . . . . 90--90
Shumin Zhai and
Per Ola Kristensson The word-gesture keyboard: reimagining
keyboard interaction . . . . . . . . . . 91--101
Dan Suciu SQL on an encrypted database: technical
perspective . . . . . . . . . . . . . . 102--102
Raluca Ada Popa and
Catherine M. S. Redfield and
Nickolai Zeldovich and
Hari Balakrishnan CryptDB: processing queries on an
encrypted database . . . . . . . . . . . 103--111
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 117--117
Leah Hoffmann Q&A: What Women Want . . . . . . . . . . 120, 119
Vinton G. Cerf Where is the science in computer
science? . . . . . . . . . . . . . . . . 5--5
CACM Staff When harm to conference reputation is
self-inflicted . . . . . . . . . . . . . 6--7
Daniel Reed and
Ed H. Chi Online privacy; replicating research
results . . . . . . . . . . . . . . . . 8--9
Neil Savage Digging for drug facts . . . . . . . . . 11--13
Gregory Mone Redesigning the data center . . . . . . 14--16
Leah Hoffmann Computer science and the three Rs . . . 17--19
Michael A. Cusumano Reflecting on the Facebook IPO . . . . . 20--23
Phillip G. Armour The Goldilocks estimate . . . . . . . . 24--25
Peter G. Neumann The foresight saga, redux . . . . . . . 26--29
George V. Neville-Neil A nice piece of code . . . . . . . . . . 30--31
Jean-François Blanchette Computing as if infrastructure mattered 32--34
Ivan Sutherland The tyranny of the clock . . . . . . . . 35--36
Rick Ratzel and
Rodney Greenstreet Toward higher precision . . . . . . . . 38--47
John Allspaw Fault injection in production . . . . . 48--52
Poul-Henning Kamp A generation lost in the bazaar . . . . 53--55
Michael Kearns Experiments in social computation . . . 56--67
Barbara Simons and
Douglas W. Jones Internet voting in the U.S. . . . . . . 68--77
Pedro Domingos A few useful things to know about
machine learning . . . . . . . . . . . . 78--87
Rocco A. Servedio A high-dimensional surprise: technical
perspective . . . . . . . . . . . . . . 89--89
Guy Kindler and
Anup Rao and
Ryan O'Donnell and
Avi Wigderson Spherical cubes: optimal foams from
computational hardness amplification . . 90--97
Bruce Hendrickson Graph embeddings and linear equations:
technical perspective . . . . . . . . . 98--98
Ioannis Koutis and
Gary L. Miller and
Richard Peng A fast solver for a class of linear
systems . . . . . . . . . . . . . . . . 99--107
Geoffrey A. Landis Last Byte: Future tense: Fermi's Paradox
and the End of the Universe . . . . . . 112--112
Moshe Y. Vardi Will MOOCs destroy academia? . . . . . . 5--5
Vinton G. Cerf Why is accessibility so hard? . . . . . 7--7
CACM Staff When predicting, start with humility . . 8--9
Michael Stonebraker New opportunities for New SQL . . . . . 10--11
Bernard Rous Major update to ACM's Computing
Classification System . . . . . . . . . 12--12
Gregory Goth Software on Mars . . . . . . . . . . . . 13--15
Tom Geller Control without controllers . . . . . . 16--18
Samuel Greengard On the digital trail . . . . . . . . . . 19--21
David Basin and
Srdjan Capkun The research value of publishing attacks 22--24
Pamela Samuelson Legally speaking: Oracle v. Google: are
APIs copyrightable? . . . . . . . . . . 25--27
Kristina McElheran Decentralization versus centralization
in IT governance . . . . . . . . . . . . 28--30
Aman Yadav and
John T. Korb Learning to teach computer science: the
need for a methods course . . . . . . . 31--33
Timothy Kostyk and
Joseph Herkert Societal implications of the emerging
smart grid . . . . . . . . . . . . . . . 34--36
Richard A. DeMillo Keeping technology promises . . . . . . 37--39
Anonymous Resilience engineering: learning to
embrace failure . . . . . . . . . . . . 40--47
Kripa Krishnan Weathering the unexpected . . . . . . . 48--52
Marshall Kirk McKusick Disks from the perspective of a file
system . . . . . . . . . . . . . . . . . 53--55
Dan Boneh and
Amit Sahai and
Brent Waters Functional encryption: a new vision for
public-key cryptography . . . . . . . . 56--64
Joerg Kurt Wegner and
Aaron Sterling and
Rajarshi Guha and
Andreas Bender and
Jean-Loup Faulon and
Janna Hastings and
Noel O'Boyle and
John Overington and
Herman Van Vlijmen and
Egon Willighagen Cheminformatics . . . . . . . . . . . . 65--75
Rolf Pfeifer and
Max Lungarella and
Fumiya Iida The challenges ahead for bio-inspired
`soft' robotics . . . . . . . . . . . . 76--87
Richard Szeliski Open platforms for computational
photography: technical perspective . . . 89--89
Andrew Adams and
David E. Jacobs and
Jennifer Dolson and
Marius Tico and
Kari Pulli and
Eino-Ville Talvala and
Boris Ajdin and
Daniel Vaquero and
Hendrik P. A. Lensch and
Mark Horowitz and
Sung Hee Park and
Natasha Gelfand and
Jongmin Baek and
Wojciech Matusik and
Marc Levoy The Frankencamera: an experimental
platform for computational photography 90--98
Henning Schulzinne The realities of home broadband:
technical perspective . . . . . . . . . 99--99
Srikanth Sundaresan and
Walter de Donato and
Nick Feamster and
Renata Teixeira and
Sam Crawford and
Antonio Pescap\`e Measuring home broadband performance . . 100--109
Peter Winkler Last Byte: Puzzled: Weighed in the
Balance . . . . . . . . . . . . . . . . 120--120
Mary Hall Understanding ACM's past . . . . . . . . 5--5
Vinton G. Cerf Computer science revisited . . . . . . . 7--7
CACM Staff Why open access? . . . . . . . . . . . . 8--9
Mark Guzdial and
Judy Robertson Levels of abstraction: pre-teens and
career choices . . . . . . . . . . . . . 12--13
Gregory Goth Quantum quests . . . . . . . . . . . . . 15--17
Gary Anthes Zoom in, zoom out . . . . . . . . . . . 18--19
Paul Hyman In the year of disruptive education . . 20--22
Richard Heeks IT innovation for the bottom of the
pyramid . . . . . . . . . . . . . . . . 24--27
David Anderson Saving Private Gromit . . . . . . . . . 28--30
George V. Neville-Neil Can more code mean fewer bugs? . . . . . 31--32
Peter J. Denning Moods . . . . . . . . . . . . . . . . . 33--35
Teresa A. Dahlberg Why we need an ACM Special Interest
Group for broadening participation . . . 36--38
William Newman Alan Turing remembered . . . . . . . . . 39--40
Ivar Jacobson and
Pan-Wei Ng and
Paul E. McMahon and
Ian Spence and
Svante Lidman The essence of software engineering: the
SEMAT kernel . . . . . . . . . . . . . . 42--49
Aiman Erbad and
Charles `Buck' Krasic Sender-side buffers and the case for
multimedia adaptation . . . . . . . . . 50--58
Michael Cornwell Anatomy of a solid-state drive . . . . . 59--63
Bryce Thomas and
Raja Jurdak and
Ian Atkinson SPDYing up the web . . . . . . . . . . . 64--73
Robert M. French Moving beyond the Turing test . . . . . 74--77
David Doty Theory of algorithmic self-assembly . . 78--88
Yannis Smaragdakis High-level data structures: technical
perspective . . . . . . . . . . . . . . 90--90
Peter Hawkins and
Martin Rinard and
Alex Aiken and
Mooly Sagiv and
Kathleen Fisher An introduction to data representation
synthesis . . . . . . . . . . . . . . . 91--99
Ali Jadbabaie Natural algorithms in a networked world:
technical perspective . . . . . . . . . 100--100
Bernard Chazelle Natural algorithms and influence systems 101--110
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 126--126
Leah Hoffmann Q&A: As Good As It Gets . . . . . . . . . 128, 127
Moshe Y. Vardi Who begat computing? . . . . . . . . . . 5--5
Vinton G. Cerf From the President: What's a robot? . . 7--7
CACM Staff Letters to the Editor: Computer science
is not a science . . . . . . . . . . . . 8--9
Alain Chesnais ACM's annual report . . . . . . . . . . 11--15
Daniel Reed BLOG@CACM: Lost in translation . . . . . 16--17
Neil Savage News: Stopping the leaks . . . . . . . . 19--21
Gregory Mone News: Beyond Hadoop . . . . . . . . . . 22--24
Marina Krakovsky News: Just the facts . . . . . . . . . . 25--27
Michael A. Cusumano Technology strategy and management: The
Apple--Samsung lawsuits . . . . . . . . 28--31
Phillip G. Armour The business of software: How we build
things: \ldots and why things are 90%
complete . . . . . . . . . . . . . . . . 32--33
Deven Desai Law and technology: Beyond location:
data security in the 21st century . . . 34--36
Thomas Haigh Historical reflections: Five lessons
from really good history . . . . . . . . 37--40
Salman Khan Viewpoint: What college could be like 41--43
Jonathan Grudin and
Gloria Mark and
John Riedl Viewpoint: Conference-journal hybrids 44--49
Pat Helland Condos and clouds . . . . . . . . . . . 50--59
CACM Staff Browser security: appearances can be
deceiving . . . . . . . . . . . . . . . 60--67
Jeremiah Grossman The Web won't be safe or secure until we
break it . . . . . . . . . . . . . . . . 68--72
Richard Becker and
Ramón Cáceres and
Karrie Hanson and
Sibren Isaacman and
Ji Meng Loh and
Margaret Martonosi and
James Rowland and
Simon Urbanek and
Alexander Varshavsky and
Chris Volinsky Human mobility characterization from
cellular network data . . . . . . . . . 74--82
Vineet Bafna and
Alin Deutsch and
Andrew Heiberg and
Christos Kozanitis and
Lucila Ohno-Machado and
George Varghese Abstractions for genomics . . . . . . . 83--93
Tamara Denning and
Tadayoshi Kohno and
Henry M. Levy Computer security and the modern home 94--103
Doug DeCarlo and
Matthew Stone Visualization, understanding, and
design: technical perspective . . . . . 105--105
Niloy J. Mitra and
Yong-Liang Yang and
Dong-Ming Yan and
Wilmot Li and
Maneesh Agrawala Illustrating how mechanical assemblies
work . . . . . . . . . . . . . . . . . . 106--114
James M. Rehg Finding people in depth: technical
perspective . . . . . . . . . . . . . . 115--115
Jamie Shotton and
Toby Sharp and
Alex Kipman and
Andrew Fitzgibbon and
Mark Finocchio and
Andrew Blake and
Mat Cook and
Richard Moore Real-time human pose recognition in
parts from single depth images . . . . . 116--124
Rudy Rucker Last byte: Future tense: Share my
enlightenment . . . . . . . . . . . . . 136, 135
Ronald F. Boisvert and
Jack W. Davidson Positioning ACM for an open access
future . . . . . . . . . . . . . . . . . 5--5
Vinton G. Cerf Growing the ACM family . . . . . . . . . 7--7
Bertrand Meyer When reviews do more than sting . . . . 8--9
Neil Savage Life in simulation . . . . . . . . . . . 11--13
Alex Wright Revving the rover . . . . . . . . . . . 14--16
Samuel Greengard A new model for healthcare . . . . . . . 17--19
Eben Moglen The tangled web we have woven . . . . . 20--22
Peter G. Neumann Inside risks: More sight on foresight 23--25
George V. Neville-Neil Kode Vicious: Divided by division . . . 26--27
Steve Cooper and
Mehran Sahami Education: Reflections on Stanford's
MOOCs . . . . . . . . . . . . . . . . . 28--30
Ana Aizcorbe and
Samuel Kortum and
Unni Pillai The value of microprocessor designs . . 31--32
Ali Sunyaev and
Stephan Schneider Cloud services certification . . . . . . 33--36
Anita Jones The explosive growth of postdocs in
computer science . . . . . . . . . . . . 37--39
William Cheswick Rethinking passwords . . . . . . . . . . 40--44
Brendan Gregg Thinking methodically about performance 45--51
Robert N. M. Watson A decade of OS access-control
extensibility . . . . . . . . . . . . . 52--63
Ari Juels and
Alina Oprea New approaches to security and
availability for cloud data . . . . . . 64--73
Jeffrey Dean and
Luiz André Barroso The tail at scale . . . . . . . . . . . 74--80
Cristian Cadar and
Koushik Sen Symbolic execution for software testing:
three decades later . . . . . . . . . . 82--90
Pradip Bose Is dark silicon real?: technical
perspective . . . . . . . . . . . . . . 92--92
Hadi Esmaeilzadeh and
Emily Blem and
Renée St. Amant and
Karthikeyan Sankaralingam and
Doug Burger Power challenges may end the multicore
era . . . . . . . . . . . . . . . . . . 93--102
Peter Winkler Last Byte: Puzzled: Tumbling Dice . . . 112--112
Moshe Y. Vardi To boycott or not to boycott . . . . . . 5--5
Vinton G. Cerf A revolution in India . . . . . . . . . 7--7
CACM Staff No place for old educational flaws in
new online media . . . . . . . . . . . . 8--9
Jason Hong and
Daniel Reed Passwords getting painful, computing
still blissful . . . . . . . . . . . . . 10--11
Neil Savage Decoding dementia . . . . . . . . . . . 13--15
Gregory Mone Rise of the swarm . . . . . . . . . . . 16--17
Paul Hyman Cybercrime: it's serious, but exactly
how serious? . . . . . . . . . . . . . . 18--20
CACM Staff ACM Fellows inducted . . . . . . . . . . 21--21
Pamela Samuelson A copyright challenge to resales of
digital music . . . . . . . . . . . . . 24--26
Denice Ward Hood and
Stafford Hood and
Dominica McBride Academic careers workshop for
underrepresented groups . . . . . . . . 27--29
Peter J. Denning Moods, wicked problems, and learning . . 30--32
Rachelle Hollander Ethics viewpoints efficacies . . . . . . 33--34
Jeff Johnson Can computer professionals and digital
technology engineers help reduce gun
violence? . . . . . . . . . . . . . . . 35--37
Mikkel Thorup Funding successful research . . . . . . 38--39
Arun Kumar and
Feng Niu and
Christopher Ré Hazy: making it easier to build and
maintain big-data analytics . . . . . . 40--49
Brian Beckman and
Erik Meijer The story of the teapot in DHTML . . . . 50--55
Kate Matsudaira Making the mobile web faster . . . . . . 56--61
Edwin Olson and
Johannes Strom and
Rob Goeddel and
Ryan Morton and
Pradeep Ranganathan and
Andrew Richardson Exploration and mapping with autonomous
robot teams . . . . . . . . . . . . . . 62--70
Nafaâ Jabeur and
Sherali Zeadally and
Biju Sayed Mobile social networking applications 71--79
Fedor V. Fomin and
Petteri Kaski Exact exponential algorithms . . . . . . 80--88
David Oran Video quality assessment in the age of
Internet video: technical perspective 90--90
Florin Dobrian and
Asad Awan and
Dilip Joseph and
Aditya Ganjam and
Jibin Zhan and
Vyas Sekar and
Ion Stoica and
Hui Zhang Understanding the impact of video
quality on user engagement . . . . . . . 91--99
Peter Winkler Last byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 102--102
Leah Hoffmann Last byte: Q&A: The Power of Distribution 104--ff
Stephen Bourne and
George Neville-Neil Developing tools and resources for those
in practice . . . . . . . . . . . . . . 5--5
Vinton G. Cerf Open access . . . . . . . . . . . . . . 7--7
Scott E. Delman An open access partnership . . . . . . . 9--9
CACM Staff A robot's roots . . . . . . . . . . . . 10--11
Mark Guzdial and
Daniel Reed Securing the future of computer science;
reconsidering analog computing . . . . . 12--13
Nidhi Subbaraman Artificial connections . . . . . . . . . 15--17
Gary Anthes Inexact design: beyond fault-tolerance 18--20
Leah Hoffmann Looking back at big data . . . . . . . . 21--23
Michael A. Cusumano Are the costs of `free' too high in
online education? . . . . . . . . . . . 26--28
Michael L. Best Peacebuilding in a networked world . . . 30--32
George V. Neville-Neil Code abuse . . . . . . . . . . . . . . . 33--34
Nir Kshetri Cyber-victimization and cybersecurity in
China . . . . . . . . . . . . . . . . . 35--37
Robert Rosenberger The problem with hands-free dashboard
cellphones . . . . . . . . . . . . . . . 38--40
Nicholas C. Zakas The evolution of web development for
mobile devices . . . . . . . . . . . . . 42--48
Patrick Meenan How fast is your website? . . . . . . . 49--55
David F. Bacon and
Rodric Rabbah and
Sunil Shukla FPGA programming for the masses . . . . 56--63
Zhengchuan Xu and
Qing Hu and
Chenghong Zhang Why computer talents become computer
hackers . . . . . . . . . . . . . . . . 64--74
Nishant Thorat and
Arvind Raghavendran and
Nigel Groves Offline management in virtualized
environments . . . . . . . . . . . . . . 75--81
Ronen Feldman Techniques and applications for
sentiment analysis . . . . . . . . . . . 82--89
David Forsyth Understanding pictures of rooms:
technical perspective . . . . . . . . . 91--91
Huayan Wang and
Stephen Gould and
Daphne Roller Discriminative learning with latent
variables for cluttered indoor scene
understanding . . . . . . . . . . . . . 92--99
Paul Di Filippo Future tense . . . . . . . . . . . . . . 104--ff
Moshe Y. Vardi Fricative computing . . . . . . . . . . 5--5
Vinton G. Cerf ACM President's salary increased by
300%! . . . . . . . . . . . . . . . . . 7--7
Scott E. Delman A few good reasons to publish in
Communications . . . . . . . . . . . . . 9--9
CACM Staff Try old boys security network . . . . . 12--13
Jeannette M. Wing and
Mark Guzdial Encouraging IT usage in future
healthcare, quality in CS education . . 14--15
Alex Wright Proving grounds . . . . . . . . . . . . 17--19
Samuel Greengard Vanishing electronics . . . . . . . . . 20--22
Paul Hyman `Small data' enabled prediction of
Obama's win, say economists . . . . . . 23--25
P. Bernt Hugenholtz Fair use in Europe . . . . . . . . . . . 26--28
David Anderson Max Newman: forgotten man of early
British computing . . . . . . . . . . . 29--31
Mark Guzdial Human-centered computing: a new degree
for Licklider's world . . . . . . . . . 32--34
Peter J. Denning The science in computer science . . . . 35--38
Michael J. Flynn and
Oskar Mencer and
Veljko Milutinovic and
Goran Rakocevic and
Per Stenstrom and
Roman Trobec and
Mateo Valero Moving from petaflops to petadata . . . 39--42
Latanya Sweeney Discrimination in online ad delivery . . 44--54
Peter Bailis and
Ali Ghodsi Eventual consistency today: limitations,
extensions, and beyond . . . . . . . . . 55--63
Adam H. Leventhal A file system all its own . . . . . . . 64--67
Mithun George Jacob and
Yu-Ting Li and
George A. Akingba and
Juan P. Wachs Collaboration with a robotic scrub nurse 68--75
Chris F. Kemerer and
Charles Zhechao Liu and
Michael D. Smith Strategies for tomorrow's
`winners-take-some' digital goods
markets . . . . . . . . . . . . . . . . 76--82
Iris Junglas and
Jeanne Harris The promise of consumer technologies in
emerging markets . . . . . . . . . . . . 84--90
Matt Pharr The ray-tracing engine that could:
technical perspective . . . . . . . . . 92--92
Steven G. Parker and
Heiko Friedrich and
David Luebke and
Keith Morley and
James Bigler and
Jared Hoberock and
David McAllister and
Austin Robison and
Andreas Dietrich and
Greg Humphreys and
Morgan McGuire and
Martin Stich GPU ray tracing . . . . . . . . . . . . 93--101
Peter Winkler Last Byte: Puzzled: Ant Alice's
Adventures . . . . . . . . . . . . . . . 104--104
Erik R. Altman SGB fortifies global SIG community . . . 5--5
Vinton G. Cerf From the President: Honoring our best 7--7
CACM Staff Letters to the Editor: How to claim your
fair share in academic publishing . . . 8--9
Jason Hong and
Judy Robertson Computer security needs refocus, and be
nice about it . . . . . . . . . . . . . 10--11
Gary Anthes Deep learning comes of age . . . . . . . 13--15
Gregory Mone The future is flexible displays . . . . 16--17
Paul Hyman Augmented-reality glasses bring cloud
security into sharp focus . . . . . . . 18--20
Neil Savage Proofs probable . . . . . . . . . . . . 22--24
CACM Staff ACM honors computing innovators . . . . 25--25
Stas Filshtinskiy Privacy and security: Cybercrime,
cyberweapons, cyber wars: is there too
much of it in the air? . . . . . . . . . 28--30
Phillip G. Armour The business of software: What is a
``good'' estimate?: whether forecasting
is valuable . . . . . . . . . . . . . . 31--32
George V. Neville-Neil Kode Vicious: Swamped by automation . . 33--34
Peter J. Denning The profession of IT: Thumb numbers . . 35--37
Nancy G. Leveson Inside risks: Learning from the past to
face the risks of today . . . . . . . . 38--42
Stephen B. Wicker and
Stephanie M. Santoso Viewpoint: Access to the Internet is a
human right . . . . . . . . . . . . . . 43--46
Dan Geer Resolved: the Internet is no place for
critical infrastructure . . . . . . . . 48--53
Bill Hsu and
Marc Sosnick-Pérez Real-time GPU audio . . . . . . . . . . 54--62
Mark Cavage There is no getting around it: you are
building a distributed system . . . . . 63--70
Ognjen Scekic and
Hong-Linh Truong and
Schahram Dustdar Incentives and rewarding in social
computing . . . . . . . . . . . . . . . 72--82
Nabil Adam and
Randy Stiles and
Andrew Zimdars and
Ryan Timmons and
Jackie Leung and
Greg Stachnick and
Jeff Merrick and
Robert Coop and
Vadim Slavin and
Tanya Kruglikov and
John Galmiche and
Sharad Mehrotra Consequence analysis of complex events
on critical U.S. infrastructure . . . . 83--91
Deepak Agarwal and
Bee-Chung Chen and
Pradheep Elango and
Raghu Ramakrishnan Content recommendation on Web portals 92--101
Yao-Wen Chang Circuit placement challenges: technical
perspective . . . . . . . . . . . . . . 104--104
Myung-Chul Kim and
Dong-Jin Lee and
Igor L. Markov SimPL: an algorithm for placing VLSI
circuits . . . . . . . . . . . . . . . . 105--113
Peter Winkler Last byte: Puzzled answers . . . . . . . 117--117
Leah Hoffmann Q&A: Cracking the Code . . . . . . . . . 120--ff
Moshe Y. Vardi The great robotics debate . . . . . . . 5--5
Vinton G. Cerf From the President: `But officer, I was
only programming at 100 lines per hour!' 7--7
CACM Staff Letters to the Editor: Plenty more
hacker motivations . . . . . . . . . . . 8--9
Jason Hong Ph.D. students must break away from
undergraduate mentality . . . . . . . . 10--11
Esther Shein Keeping computers cool from the inside 13--16
Samuel Greengard All the items fit to print . . . . . . . 17--19
Neil Savage Backing creativity . . . . . . . . . . . 20--21
Pamela Samuelson Legally Speaking: Statutory damages as a
threat to innovation . . . . . . . . . . 24--26
Christopher S. Tang and
Joshua Zimmerman Computing Ethics: Information and
communication technology for managing
supply chain risks . . . . . . . . . . . 27--29
Mari Sako Technology strategy and management: The
business of professionals . . . . . . . 30--32
Ron Eglash and
Juan E. Gilbert and
Ellen Foster Broadening participation: Toward
culturally responsive computing
education . . . . . . . . . . . . . . . 33--36
Martin Ford Viewpoint: Could artificial intelligence
create an unemployment crisis? . . . . . 37--39
Paul E. McKenney Structured deferral: synchronization via
procrastination . . . . . . . . . . . . 40--49
Samy Al Bahra Nonblocking algorithms and scalable
multicore programming . . . . . . . . . 50--61
Mathieu Desnoyers Proving the correctness of nonblocking
data structures . . . . . . . . . . . . 62--69
Yang Tang and
Di Wang and
Jing Bai and
Xiaoyan Zhu and
Ming Li Information distance between what I said
and what it heard . . . . . . . . . . . 70--77
Ariel D. Procaccia Cake cutting: not just child's play . . 78--87
Madhav Marathe and
Anil Kumar S. Vullikanti Computational epidemiology . . . . . . . 88--96
Peter Wonka A fresh approach to vector graphics:
technical perspective . . . . . . . . . 100--100
Alexandrina Orzan and
Adrien Bousseau and
Pascal Barla and
Holger Winnemöller and
Joëlle Thollot and
David Salesin Diffusion curves: a vector
representation for smooth-shaded images 101--108
Mark McClelland Last Byte: Future tense . . . . . . . . 112--ff
Moshe Y. Vardi and
Victor Vianu What is a flagship publication? . . . . 5--5
Vinton G. Cerf Computer science education --- revisited 7--7
CACM Staff Is computing science? . . . . . . . . . 9--9
Philip Guo Teaching programming the way it works
outside the classroom . . . . . . . . . 10--11
Samuel Greengard A new approach to information storage 13--15
Alex Wright Patient, heal thyself . . . . . . . . . 16--18
Paul Hyman Software aims to ensure fairness in
crowdsourcing projects . . . . . . . . . 19--21
Richard Heeks and
Andrew Robinson Ultra-low-cost computing and developing
countries . . . . . . . . . . . . . . . 22--24
Chrysanthos Dellarocas and
Marshall Van Alstyne Money models for MOOCs . . . . . . . . . 25--28
Eric Byres The air gap: SCADA's enduring security
myth . . . . . . . . . . . . . . . . . . 29--31
George V. Neville-Neil Cherry-picking and the scientific method 32--33
Leo Porter and
Mark Guzdial and
Charlie McDowell and
Beth Simon Success in introductory programming:
what works? . . . . . . . . . . . . . . 34--36
Jean-Loup Richet Overt censorship: a fatal mistake? . . . 37--38
Ariel Tseitlin The antifragile organization . . . . . . 40--44
Alex Nicolaou Best practices on the move: building web
apps for mobile devices . . . . . . . . 45--51
Tammy Everts Rules for mobile performance
optimization . . . . . . . . . . . . . . 52--59
Marc Lauritsen Are we free to code the law? . . . . . . 60--66
Jacques Wainer and
Michael Eckmann and
Siome Goldenstein and
Anderson Rocha How productivity and impact differ
across computer science subareas . . . . 67--73
Josh C. Bongard Evolutionary robotics . . . . . . . . . 74--83
Assaf Naor Every graph is essentially sparse . . . 86--86
Joshua Batson and
Daniel A. Spielman and
Nikhil Srivastava and
Shang-Hua Teng Spectral sparsification of graphs:
theory and algorithms . . . . . . . . . 87--94
Peter Winkler Last Byte: Puzzled: Wins in a Row . . . 96--96
Moshe Y. Vardi Has the innovation cup run dry? . . . . 5--5
Vinton G. Cerf Freedom and the social contract . . . . 7--7
CACM Staff For privacy and security, use public
keys everywhere . . . . . . . . . . . . 8--9
Michael Stonebraker and
Judy Robertson Big data is `buzzword du jour;' CS
academics `have the best job' . . . . . 10--11
Chris Edwards Magnetic diversion for electronic
switches . . . . . . . . . . . . . . . . 13--15
Keith Kirkpatrick Software-defined networking . . . . . . 16--19
Esther Shein Ephemeral data . . . . . . . . . . . . . 20--22
Laura DiDio Remembering Douglas Engelbart . . . . . 24--25
James Grimmelmann What to do about Google? . . . . . . . . 28--30
Thomas Haigh Software and souls; programs and
packages . . . . . . . . . . . . . . . . 31--34
Peter J. Denning The other side of language . . . . . . . 35--37
Zeljko Obrenovi\'c Research and practice: the curious case
of `small' researchers-practitioners . . 38--40
Lawrence Snyder An interview with Hadi Partovi . . . . . 41--45
Maged M. Michael The balancing act of choosing
nonblocking features . . . . . . . . . . 46--53
Sean Hull 20 obstacles to scalability . . . . . . 54--59
Christoph Lameter An overview of non-uniform memory access 59--54
Steve Benford and
Chris Greenhalgh and
Gabriella Giannachi and
Brendan Walker and
Joe Marshall and
Tom Rodden Uncomfortable user experience . . . . . 66--73
Mark Braverman Computing with real numbers, from
Archimedes to Turing and beyond . . . . 74--83
Michael Fisher and
Louise Dennis and
Matt Webster Verifying autonomous systems . . . . . . 84--93
Pietro Perona Progress in visual categorization:
technical perspective . . . . . . . . . 96--96
Pedro Felzenszwalb and
Ross Girshick and
David McAllester and
Deva Ramanan Visual object detection with deformable
part models . . . . . . . . . . . . . . 97--105
Peter Winkler Last Byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 110--110
Leah Hoffmann Last Byte: Q&A: Big Challenge . . . . . . 112--ff
John White On the future of ACM . . . . . . . . . . 5--5
Vinton G. Cerf Revisiting the tragedy of the commons 7--7
CACM Staff Deep accountability, beyond even
liability . . . . . . . . . . . . . . . 8--9
Philip Guo Helping scientists, engineers to work up
to 100 times faster . . . . . . . . . . 12--13
Alex Wright Tuning in to graphene . . . . . . . . . 15--17
Tom Geller Making the Internet safe for gadgets . . 18--20
Paul Hyman Software helps linguists reconstruct,
decipher ancient languages . . . . . . . 21--23
Sarah Underwood The Alan Turing Year leaves a rich
legacy . . . . . . . . . . . . . . . . . 24--25
Michael A. Cusumano Evaluating a startup venture . . . . . . 26--29
Phillip G. Armour When faster is slower . . . . . . . . . 30--32
George V. Neville-Neil Kode Vicious: The naming of hosts is a
difficult matter . . . . . . . . . . . . 33--34
Kevin Fu and
James Blum Controlling for cybersecurity risks of
medical device software . . . . . . . . 35--37
David H. Ackley Beyond efficiency . . . . . . . . . . . 38--40
Jacob Loveless Barbarians at the gateways . . . . . . . 42--49
Jacob Loveless and
Sasha Stoikov and
Rolf Waeber Online algorithms in high-frequency
trading . . . . . . . . . . . . . . . . 50--56
Stephen D. Strowes Passively measuring TCP round-trip times 57--64
Floris Bex and
John Lawrence and
Mark Snaith and
Chris Reed Implementing the argument web . . . . . 66--73
Apirak Hoonlor and
Boleslaw K. Szymanski and
Mohammed J. Zaki Trends in computer science research . . 74--83
Rodney Van Meter and
Clare Horsman A blueprint for building a quantum
computer . . . . . . . . . . . . . . . . 84--93
Rajeev Alur Can we verify cyber-physical systems?:
technical perspective . . . . . . . . . 96--96
Matthias Althoff and
Akshay Rajhans and
Bruce H. Krogh and
Soner Yaldiz and
Xin Li and
Larry Pileggi Formal verification of phase-locked
loops using reachability analysis and
continuization . . . . . . . . . . . . . 97--104
Brian Clegg Last byte: Future tense . . . . . . . . 112--ff
Moshe Y. Vardi The end of the American network . . . . 5--5
Vinton G. Cerf Heidelberg Laureate Forum . . . . . . . 7--7
CACM Staff Microprocessor architectures follow
markets and silicon . . . . . . . . . . 8--9
Jason Hong Considering privacy issues in the
context of Google Glass . . . . . . . . 10--11
Gregory Mone Future-proof encryption . . . . . . . . 12--14
Neil Savage More than a mouse . . . . . . . . . . . 15--16
Keith Kirkpatrick Legal issues with robots . . . . . . . . 17--19
Deirdre K. Mulligan and
Kenneth A. Bamberger Privacy and security: What regulators
can do to advance privacy through design 20--22
Pamela Samuelson Legally speaking: Is software
patentable? . . . . . . . . . . . . . . 23--25
Katina Michael and
M. G. Michael Computing ethics: No limits to watching? 26--28
Marshall Van Alstyne Economic and business dimensions: Why
not immortality? . . . . . . . . . . . . 29--31
Cameron Wilson Education: Making computer science count 32--33
Tobias Langlotz and
Jens Grubert and
Raphael Grasset Viewpoint: Augmented reality browsers:
essential products or only gadgets? . . 34--36
James Roche Adopting DevOps practices in quality
assurance . . . . . . . . . . . . . . . 38--43
Neil Mitchell Leaking space . . . . . . . . . . . . . 44--52
Ivar Jacobson and
Ian Spence and
Pan-Wei Ng Agile and SEMAT: perfect partners . . . 53--59
Neil Maiden and
Sonali D'Souza and
Sara Jones and
Lars Müller and
Lucia Pannese and
Kristine Pitts and
Michael Prilla and
Kevin Pudney and
Malcolm Rose and
Ian Turner and
Konstantinos Zachos Computing technologies for reflective,
creative care of people with dementia 60--67
Evgeny Kaganer and
Gabriel A. Giordano and
Sebastien Brion and
Marco Tortoriello Media tablets for mobile learning . . . 68--75
Philip Treleaven and
Michal Galas and
Vidhi Lalchand Algorithmic trading review . . . . . . . 76--85
Mamadou Tourad Diallo and
Hassnaa Moustafa and
Hossam Afifi and
Nicolas Marechal Adaptation of audiovisual contents and
their delivery means . . . . . . . . . . 86--93
Shekhar Borkar Centip$3$De demonstrates more than
Moore\ldots: technical perspective . . . 96--96
Ronald G. Dreslinski and
David Fick and
Bharan Giridhar and
Gyouho Kim and
Sangwon Seo and
Matthew Fojtik and
Sudhir Satpathy and
Yoonmyung Lee and
Daeyeon Kim and
Nurrachman Liu and
Michael Wieckowski and
Gregory Chen and
Dennis Sylvester and
David Blaauw and
Trevor Mudge Centip$3$De: a many-core prototype
exploring $3$D integration and
near-threshold computing . . . . . . . . 97--104
Peter Winkler Last Byte: Puzzled: Coin flipping . . . 120--120
M. Tamer Özsu ACM books to launch . . . . . . . . . . 5--5
Vinton G. Cerf Software at scale . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Free the digital
natives . . . . . . . . . . . . . . . . 8--9
Mark Guzdial and
Valerie Barr blog@CACM: The lure of live coding; the
attraction of small data . . . . . . . . 10--11
Chris Edwards News: Life points the way to a new
template for chipmaking . . . . . . . . 13--15
Samuel Greengard News: Seeing the big picture . . . . . . 16--18
Karen A. Frenkel News: CS enrollments rise \ldots at the
expense of the humanities? . . . . . . . 19--21
Richard Heeks Emerging markets: Information technology
impact sourcing . . . . . . . . . . . . 22--25
David Anderson Historical reflections: Patrick
Blackett: providing `white heat' to the
British computing revolution . . . . . . 26--28
Peter J. Denning The profession of IT: Design thinking 29--31
George V. Neville-Neil Kode Vicious: A lesson in resource
management . . . . . . . . . . . . . . . 32--33
Wendy M. DuBow and
Ruthe Farmer and
Zhen Wu and
Malia Fredrickson Broadening participation: Bringing young
women into computing through the NCWIT
Aspirations in Computing program . . . . 34--37
Armando Fox Viewpoint: From MOOCs to SPOCs . . . . . 38--40
Ilya Grigorik Practice: Making the Web faster with
HTTP 2.0 . . . . . . . . . . . . . . . . 42--49
David Chisnall Practice: The challenge of
cross-language interoperability . . . . 50--56
Fred Chow Practice: Intermediate representation 57--62
Vasant Dhar Data science and prediction . . . . . . 64--73
Jonathan Lazar and
Harry Hochheiser Legal aspects of interface accessibility
in the U.S. . . . . . . . . . . . . . . 74--80
Doug Terry Replicated data consistency explained
through baseball . . . . . . . . . . . . 82--89
Gareth Tyson and
Nishanth Sastry and
Ruben Cuevas and
Ivica Rimac and
Andreas Mauthe A survey of mobility in
information-centric networks . . . . . . 90--98
Eliot Moss The cleanest garbage collection:
technical perspective . . . . . . . . . 100--100
David F. Bacon and
Perry Cheng and
Sunil Shukla And then there were none: a stall-free
real-time garbage collector for
reconfigurable hardware . . . . . . . . 101--109
Peter Winkler Last Byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 126--126
Leah Hoffmann Last Byte: Q&A: Securing the Risk . . . . 128--ff
Moshe Y. Vardi Scalable conferences . . . . . . . . . . 5--5
Vinton G. Cerf From the President; Virtual reality
redux . . . . . . . . . . . . . . . . . 7--7
CACM Staff Nominees for elections and report of the
ACM Nominating Committee . . . . . . . . 8--8
CACM Staff ACM's FY13 annual report . . . . . . . . 9--14
CACM Staff U.S. does not control the Internet . . . 16--17
Mark Guzdial and
Joel C. Adams MOOCs need more work; so do CS graduates 18--19
Gary Anthes French team invents faster code-breaking
algorithm . . . . . . . . . . . . . . . 21--23
Tom Geller How do you feel?: your computer knows 24--26
Paul Hyman `Peace technologies' enable eyewitness
reporting when disasters strike . . . . 27--29
Michael A. Cusumano The legacy of Steve Ballmer . . . . . . 30--32
Christopher S. Yoo Toward a closer integration of law and
computer science . . . . . . . . . . . . 33--35
Thomas Haigh Actually, Turing did not invent the
computer . . . . . . . . . . . . . . . . 36--41
Phillip G. Armour Estimation is not evil . . . . . . . . . 42--43
Doug Terry Publish now, judge later . . . . . . . . 44--46
Alex E. Bell The software inferno . . . . . . . . . . 48--53
Jason Lango Toward software-defined SLAs . . . . . . 54--60
Anil Madhavapeddy and
David J. Scott Unikernels: the rise of the virtual
library operating system . . . . . . . . 61--69
Kenton O'Hara and
Gerardo Gonzalez and
Abigail Sellen and
Graeme Penney and
Andreas Varnavas and
Helena Mentis and
Antonio Criminisi and
Robert Corish and
Mark Rouncefield and
Neville Dastur and
Tom Carrell Touchless interaction in surgery . . . . 70--77
Jessica Li and
Arun Vishwanath and
H. Raghav Rao Retweeting the Fukushima nuclear
radiation disaster . . . . . . . . . . . 78--85
Vincent Gramoli and
Rachid Guerraoui Democratizing transactional programming 86--93
Xuedong Huang and
James Baker and
Raj Reddy A historical perspective of speech
recognition . . . . . . . . . . . . . . 94--103
Subramanian S. Iyer Silicon stress: technical perspective 106--106
Moongon Jung and
Joydeep Mitra and
David Z. Pan and
Sung Kyu Lim TSV stress-aware full-chip mechanical
reliability analysis and optimization
for $3$D IC . . . . . . . . . . . . . . 107--115
Seth Shostak Last byte: Future Tense: The second
signal . . . . . . . . . . . . . . . . . 128--ff
Andrew McGettrick Education, always . . . . . . . . . . . 5--5
Vinton G. Cerf Cognitive implants . . . . . . . . . . . 7--7
CACM Staff Contribute more than algorithmic
speculation . . . . . . . . . . . . . . 9--9
Philip Guo Clarifying human-computer interaction 10--11
Don Monroe A new type of mathematics? . . . . . . . 13--15
Esther Shein Should everybody learn to code? . . . . 16--18
Samuel Greengard Computational photography comes into
focus . . . . . . . . . . . . . . . . . 19--21
CACM Staff ACM Fellows inducted . . . . . . . . . . 22--22
Diana L. Burley and
Jon Eisenberg and
Seymour E. Goodman Would cybersecurity professionalization
help address the cybersecurity crisis? 24--27
Tim Bell Establishing a nationwide CS curriculum
in New Zealand high schools . . . . . . 28--30
William Young and
Nancy G. Leveson An integrated approach to safety and
security based on systems theory . . . . 31--35
George V. Neville-Neil Kode vicious: Bugs and bragging rights 36--37
Marco Ceccagnoli and
Chris Forman and
Peng Huang and
D. J. Wu Digital platforms: when is participation
valuable? . . . . . . . . . . . . . . . 38--39
Stephen J. Andriole Ready technology . . . . . . . . . . . . 40--42
Anonymous Node at LinkedIn: the pursuit of
thinner, lighter, faster . . . . . . . . 44--51
Poul-Henning Kamp Center wheel for success . . . . . . . . 52--54
Zachary Hensley and
Jibonananda Sanyal and
Joshua New Provenance in sensor data management . . 55--62
Gerard J. Holzmann Mars code . . . . . . . . . . . . . . . 64--73
Thanassis Avgerinos and
Sang Kil Cha and
Alexandre Rebert and
Edward J. Schwartz and
Maverick Woo and
David Brumley Automatic exploit generation . . . . . . 74--84
Silvio Micali and
Michael O. Rabin Cryptography miracles, secure auctions,
matching problem verification . . . . . 85--93
Reinhard Wilhelm and
Daniel Grund Computation takes time, but how much? 94--103
Michael W. Mahoney A new spin on an old algorithm:
technical perspective . . . . . . . . . 106--106
Grey Ballard and
James Demmel and
Olga Holtz and
Oded Schwartz Communication costs of Strassen's matrix
multiplication . . . . . . . . . . . . . 107--114
Peter Winkler Last byte: Puzzled: Lowest Number Wins 120--120
Moshe Y. Vardi Boolean satisfiability: theory and
engineering . . . . . . . . . . . . . . 5--5
Vinton G. Cerf Letter from the President: What if it's
us? . . . . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Develop research
culture in the Arab Middle East . . . . 9--9
Kate Matsudaira Capturing and structuring data mined
from the Web . . . . . . . . . . . . . . 10--11
Erica Klarreich News: Reading brains . . . . . . . . . . 12--14
Keith Kirkpatrick News: World without wires . . . . . . . 15--17
Neil Savage News: Playing at health . . . . . . . . 18--19
Pamela Samuelson Legally speaking: Mass digitization as
fair use . . . . . . . . . . . . . . . . 20--22
Arvind Narayanan and
Shannon Vallor Computing ethics: Why software
engineering courses should include
ethics coverage . . . . . . . . . . . . 23--25
Peter J. Denning The profession of IT: `Surfing toward
the future' . . . . . . . . . . . . . . 26--29
Richard Ladner Broadening participation: The impact of
the United Nations Convention on the
Rights of Persons with Disabilities . . 30--32
David Patterson Viewpoint: How to build a bad research
center . . . . . . . . . . . . . . . . . 33--36
Wojciech Golab and
Muntasir R. Rahman and
Alvin AuYoung and
Kimberly Keeton and
Xiaozhou (Steve) Li Eventually consistent: not what you were
expecting? . . . . . . . . . . . . . . . 38--44
Robert F. Sproull and
Jim Waldo The API performance contract . . . . . . 45--51
Andi Kleen Scaling existing lock-based applications
with lock elision . . . . . . . . . . . 52--56
Junfeng Yang and
Heming Cui and
Jingyue Wu and
Yang Tang and
Gang Hu Making parallel programs reliable with
stable multithreading . . . . . . . . . 58--69
Christine Alvarado and
Eugene Judson Using targeted conferences to recruit
women into computer science . . . . . . 70--77
Gang-Hoon Kim and
Silvana Trimi and
Ji-Hyong Chung Big-data applications in the government
sector . . . . . . . . . . . . . . . . . 78--85
Elzbieta Zieli\'nska and
Wojciech Mazurczyk and
Krzysztof Szczypiorski Trends in steganography . . . . . . . . 86--95
Dan Wallach Smartphone security `taint' what it used
to be: technical perspective . . . . . . 98--98
William Enck and
Peter Gilbert and
Byung-Gon Chun and
Landon P. Cox and
Jaeyeon Jung and
Patrick McDaniel and
Anmol N. Sheth TaintDroid: an information flow tracking
system for real-time privacy monitoring
on smartphones . . . . . . . . . . . . . 99--106
Peter Winkler Last byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 109--109
Leah Hoffmann Last Byte: Q&A: RISC and reward . . . . . 112--ff
Alfred Aho and
Georg Gottlob A front row seat to Communications'
editorial transformation . . . . . . . . 5--5
Vinton G. Cerf The Internet governance ecosystem . . . 7--7
CACM Staff Code that missed Mars . . . . . . . . . 9--9
Mark Guzdial and
Daniel Reed Eyes forward . . . . . . . . . . . . . . 10--11
Chris Edwards Using patient data for personalized
cancer treatments . . . . . . . . . . . 13--15
Paul Hyman Speech-to-speech translations stutter,
but researchers see mellifluous future 16--19
Gregory Mone New models in cosmetics replacing animal
testing . . . . . . . . . . . . . . . . 20--21
Michael A. Cusumano MOOCs revisited, with some policy
suggestions . . . . . . . . . . . . . . 24--26
Michael L. Best Thinking outside the continent . . . . . 27--29
George V. Neville-Neil Kode Vicious: This is the foo field . . 30--31
Deborah Estrin Small data, where $ n = \mbox {me} $ . . 32--34
Uzi Vishkin Is multicore hardware for
general-purpose parallel processing
broken? . . . . . . . . . . . . . . . . 35--39
Paul Vixie Rate-limiting state . . . . . . . . . . 40--43
Ivar Jacobson and
Pan-Wei Ng and
Ian Spence and
Paul E. McMahon Major-league SEMAT: why should an
executive care? . . . . . . . . . . . . 44--50
Christoph Paasch and
Olivier Bonaventure Multipath TCP . . . . . . . . . . . . . 51--57
Daniel T. Seaton and
Yoav Bergner and
Isaac Chuang and
Piotr Mitros and
David E. Pritchard Who does what in a massive open online
course? . . . . . . . . . . . . . . . . 58--65
Jeremy Avigad and
John Harrison Formally verified mathematics . . . . . 66--75
Martin Odersky and
Tiark Rompf Unifying functional and object-oriented
programming with Scala . . . . . . . . . 76--86
Franziska Roesner and
Tadayoshi Kohno and
David Molnar Security and privacy for augmented
reality systems . . . . . . . . . . . . 88--96
Joe Warren A `reasonable' solution to deformation
methods: technical perspective . . . . . 98--98
Alec Jacobson and
Ilya Baran and
Jovan Popovi\'c and
Olga Sorkine-Hornung Bounded biharmonic weights for real-time
deformation . . . . . . . . . . . . . . 99--106
Ken MacLeod Last Byte: Future Tense: Re: Search . . 112--ff
Moshe Y. Vardi Moore's law and the sand-heap paradox 5--5
Vinton G. Cerf Sometimes it takes some time! . . . . . 7--7
CACM Staff Know your steganographic enemy . . . . . 8--8
CACM Staff ACM's 2014 general election: please take
this opportunity to vote . . . . . . . . 9--17
Judy Robertson Rethinking how to teach programming to
newcomers . . . . . . . . . . . . . . . 18--19
Samuel Greengard How computers are changing biology . . . 21--23
Tom Geller The forever disc . . . . . . . . . . . . 24--26
Keith Kirkpatrick Technology confounds the courts . . . . 27--29
Marshall Van Alstyne Why Bitcoin has value . . . . . . . . . 30--32
Ben Depoorter What happened to video game piracy? . . 33--34
David Anderson Tom Kilburn: a tale of five computers 35--38
Steve Cooper and
Shuchi Grover and
Beth Simon Building a virtual community of practice
for K-12 CS teachers . . . . . . . . . . 39--41
Ruzena Bajcsy Robots are coming . . . . . . . . . . . 42--43
Bob Toxen The NSA and Snowden: securing the
all-seeing eye . . . . . . . . . . . . . 44--51
Lucian Carata and
Sherif Akoush and
Nikilesh Balakrishnan and
Thomas Bytheway and
Ripduman Sohan and
Margo Seltzer and
Andy Hopper A primer on provenance . . . . . . . . . 52--60
Wyatt Lloyd and
Michael J. Freedman and
Michael Kaminsky and
David G. Andersen Don't settle for eventual consistency 61--68
Mihir Nanavati and
Patrick Colp and
Bill Aiello and
Andrew Warfield Cloud security: a gathering storm . . . 70--79
Shimeon Pass and
Boaz Ronen Reducing the software value gap . . . . 80--87
Manlu Liu and
Sean Hansen and
Qiang Tu The community source approach to
software development and the Kuali
experience . . . . . . . . . . . . . . . 88--96
Kevin Leyton-Brown and
Holger H. Hoos and
Frank Hutter and
Lin Xu Understanding the empirical hardness of
NP-complete problems . . . . . . . . . . 98--107
Ari Juels and
Bonnie Wong The interplay of neuroscience and
cryptography: technical perspective . . 109--109
Hristo Bojinov and
Daniel Sanchez and
Paul Reber and
Dan Boneh and
Patrick Lincoln Neuroscience meets cryptography: crypto
primitives secure against rubber hose
attacks . . . . . . . . . . . . . . . . 110--118
Peter Winkler Last Byte: Puzzled: A Sort, of Sorts . . 120--120
Mehran Sahami and
Steve Roach Computer science curricula 2013 released 5--5
Vinton G. Cerf Letter from the President: The house
elves of ACM . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Efficient code to
counter dying Moore's Law . . . . . . . 9--9
Daniel Reed and
Chris Stephenson BLOG@ACM: First impressions, unexpected
benefits . . . . . . . . . . . . . . . . 10--11
Don Monroe Neuromorphic computing gets ready for
the (really) big time . . . . . . . . . 13--15
Neil Savage Time for a change . . . . . . . . . . . 16--18
CACM Staff Visualizations make big data meaningful 19--21
Neil Savage General agreement . . . . . . . . . . . 22--23
Ross Anderson and
Steven J. Murdoch Inside risks: EMV: why payment systems
fail . . . . . . . . . . . . . . . . . . 24--28
Phillip G. Armour The business of software: Owning and
using . . . . . . . . . . . . . . . . . 29--30
Dinei Florêncio and
Cormac Herley and
Adam Shostack Privacy and security: FUD: a plea for
intolerance . . . . . . . . . . . . . . 31--33
Peter J. Denning The profession of IT: Avalanches are
coming . . . . . . . . . . . . . . . . . 34--36
George V. Neville-Neil Kode Vicious: The logic of logging . . . 37--38
Charles K. Davis Viewpoint: Beyond data and analysis . . 39--41
Andy Gill Domain-specific languages and code
synthesis using Haskell . . . . . . . . 42--49
Erik Meijer The curse of the excluded middle . . . . 50--55
Bo Joel Svensson and
Mary Sheeran and
Ryan R. Newton Design exploration through
code-generating DSLs . . . . . . . . . . 56--63
Christos Siaterlis and
Béla Genge Cyber-physical testbeds . . . . . . . . 64--73
Weiguo Fan and
Michael D. Gordon The power of social media analytics . . 74--81
Daniela Rosner and
Marco Roccetti and
Gustavo Marfia The digitization of cultural practices 82--87
Peter Musial and
Nicolas Nicolaou and
Alexander A. Shvartsman Implementing distributed shared memory
for dynamic networks . . . . . . . . . . 88--98
Michiel van de Panne Motion fields for interactive character
animation: technical perspective . . . . 100--100
Yongjoon Lee and
Kevin Wampler and
Gilbert Bernstein and
Jovan Popovi\'c and
Zoran Popovi\'c Motion fields for interactive character
locomotion . . . . . . . . . . . . . . . 101--108
Peter Winkler Last byte: Puzzled: Solutions and
Sources . . . . . . . . . . . . . . . . 110--110
Leah Hoffmann Last Byte: Q&A: Divide and Conquer . . . 112--ff
Vicki Hanson and
Reyyan Ayfer and
Bev Bachmayer European women in computing . . . . . . 5--5
Vinton G. Cerf Responsible programming . . . . . . . . 7--7
CACM Staff Snowden weak link: copying to USB device 8--9
Mark Guzdial and
Philip Guo The difficulty of teaching programming
languages, and the benefits of hands-on
learning . . . . . . . . . . . . . . . . 10--11
Alex Wright Big data meets big science . . . . . . . 13--15
Logan Kugler Robots compete in disaster scenarios . . 16--18
Esther Shein Holographic projection systems provide
eternal life . . . . . . . . . . . . . . 19--21
Pamela Samuelson Legally speaking: Watching TV on
Internet-connected devices . . . . . . . 22--24
Chuck Huff and
Almut Furchert Computing ethics: Toward a pedagogy of
ethical practice . . . . . . . . . . . . 25--27
Mari Sako Technology strategy and management: The
business of the state . . . . . . . . . 28--30
Jane Margolis and
Joanna Goode and
Gail Chapman and
Jean J. Ryoo Broadening participation: That classroom
`magic' . . . . . . . . . . . . . . . . 31--33
Batya Friedman Viewpoint: Structural challenges and the
need to adapt . . . . . . . . . . . . . 34--37
Phillip A. Laplante Viewpoint: Licensing professional
software engineers: seize the
opportunity . . . . . . . . . . . . . . 38--40
Thomas Wadlow Who must you trust? . . . . . . . . . . 42--49
Anonymous Automated QA testing at electronic arts 50--57
Mike Bland Finding more than one worm in the apple 58--64
Matthew Faulkner and
Robert Clayton and
Thomas Heaton and
K. Mani Chandy and
Monica Kohler and
Julian Bunn and
Richard Guy and
Annie Liu and
Michael Olson and
MingHei Cheng and
Andreas Krause Community sense and response systems:
your phone as quake detector . . . . . . 66--75
Orna Agmon Ben-Yehuda and
Muli Ben-Yehuda and
Assaf Schuster and
Dan Tsafrir The rise of RaaS: the
Resource-as-a-Service cloud . . . . . . 76--84
H. V. Jagadish and
Johannes Gehrke and
Alexandros Labrinidis and
Yannis Papakonstantinou and
Jignesh M. Patel and
Raghu Ramakrishnan and
Cyrus Shahabi Big data and its technical challenges 86--94
Konstantina (Dina) Papagiannaki The power of joint multiuser
beamforming: technical perspective . . . 96--96
Hariharan Rahul and
Swarun Kumar and
Dina Katabi JMB: scaling wireless capacity with user
demands . . . . . . . . . . . . . . . . 97--106
Geoffrey A. Landis Last byte: Future Tense: The Chatbot and
the Drone . . . . . . . . . . . . . . . 112--ff
Moshe Y. Vardi Editor's letter: Openism, IPism,
fundamentalism, and pragmatism . . . . . 5--5
Vinton G. Cerf Cerf's up: ACM and the professional
programmer . . . . . . . . . . . . . . . 7--7
Mark Guzdial BLOG@CACM: Why the U.S. is not ready for
mandatory CS education . . . . . . . . . 8--9
Chris Edwards News: Researchers probe security through
obscurity . . . . . . . . . . . . . . . 11--13
Keith Kirkpatrick News: Surgical robots deliver care more
precisely . . . . . . . . . . . . . . . 14--16
Erica Klarreich News: Hello, my name is \ldots . . . . . 17--19
Seda Gürses Privacy and security: Can you engineer
privacy? . . . . . . . . . . . . . . . . 20--23
Uri Wilensky and
Corey E. Brady and
Michael S. Horn Education: Fostering computational
literacy in science classrooms . . . . . 24--28
Chris Coward Global computing: Private then shared? 29--30
George V. Neville-Neil Kode Vicious: Forked over . . . . . . . 31--32
Frank Levy and
Richard J. Murnane Viewpoint: Researching the robot
revolution . . . . . . . . . . . . . . . 33--35
Jaime Teevan and
Kevyn Collins-Thompson and
Ryen W. White and
Susan Dumais Viewpoint: Slow search . . . . . . . . . 36--38
Mark Cavage and
David Pacheco Bringing arbitrary compute to
authoritative data . . . . . . . . . . . 40--48
Poul-Henning Kamp Quality software costs money ---
Heartbleed was free . . . . . . . . . . 49--51
Michael J. Lutz and
J. Fernando Naveda and
James R. Vallino Undergraduate software engineering . . . 52--58
Francesca Spezzano and
V. S. Subrahmanian and
Aaron Mannes Reshaping terrorist networks . . . . . . 60--69
Sumit Gulwani Example-based learning in computer-aided
STEM education . . . . . . . . . . . . . 70--80
Andrew V. Goldberg and
Robert E. Tarjan Efficient maximum flow algorithms . . . 82--89
Philip A. Bernstein Getting consensus for data replication:
technical perspective . . . . . . . . . 92--92
Peter Bailis and
Shivaram Venkataraman and
Michael J. Franklin and
Joseph M. Hellerstein and
Ion Stoica Last byte: Quantifying eventual
consistency with PBS . . . . . . . . . . 93--102
Peter Winkler Last byte: Puzzled: Paths and Matchings 104--104
Moshe Y. Vardi Editor's Letter: Would Turing have
passed the Turing Test? . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: Augmented reality . . . . . . 7--7
CACM Staff Letters to the Editor: Provenance of
British computing . . . . . . . . . . . 8--9
Philip Guo BLOG@CACM: Refining students' coding and
reviewing skills . . . . . . . . . . . . 10--11
Samuel Greengard News: Weathering a new era of big data 12--14
Neil Savage News: The power of memory . . . . . . . 15--17
Gregory Mone News: The new digital medicine . . . . . 18--20
Stefan Bechtold and
Adrian Perrig Law and technology: Accountability in
future Internet architectures . . . . . 21--23
Thomas Haigh Historical reflections: We have never
been digital . . . . . . . . . . . . . . 24--28
Peter J. Denning The profession of IT: Learning for the
new digital age . . . . . . . . . . . . 29--31
Luke Muehlhauser and
Bill Hibbard Viewpoint: Exploratory engineering in
artificial intelligence . . . . . . . . 32--34
John Leslie King and
Paul F. Uhlir Viewpoint: Soft infrastructure
challenges to scientific knowledge
discovery . . . . . . . . . . . . . . . 35--37
Christoph Kern Securing the tangled web . . . . . . . . 38--47
Peter Bailis and
Kyle Kingsbury The network is reliable . . . . . . . . 48--55
Jon P. Daries and
Justin Reich and
Jim Waldo and
Elise M. Young and
Jonathan Whittinghill and
Andrew Dean Ho and
Daniel Thomas Seaton and
Isaac Chuang Privacy, anonymity, and big data in the
social sciences . . . . . . . . . . . . 56--63
Cormac Herley Security, cybercrime, and scale . . . . 64--71
Michail Tsikerdekis and
Sherali Zeadally Online deception in social media . . . . 72--80
Jean-Paul Laumond and
Nicolas Mansard and
Jean-Bernard Lasserre Optimality in robot motion: optimal
versus optimized motion . . . . . . . . 82--89
Alexei A. Efros Portraiture in the age of big data:
technical perspective . . . . . . . . . 92--92
Ira Kemelmacher-Shlizerman and
Eli Shechtman and
Rahul Garg and
Steven M. Seitz Moving portraits . . . . . . . . . . . . 93--99
Peter Winkler Last byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 102--102
Marina Krakovsky Last byte: Q&A: Finding themes . . . . . 104--ff
John White ACM's challenges and opportunities . . . 5--5
Vinton G. Cerf Cerf's up: Unconventional computing . . 7--7
CACM Staff Letters to the Editor: Responsible
programming not a technical issue . . . 8--9
John Langford and
Mark Guzdial BLOG@CACM: Finding a research job, and
teaching CS in high school . . . . . . . 10--11
Don Monroe News: Still seeking the optical
transistor . . . . . . . . . . . . . . . 13--15
Neil Savage News: Gradual evolution . . . . . . . . 16--18
Nidhi Subbaraman News: Museums go high-tech with digital
forensics . . . . . . . . . . . . . . . 19--21
Michael A. Cusumano Technology strategy and management: The
Bitcoin ecosystem . . . . . . . . . . . 22--24
Peter G. Neumann Inside risks: Risks and myths of cloud
computing and cloud storage . . . . . . 25--27
George V. Neville-Neil Kode vicious: Outsourcing responsibility 28--29
Phillip G. Armour The business of software: Vendor: vidi,
vici . . . . . . . . . . . . . . . . . . 30--31
Henry Lucas Viewpoint: Disrupting and transforming
the university . . . . . . . . . . . . . 32--35
Edgar G. Daylight Viewpoint: A Turing tale . . . . . . . . 36--38
Ben Laurie Certificate transparency . . . . . . . . 40--46
Axel Arnbak and
Hadi Asghari and
Michel Van Eeten and
Nico Van Eijk Security collapse in the HTTPS market 47--55
Sharon Goldberg Why is it taking so long to secure
Internet routing? . . . . . . . . . . . 56--63
Hanan Samet and
Jagan Sankaranarayanan and
Michael D. Lieberman and
Marco D. Adelfio and
Brendan C. Fruin and
Jack M. Lotkowski and
Daniele Panozzo and
Jon Sperling and
Benjamin E. Teitler Reading news with maps by exploiting
spatial synonyms . . . . . . . . . . . . 64--77
Denny Vrandeci\'c and
Markus Krötzsch Wikidata: a free collaborative
knowledgebase . . . . . . . . . . . . . 78--85
Martin Casado and
Nate Foster and
Arjun Guha Abstractions for software-defined
networks . . . . . . . . . . . . . . . . 86--95
Bart Preneel Attacking a problem from the middle:
technical perspective . . . . . . . . . 97--97
Itai Dinur and
Orr Dunkelman and
Nathan Keller and
Adi Shamir Dissection: a new paradigm for solving
bicomposite search problems . . . . . . 98--105
Daniel H. Wilson Last byte: Future Tense: Garden of Life 112--ff
Alexander L. Wolf Dealing with the deep, long-term
challenges facing ACM (part I) . . . . . 5--5
Vinton G. Cerf Heidelberg Laureate Forum II . . . . . . 7--7
CACM Staff Letters to the Editor: Accountability is
no excuse for surveillance . . . . . . . 9--9
Mark Guzdial and
Lawrence M. Fisher BLOG@CACM: Teach the teachers, and
contribute to humanity . . . . . . . . . 10--11
Gary Anthes News: Researchers simplify parallel
programming . . . . . . . . . . . . . . 13--15
Esther Shein News: Computing what fits . . . . . . . 16--19
Logan Kugler News: Keeping online reviews honest . . 20--23
Arvind Malhotra and
Marshall Van Alstyne Economic and business dimensions: The
dark side of the sharing economy \ldots
and how to lighten it . . . . . . . . . 24--27
Pamela Samuelson Legally speaking: Updates on the
intellectual property front . . . . . . 28--30
Solon Barocas and
Helen Nissenbaum Computing ethics: Big data's end run
around procedural privacy protections 31--33
Steve Cooper and
Shuchi Grover and
Mark Guzdial and
Beth Simon Education: A future for computing
education research . . . . . . . . . . . 34--36
Susan Landau Privacy and security: Summing up . . . . 37--39
Mark Klein and
Gregorio Convertino Viewpoint: An embarrassment of riches 40--42
Terrence August and
Robert August and
Hyoduk Shin Viewpoint: Designing user incentives for
cybersecurity . . . . . . . . . . . . . 43--46
Ellen Chisa Evolution of the product manager . . . . 48--52
Alex Liu JavaScript and the Netflix user
interface . . . . . . . . . . . . . . . 53--59
John T. Richards and
Jonathan Brezin and
Calvin B. Swart and
Christine A. Halverson A decade of progress in parallel
programming productivity . . . . . . . . 60--66
Stephen Gould and
Xuming He Scene understanding by labeling pixels 68--77
Pasquale De Meo and
Emilio Ferrara and
Giacomo Fiumara and
Alessandro Provetti On Facebook, most ties are weak . . . . 78--84
Beryl Nelson The data on diversity . . . . . . . . . 86--95
Szymon Rusinkiewicz The intricate dance of fabric and light:
technical perspective . . . . . . . . . 97--97
Shuang Zhao and
Wenzel Jakob and
Steve Marschner and
Kavita Bala Building volumetric appearance models of
fabric using micro CT imaging . . . . . 98--105
Dennis Shasha Last byte: Upstart puzzles . . . . . . . 120--120
Bobby Schnabel and
John White Pathways to computing careers . . . . . 5--5
Vinton G. Cerf Cerf's Up: Does innovation create or
destroy jobs? . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: On the
significance of Turing's test . . . . . 8--9
Mark Guzdial BLOG@CACM: Meeting student and teacher
needs in computing education . . . . . . 10--11
Chris Edwards News: Decoding the language of human
movement . . . . . . . . . . . . . . . . 12--14
Gregory Mone News: Intelligent living . . . . . . . . 15--16
Keith Kirkpatrick News: Sensors for seniors . . . . . . . 17--19
CACM Staff News: ACM's Turing Award prize raised to
\$1 million . . . . . . . . . . . . . . 20--20
Michael L. Best Global computing: The Internet that
Facebook built . . . . . . . . . . . . . 21--23
Peter J. Denning The profession of IT: The whole
professional . . . . . . . . . . . . . . 24--27
Telle Whitney and
Elizabeth Ames Broadening participation: Innovation and
inclusion . . . . . . . . . . . . . . . 28--30
George V. Neville-Neil Kode vicious: Port squatting . . . . . . 31--32
Martin Naedele and
Rick Kazman and
Yuanfang Cai Viewpoint: Making the case for a
``manufacturing execution system'' for
software development . . . . . . . . . . 33--36
Erik Meijer and
Vikram Kapoor The responsive enterprise: embracing the
hacker way . . . . . . . . . . . . . . . 38--43
David Chisnall No such thing as a general-purpose
processor . . . . . . . . . . . . . . . 44--48
Ivar Jacobson and
Ed Seidewitz A new software engineering . . . . . . . 49--54
Stacy Marsella and
Jonathan Gratch Computationally modeling human emotion 56--67
Mark Silberstein and
Bryan Ford and
Emmett Witchel GPUfs: the case for operating system
services on GPUs . . . . . . . . . . . . 68--79
N. R. Jennings and
L. Moreau and
D. Nicholson and
S. Ramchurn and
S. Roberts and
T. Rodden and
A. Rogers Human-agent collectives . . . . . . . . 80--88
Stephen W. Keckler Rethinking caches for throughput
processors: technical perspective . . . 90--90
Timothy G. Rogers and
Mike O'Connor and
Tor M. Aamodt Learning your limit: managing massively
multithreaded caches through scheduling 91--98
Gregory Mone Last byte: Q&A: From Esterel to HipHop 120--ff
Moshe Y. Vardi Editor's letter: The rise and fall of
industrial research labs . . . . . . . . 5--5
Vinton G. Cerf Cerf's Up: A long way to have come and
still to go . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Toward a map
interface not inherently related to
geography . . . . . . . . . . . . . . . 8--9
CACM Staff Letters to the Editor: ACM's FY14 annual
report . . . . . . . . . . . . . . . . . 11--15
Valerie Barr and
Michael Stonebraker BLOG@CACM: A valuable lesson, and
whither Hadoop? . . . . . . . . . . . . 18--19
Erica Klarreich News: In search of Bayesian inference 21--24
Samuel Greengard News: Smart transportation networks
drive gains . . . . . . . . . . . . . . 25--27
Gary Anthes News: Data brokers are watching you . . 28--30
Lawrence M. Fisher News: Google Boosts ACM's Turing Award
prize to \$1 million . . . . . . . . . . 31--31
Michael A. Cusumano Technology strategy and management: How
traditional firms must compete in the
sharing economy . . . . . . . . . . . . 32--34
Lee A. Bygrave Law and technology: A right to be
forgotten? . . . . . . . . . . . . . . . 35--37
Phillip G. Armour The business of software: A little queue
theory . . . . . . . . . . . . . . . . . 38--39
Thomas Haigh Historical reflections: The tears of
Donald Knuth . . . . . . . . . . . . . . 40--44
Reza Rawassizadeh and
Blaine A. Price and
Marian Petre Viewpoint: Wearables: has the age of
smartwatches finally arrived? . . . . . 45--47
Hermann Maurer Viewpoint: Does the Internet make us
stupid? . . . . . . . . . . . . . . . . 48--51
Silvio Micali Viewpoint: What it means to receive the
Turing award . . . . . . . . . . . . . . 52--53
Rick Richardson Disambiguating databases . . . . . . . . 54--61
Geetanjali Sampemane Internal access controls . . . . . . . . 62--65
Davidlohr Bueso Scalability techniques for practical
synchronization primitives . . . . . . . 66--74
Virender Singh and
Alicia Perdigones and
José Luis Garcia and
Ignacio Cañas-Guerroro and
Fernando R. Mazarrón Analyzing worldwide research in hardware
architecture, 1997--2011 . . . . . . . . 76--85
Tuukka Ruotsalo and
Giulio Jacucci and
Petri Myllymäki and
Samuel Kaski Interactive intent modeling: information
discovery beyond search . . . . . . . . 86--92
Saket Navlakha and
Ziv Bar-Joseph Distributed information processing in
biological and computational systems . . 94--102
Ravi Nair Big data needs approximate computing:
technical perspective . . . . . . . . . 104--104
Hadi Esmaeilzadeh and
Adrian Sampson and
Luis Ceze and
Doug Burger Neural acceleration for general-purpose
approximate programs . . . . . . . . . . 105--115
William Sims Bainbridge Last byte: Future tense: Wow! . . . . . 128--ff
Moshe Y. Vardi Editor's letter: Is information
technology destroying the middle class? 5--5
Vinton G. Cerf Cerf's up: There is nothing new under
the sun . . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Software
engineering, like electrical engineering 8--9
Mark Guzdial BLOG@CACM: What's the best way to teach
computer science to beginners? . . . . . 12--13
Neil Savage News: Visualizing sound . . . . . . . . 15--17
Logan Kugler News: Online privacy: regional
differences . . . . . . . . . . . . . . 18--20
Keith Kirkpatrick News: Using technology to help people 21--23
Carl Landwehr Privacy and security: We need a building
code for building code . . . . . . . . . 24--26
Ming Zeng Economic and business dimensions: Three
paradoxes of building platforms . . . . 27--29
Peter G. Neumann Inside risks: Far-sighted thinking about
deleterious computer-related events . . 30--33
Diana Franklin Education: Putting the computer science
in computing education research . . . . 34--36
George V. Neville-Neil Kode vicious: Too big to fail . . . . . 37--39
Armando Fox and
David Patterson Viewpoint: Do-it-yourself textbook
publishing . . . . . . . . . . . . . . . 40--43
Benjamin Livshits and
Manu Sridharan and
Yannis Smaragdakis and
Ondrej Lhoták and
J. Nelson Amaral and
Bor-Yuh Evan Chang and
Samuel Z. Guyer and
Uday P. Khedker and
Anders Mòller and
Dimitrios Vardoulakis Viewpoint: In defense of soundiness: a
manifesto . . . . . . . . . . . . . . . 44--46
Harlan Stenn Securing Network Time Protocol . . . . . 48--51
Robert V. Binder and
Bruno Legeard and
Anne Kramer Model-based testing: where does it
stand? . . . . . . . . . . . . . . . . . 52--56
Carlos Juiz and
Mark Toomey To govern IT, or not to govern IT? . . . 58--64
Dalal Alrajeh and
Jeff Kramer and
Alessandra Russo and
Sebastian Uchitel Automated support for diagnosis and
repair . . . . . . . . . . . . . . . . . 65--72
Michael Walfish and
Andrew J. Blumberg Verifying computations without
reexecuting them . . . . . . . . . . . . 74--84
Thomas A. Henzinger and
Jean-François Raskin The equivalence problem for finite
automata: technical perspective . . . . 86--86
Filippo Bonchi and
Damien Pous Hacking nondeterminism with induction
and coinduction . . . . . . . . . . . . 87--95
Dennis Shasha Last byte: Upstart Puzzles: Take Your
Seats . . . . . . . . . . . . . . . . . 104--104
Wayne Graves Raising ACM's Digital Library . . . . . 5--5
CACM Staff Letters to the Editor: Make abstracts
communicate results . . . . . . . . . . 6--6
Vinton G. Cerf Letters to the Editor: `As we may think' 7--7
Valerie Barr and
Mark Guzdial BLOG@CACM: Advice on teaching CS, and
the learnability of programming
languages . . . . . . . . . . . . . . . 8--9
Keith Kirkpatrick News: Automating organic synthesis . . . 13--15
Tom Geller News: Car talk . . . . . . . . . . . . . 16--18
Esther Shein News: Python for beginners . . . . . . . 19--21
Pamela Samuelson Legally speaking: Copyrightability of
Java APIs revisited . . . . . . . . . . 22--24
Thomas J. Cortina Broadening participation: Reaching a
broader population of students through
``unplugged'' activities . . . . . . . . 25--27
Peter J. Denning and
Edward E. Gordon The profession of IT: A technician
shortage . . . . . . . . . . . . . . . . 28--30
John Leslie King Computing ethics: Humans in computing:
growing responsibilities for researchers 31--33
Shriram Krishnamurthi and
Jan Vitek Viewpoint: The real software crisis:
repeatability as a core value . . . . . 34--36
Maarten Bullynck and
Edgar G. Daylight and
Liesbeth De Mol Viewpoint: Why did computer science make
a hero out of Turing? . . . . . . . . . 37--39
Poul-Henning Kamp HTTP\slash 2.0: the IETF is phoning it
in . . . . . . . . . . . . . . . . . . . 40--42
Dave Long META II: digital vellum in the digital
scriptorium . . . . . . . . . . . . . . 43--48
Stephen J. Andriole Who owns IT? . . . . . . . . . . . . . . 50--57
Ashwin Machanavajjhala and
Daniel Kifer Designing statistical privacy for your
data . . . . . . . . . . . . . . . . . . 58--67
Timothy Libert Privacy implications of health
information seeking on the web . . . . . 68--77
Edward Adelson Image processing goes back to basics:
technical perspective . . . . . . . . . 80--80
Sylvain Paris and
Samuel W. Hasinoff and
Jan Kautz Local Laplacian filters: edge-aware
image processing with a Laplacian
pyramid . . . . . . . . . . . . . . . . 81--91
Leah Hoffmann Last byte: Object Lessons: Q&A . . . . . 96--ff
Joseph A. Konstan and
Jack W. Davidson Charting the future: scholarly
publishing in CS . . . . . . . . . . . . 5--5
Vinton G. Cerf The human touch . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Human or machine? 8--9
John Langford and
Mark Guzdial BLOG@CACM: The arbitrariness of reviews,
and advice for school administrators . . 12--13
Alex Wright News: Molecular moonshots . . . . . . . 15--17
Chris Edwards News: Secure-system designers strive to
stem data leaks . . . . . . . . . . . . 18--20
Mark Broderick News: What's the price now? . . . . . . 21--23
Dorothy E. Denning Privacy and security: Toward more secure
software . . . . . . . . . . . . . . . . 24--26
Mari Sako Technology strategy and management:
Competing in emerging markets . . . . . 27--29
George V. Neville-Neil Kode Vicious: Raw networking . . . . . . 30--32
Len Shustek Interview: An interview with Juris
Hartmanis . . . . . . . . . . . . . . . 33--37
Leslie Lamport Viewpoint: Who builds a house without
drawing blueprints? . . . . . . . . . . 38--41
Paul Vixie Go static or go home . . . . . . . . . . 42--45
Neil J. Gunther and
Paul Puglia and
Kristofer Tomasette Hadoop superlinear scalability . . . . . 46--55
Philip R. Cohen and
Edward C. Kaiser and
M. Cecelia Buchanan and
Scott Lind and
Michael J. Corrigan and
R. Matthews Wesson Sketch-Thru-Plan: a multimodal interface
for command and control . . . . . . . . 56--65
Chris Newcombe and
Tim Rath and
Fan Zhang and
Bogdan Munteanu and
Marc Brooker and
Michael Deardeuff How Amazon web services uses formal
methods . . . . . . . . . . . . . . . . 66--73
Johannes Sametinger and
Jerzy Rozenblit and
Roman Lysecky and
Peter Ott Security challenges for medical devices 74--82
Trevor Mudge The specialization trend in computer
hardware: technical perspective . . . . 84--84
Wajahat Qadeer and
Rehan Hameed and
Ofer Shacham and
Preethi Venkatesan and
Christos Kozyrakis and
Mark Horowitz Convolution engine: balancing efficiency
and flexibility in specialized computing 85--93
David Allen Batchelor Last byte: Future tense . . . . . . . . 96--ff
Moshe Y. Vardi Incentivizing quality and impact in
computing research . . . . . . . . . . . 5--5
Vinton G. Cerf Cascade failure . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Abolish software
warranty disclaimers . . . . . . . . . . 8--9
Joel Adams and
Daniel A. Reed BLOG@CACM: Introducing young women to
CS, and supporting advanced research
environments . . . . . . . . . . . . . . 10--11
Logan Kugler News: Is ``good enough'' computing good
enough? . . . . . . . . . . . . . . . . 12--14
Keith Kirkpatrick News: Putting the data science into
journalism . . . . . . . . . . . . . . . 15--17
Gregory Mone News: Robots with a human touch . . . . 18--19
Michael Schrage and
Marshall Van Alstyne Economic and business dimensions: Life
of IP . . . . . . . . . . . . . . . . . 20--23
Sally Fincher Education: What are we doing when we
teach computing in schools? . . . . . . 24--26
Christopher Jon Sprigman Law and technology: Oracle v. Google: a
high-stakes legal fight for the software
industry . . . . . . . . . . . . . . . . 27--29
Thomas Ball and
Benjamin Zorn Viewpoint: Teach foundational language
principles . . . . . . . . . . . . . . . 30--31
Serge Abiteboul and
Benjamin André and
Daniel Kaplan Viewpoint: Managing your digital life 32--35
Justin Sheehy There is no now . . . . . . . . . . . . 36--41
Spencer Rathbun Parallel processing with promises . . . 42--47
Sören Preibusch Privacy behaviors after Snowden . . . . 48--55
Roli Varma and
Deepak Kapur Decoding femininity in computer science
in India . . . . . . . . . . . . . . . . 56--62
Jean-Paul Laumond and
Nicolas Mansard and
Jean Bernard Lasserre Optimization as motion selection
principle in robot action . . . . . . . 64--74
James Larus Programming multicore computers:
technical perspective . . . . . . . . . 76--76
Nadathur Satish and
Changkyu Kim and
Jatin Chhugani and
Hideki Saito and
Rakesh Krishnaiyer and
Mikhail Smelyanskiy and
Milind Girkar and
Pradeep Dubey Can traditional programming bridge the
ninja performance gap for parallel
computing applications? . . . . . . . . 77--86
Dennis Shasha Last byte: Upstart Puzzles: Strategic
Friendship . . . . . . . . . . . . . . . 88--88
John White Thank you\ldots . . . . . . . . . . . . 5--5
Vinton G. Cerf A celebration of accomplishments . . . . 7--7
CACM Staff Letters to the Editor: To learn CS
principles, start in the cafeteria line 8--9
Mark Guzdial BLOG@CACM: Bringing evidence-based
education to CS . . . . . . . . . . . . 10--11
Neil Savage News: Plenty of proteins . . . . . . . . 12--14
Samuel Greengard News: Between the lines . . . . . . . . 15--17
Gary Anthes News: Estonia: a model for e-government 18--20
Andreas Reuter News: Klaus Tschira: 1940--2015 . . . . 21--21
Neil Savage News: Forging relationships . . . . . . 22--23
Vishal Misra Inside risks: Routing money, not packets 24--27
Peter J. Denning The profession of IT: Emergent
innovation . . . . . . . . . . . . . . . 28--31
George V. Neville-Neil Kode vicious: Lazarus code . . . . . . . 32--33
Meg Leta Jones Viewpoint: Forgetting made (too) easy 34--35
Yannis Papakonstantinou Viewpoint: Created computed universe . . 36--38
Vinton G. Cerf Interview: An interview with U.S. chief
technology officer Megan Smith . . . . . 39--43
Kate Matsudaira The science of managing data science . . 44--47
Stepán Davidovic and
Kavita Guliani Reliable Cron across the planet . . . . 48--53
Reza Zafarani and
Huan Liu Evaluation without ground truth in
social media research . . . . . . . . . 54--60
Kurt Jensen and
Lars M. Kristensen Colored Petri nets: a graphical language
for formal modeling and validation of
concurrent systems . . . . . . . . . . . 61--70
Leslie Lamport Turing lecture: The computer science of
concurrency: the early years . . . . . . 71--76
Mark Berman and
Piet Demeester and
Jae Woo Lee and
Kiran Nagaraja and
Michael Zink and
Didier Colle and
Dilip Kumar Krishnappa and
Dipankar Raychaudhuri and
Henning Schulzrinne and
Ivan Seskar and
Sachin Sharma Future Internets escape the simulator 78--89
Patrick Baudisch Virtual reality in your living room:
technical perspective . . . . . . . . . 92--92
Brett R. Jones and
Hrvoje Benko and
Eyal Ofek and
Andrew D. Wilson IllumiRoom: immersive experiences beyond
the TV screen . . . . . . . . . . . . . 93--100
Leah Hoffmann Last byte: Q&A: The Path to Clean Data 104--ff
Alexander L. Wolf A new Chief Executive Officer and
Executive Director of ACM . . . . . . . 4--5
Vinton G. Cerf Cerf's up: Milestones . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Quality vs.
quantity in faculty publications . . . . 8--9
John Arquilla and
Duncan A. Buell BLOG@CACM: The dangers of military
robots, the risks of online voting . . . 12--13
Chris Edwards News: Growing pains for deep learning 14--16
Gregory Goth News: Bringing big data to the big tent 17--19
Gregory Mone News: The new smart cities . . . . . . . 20--21
Lawrence M. Fisher News: ACM announces 2014 award
recipients . . . . . . . . . . . . . . . 22--23
Pamela Samuelson Legally speaking: Anti-circumvention
rules limit reverse engineering . . . . 24--26
L. Jean Camp Computing ethics: Respecting people and
respecting privacy . . . . . . . . . . . 27--28
David Anderson Historical reflections: Preserving the
digital record of computing history . . 29--31
Phillip G. Armour The business of software: An updated
software almanac . . . . . . . . . . . . 32--34
Juan E. Gilbert and
Jerlando F. L. Jackson and
Edward C. Dillon, Jr. and
LaVar J. Charleston Broadening participation: African
Americans in the U.S. computing sciences
workforce . . . . . . . . . . . . . . . 35--38
Vijay Kumar and
Thomas A. Kalil Viewpoint: The future of computer
science and engineering is in your hands 39--41
Andrew Brook Low-latency distributed applications in
finance . . . . . . . . . . . . . . . . 42--50
Phelim Dowling and
Kevin McGrath Using free and open source tools to
manage software quality . . . . . . . . 51--55
Daniel A. Reed and
Jack Dongarra Exascale computing and big data . . . . 56--68
Alexander Hogenboom and
Flavius Frasincar and
Franciska de Jong and
Uzay Kaymak Using rhetorical structure in sentiment
analysis . . . . . . . . . . . . . . . . 69--77
Joseph Bonneau and
Cormac Herley and
Paul C. van Oorschot and
Frank Stajano Passwords and the evolution of imperfect
authentication . . . . . . . . . . . . . 78--87
Stuart Russell Unifying logic and probability . . . . . 88--97
William D. Clinger The simplicity of cache efficient
functional algorithms: technical
perspective . . . . . . . . . . . . . . 100--100
Guy E. Blelloch and
Robert Harper Cache efficient functional algorithms 101--108
Brian Clegg Last byte: Future Tense: Toy Box Earth 112--ff
Moshe Y. Vardi Editor's Letter: Why doesn't ACM have a
SIG for theoretical computer science? 5--5
Vinton G. Cerf Cerf's up: Invention . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Not so easy to
forget . . . . . . . . . . . . . . . . . 8--9
Mark Guzdial BLOG@CACM: Plain talk on computing
education . . . . . . . . . . . . . . . 10--11
Esther Shein News: Teaching computers with illusions 13--15
Logan Kugler News: Touching the virtual . . . . . . . 16--18
Keith Kirkpatrick News: The moral challenges of driverless
cars . . . . . . . . . . . . . . . . . . 19--20
David Kotz and
Kevin Fu and
Carl Gunter and
Avi Rubin Privacy and security: Security for
mobile and cloud frontiers in healthcare 21--23
Henry Chesbrough and
Marshall Van Alstyne Economic and business dimensions:
Permissionless innovation . . . . . . . 24--26
George V. Neville-Neil Kode Vicious: Hickory dickory doc . . . 27--28
Susanne Hambrusch and
Ran Libeskind-Hadas and
Eric Aaron Education: Understanding the U.S.
domestic computer science Ph.D. pipeline 29--32
Leen-Kiat Soh and
Duane F. Shell and
Elizabeth Ingraham and
Stephen Ramsay and
Brian Moore Viewpoint: Learning through
computational creativity . . . . . . . . 33--35
Arie van Deursen Testing web applications with state
objects . . . . . . . . . . . . . . . . 36--43
Daniel C. Wang From the EDVAC to WEBVACs . . . . . . . 44--51
Beno\^\it Valiron and
Neil J. Ross and
Peter Selinger and
D. Scott Alexander and
Jonathan M. Smith Programming the quantum future . . . . . 52--61
Petra Saskia Bayerl and
Babak Akhgar Surveillance and falsification
implications for open source
intelligence investigations . . . . . . 62--69
Rua-Huan Tsaih and
David C. Yen and
Yu-Chien Chang Challenges deploying complex
technologies in a traditional
organization . . . . . . . . . . . . . . 70--75
Thanassis Tiropanis and
Wendy Hall and
Jon Crowcroft and
Noshir Contractor and
Leandros Tassiulas Network science, web science, and
Internet science . . . . . . . . . . . . 76--82
Aniket (Niki) Kittur Corralling crowd power: technical
perspective . . . . . . . . . . . . . . 84--84
Michael S. Bernstein and
Greg Little and
Robert C. Miller and
Björn Hartmann and
Mark S. Ackerman and
David R. Karger and
David Crowell and
Katrina Panovich Soylent: a word processor with a crowd
inside . . . . . . . . . . . . . . . . . 85--94
Dennis Shasha Last byte: Upstart puzzles . . . . . . . 96--96
Joseph A. Konstan and
Jack W. Davidson Should conferences meet journals and
where? A proposal for `PACM' . . . . . . 5--5
Vinton G. Cerf Cerf's up: On (computing) artifacts . . 7--7
CACM Staff Letters to the Editor: May the
computational force be with you . . . . 8--9
John Arquilla BLOG@CACM: Moving beyond the cold war 10--11
Neil Savage News: Split second . . . . . . . . . . . 12--14
Gregory Mone News: Sensing emotions . . . . . . . . . 15--16
Logan Kugler News: New news aggregator apps . . . . . 17--19
Thomas Haigh and
Mark Priestley Historical reflections: Innovators
assemble: Ada Lovelace, Walter Isaacson,
and the superheroines of computing . . . 20--27
Joe Karaganis and
Jennifer Urban Law and technology: The rise of the robo
notice . . . . . . . . . . . . . . . . . 28--30
Dorothea Kleine Global computing: The value of social
theories for global computing . . . . . 31--33
Peter J. Denning The profession of IT: Automated
education and the professional . . . . . 34--36
Jeffrey D. Ullman Viewpoint: Experiments as research
validation: have we gone too far? . . . 37--39
Michael Mitzenmacher Viewpoint: Theory without experiments:
have we gone too far? . . . . . . . . . 40--42
Kathryn S. McKinley Point/Counterpoint: The pros and cons of
the 'PACM' proposal: point . . . . . . . 43--44
David S. Rosenblum Point/Counterpoint: The pros and cons of
the 'PACM' proposal: counterpoint . . . 44--45
Spence Green and
Jeffrey Heer and
Christopher D. Manning Natural language translation at the
intersection of AI and HCI . . . . . . . 46--53
Philip Maddox Testing a distributed system . . . . . . 54--58
Simha Sethumadhavan and
Adam Waksman and
Matthew Suozzo and
Yipeng Huang and
Julianna Eum Trustworthy hardware from untrusted
components . . . . . . . . . . . . . . . 60--71
Ignacio Laguna and
Dong H. Ahn and
Bronis R. de Supinski and
Todd Gamblin and
Gregory L. Lee and
Martin Schulz and
Saurabh Bagchi and
Milind Kulkarni and
Bowen Zhou and
Zhezhe Chen and
Feng Qin Debugging high-performance computing
applications at massive scales . . . . . 72--81
Tanmoy Chakraborty and
Suhansanu Kumar and
Pawan Goyal and
Niloy Ganguly and
Animesh Mukherjee On the categorization of scientific
citation profiles in computer science 82--90
Ernest Davis and
Gary Marcus Commonsense reasoning and commonsense
knowledge in artificial intelligence . . 92--103
Aviv Zohar Bitcoin: under the hood . . . . . . . . 104--113
Marc Alexa A woodworker's easy fix: technical
perspective . . . . . . . . . . . . . . 115--115
Nobuyuki Umentani and
Takeo Igarashi and
Niloy J. Mitra Guided exploration of physically valid
shapes for furniture design . . . . . . 116--124
Leah Hoffmann Last byte: Q&A: A Passion for Pairings 128--ff
Moshe Y. Vardi What can be done about gender diversity
in computing?: a lot! . . . . . . . . . 5--5
Vinton G. Cerf The Third Heidelberg Laureate Forum . . 7--7
CACM Staff Letters to the Editor: Ban `naked'
braces! . . . . . . . . . . . . . . . . 10--11
John Arquilla and
Daniel A. Reed BLOG@CACM: The morality of online war;
the fates of data analytics, HPC . . . . 12--13
Gary Anthes News: Scientists update views of light 15--17
Samuel Greengard News: Automotive systems get smarter . . 18--20
Keith Kirkpatrick News: Cyber policies on the rise . . . . 21--23
Harold `Hal' Abelson and
Ross Anderson and
Steven M. Bellovin and
Josh Benaloh and
Matt Blaze and
Whitfield `Whit' Diffie and
John Gilmore and
Matthew Green and
Susan Landau and
Peter G. Neumann and
Ronald L. Rivest and
Jeffrey I. Schiller and
Bruce Schneier and
Michael A. Specter and
Daniel J. Weitzner Inside risks: Keys under doormats . . . 24--26
Michael A. Cusumano Technology strategy and management: In
defense of IBM . . . . . . . . . . . . . 27--28
George V. Neville-Neil Kode Vicious: Storming the cubicle . . . 29--31
Phillip G. Armour The business of software: Thinking
thoughts . . . . . . . . . . . . . . . . 32--34
Thomas J. Misa Historical reflections: Computing is
history . . . . . . . . . . . . . . . . 35--37
Thomas G. Dietterich and
Eric J. Horvitz Viewpoint: Rise of concerns about AI:
reflections and directions . . . . . . . 38--40
Phillip Compeau and
Pavel A. Pevzner Viewpoint: Life after MOOCs . . . . . . 41--44
T. S. Pillai and
V. Chidambaram and
R. Alagappan and
S. Al-Kiswany and
A. C. Arpaci-Dusseau and
R. H. Arpaci-Dusseau Crash consistency . . . . . . . . . . . 46--51
Rich Harris Dismantling the barriers to entry . . . 52--57
Joan Feigenbaum and
Bryan Ford Seeking anonymity in an Internet
panopticon . . . . . . . . . . . . . . . 58--69
Patricia Lago and
Sedef Akinli Koçak and
Ivica Crnkovic and
Birgit Penzenstadler Framing sustainability as a property of
software quality . . . . . . . . . . . . 70--78
Eleazar Eskin Discovering genes involved in disease
and the mystery of missing heritability 80--87
Cleve Moler Technical Perspective: Not just a matrix
laboratory anymore . . . . . . . . . . . 90--90
Lloyd N. Trefethen Computing numerically with functions
instead of numbers . . . . . . . . . . . 91--97
William Sims Bainbridge Last byte: Future Tense: Processional 104--ff
Bobby Schnabel A tale of ACM visions . . . . . . . . . 5--5
Vinton G. Cerf Memory with a twist . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Who will read
PACM? . . . . . . . . . . . . . . . . . 8--9
Valerie Barr and
Michael Stonebraker BLOG@CACM: How men can help women in CS;
winning `computing's Nobel prize' . . . 10--11
Alex Wright News: Algorithmic authors . . . . . . . 12--14
Esther Shein News: Companies proactively seek out
internal threats . . . . . . . . . . . . 15--17
Chris Edwards News: Brain science helps computers
separate speakers in a crowded room . . 18--20
CACM Staff News: John H. Holland 1929--2015 . . . . 21--21
Steven B. Lipner Privacy and security: Security assurance 24--26
Pamela Samuelson Legally speaking: Software patents are
falling down . . . . . . . . . . . . . . 27--29
Muhammad Zia Hydari and
Rahul Telang and
William M. Marella Economic and business dimensions:
Electronic health records and patient
safety . . . . . . . . . . . . . . . . . 30--32
Pratim Sengupta and
Amanda Dickes and
Amy Voss Farris and
Ashlyn Karan and
David Martin and
Mason Wright Education: Programming in K--12 science
classrooms . . . . . . . . . . . . . . . 33--35
Len Shustek Interview: An interview with Fred Brooks 36--40
Rafael A. Calvo and
Dorian Peters and
Sidney D'Mello Viewpoints: When technologies manipulate
our emotions . . . . . . . . . . . . . . 41--42
Ben Maurer Fail at scale . . . . . . . . . . . . . 44--49
Tyler Mcmullen It probably works . . . . . . . . . . . 50--54
Taylor Savage Componentizing the web . . . . . . . . . 55--61
Dafna Shahaf and
Carlos Guestrin and
Eric Horvitz and
Jure Leskovec Information cartography . . . . . . . . 62--73
So-Hyun Lee and
Hee-Woong Kim Why people post benevolent and malicious
comments online . . . . . . . . . . . . 74--79
Chenyan Xu and
Yang Yu and
Chun-Keung Hoi Hidden in-game intelligence in NBA
players' tweets . . . . . . . . . . . . 80--89
Sumit Gulwani and
José Hernández-Orallo and
Emanuel Kitzelmann and
Stephen H. Muggleton and
Ute Schmid and
Benjamin Zorn Inductive programming meets the real
world . . . . . . . . . . . . . . . . . 90--99
Frédo Durand Technical Perspective: The Path to Light
Transport . . . . . . . . . . . . . . . 102--102
Wenzel Jakob and
Steve Marschner Geometric tools for exploring manifolds
of light transport paths . . . . . . . . 103--111
George Varghese Technical Perspective: Treating Networks
Like Programs . . . . . . . . . . . . . 112--112
Mihai Dobrescu and
Katerina Argyraki Software dataplane verification . . . . 113--121
Dennis Shasha Last byte: Upstart Puzzles: Auction
Triplets . . . . . . . . . . . . . . . . 136--136
Moshe Y. Vardi On lethal autonomous weapons . . . . . . 5--5
Vinton G. Cerf Advancing the ACM agenda . . . . . . . . 7--7
CACM Staff Letters to the Editor: What about
statistical relational learning? . . . . 8--9
Moshe Y. Vardi and
Mark Guzdial BLOG@CACM: What do we do when the jobs
are gone, and why we must embrace active
learning . . . . . . . . . . . . . . . . 10--11
Don Monroe News: When data is not enough . . . . . 12--14
Gregory Mone News: The hyper-intelligent bandage . . 15--16
Keith Kirkpatrick News: Technology brings online education
in line with campus programs . . . . . . 17--19
David Anderson Historical reflections: The digital dark
age . . . . . . . . . . . . . . . . . . 20--23
Peter J. Denning and
Nicholas Dew The profession of IT: Why our theories
of innovation fail us . . . . . . . . . 24--26
Nancy Tuana Computing ethics: Coupled
ethical-epistemic analysis in teaching
ethics . . . . . . . . . . . . . . . . . 27--29
George V. Neville-Neil Kode vicious: Pickled patches . . . . . 30--32
Richard E. Ladner and
Sheryl Burgstahler Broadening participation: Increasing the
participation of individuals with
disabilities in computing . . . . . . . 33--36
Jeremy Scott and
Alan Bundy Viewpoint: Creating a new generation of
computational thinkers . . . . . . . . . 37--40
Cory Doctorow Viewpoint: I can't let you do that, Dave 41--42
Stephen Goose Point/Counterpoint: The case for banning
killer robots: point . . . . . . . . . . 43--45
Ronald Arkin Point/Counterpoint: The case for banning
killer robots: counterpoint . . . . . . 46--47
Olivia Angiuli and
Joe Blitzstein and
Jim Waldo How to de-identify your data . . . . . . 48--55
Kate Matsudaira Lean software development: building and
shipping two versions . . . . . . . . . 56--58
Fabien Gaud and
Baptiste Lepers and
Justin Funston and
Mohammad Dashti and
Alexandra Fedorova and
Vivien Quéma and
Renaud Lachaize and
Mark Roth Challenges of memory management on
modern NUMA systems . . . . . . . . . . 59--66
Andrea Ballatore and
Michela Bertolotto Personalizing maps . . . . . . . . . . . 68--74
Philip Wadler Propositions as types . . . . . . . . . 75--84
Soumya Sen and
Carlee Joe-Wong and
Sangtae Ha and
Mung Chiang Smart data pricing: using economics to
manage network congestion . . . . . . . 86--93
Robert Kraut and
Moira Burke Internet use and psychological
well-being: effects of activity and
audience . . . . . . . . . . . . . . . . 94--100
Noah Snavely Technical Perspective: Paris Beyond
Frommer's . . . . . . . . . . . . . . . 102--102
Carl Doersch and
Saurabh Singh and
Abhinav Gupta and
Josef Sivic and
Alexei A. Efros What makes Paris look like Paris? . . . 103--110
David Maier Technical Perspective: In-Situ Database
Management . . . . . . . . . . . . . . . 111--111
Ioannis Alagiannis and
Renata Borovica-Gajic and
Miguel Branco and
Stratos Idreos and
Anastasia Ailamaki NoDB: efficient query execution on raw
data files . . . . . . . . . . . . . . . 112--121
Leah Hoffmann Last byte: Q&A: Redefining Architectures 136--ff
Mark R. Nelson Focusing on teacher needs in K--12 CS
education . . . . . . . . . . . . . . . 5--5
Vinton G. Cerf On the road in Latin America . . . . . . 7--7
CACM Staff Letters to the Editor: Let the liable
pay . . . . . . . . . . . . . . . . . . 8--9
Vinton G. Cerf Letters to the Editor: ACM's 2016
general election . . . . . . . . . . . . 10--10
Alexander L. Wolf Letters to the Editor: ACM's annual
report for FY15 . . . . . . . . . . . . 11--16
John Arquilla and
Joel C. Adams BLOG@CACM: Controlling cyber arms, and
creating new LEGOs . . . . . . . . . . . 18--19
Neil Savage News: Seeing more clearly . . . . . . . 20--22
Samuel Greengard News: Better memory . . . . . . . . . . 23--25
Esther Shein News: Preserving the internet . . . . . 26--28
CACM Staff News: Gene Amdahl, 1922--2015 . . . . . 29--29
Jonathan T. Weinberg Law and technology: Biometric identity 30--32
Michael A. Cusumano and
David B. Yoffie Technology strategy and management:
Extrapolating from Moore's law . . . . . 33--35
Phillip G. Armour The business of software: The chaos
machine . . . . . . . . . . . . . . . . 36--38
Thomas Haigh and
Mark Priestley Historical reflections: Where code comes
from: architectures of automatic control
from Babbage to Algol . . . . . . . . . 39--44
Gio Wiederhold Viewpoint: Unbalanced data leads to
obsolete economic advice . . . . . . . . 45--46
Yoav Shoham Viewpoint: Why knowledge representation
matters . . . . . . . . . . . . . . . . 47--49
George V. Neville-Neil Time is an illusion lunchtime doubly so 50--55
Mihir Nanavati and
Malte Schwarzkopf and
Jake Wires and
Andrew Warfield Non-volatile storage . . . . . . . . . . 56--63
Pat Helland Immutability changes everything . . . . 64--70
Shashi Shekhar and
Steven K. Feiner and
Walid G. Aref Spatial computing . . . . . . . . . . . 72--81
Melissa Lee and
Esteve Almirall and
Jonathan Wareham Open data and civic apps:
first-generation failures,
second-generation improvements . . . . . 82--89
Lazaros Goutas and
Juliana Sutanto and
Hassan Aldarbesti The building blocks of a cloud strategy:
evidence from three SaaS providers . . . 90--97
Ioannis Koutis and
Ryan Williams Algebraic fingerprints for faster
algorithms . . . . . . . . . . . . . . . 98--105
Steve Hand Technical Perspective: High-performance
virtualization: are we done? . . . . . . 107--107
Nadav Amit and
Abel Gordon and
Nadav Har'El and
Muli Ben-Yehuda and
Alex Landau and
Assaf Schuster and
Dan Tsafrir Bare-metal performance for virtual
machines with exitless interrupts . . . 108--116
Tova Milo Technical Perspective: Enlisting the
power of the crowd . . . . . . . . . . . 117--117
Beth Trushkowsky and
Tim Kraska and
Michael J. Franklin and
Purnamrita Sarkar Answering enumeration queries with the
crowd . . . . . . . . . . . . . . . . . 118--127
Dennis Shasha Last byte: Upstart Puzzles: Ice Trap . . 136--136
Moshe Y. Vardi Editor's Letter: The moral hazard of
complexity-theoretic assumptions . . . . 5--5
Vinton G. Cerf Cerf's up: Apps and the Web . . . . . . 7--7
CACM Staff Letters to the Editor: Expect
`ungoverned actors' to use AI-supported
weapons, too . . . . . . . . . . . . . . 8--9
Mark Guzdial BLOG@CACM: Drumming up support for AP CS
principles . . . . . . . . . . . . . . . 12--13
Chris Edwards News: Self-repair techniques point to
robots that design themselves . . . . . 15--17
Logan Kugler News: How a supervillain (or a hacker in
his basement) could destroy the Internet 18--20
Tom Geller News: In privacy law, it's the U.S. vs.
the world . . . . . . . . . . . . . . . 21--23
CACM Staff News: ACM inducts Fellows . . . . . . . 24--24
Peter C. Evans and
Rahul C. Basole Economic and business dimensions:
Revealing the API ecosystem and
enterprise strategy via visual analytics 26--28
Carl Landwehr Privacy and security: Privacy research
directions . . . . . . . . . . . . . . . 29--31
Rick Adrion and
Renee Fall and
Barbara Ericson and
Mark Guzdial Education: Broadening access to
computing education state by state . . . 32--34
George V. Neville-Neil Kode Vicious: Code hoarding . . . . . . 35--36
Satish Chandra and
Suresh Thummalapenta and
Saurabh Sinha Viewpoint: Lessons from the tech
transfer trenches . . . . . . . . . . . 37--39
Herbert Lin Viewpoint: Having a conversation about
bulk surveillance . . . . . . . . . . . 40--42
R. V. Guha and
Dan Brickley and
Steve Macbeth Schema.org: evolution of structured data
on the web . . . . . . . . . . . . . . . 44--51
Caitie McCaffrey The verification of a distributed system 52--55
Nicholas Diakopoulos Accountability in algorithmic decision
making . . . . . . . . . . . . . . . . . 56--62
Bart Thomee and
David A. Shamma and
Gerald Friedland and
Benjamin Elizalde and
Karl Ni and
Douglas Poland and
Damian Borth and
Li-Jia Li YFCC100M: the new data in multimedia
research . . . . . . . . . . . . . . . . 64--73
Michael Stonebraker Turing Lecture: The land sharks are on
the squawk box . . . . . . . . . . . . . 74--83
J. P. Shim and
J. Koh and
S. Fister and
H. Y. Seo Phonetic analytics technology and big
data: real-world cases . . . . . . . . . 84--90
Daniel Abadi and
Rakesh Agrawal and
Anastasia Ailamaki and
Magdalena Balazinska and
Philip A. Bernstein and
Michael J. Carey and
Surajit Chaudhuri and
Jeffrey Dean and
AnHai Doan and
Michael J. Franklin and
Johannes Gehrke and
Laura M. Haas and
Alon Y. Halevy and
Joseph M. Hellerstein and
Yannis E. Ioannidis and
H. V. Jagadish and
Donald Kossmann and
Samuel Madden and
Sharad Mehrotra and
Tova Milo and
Jeffrey F. Naughton and
Raghu Ramakrishnan and
Volker Markl and
Christopher Olston and
Beng Chin Ooi and
Christopher Ré and
Dan Suciu and
Michael Stonebraker and
Todd Walter and
Jennifer Widom The Beckman report on database research 92--99
Michael Mitzenmacher and
Justin Thaler Technical Perspective: Catching lies
(and mistakes) in offloaded computation 102--102
Bryan Parno and
Jon Howell and
Craig Gentry and
Mariana Raykova Pinocchio: nearly practical verifiable
computation . . . . . . . . . . . . . . 103--112
Sumit Gulwani Technical Perspective: Program synthesis
using stochastic techniques . . . . . . 113--113
Eric Schkufza and
Rahul Sharma and
Alex Aiken Stochastic program optimization . . . . 114--122
Ken MacLeod Last byte: Future Tense: Chatterbox . . 128--ff
Eugene H. Spafford The strength of encryption . . . . . . . 5--5
Vinton G. Cerf Computer science in the curriculum . . . 7--7
CACM Staff Letters to the Editor: ACM moral
imperatives vs. lethal autonomous
weapons . . . . . . . . . . . . . . . . 8--9
Valerie Barr BLOG@CACM: The value of Ada . . . . . . 10--11
Gregory Goth News: Deep or shallow, NLP is breaking
out . . . . . . . . . . . . . . . . . . 13--16
Tom Geller News: Rich data, poor fields . . . . . . 17--18
Neil Savage News: When computers stand in the
schoolhouse door . . . . . . . . . . . . 19--21
CACM Staff News: Peter Naur: 1928--2016 . . . . . . 22--23
Pamela Samuelson Legally speaking: New exemptions to
anti-circumvention rules . . . . . . . . 24--26
Jeffrey Johnson Computing ethics: The question of
information justice . . . . . . . . . . 27--29
Peter J. Denning The profession of IT: Fifty years of
operating systems . . . . . . . . . . . 30--32
Tiffany Barnes and
George K. Thiruvathukal Broadening participation: The need for
research in broadening participation . . 33--34
Maja Vukovic and
Jim Laredo and
Vinod Muthusamy and
Aleksander Slominski and
Roman Vaculin and
Wei Tan and
Vijay Naik and
Ignacio Silva-Lepe and
Arun Kumar and
Biplav Srivastava and
Joel W. Branch Viewpoint: Riding and thriving on the
API hype cycle . . . . . . . . . . . . . 35--37
H. V. Jagadish Viewpoint: Paper presentation at
conferences: time for a reset . . . . . 38--39
David Patterson Interview: An interview with Stanford
University President John Hennessy . . . 40--45
CACM Staff A purpose-built global network: Google's
move to SDN . . . . . . . . . . . . . . 46--54
Kate Matsudaira The paradox of autonomy and recognition 55--57
Tom Limoncelli Automation should be like Iron Man, not
Ultron . . . . . . . . . . . . . . . . . 58--61
Christian Collberg and
Todd A. Proebsting Repeatability in computer systems
research . . . . . . . . . . . . . . . . 62--69
Andrew S. Tanenbaum Lessons learned from 30 years of MINIX 70--78
Antonio De Nicola and
Michele Missikoff A lightweight methodology for rapid
ontology engineering . . . . . . . . . . 79--86
Boaz Barak Hopes, fears, and software obfuscation 88--96
John Regehr Technical Perspective: STACKing up
undefined behaviors . . . . . . . . . . 98--98
Xi Wang and
Nickolai Zeldovich and
M. Frans Kaashoek and
Armando Solar-Lezama A differential approach to undefined
behavior detection . . . . . . . . . . . 99--106
David Forsyth Technical Perspective: Taming the name
game . . . . . . . . . . . . . . . . . . 107--107
Vicente Ordonez and
Wei Liu and
Jia Deng and
Yejin Choi and
Alexander C. Berg and
Tamara L. Berg Learning to name objects . . . . . . . . 108--115
Leah Hoffmann Last byte: Q&A: A Graphics and Hypertext
Innovator . . . . . . . . . . . . . . . 120--ff
Moshe Y. Vardi Are we headed toward another global tech
bust? . . . . . . . . . . . . . . . . . 5--5
Vinton G. Cerf and
Maggie Johnson Enrollments explode! but diversity
students are leaving\ldots . . . . . . . 7--7
CACM Staff Letters to the Editor: Chaos is no
catastrophe . . . . . . . . . . . . . . 8--9
Mark Guzdial and
John Arquilla BLOG@CACM: Sampling bias in CS
education, and where's the cyber
strategy? . . . . . . . . . . . . . . . 10--11
Chris Edwards News: Automating proofs . . . . . . . . 13--15
Keith Kirkpatrick News: Existing technologies can assist
the disabled . . . . . . . . . . . . . . 16--18
Gary Anthes News: Search engine agendas . . . . . . 19--21
Lawrence M. Fisher News: Marvin Minsky: 1927--2016 . . . . 22--24
Lawrence M. Fisher News: A decade of ACM efforts contribute
to computer science for all . . . . . . 25--27
Kentaro Toyama Global computing: The Internet and
inequality . . . . . . . . . . . . . . . 28--30
George V. Neville-Neil Kode Vicious: GNL is not Linux . . . . . 31--32
Mari Sako Technology strategy and management: The
need for corporate diplomacy . . . . . . 33--35
Manuel Cebrian and
Iyad Rahwan and
Alex ``Sandy'' Pentland Viewpoint: Beyond viral . . . . . . . . 36--39
Poul-Henning Kamp More encryption means less privacy . . . 40--42
Carlos Baquero and
Nuno Preguiça Why logical clocks are easy . . . . . . 43--47
Thomas A. Limoncelli How SysAdmins devalue themselves . . . . 48--49
Palash Bera How colors in business dashboards affect
users' decision making . . . . . . . . . 50--57
Mikhail I. Gofman and
Sinjini Mitra Multimodal biometrics for enhanced
mobile device security . . . . . . . . . 58--65
Alberto Apostolico and
Maxime Crochemore and
Martin Farach-Colton and
Zvi Galil and
S. Muthukrishnan 40 years of suffix trees . . . . . . . . 66--73
David Wagner Technical Perspective: Fairness and the
coin flip . . . . . . . . . . . . . . . 75--75
Marcin Andrychowicz and
Stefan Dziembowski and
Daniel Malinowski and
Lukasz Mazurek Secure multiparty computations on
Bitcoin . . . . . . . . . . . . . . . . 76--84
Emin Gün Sirer Technical Perspective: The state (and
security) of the Bitcoin economy . . . . 85--85
Sarah Meiklejohn and
Marjori Pomarole and
Grant Jordan and
Kirill Levchenko and
Damon McCoy and
Geoffrey M. Voelker and
Stefan Savage A fistful of Bitcoins: characterizing
payments among men with no names . . . . 86--93
Dennis Shasha Last byte: Upstart Puzzles: Sleep No
More . . . . . . . . . . . . . . . . . . 96--96
Moshe Y. Vardi The moral imperative of artificial
intelligence . . . . . . . . . . . . . . 5--5
Vinton G. Cerf The IANA transition . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Why All Writs is
a Trojan horse . . . . . . . . . . . . . 8--9
CACM Staff Letters to the Editor: ACM's 2016
general election: please take this
opportunity to vote . . . . . . . . . . 11--22
Mark Guzdial BLOG@CACM: Bringing computer science to
U.S. schools, state by state . . . . . . 24--25
Don Monroe News: Silicon photonics: ready to go the
distance? . . . . . . . . . . . . . . . 26--28
Samuel Greengard News: Cybersecurity gets smart . . . . . 29--31
Keith Kirkpatrick News: Coding as sport . . . . . . . . . 32--33
Jason Schultz Law and technology: The Internet of
Things we don't own? . . . . . . . . . . 36--38
R. Benjamin Shapiro and
Matthew Ahrens Education: Beyond blocks: syntax and
semantics . . . . . . . . . . . . . . . 39--41
Wen Wen and
Chris Forman Economic and business dimensions: Do
patent commons and standards-setting
organizations help navigate patent
thickets? . . . . . . . . . . . . . . . 42--43
David P. Anderson Historical reflections: Preserving
hybrid objects . . . . . . . . . . . . . 44--46
Steffen Wendzel Viewpoint: How to increase the security
of smart buildings? . . . . . . . . . . 47--49
Brendan Burns and
Brian Grant and
David Oppenheimer and
Eric Brewer and
John Wilkes Borg, Omega, and Kubernetes . . . . . . 50--57
Kate Matsudaira Delegation as art . . . . . . . . . . . 58--60
Ivar Jacobson and
Ian Spence and
Brian Kerr Use-case 2.0 . . . . . . . . . . . . . . 61--69
Stephen M. Casner and
Edwin L. Hutchins and
Don Norman The challenges of partially automated
driving . . . . . . . . . . . . . . . . 70--77
Andrew Lenharth and
Donald Nguyen and
Keshav Pingali Parallel graph analytics . . . . . . . . 78--87
Hanan Samet and
Sarana Nutanong and
Brendan C. Fruin Static presentation consistency issues
in smartphone mapping apps . . . . . . . 88--98
Mason Bretan and
Gil Weinberg A survey of robotic musicianship . . . . 100--109
Boaz Barak Technical Perspective: a breakthrough in
software obfuscation . . . . . . . . . . 112--112
Sanjam Garg and
Craig Gentry and
Shai Halevi and
Mariana Raykova and
Amit Sahai and
Brent Waters Hiding secrets in software: a
cryptographic approach to program
obfuscation . . . . . . . . . . . . . . 113--120
Gail C. Murphy Technical Perspective: Software is
natural . . . . . . . . . . . . . . . . 121--121
Abram Hindle and
Earl T. Barr and
Mark Gabel and
Zhendong Su and
Premkumar Devanbu On the naturalness of software . . . . . 122--131
Louis Friedman Last byte: Future Tense: Becoming a
Multi-Planet Species . . . . . . . . . . 136--ff
Alexander L. Wolf Moving forward . . . . . . . . . . . . . 5--5
Vinton G. Cerf Celebrations! . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: No backdoor
required or expected . . . . . . . . . . 8--9
John Langford and
Bertrand Meyer and
Mark Guzdial BLOG@CACM: The solution to AI, what real
researchers do, and expectations for CS
classrooms . . . . . . . . . . . . . . . 10--11
Neil Savage News: The key to privacy . . . . . . . . 12--14
Logan Kugler News: What happens when big data
blunders? . . . . . . . . . . . . . . . 15--16
Alex Wright News: Reimagining search . . . . . . . . 17--19
Gregory Mone News: What's next for digital
humanities? . . . . . . . . . . . . . . 20--21
Rebecca T. Mercuri and
Peter G. Neumann Inside risks: The risks of self-auditing
systems . . . . . . . . . . . . . . . . 22--25
George V. Neville-Neil Kode Vicious: What are you trying to
pull? . . . . . . . . . . . . . . . . . 26--27
Peter J. Denning The profession of IT: How to produce
innovations . . . . . . . . . . . . . . 28--30
Derek Chiou Interview: An interview with Yale Patt 31--36
Boaz Barak Viewpoint: Computer science should stay
young . . . . . . . . . . . . . . . . . 37--38
Jean-Pierre Hubaux and
Ari Juels Viewpoint: Privacy is dead, long live
privacy . . . . . . . . . . . . . . . . 39--41
Ankita Mitra Viewpoint: A byte is all we need . . . . 42--44
Kate Matsudaira Nine things I didn't know I would learn
being an engineer manager . . . . . . . 45--47
Brendan Gregg The flame graph . . . . . . . . . . . . 48--57
Pat Helland Standing on distributed shoulders of
giants . . . . . . . . . . . . . . . . . 58--61
Brad A. Myers and
Jeffrey Stylos Improving API usability . . . . . . . . 62--69
Daniel Genkin and
Lev Pachmanov and
Itamar Pipman and
Adi Shamir and
Eran Tromer Physical key extraction attacks on PCs 70--79
Petros Drineas and
Michael W. Mahoney RandNLA: randomized numerical linear
algebra . . . . . . . . . . . . . . . . 80--90
Koushik Sen Veritesting tackles path-explosion
problem . . . . . . . . . . . . . . . . 92--92
Thanassis Avgerinos and
Alexandre Rebert and
Sang Kil Cha and
David Brumley Enhancing symbolic execution with
veritesting . . . . . . . . . . . . . . 93--100
Siddharth Suri Computing with the crowd . . . . . . . . 101--101
Daniel W. Barowy and
Charlie Curtsinger and
Emery D. Berger and
Andrew McGregor AutoMan: a platform for integrating
human-based and digital computation . . 102--109
Leah Hoffmann Last byte: Q&A: Finding new directions in
cryptography: Whitfield Diffie and
Martin Hellman on their meeting, their
research, and the results that billions
use every day . . . . . . . . . . . . . 112--ff
Moshe Y. Vardi The ritual of academic-unit review . . . 5--5
Vinton G. Cerf The power of big ideas . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Rethinking
computational thinking . . . . . . . . . 8--8
Jeannette M. Wing and
Dan Stanzione BLOG@CACM: Progress in computational
thinking, and expanding the HPC
community . . . . . . . . . . . . . . . 10--11
Neil Savage News: Graph matching in theory and
practice . . . . . . . . . . . . . . . . 12--14
Marina Krakovsky News: Accelerating search . . . . . . . 15--16
Lawrence M. Fisher News: Booming enrollments . . . . . . . 17--18
Keith Kirkpatrick News: Legal advice on the smartphone . . 19--21
Pamela Samuelson Legally speaking: Apple v. Samsung and
the upcoming design patent wars? . . . . 22--24
Thomas Haigh Historical reflections: How Charles
Bachman invented the DBMS, a foundation
of our digital world . . . . . . . . . . 25--30
Jacob Metcalf Computing ethics: Big data analytics and
revision of the common rule . . . . . . 31--33
Toby Walsh Viewpoint: Turing's red flag . . . . . . 34--37
Yuri Gurevich and
Efim Hudis and
Jeannette M. Wing Viewpoint: Inverse privacy . . . . . . . 38--42
Sachin Date Should you upload or ship big data to
the cloud? . . . . . . . . . . . . . . . 44--51
Thomas A. Limoncelli The small batches principle . . . . . . 52--57
Heinrich Hartmann Statistics for engineers . . . . . . . . 58--66
Abhik Roychoudhury and
Satish Chandra Formula-based software debugging . . . . 68--77
Rachel Potvin and
Josh Levenberg Why Google stores billions of lines of
code in a single repository . . . . . . 78--87
Gill Barequet and
Günter Rote and
Mira Shalah $ \lambda > 4 $: an improved lower bound
on the growth constant of polyominoes 88--95
Emilio Ferrara and
Onur Varol and
Clayton Davis and
Filippo Menczer and
Alessandro Flammini The rise of social bots . . . . . . . . 96--104
Henry Kautz and
Parag Singla Technical Perspective: Combining logic
and probability . . . . . . . . . . . . 106--106
Vibhav Gogate and
Pedro Domingos Probabilistic theorem proving . . . . . 107--115
Sam Madden Technical Perspective: Mesa takes data
warehousing to new heights . . . . . . . 116--116
Ashish Gupta and
Fan Yang and
Jason Govig and
Adam Kirsch and
Kelvin Chan and
Kevin Lai and
Shuo Wu and
Sandeep Dhoot and
Abhilash Rajesh Kumar and
Ankur Agiwal and
Sanjay Bhansali and
Mingsheng Hong and
Jamie Cameron and
Masood Siddiqi and
David Jones and
Jeff Shute and
Andrey Gubarev and
Shivakumar Venkataraman and
Divyakant Agrawal Mesa: a geo-replicated online data
warehouse for Google's advertising
system . . . . . . . . . . . . . . . . . 117--125
Dennis Shasha Last byte: Upstart Puzzles: Chair Games 128--128
Vicki L. Hanson From the new ACM President . . . . . . . 5--5
Vinton G. Cerf Star struck in Lindau . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Future
cyberdefenses will defeat cyberattacks
on PCs . . . . . . . . . . . . . . . . . 8--9
Jason Hong BLOG@CACM: Inside the Great Wall . . . . 10--11
Marina Krakovsky News: Reinforcement renaissance . . . . 12--14
Gary Anthes News: Open source software no longer
optional . . . . . . . . . . . . . . . . 15--17
Logan Kugler News: Smartphone apps for social good 18--20
Paul Kocher Privacy and security: Computer security
is broken: can better hardware help fix
it? . . . . . . . . . . . . . . . . . . 22--25
Yasmin B. Kafai Education: From computational thinking
to computational participation in K--12
education . . . . . . . . . . . . . . . 26--27
George V. Neville-Neil Kode Vicious: Chilling the messenger . . 28--29
Ben Shneiderman Viewpoint: Teamwork in computing
research . . . . . . . . . . . . . . . . 30--31
Ivan Beschastnikh and
Patty Wang and
Yuriy Brun and
Michael D. Ernst Debugging distributed systems . . . . . 32--37
Pat Helland The singular success of SQL . . . . . . 38--41
Tom Killalea The hidden dividends of microservices 42--45
Rida Khatoun and
Sherali Zeadally Smart cities: concepts, architectures,
research opportunities . . . . . . . . . 46--57
Stephanie Forrest and
Melanie Mitchell Adaptive computation: the
multidisciplinary legacy of John H.
Holland . . . . . . . . . . . . . . . . 58--63
Leon Kappelman and
Mary C. Jones and
Vess Johnson and
Ephraim R. McLean and
Kittipong Boonme Skills for success at different stages
of an IT professional's career . . . . . 64--70
Bonnie Berger and
Noah M. Daniels and
Y. William Yu Computational biology in the 21st
century: scaling with compressive
algorithms . . . . . . . . . . . . . . . 72--80
Todd Millstein Technical Perspective: Toward reliable
programming for unreliable hardware . . 82--82
Michael Carbin and
Sasa Misailovic and
Martin C. Rinard Verifying quantitative reliability for
programs that execute on unreliable
hardware . . . . . . . . . . . . . . . . 83--91
Philip Wadler Technical Perspective: Why didn't I
think of that? . . . . . . . . . . . . . 92--92
Adam Chlipala Ur/Web: a simple model for programming
the web . . . . . . . . . . . . . . . . 93--100
Ken MacLeod Last byte: Future Tense: Gut Feelings 104--ff
Moshe Y. Vardi Academic rankings considered harmful! 5--5
Vinton G. Cerf Keeping the Internet open . . . . . . . 7--7
CACM Staff Letters to the Editor: Election auditing
and verifiability . . . . . . . . . . . 8--9
Chris Edwards News: Reconciling quantum physics with
math . . . . . . . . . . . . . . . . . . 11--13
Samuel Greengard News: GPUs reshape computing . . . . . . 14--16
Gregory Mone News: The edge of the uncanny . . . . . 17--19
Felix Wu Law and Technology: No easy answers in
the fight over iPhone decryption . . . . 20--22
Peter J. Denning The profession of IT: Software quality 23--25
Richard E. Ladner and
Maya Israel Broadening participation: ``For all'' in
``computer science for all'' . . . . . . 26--28
Amitai Etzioni and
Oren Etzioni Viewpoint: Designing AI systems that
obey our laws and values . . . . . . . . 29--31
Ethan Katz-Bassett and
Justine Sherry and
Te-Yuan Huang and
Maria Kazandjieva and
Craig Partridge and
Fahad Dogar Viewpoint: Helping conference attendees
better understand research presentations 32--34
Abraham Bernstein and
James Hendler and
Natalya Noy Viewpoint: A new look at the Semantic
Web . . . . . . . . . . . . . . . . . . 35--37
Peter Bailis and
Simon Peter and
Justine Sherry Introducing research for practice . . . 38--41
Kate Matsudaira Bad software architecture is a people
problem . . . . . . . . . . . . . . . . 42--43
Thomas A. Limoncelli 10 optimizations on linear search . . . 44--48
Peter Buneman and
Susan Davidson and
James Frew Why data citation is a computational
problem . . . . . . . . . . . . . . . . 50--57
Hanan Samet and
Sarana Nutanong and
Brendan C. Fruin Dynamic presentation consistency issues
in smartphone mapping apps . . . . . . . 58--67
Percy Liang Learning executable semantic parsers for
natural language understanding . . . . . 68--76
Kyros Kutulakos The dawn of computational light
transport: technical perspective . . . . 78--78
Andreas Velten and
Di Wu and
Belen Masia and
Adrian Jarabo and
Christopher Barsi and
Chinmaya Joshi and
Everett Lawson and
Moungi Bawendi and
Diego Gutierrez and
Ramesh Raskar Imaging the propagation of light through
scenes at picosecond resolution . . . . 79--86
Andrew W. Moore Jupiter rising: technical perspective 87--87
Arjun Singh and
Joon Ong and
Amit Agarwal and
Glen Anderson and
Ashby Armistead and
Roy Bannon and
Seb Boving and
Gaurav Desai and
Bob Felderman and
Paulie Germano and
Anand Kanagala and
Hong Liu and
Jeff Provost and
Jason Simmons and
Eiichi Tanda and
Jim Wanderer and
Urs Hölzle and
Stephen Stuart and
Amin Vahdat Jupiter rising: a decade of Clos
topologies and centralized control in
Google's datacenter network . . . . . . 88--97
Leah Hoffmann Last byte: Q&A . . . . . . . . . . . . . 104--ff
Ronald F. Boisvert Departments: Incentivizing
reproducibility . . . . . . . . . . . . 5--5
Vinton G. Cerf Departments: 'We're going backward!' . . 7--7
Perry R. Cook BLOG@CACM: Adding art to STEM . . . . . 8--9
Don Monroe News: Optical fibers getting full . . . 10--12
Marina Krakovsky News: Bringing holography to light . . . 13--15
Keith Kirkpatrick News: Battling algorithmic bias: how do
we ensure algorithms treat us fairly? 16--17
Michael A. Cusumano Technology strategy and management: The
puzzle of Japanese innovation and
entrepreneurship . . . . . . . . . . . . 18--20
Michael L. Best Global computing: Mobile computing and
political transformation . . . . . . . . 21--23
George V. Neville-Neil Kode vicious: Cloud calipers . . . . . . 24--25
Peter G. Neumann Inside risks: Risks of automation: a
cautionary total-system perspective of
our cyberfuture . . . . . . . . . . . . 26--30
Kathrin Conrad and
Nysret Musliu and
Reinhard Pichler and
Hannes Werthner Viewpoint: Universities and computer
science in the European crisis of
refugees . . . . . . . . . . . . . . . . 31--33
Ulan Degenbaev and
Jochen Eisinger and
Manfred Ernst and
Ross Mcilroy and
Hannes Payer Idle-time garbage-collection scheduling 34--39
Kate Matsudaira Fresh starts . . . . . . . . . . . . . . 40--41
Andre Medeiros Dynamics of change: why reactivity
matters . . . . . . . . . . . . . . . . 42--46
Robert Lychev and
Michael Schapira and
Sharon Goldberg Rethinking security for Internet routing 48--57
Craig Partridge and
Mark Allman Ethical considerations in network
measurement papers . . . . . . . . . . . 58--64
A. J. Burns and
M. Eric Johnson and
Peter Honeyman A brief chronology of medical device
security . . . . . . . . . . . . . . . . 66--72
Johannes Gehrke Technical Perspective: Naiad . . . . . . 74--74
Derek G. Murray and
Frank McSherry and
Michael Isard and
Rebecca Isaacs and
Paul Barham and
Martín Abadi Incremental, iterative data processing
with timely dataflow . . . . . . . . . . 75--83
James Larus Technical Perspective: The power of
parallelizing computations . . . . . . . 84--84
Saeed Maleki and
Madanlal Musuvathi and
Todd Mytkowicz Efficient parallelization using rank
convergence in dynamic programming
algorithms . . . . . . . . . . . . . . . 85--92
Dennis Shasha Last byte: Find me quickly . . . . . . . 96--96
Moshe Y. Vardi Departments: Globalization, computing,
and their political impact . . . . . . . 5--5
Vinton G. Cerf Departments: Heidelberg anew . . . . . . 7--7
CACM Staff Letters to the Editor: Learn to live
with academic rankings . . . . . . . . . 8--9
Valerie Barr and
Mark Guzdial BLOG@CACM: Introducing CS to newcomers,
and JES as a teaching tool . . . . . . . 10--11
Erica Klarreich News: Learning securely . . . . . . . . 12--14
Sarah Underwood News: Blockchain beyond Bitcoin . . . . 15--17
Tom Geller News: Farm automation gets smarter . . . 18--19
Roger R. Schell Privacy and security: Cyber defense
triad for where security matters . . . . 20--23
Pamela Samuelson Legally speaking: Fair use prevails in
Oracle v. Google . . . . . . . . . . . . 24--28
Bala R. Iyer and
Rahul C. Basole Economic and business dimensions:
Visualization to understand ecosystems 27--30
Mark Guzdial and
Briana Morrison Education: Growing computer science
education into a STEM education
discipline . . . . . . . . . . . . . . . 31--33
Jack Copeland and
Eli Dresner and
Diane Proudfoot and
Oron Shagrir Viewpoint: Time to reinspect the
foundations? . . . . . . . . . . . . . . 34--38
Jonathan Grudin Viewpoint: Technology and academic lives 37--39
Pat Helland The power of babble . . . . . . . . . . 40--43
Adam Morrison Scaling synchronization in multicore
programs . . . . . . . . . . . . . . . . 44--51
Peter Bailis and
Camille Fournier and
Joy Arulraj and
Andrew Pavlo Research for practice: distributed
consensus and implications of NVM on
database management systems . . . . . . 52--55
Matei Zaharia and
Reynold S. Xin and
Patrick Wendell and
Tathagata Das and
Michael Armbrust and
Ankur Dave and
Xiangrui Meng and
Josh Rosen and
Shivaram Venkataraman and
Michael J. Franklin and
Ali Ghodsi and
Joseph Gonzalez and
Scott Shenker and
Ion Stoica Apache Spark: a unified engine for big
data processing . . . . . . . . . . . . 56--65
Dinei Florêncio and
Cormac Herley and
Paul C. Van Oorschot Pushing on string: the `don't care'
region of password strength . . . . . . 66--74
Enrico Bozzo and
Massimo Franceschet A theory on power in networks . . . . . 75--83
Adi Livnat and
Christos Papadimitriou Sex as an algorithm: the theory of
evolution under the lens of computation 84--93
Dietmar Jannach and
Paul Resnick and
Alexander Tuzhilin and
Markus Zanker Recommender systems --- : beyond matrix
completion . . . . . . . . . . . . . . . 94--102
Kurt Keutzer If I could only design one circuit
\ldots: technical perspective . . . . . 104--104
Yunji Chen and
Tianshi Chen and
Zhiwei Xu and
Ninghui Sun and
Olivier Temam DianNao family: energy-efficient
hardware accelerators for machine
learning . . . . . . . . . . . . . . . . 105--112
James C. Hoe FPGA compute acceleration is first about
energy efficiency: technical perspective 113--113
Andrew Putnam and
Adrian M. Caulfield and
Eric S. Chung and
Derek Chiou and
Kypros Constantinides and
John Demme and
Hadi Esmaeilzadeh and
Jeremy Fowers and
Gopi Prashanth Gopal and
Jan Gray and
Michael Haselman and
Scott Hauck and
Stephen Heil and
Amir Hormati and
Joo-Young Kim and
Sitaram Lanka and
James Larus and
Eric Peterson and
Simon Pope and
Aaron Smith and
Jason Thong and
Phillip Yi Xiao and
Doug Burger A reconfigurable fabric for accelerating
large-scale datacenter services . . . . 114--122
Brian Clegg Last byte: The candidate . . . . . . . . 136--ff
Marty J. Wolf Departments: The ACM code of ethics: a
call to action . . . . . . . . . . . . . 6--6
Bo Brinkman and
Don Gotterbarn and
Keith Miller and
Marty J. Wolf Departments: Making a positive impact:
updating the ACM code of ethics . . . . 7--13
Vinton G. Cerf Departments: When email isn't private 15--15
CACM Staff Letters to the Editor: Reclaim the lost
promise of the Semantic Web . . . . . . 17--17
Mark Guzdial and
Daniel Reed BLOG@CACM: ICER 2016, and Star Trek at
50 . . . . . . . . . . . . . . . . . . . 18--19
Samuel Greengard News: Cracking the code on biology . . . 21--23
Chris Edwards News: Containers push toward the Mayfly
server . . . . . . . . . . . . . . . . . 24--26
Keith Kirkpatrick News: Can we trust autonomous weapons? 27--29
Peter J. Denning and
Gloria Flores The profession of IT: Learning to learn 32--36
David P. Anderson Historical reflections: Nailing smoke 37--39
Yan Chen Broadening participation: Mentoring
female assistant professors enhances
their success . . . . . . . . . . . . . 40--42
Orit Hazzan and
Jeff Kramer Viewpoint: Assessing abstraction skills 43--45
Jesper Larsson Träff Viewpoint: (Mis)managing parallel
computing research through EU project
funding . . . . . . . . . . . . . . . . 46--48
Marius Eriksen Functional at scale . . . . . . . . . . 50--55
CACM Staff React: Facebook's functional turn on
writing Javascript . . . . . . . . . . . 56--62
Ivar Jacobson and
Ian Spence and
Ed Seidewitz Industrial-scale agile: from craft to
engineering . . . . . . . . . . . . . . 63--71
Anders Ynnerman and
Thomas Rydell and
Daniel Antoine and
David Hughes and
Anders Persson and
Patric Ljung Interactive visualization of $3$D
scanned mummies at public venues . . . . 72--81
Mark Sagar and
Mike Seymour and
Annette Henderson Creating connection with autonomous
facial animation . . . . . . . . . . . . 82--91
Katie Shilton and
Jeffrey A. Burke and
kc claffy and
Lixia Zhang Anticipating policy and social
implications of named data networking 92--101
Yiling Chen and
Arpita Ghosh and
Michael Kearns and
Tim Roughgarden and
Jennifer Wortman Vaughan Mathematical foundations for social
computing . . . . . . . . . . . . . . . 102--108
Srinivasan Keshav The chemistry of software-defined
batteries: technical perspective . . . . 110--110
Anirudh Badam and
Ranveer Chandra and
Jon Dutra and
Anthony Ferrese and
Steve Hodges and
Pan Hu and
Julia Meinershagen and
Thomas Moscibroda and
Bodhi Priyantha and
Evangelia Skiani Software-defined batteries . . . . . . . 111--119
Takeo Igarashi $3$D image editing made easy: technical
perspective . . . . . . . . . . . . . . 120--120
Tao Chen and
Zhe Zhu and
Shi-Min Hu and
Daniel Cohen-Or and
Ariel Shamir Extracting $3$D objects from photographs
using $3$-sweep . . . . . . . . . . . . 121--129
Leah Hoffmann Last byte: A view to the future . . . . 144--ff
Moshe Y. Vardi Technology for the most effective use of
mankind . . . . . . . . . . . . . . . . 5--5
Vicki L. Hanson The ACM future of computing academy . . 7--7
Vinton G. Cerf Information and misinformation on the
Internet . . . . . . . . . . . . . . . . 9--9
Valerie Barr and
Michael Stonebraker and
Raul Castro Fernandez and
Dong Deng and
Michael Brodie BLOG@CACM: How we teach CS2All, and what
to do about database decay . . . . . . . 10--11
Don Monroe News: Pure randomness extracted from two
poor sources . . . . . . . . . . . . . . 13--15
Alex Wright News: Mapping the Internet of Things . . 16--18
Gregory Mone News: Bias in technology . . . . . . . . 19--20
Michael A. Cusumano Technology strategy and management: Is
Google's Alphabet a good bet? . . . . . 22--25
Michael Geist Law and technology: Why less is more
when it comes to Internet jurisdiction 26--28
Thomas Haigh Historical reflections: Colossal genius:
Tutte, Flowers, and a bad imitation of
Turing . . . . . . . . . . . . . . . . . 29--35
Jerry Kaplan Viewpoint: Artificial intelligence:
think again . . . . . . . . . . . . . . 36--38
Jeremy Straub Viewpoint: Effects of international
trafficking in arms regulations changes 39--41
Kate Matsudaira Resolving conflict . . . . . . . . . . . 42--44
Josh Bailey and
Stephen Stuart Faucet: deploying SDN in the enterprise 45--49
Peter Bailis and
Jean Yang and
Vijay Janapa Reddi and
Yuhao Zhu Research for practice: Web security and
mobile Web computing . . . . . . . . . . 50--53
Peter J. Denning and
Ted G. Lewis Exponential laws of computing growth . . 54--65
Cecil Eng Huang Chua and
Veda C. Storey Bottom-up enterprise information
systems: rethinking the roles of central
IT departments . . . . . . . . . . . . . 66--72
Bülent Yener Cell-graphs: image-driven modeling of
structure-function relationship . . . . 74--84
Richard Szeliski Magnifying motions the right way:
technical perspective . . . . . . . . . 86--86
Neal Wadhwa and
Hao-Yu Wu and
Abe Davis and
Michael Rubinstein and
Eugene Shih and
Gautham J. Mysore and
Justin G. Chen and
Oral Buyukozturk and
John V. Guttag and
William T. Freeman and
Frédo Durand Eulerian video magnification and
analysis . . . . . . . . . . . . . . . . 87--95
Valentina Salapura Mapping the universe: technical
perspective . . . . . . . . . . . . . . 96--96
Salman Habib and
Vitali Morozov and
Nicholas Frontiere and
Hal Finkel and
Adrian Pope and
Katrin Heitmann and
Kalyan Kumaran and
Venkatram Vishwanath and
Tom Peterka and
Joe Insley and
David Daniel and
Patricia Fasel and
Zarija Luki\'c HACC: extreme scaling and performance
across diverse architectures . . . . . . 97--104
Dennis Shasha Last byte: Open field tic-tac-toe . . . 112--112
Vicki L. Hanson Departments: Celebrating 50 years of the
Turing award . . . . . . . . . . . . . . 5--5
Francine Berman and
Vinton G. Cerf Departments: Social and ethical behavior
in the Internet of Things . . . . . . . 6--7
CACM Staff Letters to the Editor: Use the
scientific method in computer science 8--9
CACM Staff Panels in print: Artificial intelligence 10--11
Janet Davis BLOG@CACM: Liberal arts academia wants
YOU! . . . . . . . . . . . . . . . . . . 12--13
Chris Edwards News: Secure quantum communications . . 15--17
Samuel Greengard News: Are computer chips the new
security threat? . . . . . . . . . . . . 18--19
Keith Kirkpatrick News: It's not the algorithm, it's the
data . . . . . . . . . . . . . . . . . . 21--23
Ulf Lindqvist and
Peter G. Neumann Inside risks: The future of the Internet
of Things . . . . . . . . . . . . . . . 26--30
Aman Yadav and
Steve Cooper Education: Fostering creativity through
computing . . . . . . . . . . . . . . . 31--33
George V. Neville-Neil Kode vicious: The unholy trinity of
software development . . . . . . . . . . 34--36
Azer Bestavros and
Andrei Lapets and
Mayank Varia Privacy and security: User-centric
distributed solutions for
privacy-preserving analytics . . . . . . 37--39
Alan Bundy Viewpoint: Smart machines are not a
threat to humanity . . . . . . . . . . . 40--42
Devdatt Dubhashi and
Shalom Lappin Viewpoint: AI dangers: imagined and real 43--45
Pat Helland Life beyond distributed transactions . . 46--54
Thomas A. Limoncelli Are you load balancing wrong? . . . . . 55--57
Neal Cardwell and
Yuchung Cheng and
C. Stephen Gunn and
Soheil Hassas Yeganeh and
Van Jacobson BBR: congestion-based congestion control 58--66
Brett Danaher and
Michael D. Smith and
Rahul Telang Copyright enforcement in the digital
age: empirical evidence and policy
implications . . . . . . . . . . . . . . 68--75
Herbert Bruderer Computing history beyond the U.K. and
U.S.: selected landmarks from
continental Europe . . . . . . . . . . . 76--84
Frits Vaandrager Model learning . . . . . . . . . . . . . 86--95
Eric Rescorla Technical Perspective: Cleaning up flaws
in TLS implementations . . . . . . . . . 98--98
Benjamin Beurdouche and
Karthikeyan Bhargavan and
Antoine Delignat-Lavaud and
Cédric Fournet and
Markulf Kohlweiss and
Alfredo Pironti and
Pierre-Yves Strub and
Jean Karim Zinzindohoue A messy state of the union: taming the
composite state machines of TLS . . . . 99--107
Ivan Martinovic and
Kasper Rasmussen and
Marc Roeschlin and
Gene Tsudik Authentication using pulse-response
biometrics . . . . . . . . . . . . . . . 108--115
William Sims Bainbridge Last byte: Fatal guidance . . . . . . . 120--ff
Moshe Y. Vardi Departments: ACM's open-conference
principle and political reality . . . . 5--5
Vicki L. Hanson Departments: ACM's commitment to
accessibility . . . . . . . . . . . . . 7--7
Vinton G. Cerf Departments: Grumpy old cells . . . . . 9--9
CACM Staff Letters to the Editor: Address the
consequences of AI in advance . . . . . 10--11
Mark Guzdial and
Robin K. Hill BLOG@CACM: The slow evolution of CS for
all, the beauty of programs . . . . . . 12--13
Neil Savage News: Thinking deeply to make better
speech . . . . . . . . . . . . . . . . . 15--17
Samuel Greengard News: The future of semiconductors . . . 18--20
Keith Kirkpatrick News: Financing the dark web . . . . . . 21--22
CACM Staff News: ACM recognizes new Fellows . . . . 23--23
Pamela Samuelson Legally speaking: Supreme Court on
design patent damages in Samsung v.
Apple . . . . . . . . . . . . . . . . . 26--28
Elizabeth Varki Computing ethics: Where review goes
wrong . . . . . . . . . . . . . . . . . 29--30
Peter J. Denning and
Matti Tedre and
Pat Yongpradit The profession of IT: Misconceptions
about computer science . . . . . . . . . 31--33
Thomas M. Philip Viewpoint: Learning with mobile
technologies . . . . . . . . . . . . . . 34--36
Theo Schlossnagle Time, but faster . . . . . . . . . . . . 38--41
Mohamed Zahran Heterogeneous computing: here to stay 42--45
Peter Bailis and
Irene Zhang and
Fadel Adib Research for practice: distributed
transactions and networks as physical
sensors . . . . . . . . . . . . . . . . 46--49
Jonathan Lazar and
Elizabeth F. Churchill and
Tovi Grossman and
Gerrit van der Veer and
Philippe Palanque and
John ``Scooter'' Morris and
Jennifer Mankoff Making the field of computing more
inclusive . . . . . . . . . . . . . . . 50--59
Daniel J. Mazzola and
Robert D. St. Louis and
Mohan R. Tanniru The path to the top: insights from
career histories of top CIOs . . . . . . 60--68
Simon Price and
Peter A. Flach Computational support for academic peer
review: a perspective from artificial
intelligence . . . . . . . . . . . . . . 70--79
Srinivasan Keshav The power of wi-fi to deliver power:
technical perspective . . . . . . . . . 82--82
Vamsi Talla and
Bryce Kellogg and
Benjamin Ransford and
Saman Naderiparizi and
Joshua R. Smith and
Shyamnath Gollakota Powering the next billion devices with
wi-fi . . . . . . . . . . . . . . . . . 83--91
Leonid Libkin Data distribution for fast joins:
technical perspective . . . . . . . . . 92--92
Tom J. Ameloot and
Gaetano Geck and
Bas Ketsman and
Frank Neven and
Thomas Schwentick Reasoning on data partitioning for
single-round multi-join evaluation in
massively parallel systems . . . . . . . 93--100
Leah Hoffmann Last byte: Out of bounds . . . . . . . . 104--ff
Valerie Barr Departments: Gender diversity in
computing: are we making any progress? 5--5
Vinton G. Cerf Departments: A genetic theory of the
Silicon Valley phenomenon . . . . . . . 7--7
CACM Staff Letters to the Editor: Consider indirect
threats of AI, too . . . . . . . . . . . 8--9
John Arquilla and
Mark Guzdial BLOG@CACM: Crafting a national
cyberdefense, and preparing to support
computational literacy . . . . . . . . . 10--11
Gregory Mone News: Sensors on the brain . . . . . . . 12--14
Chris Edwards News: Digitizing the world . . . . . . . 15--16
Esther Shein News: Computing the arts . . . . . . . . 17--19
CACM Staff News: Cybersecurity . . . . . . . . . . 20--21
Ineke Buskens Global computing: Online social networks
and global women's empowerment . . . . . 22--23
George V. Neville-Neil Kode vicious: The chess player who
couldn't pass the salt . . . . . . . . . 24--25
William Regli Viewpoint: Wanted: toolsmiths . . . . . 26--28
Yancey Strickler Viewpoint: What it means to be an
entrepreneur today . . . . . . . . . . . 29--31
Meng-Day (Mandel) Yu and
Srinivas Devadas Pervasive, dynamic authentication of
physical items . . . . . . . . . . . . . 32--39
Robert C. Seacord Uninitialized reads . . . . . . . . . . 40--44
Kate Matsudaira Does anybody listen to you? . . . . . . 45--46
Luiz Barroso and
Mike Marty and
David Patterson and
Parthasarathy Ranganathan Attack of the killer microseconds . . . 48--54
Aman Yadav and
Chris Stephenson and
Hai Hong Computational thinking for teacher
education . . . . . . . . . . . . . . . 55--62
Athman Bouguettaya and
Munindar Singh and
Michael Huhns and
Quan Z. Sheng and
Hai Dong and
Qi Yu and
Azadeh Ghari Neiat and
Sajib Mistry and
Boualem Benatallah and
Brahim Medjahed and
Mourad Ouzzani and
Fabio Casati and
Xumin Liu and
Hongbing Wang and
Dimitrios Georgakopoulos and
Liang Chen and
Surya Nepal and
Zaki Malik and
Abdelkarim Erradi and
Yan Wang and
Brian Blake and
Schahram Dustdar and
Frank Leymann and
Michael Papazoglou A service computing manifesto: the next
10 years . . . . . . . . . . . . . . . . 64--72
Gernot Heiser Technical Perspective: Proving file
systems meet expectations . . . . . . . 74--74
Tej Chajed and
Haogang Chen and
Adam Chlipala and
M. Frans Kaashoek and
Nickolai Zeldovich and
Daniel Ziegler Certifying a file system using Crash
Hoare logic: correctness in the presence
of crashes . . . . . . . . . . . . . . . 75--84
Jonathan Ullman Technical Perspective: Building a safety
net for data reuse . . . . . . . . . . . 85--85
Cynthia Dwork and
Vitaly Feldman and
Moritz Hardt and
Toniann Pitassi and
Omer Reingold and
Aaron Roth Guilt-free data reuse . . . . . . . . . 86--93
Dennis Shasha Last byte: Stacking the deck . . . . . . 96--96
Moshe Y. Vardi Editor's letter: Cyber insecurity and
cyber libertarianism . . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: Can liberty survive the
digital age? . . . . . . . . . . . . . . 7--7
Bertrand Meyer BLOG@CACM: Ending null pointer crashes 8--9
Esther Shein News: Combating cancer with data . . . . 10--12
Samuel Greengard News: Making chips smarter . . . . . . . 13--15
Keith Kirkpatrick News: Bionics in competition . . . . . . 16--17
CACM Staff News: The Internet of Things . . . . . . 18--19
Woodrow Hartzog and
Ira Rubinstein Law and Technology: The anonymization
debate should be about risk, not
perfection . . . . . . . . . . . . . . . 22--24
Leo Porter and
Cynthia Lee and
Beth Simon and
Mark Guzdial Education: Preparing tomorrow's faculty
to address challenges in teaching
computer science . . . . . . . . . . . . 25--27
Wendell Wallach Viewpoint: Toward a ban on lethal
autonomous weapons: surmounting the
obstacles . . . . . . . . . . . . . . . 28--34
Erik Meijer Making money using math . . . . . . . . 36--42
Robert Guo MongoDB's JavaScript fuzzer . . . . . . 43--47
Peter Bailis and
Arvind Narayanan and
Andrew Miller and
Song Han Research for practice: cryptocurrencies,
blockchains, and smart contracts;
hardware for deep learning . . . . . . . 48--51
Catherine C. Marshall and
Frank M. Shipman Who owns the social web? . . . . . . . . 52--61
Marina Jirotka and
Barbara Grimpe and
Bernd Stahl and
Grace Eden and
Mark Hartswood Responsible research and innovation in
the digital age . . . . . . . . . . . . 62--68
Milan Vojnovi\'c Contest theory . . . . . . . . . . . . . 70--80
Guy Blelloch Technical Perspective: Functional
compilers . . . . . . . . . . . . . . . 82--82
Geoffrey Mainland and
Roman Leshchinskiy and
Simon Peyton Jones Exploiting vector instructions with
generalized stream fusion . . . . . . . 83--91
Alon Halevy Technical Perspective: Building
knowledge bases from messy data . . . . 92--92
Ce Zhang and
Christopher Ré and
Michael Cafarella and
Christopher De Sa and
Alex Ratner and
Jaeho Shin and
Feiran Wang and
Sen Wu DeepDive: declarative knowledge base
construction . . . . . . . . . . . . . . 93--102
David Allen Batchelor Last byte: Beyond `Star Trek' . . . . . 104--ff
Bo Brinkman and
Catherine Flick and
Don Gotterbarn and
Keith Miller and
Kate Vazansky and
Marty J. Wolf Departments: Listening to professional
voices: draft 2 of the ACM code of
ethics and professional conduct . . . . 105--111
Moshe Y. Vardi Editor's letter: Ten years at the helm
of \booktitleCommunications of the ACM 5--5
Vinton G. Cerf Cerf's up: Open access to academic
research . . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Technologies do
have ethics . . . . . . . . . . . . . . 8--9
Mark Guzdial BLOG@CACM: Balancing teaching CS
efficiently with motivating students . . 10--11
Don Monroe News: Deep learning takes on translation 12--14
Chris Edwards News: Optimization search finds a heart
of glass . . . . . . . . . . . . . . . . 15--16
Sarah Underwood News: Potential and peril . . . . . . . 17--19
Neil Savage News: Weaving the web . . . . . . . . . 20--22
CACM Staff News: Big data . . . . . . . . . . . . . 24--25
Peter G. Neumann Inside risks: Trustworthiness and
truthfulness are essential . . . . . . . 26--28
Leslie Goodyear and
Gary Silverstein and
Linda P. Thurston Broadening participation: The influence
and promise of alliances . . . . . . . . 29--30
George V. Neville-Neil Kode Vicious: Forced exception handling 31--32
Peter J. Denning Viewpoint: Remaining trouble spots with
computational thinking . . . . . . . . . 33--39
Devon H. O'Dell The debugging mind-set . . . . . . . . . 40--45
Pat Helland and
Simon Weaver and
Ed Harris Too big NOT to fail . . . . . . . . . . 46--50
Kate Matsudaira and
Erik Meijer Conversations with technology leaders:
Erik Meijer . . . . . . . . . . . . . . 51--54
David Barrera and
Laurent Chuat and
Adrian Perrig and
Raphael M. Reischuk and
Pawel Szalachowski The SCION Internet architecture . . . . 56--65
Yili Liu and
Lina Zhou The dynamics of work-family conflict . . 66--70
David Bau and
Jeff Gray and
Caitlin Kelleher and
Josh Sheldon and
Franklyn Turbak Learnable programming: blocks and beyond 72--80
Jitendra Malik Technical Perspective: What led computer
vision to deep learning? . . . . . . . . 82--83
Alex Krizhevsky and
Ilya Sutskever and
Geoffrey E. Hinton ImageNet classification with deep
convolutional neural networks . . . . . 84--90
Avi Wigderson Technical Perspective: Low-depth
arithmetic circuits . . . . . . . . . . 91--91
Ankit Gupta and
Pritish Kamath and
Neeraj Kayal and
Ramprasad Saptharishi Unexpected power of low-depth arithmetic
circuits . . . . . . . . . . . . . . . . 93--100
Leah Hoffmann Last byte: This is for everyone . . . . 104--ff
Andrew A. Chien Editor's letter: Today's
\booktitleCommunications of the ACM . . 5--5
Vinton G. Cerf Cerf's up: A brittle and fragile future 7--7
Mark Guzdial BLOG@CACM: 'Generation CS' drives growth
in enrollments . . . . . . . . . . . . . 10--11
Neil Savage News: Building a brain may mean going
analog . . . . . . . . . . . . . . . . . 13--15
Samuel Greengard News: Cracking the code on DNA storage 16--18
Gary Anthes News: Artificial intelligence poised to
ride a new wave . . . . . . . . . . . . 19--21
Lawrence M. Fisher News: Jean E. Sammet 1928--2017 . . . . 22--22
Adam L. Young and
Moti Yung Privacy and security: Cryptovirology:
the birth, neglect, and explosion of
ransomware . . . . . . . . . . . . . . . 24--26
Brad Greenwood and
Gordon Burtch and
Seth Carnahan Economic and business dimensions:
Unknowns of the gig-economy . . . . . . 27--29
Peter J. Denning The profession of IT: The beginner's
creed . . . . . . . . . . . . . . . . . 30--31
Marc Snir Viewpoint: The informal guide to ACM
Fellow nominations . . . . . . . . . . . 32--34
Pat Helland Side effects, front and center . . . . . 36--39
Mark A. Overton The IDAR graph . . . . . . . . . . . . . 40--45
Peter Bailis and
Peter Alvaro and
Sumit Gulwani Research for practice: tracing and
debugging distributed systems;
programming by examples . . . . . . . . 46--49
D. Fox Harrell and
Chong-U Lim Reimagining the avatar dream: modeling
social identity in digital media . . . . 50--61
Pantelis Koutroumpis and
Aija Leiponen and
Llewellyn D. W. Thomas How important is IT? . . . . . . . . . . 62--68
Denis Nekipelov and
Tammy Wang Inference and auction design in online
advertising . . . . . . . . . . . . . . 70--79
Fred B. Schneider IronFleet simplifies proving safety and
liveness properties: technical
perspective . . . . . . . . . . . . . . 82--82
Chris Hawblitzel and
Jon Howell and
Manos Kapritsos and
Jacob R. Lorch and
Bryan Parno and
Michael L. Roberts and
Srinath Setty and
Brian Zill IronFleet: proving safety and liveness
of practical distributed systems . . . . 83--92
Michael Mitzenmacher Building a better hash function:
technical perspective . . . . . . . . . 93--93
Mikkel Thorup Fast and powerful hashing using
tabulation . . . . . . . . . . . . . . . 94--101
Dennis Shasha Last byte: Ruby risks . . . . . . . . . 104--104
Andrew A. Chien Editor's letter: Building the future:
Communications of the ACM . . . . . . . 5--5
Vinton G. Cerf Cerf's up: In praise of
under-specification? . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Embed ethical
guidelines in autonomous weapons . . . . 8--9
Philip Guo BLOG@CACM: How adults ages 60+ are
learning to code . . . . . . . . . . . . 10--11
Esther Shein News: Hacker-proof coding . . . . . . . 12--14
Logan Kugler News: Why virtual reality will transform
a workplace near you . . . . . . . . . . 15--17
Keith Kirkpatrick News: AI in contact centers . . . . . . 18--19
Lawrence M. Fisher News: Charles P. `Chuck' Thacker:
1943--2017 . . . . . . . . . . . . . . . 20--21
David P. Anderson Historical reflections: Prophets, seers,
and pioneers . . . . . . . . . . . . . . 22--25
Jennifer Wang Education: Is the U.S. education system
ready for CS for all? . . . . . . . . . 26--28
George V. Neville-Neil Kode Vicious: The observer effect . . . 29--30
Dominic Horsman and
Vivien Kendon and
Susan Stepney Viewpoint: The natural science of
computing . . . . . . . . . . . . . . . 31--34
Ricardo Olenewa and
Gary M. Olson and
Judith S. Olson and
Daniel M. Russell Now that we can write simultaneously,
how do we use that to our advantage? . . 36--43
Hans-J. Boehm Small-data computing: correct calculator
arithmetic . . . . . . . . . . . . . . . 44--49
Leo Corry Turing's pre-war analog computers: the
fatherhood of the modern computer
revisited . . . . . . . . . . . . . . . 50--58
Longbing Cao Data science: challenges and directions 59--68
Marijn J. H. Heule and
Oliver Kullmann The science of brute force . . . . . . . 70--79
Marc Shapiro Unexpected connections: technical
perspective . . . . . . . . . . . . . . 82--82
Austin T. Clements and
M. Frans Kaashoek and
Eddie Kohler and
Robert T. Morris and
Nickolai Zeldovich The scalable commutativity rule:
designing scalable software for
multicore processors . . . . . . . . . . 83--90
Helmut Pottmann Linking form, function, and fabrication:
technical perspective . . . . . . . . . 91--91
Moritz Bächer and
Bernd Bickel and
Emily Whiting and
Olga Sorkine-Hornung Spin-it: optimizing moment of inertia
for spinnable objects . . . . . . . . . 92--99
Brian Clegg Last byte: Turing's taxi . . . . . . . . 104--ff
Simson Garfinkel and
Jeanna Matthews and
Stuart S. Shapiro and
Jonathan M. Smith Letter from USACM: Toward algorithmic
transparency and accountability . . . . 5--5
Vinton G. Cerf Cerf's Up: Take two aspirin and call me
in the morning . . . . . . . . . . . . . 6--6
Moshe Y. Vardi Vardi's Insights: Divination by program
committee . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: Computational
thinking is not necessarily
computational . . . . . . . . . . . . . 8--9
Robin K. Hill BLOG@CACM: Assuring software quality by
preventing neglect . . . . . . . . . . . 10--11
Samuel Greengard News: It's all about image . . . . . . . 13--15
Gregory Mone News: Broadband to Mars . . . . . . . . 16--17
Logan Kugler News: Why GPS spoofing is a threat to
companies, countries . . . . . . . . . . 18--19
Lawrence M. Fisher News: Turing laureates celebrate award's
50th anniversary . . . . . . . . . . . . 20--23
Lawrence M. Fisher News: Charles W. Bachman: 1924--2017 . . 24--25
Joel R. Reidenberg Law and technology: Digitocracy . . . . 26--28
Carolina Alves de Lima Salge and
Nicholas Berente Computing ethics: Is that social bot
behaving unethically? . . . . . . . . . 29--31
Peter J. Denning The profession of IT: Multitasking
without thrashing . . . . . . . . . . . 32--34
Gregorio Convertino and
Nancy Frishberg Viewpoint: Why agile teams fail without
UX research . . . . . . . . . . . . . . 35--37
Andrew Conway and
Peter Eckersley Viewpoint: When does law enforcement's
demand to read your data become a demand
to read your mind? . . . . . . . . . . . 38--40
Ben Treynor and
Mike Dahlin and
Vivek Rau and
Betsy Beyer The calculus of service availability . . 42--47
Graham Cormode Data sketching . . . . . . . . . . . . . 48--55
Kate Matsudaira 10 ways to be a better interviewer . . . 56--58
Carissa Schoenick and
Peter Clark and
Oyvind Tafjord and
Peter Turney and
Oren Etzioni Moving beyond the Turing Test with the
Allen AI Science Challenge . . . . . . . 60--64
Petter Bae Brandtzaeg and
Asbjòrn Fòlstad Trust and distrust in online
fact-checking services . . . . . . . . . 65--71
Sean Peisert Security in high-performance computing
environments . . . . . . . . . . . . . . 72--80
Charles (Chuck) Thacker Technical perspective: a gloomy look at
the integrity of hardware . . . . . . . 82--82
Kaiyuan Yang and
Matthew Hicks and
Qing Dong and
Todd Austin and
Dennis Sylvester Exploiting the analog properties of
digital circuits for malicious hardware 83--91
Ed H. Chi Technical perspective: Humans and
computers working together on hard tasks 92--92
Walter S. Lasecki and
Christopher D. Miller and
Iftekhar Naim and
Raja Kushalnagar and
Adam Sadilek and
Daniel Gildea and
Jeffrey P. Bigham Scribe: deep integration of human and
machine intelligence to caption speech
in real time . . . . . . . . . . . . . . 93--100
Leah Hoffmann Last byte: All the pretty pictures . . . 104--ff
Andrew A. Chien Editor's letter: Computing is a
profession . . . . . . . . . . . . . . . 5--5
Vinton G. Cerf Editor's letter: Six education . . . . . 7--7
CACM Staff Letters to the Editor: Beyond brute
force . . . . . . . . . . . . . . . . . 8--9
Robin K. Hill and
Mark Guzdial BLOG@CACM: Manipulating word
representations, and preparing students
for coding jobs? . . . . . . . . . . . . 12--13
Keith Kirkpatrick News: $3$D-printing human body parts . . 15--17
Don Monroe News: Digital hearing . . . . . . . . . 18--20
Chris Edwards News: Portable device fears show power
of social development . . . . . . . . . 21--22
Michael A. Cusumano Technology strategy and management:
Amazon and whole foods: follow the
strategy (and the money) . . . . . . . . 24--26
David Lorge Parnas Inside risks: The real risks of
artificial intelligence . . . . . . . . 27--31
Vasant Dhar and
Roger M. Stein Economic and business dimensions:
FinTech platforms and strategy . . . . . 32--35
George V. Neville-Neil Kode vicious: IoT: the Internet of
Terror . . . . . . . . . . . . . . . . . 36--37
Roderick Chapman and
Neil White and
Jim Woodcock Viewpoint: What can agile methods bring
to high-integrity software development? 38--41
Alvaro Videla Metaphors we compute by . . . . . . . . 42--45
Peter Bailis and
Tawanna Dillahunt and
Stefanie Mueller and
Patrick Baudisch Research for practice: technology for
underserved communities; personal
fabrication . . . . . . . . . . . . . . 46--49
Thomas A. Limoncelli Four ways to make CS and IT more
immersive . . . . . . . . . . . . . . . 50--52
Ewan Tempero and
Tony Gorschek and
Lefteris Angelis Barriers to refactoring . . . . . . . . 54--61
Heiko Gewald and
Xuequn Wang and
Andy Weeger and
Mahesh S. Raisinghani and
Gerald Grant and
Otavio Sanchez and
Siddhi Pittayachawan Millennials' attitudes toward IT
consumerization in the workplace . . . . 62--69
Stephen B. Wicker and
Kolbeinn Karlsson Internet advertising: technology,
ethics, and a serious difference of
opinion . . . . . . . . . . . . . . . . 70--79
Jeffrey F. Naughton Broadening and deepening query
optimization yet still making progress:
technical perspective . . . . . . . . . 80--80
Immanuel Trummer and
Christoph Koch Multi-objective parametric query
optimization . . . . . . . . . . . . . . 81--89
Jeffrey S. Foster Shedding new light on an old language
debate: technical perspective . . . . . 90--90
Baishakhi Ray and
Daryl Posnett and
Premkumar Devanbu and
Vladimir Filkov A large-scale study of programming
languages and code quality in GitHub . . 91--100
Laurie Williams and
Doug Baldwin Departments: Highlights of the ACM
student research competition . . . . . . 5--5
Vinton G. Cerf Cerf's up: Heidelberg laureate forum . . 6--6
Moshe Y. Vardi Vardi's insights: Would Turing have won
the Turing award? . . . . . . . . . . . 7--7
CACM Staff Letters to the Editor: They see what you
see . . . . . . . . . . . . . . . . . . 8--9
Mei Kobayashi BLOG@CACM: Opportunities for women,
minorities in information retrieval . . 10--11
Neil Savage News: A block on the old chip . . . . . 12--14
Alex Wright News: Censoring sensors . . . . . . . . 15--16
Esther Shein News: Overcoming disabilities . . . . . 17--19
Pamela Samuelson Legally speaking: Disgorging profits in
design patent cases . . . . . . . . . . 20--22
Solon Barocas and
Danah Boyd Computing ethics: Engaging the ethics of
data science in practice . . . . . . . . 23--25
Richard Connor and
Quintin Cutts and
Judy Robertson Education: Keeping the machinery in
computing education . . . . . . . . . . 26--28
Martin Spann and
Lucas Stich and
Klaus M. Schmidt Viewpoint: Pay what you want as a
pricing model for open access
publishing? . . . . . . . . . . . . . . 29--31
Virginia Dignum Viewpoint: Social agents: bridging
simulation and engineering . . . . . . . 32--34
CACM Staff Hootsuite: in pursuit of reactive
systems . . . . . . . . . . . . . . . . 36--43
Kate Matsudaira Breadth and depth . . . . . . . . . . . 44--45
Ivar Jacobson and
Ian Spence and
Pan-Wei Ng Is there a single method for the
Internet of Things? . . . . . . . . . . 46--53
Makoto Odamaki and
Shree K. Nayar Cambits: a reconfigurable camera system 54--61
Stuart Mcilroy and
Weiyi Shang and
Nasir Ali and
Ahmed E. Hassan User reviews of top mobile apps in Apple
and Google app stores . . . . . . . . . 62--67
Laurel D. Riek Healthcare robotics . . . . . . . . . . 68--78
David Silver Solving imperfect information games:
technical perspective . . . . . . . . . 80--80
Michael Bowling and
Neil Burch and
Michael Johanson and
Oskari Tammelin Heads-up limit hold'em poker is solved 81--88
Marc Alexa Exploring a kingdom by geodesic
measures: technical perspective . . . . 89--89
Keenan Crane and
Clarisse Weischedel and
Max Wardetzky The heat method for distance computation 90--99
Seth Shostak Last byte: Butterfly effect . . . . . . 112--112
Andrew A. Chien Computing Is the Secret Ingredient
(well, not so secret) . . . . . . . . . 5--5
CACM Staff Start CS Students Off with Industry Best
Practices . . . . . . . . . . . . . . . 6--6
Vinton G. Cerf Cerf's up: Now for Something Entirely
Different . . . . . . . . . . . . . . . 7--7
Philip Guo Building Tools to Help Students Learn to
Program . . . . . . . . . . . . . . . . 8--9
Don Monroe Perovskites Boost Solar-Cell Potential 11--13
Samuel Greengard Gaming Machine Learning . . . . . . . . 14--16
Keith Kirkpatrick Parallel Computational Thinking . . . . 17--19
Peter J. Denning The Forgotten Engineer . . . . . . . . . 20--23
Louise Ann Lyon and
Jill Denner Community Colleges: A Resource for
Increasing Equity and Inclusion in
Computer Science Education . . . . . . . 24--26
George V. Neville-Neil Cold, Hard Cache . . . . . . . . . . . . 27--28
Stephen J. Andriole The Death of Big Software . . . . . . . 29--32
Ernest Davis Lousy Advice to the Lovelorn . . . . . . 33--35
Arvind Narayanan and
Jeremy Clark Bitcoin's Academic Pedigree . . . . . . 36--45
Pat Helland XML and JSON Are Like Cardboard . . . . 46--47
John Regehr and
Peter Bailis Research for Practice: Vigorous Public
Debates in Academic Computer Science . . 48--50
Martin E. Hellman Turing Lecture: Cybersecurity, Nuclear
Security, Alan Turing, and Illogical
Logic . . . . . . . . . . . . . . . . . 52--59
Ramiro Montealegre and
Wayne F. Cascio Technology-Driven Changes in Work and
Employment . . . . . . . . . . . . . . . 60--67
Gustavo Pinto and
Fernando Castor Energy Efficiency: A New Concern for
Application Software Developers . . . . 68--75
Aaron Roth Technical Perspective: Pricing
Information (and Its Implications) . . . 78--78
Chao Li and
Daniel Yang Li and
Gerome Miklau and
Dan Suciu A Theory of Pricing Private Data . . . . 79--86
James Larus Technical Perspective: A Simple, Elegant
Approach to Non-Numeric Parallelization 87--87
Simone Campanoni and
Kevin Brownell and
Svilen Kanev and
Timothy M. Jones and
Gu-Yeon Wei and
David Brooks Automatically Accelerating Non-Numerical
Programs by Architecture-Compiler
Co-Design . . . . . . . . . . . . . . . 88--97
Leah Hoffmann Last Byte: Grooming the Leaders of
Tomorrow . . . . . . . . . . . . . . . . 112, 111
Vinton G. Cerf Cerf's up: The role of archives in
digital preservation . . . . . . . . . . 7--7
Moshe Y. Vardi Vardi's insights: Computer professionals
for social responsibility . . . . . . . 9--9
CACM Staff Letters to the editor: A leap from
artificial to intelligence . . . . . . . 10--11
Mark R. Nelson BLOG@CACM: The big IDEA and the PD
pipeline . . . . . . . . . . . . . . . . 12--13
Gregory Mone News: Feeling sounds, hearing sights . . 15--17
Alex Wright News: Smartphone science . . . . . . . . 18--20
Marina Krakovsky News: The new jobs . . . . . . . . . . . 21--23
Michael A. Cusumano Technology strategy and management: The
sharing economy meets reality . . . . . 26--28
Chris Marsden Law and technology: How law and computer
science can work together to improve the
information society . . . . . . . . . . 29--31
Thomas Haigh Historical reflections: Defining
American greatness: IBM from Watson to
Trump . . . . . . . . . . . . . . . . . 32--37
Henry C. Lucas, Jr. Viewpoint: Technology and the failure of
the university . . . . . . . . . . . . . 38--41
Chitta Baral and
Shih-Fu Chang and
Brian Curless and
Partha Dasgupta and
Julia Hirschberg and
Anita Jones Viewpoint: Ask not what your postdoc can
do for you \ldots . . . . . . . . . . . 42--44
Antony Alappatt Network applications are interactive . . 46--53
Peter Alvaro and
Severine Tymon Abstracting the geniuses away from
failure testing . . . . . . . . . . . . 54--61
Jacob Loveless Cache me if you can . . . . . . . . . . 62--68
Michele Coscia Popularity spikes hurt future chances
for viral propagation of protomemes . . 70--77
Hemang Subramanian Decentralized blockchain-based
electronic marketplaces . . . . . . . . 78--84
Wojciech Mazurczyk and
Steffen Wendzel Information hiding: challenges for
forensic experts . . . . . . . . . . . . 86--94
David C. Parkes Moving spectrum: technical perspective 96--96
Neil Newman and
Alexandre Fréchette and
Kevin Leyton-Brown Deep optimization for spectrum repacking 97--104
Manuel Chakravarty Can high performance be portable?:
technical perspective . . . . . . . . . 105--105
Jonathan Ragan-Kelley and
Andrew Adams and
Dillon Sharlet and
Connelly Barnes and
Sylvain Paris and
Marc Levoy and
Saman Amarasinghe and
Frédo Durand Halide: decoupling algorithms from
schedules for high-performance image
processing . . . . . . . . . . . . . . . 106--115
Dennis Shasha Last byte: Polychromatic choreography 120--120
Don Gotterbarn and
Amy Bruckman and
Catherine Flick and
Keith Miller and
Marty J. Wolf ACM code of ethics and professional
conduct: ACM code of ethics: a guide for
positive action . . . . . . . . . . . . 121--128
Jodi L. Tims From the chair of ACM-W: Achieving
gender equity: ACM-W can't do it alone 5--5
Vinton G. Cerf Cerf's up: A comprehensive self-driving
car test . . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: Toward an
equation that anticipates AI risks . . . 8--9
John Arquilla and
Mark Guzdial BLOG@CACM: Protecting the power grid,
and finding bias in student evaluations 10--11
Chris Edwards News: Quantum technology forgoes
unconditional security to extend its
reach . . . . . . . . . . . . . . . . . 12--14
Neil Savage News: Going serverless . . . . . . . . . 15--16
Logan Kugler News: The war over the value of personal
data . . . . . . . . . . . . . . . . . . 17--19
Kevin Fu and
Wenyuan Xu Inside risks: Risks of trusting the
physics of sensors . . . . . . . . . . . 20--23
Sarah Wille and
Daphne Sajous-Brady Education: The inclusive and accessible
workplace . . . . . . . . . . . . . . . 24--26
George V. Neville-Neil Kode Vicious: Reducing the attack
surface . . . . . . . . . . . . . . . . 27--28
Jennifer Keating and
Illah Nourbakhsh Viewpoint: Teaching artificial
intelligence and humanity . . . . . . . 29--32
Shane Greenstein Viewpoint: Innovation from the edges . . 33--36
Andrew Leung and
Andrew Spyker and
Tim Bozarth Titus: introducing containers to the
Netflix cloud . . . . . . . . . . . . . 38--45
Albert Kwon and
James R. Wilcox and
Peter Bailis Research for practice: private online
communication; highlights in systems
verification . . . . . . . . . . . . . . 46--49
Kate Matsudaira Views from the top . . . . . . . . . . . 50--52
John Zysman and
Martin Kenney The next phase in the digital
revolution: intelligent tools,
platforms, growth, employment . . . . . 54--63
Vlasta Stavova and
Lenka Dedkova and
Martin Ukrop and
Vashek Matyas A large-scale comparative study of beta
testers and regular users . . . . . . . 64--71
Othon Michail and
Paul G. Spirakis Elements of the theory of dynamic
networks . . . . . . . . . . . . . . . . 72--72
Steve Zdancewic Building bug-free compilers: technical
perspective . . . . . . . . . . . . . . 83--83
Nuno P. Lopes and
David Menendez and
Santosh Nagarakatte and
John Regehr Practical verification of peephole
optimizations with Alive . . . . . . . . 84--91
Vincent Conitzer Designing algorithms and the fairness
criteria they should satisfy: technical
perspective . . . . . . . . . . . . . . 92--92
Kobi Gal and
Ariel D. Procaccia and
Moshe Mash and
Yair Zick Which is the fairest (rent division) of
them all? . . . . . . . . . . . . . . . 93--100
David Allen Batchelor Last byte: Welcome to the singularity 104--ff
Andrew A. Chien Editor's letter: Here comes everybody
\ldots to \booktitleCommunications . . . 5--5
Vinton G. Cerf Cerf's up: Unintended consequences . . . 7--7
Moshe Y. Vardi Vardi's insights: A declaration of the
dependence of cyberspace . . . . . . . . 9--9
CACM Staff Letters to the Editor: Keep the ACM Code
of Ethics as it is . . . . . . . . . . . 10--11
Mark Guzdial and
Bertrand Meyer BLOG@CACM: The costs and pleasures of a
computer science teacher . . . . . . . . 12--13
Samuel Greengard News: In pursuit of virtual life . . . . 15--17
Keith Kirkpatrick News: The construction industry in the
21st century . . . . . . . . . . . . . . 18--20
Esther Shein News: The state of fakery . . . . . . . 21--23
Ross Anderson Privacy and security: Making security
sustainable . . . . . . . . . . . . . . 24--26
Pamela Samuelson Legally speaking: Will the Supreme Court
nix reviews of bad patents? . . . . . . 27--29
Simon Rogerson Computing ethics: Ethics omission
increases gases emission . . . . . . . . 30--32
Peter J. Denning The profession of IT: The computing
profession . . . . . . . . . . . . . . . 33--35
Fred B. Schneider Viewpoint: Impediments with policy
interventions to foster cybersecurity 36--38
M. S. Silberman and
B. Tomlinson and
R. LaPlante and
J. Ross and
L. Irani and
A. Zaldivar Viewpoint: Responsible research with
crowds: pay crowdworkers at least
minimum wage . . . . . . . . . . . . . . 39--41
Hanna Wallach Viewpoint: Computational social science
$ \neq $ computer science $+$ social
data . . . . . . . . . . . . . . . . . . 42--44
Yonatan Sompolinsky and
Aviv Zohar Bitcoin's underlying incentives . . . . 46--53
Thomas A. Limoncelli Operational excellence in April Fools'
pranks . . . . . . . . . . . . . . . . . 54--57
Theo Schlossnagle Monitoring in a DevOps world . . . . . . 58--61
Matthias Felleisen and
Robert Bruce Findler and
Matthew Flatt and
Shriram Krishnamurthi and
Eli Barzilay and
Jay McCarthy and
Sam Tobin-Hochstadt A programmable programming language . . 62--71
Bran Knowles and
Vicki L. Hanson The wisdom of older technology
(non)users . . . . . . . . . . . . . . . 72--77
Tony Gorschek Evolution toward soft(er) products . . . 78--84
Benjamin Kuipers How can we trust a robot? . . . . . . . 86--95
Nicole Immorlica A graph-theoretic framework traces task
planning: technical perspective . . . . 98--98
Jon Kleinberg and
Sigal Oren Time-inconsistent planning: a
computational problem in behavioral
economics . . . . . . . . . . . . . . . 99--107
Kenny Paterson On Heartbleed: a hard beginnyng makth a
good endyng John Heywood (1497--1580):
technical perspective . . . . . . . . . 108--108
Liang Zhang and
David Choffnes and
Tudor Dumitras and
Dave Levin and
Alan Mislove and
Aaron Schulman and
Christo Wilson Analysis of SSL certificate reissues and
revocations in the wake of Heartbleed 109--116
Leah Hoffmann Last byte: The network effect . . . . . 120--ff
Andrew A. Chien Department: Editor's letter: Go big! . . 5--5
Vinton G. Cerf Department: Editor's letter: The sound
of programming . . . . . . . . . . . . . 6--6
Moshe Y. Vardi Departments: Open access and ACM . . . . 7--7
CACM Staff Letters to the editor: Predicting
failure of the university . . . . . . . 8--9
Jodi Tims and
Daniel A. Reed BLOG@CACM: Fostering inclusion, keeping
the net neutral . . . . . . . . . . . . 10--11
Neil Savage News: Always out of balance . . . . . . 12--14
Don Monroe News: Chips for artificial intelligence 15--17
Marina Krakovsky News: Artificial (emotional)
intelligence . . . . . . . . . . . . . . 18--19
Mari Sako Technology strategy and management:
Business ecosystems: how do they matter
for innovation? . . . . . . . . . . . . 20--22
George V. Neville-Neil Kode vicious: Popping kernels . . . . . 23--24
Sheldon H. Jacobson Viewpoint: Push versus pull . . . . . . 25--27
Stephen B. Wicker Viewpoint: Smartphones, contents of the
mind, and the Fifth Amendment . . . . . 28--31
Nicole Forsgren DevOps delivers . . . . . . . . . . . . 32--33
Jez Humble Continuous delivery sounds great, but
will it work here? . . . . . . . . . . . 34--39
Bridget Kromhout Containers will not fix your broken
culture (and other hard truths) . . . . 40--43
Nicole Forsgren and
Mik Kersten DevOps metrics . . . . . . . . . . . . . 44--48
Mila Gascó-Hernandez Building a smart city: lessons from
Barcelona . . . . . . . . . . . . . . . 50--57
Caitlin Sadowski and
Edward Aftandilian and
Alex Eagle and
Liam Miller-Cushon and
Ciera Jaspan Lessons from building static analysis
tools at Google . . . . . . . . . . . . 58--66
Francine Berman and
Rob Rutenbar and
Brent Hailpern and
Henrik Christensen and
Susan Davidson and
Deborah Estrin and
Michael Franklin and
Margaret Martonosi and
Padma Raghavan and
Victoria Stodden and
Alexander S. Szalay Realizing the potential of data science 67--72
Mordechai Guri and
Yuval Elovici Bridgeware: the air-gap malware . . . . 74--82
David M. Blei Expressive probabilistic models and
scalable method of moments: technical
perspective . . . . . . . . . . . . . . 84--84
Sanjeev Arora and
Rong Ge and
Yoni Halpern and
David Mimno and
Ankur Moitra and
David Sontag and
Yichen Wu and
Michael Zhu Learning topic models --- provably and
efficiently . . . . . . . . . . . . . . 85--93
Dennis Shasha Last byte: Finding October . . . . . . . 96--ff
Vinton G. Cerf Cerf's up: Turing test 2 . . . . . . . . 5--5
Jack Davidson and
Joseph Konstan and
Andrew A. Chien and
Scott Delman Editorial: Toward sustainable access:
where are we now? . . . . . . . . . . . 6--7
Moshe Y. Vardi Vardi's insights: How we lost the women
in computing . . . . . . . . . . . . . . 9--9
CACM Staff ACM's election: ACM's 2018 general
election: please take this opportunity
to vote . . . . . . . . . . . . . . . . 13--21
CACM Staff Letters to the editor: Get ACM (and
\booktitleCommunications) out of
politics . . . . . . . . . . . . . . . . 20--11
Edwin Torres and
Walid Saba BLOG@CACM: Commenting on code,
considering data's bottleneck . . . . . 24--25
Gregory Mone News: Shrinking machines, cellular
computers . . . . . . . . . . . . . . . 26--28
Neil Savage News: Using functions for easier
programming . . . . . . . . . . . . . . 29--30
Samuel Greengard News: Finding a healthier approach to
managing medical data . . . . . . . . . 31--33
Ryan Calo Law and technology: Is the law ready for
driverless cars? . . . . . . . . . . . . 34--36
Fred B. Schneider Privacy and security: Putting trust in
security engineering . . . . . . . . . . 37--39
Alexander Repenning Education: Scale or fail . . . . . . . . 40--42
Harold ``Bud'' Lawson Viewpoint: The march into the black hole
of complexity . . . . . . . . . . . . . 43--45
Margaret Martonosi Viewpoint: Science, policy, and service 46--48
Malte Schwarzkopf and
Peter Bailis Research for practice: cluster
scheduling for datacenters . . . . . . . 50--53
Stepán Davidovic and
Betsy Beyer Canary analysis service . . . . . . . . 54--62
Kate Matsudaira How is your week going so far? . . . . . 63--64
Josh Tenenberg and
Wolff-Michael Roth and
Donald Chinn and
Alfredo Jornet and
David Socha and
Skip Walter More than the code: learning rules of
rejection in writing programs . . . . . 66--71
Richard R. Brooks and
Lu Yu and
Yu Fu and
Oluwakemi Hambolu and
John Gaynard and
Julie Owono and
Archippe Yepmou and
Felix Blanc Internet freedom in West Africa:
technical support for journalists and
democracy advocates . . . . . . . . . . 72--82
Xiaonan Wang Data acquisition in vehicular ad hoc
networks . . . . . . . . . . . . . . . . 83--88
Björn W. Schuller Speech emotion recognition: two decades
in a nutshell, benchmarks, and ongoing
trends . . . . . . . . . . . . . . . . . 90--99
Oren Etzioni Technical perspective: Breaking the mold
of machine learning . . . . . . . . . . 102--102
T. Mitchell and
W. Cohen and
E. Hruschka and
P. Talukdar and
B. Yang and
J. Betteridge and
A. Carlson and
B. Dalvi and
M. Gardner and
B. Kisiel and
J. Krishnamurthy and
N. Lao and
K. Mazaitis and
T. Mohamed and
N. Nakashole and
E. Platanios and
A. Ritter and
M. Samadi and
B. Settles and
R. Wang and
D. Wijaya and
A. Gupta and
X. Chen and
A. Saparov and
M. Greaves and
J. Welling Never-ending learning . . . . . . . . . 103--115
Ken MacLeod Last byte: Free press . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: Celebrating excellence . . . 5--5
CACM Staff Letters to the editor: When to hold 'em 6--7
Mark Guzdial and
Susan Landau BLOG@CACM: Programming programming
languages, and analyzing Facebook's
failure . . . . . . . . . . . . . . . . 8--9
Neil Savage News: Rewarded for RISC . . . . . . . . 10--12
Chris Edwards News: Deep learning hunts for signals
among the noise . . . . . . . . . . . . 13--14
Keith Kirkpatrick News: $3$D sensors provide security,
better games . . . . . . . . . . . . . . 15--17
Logan Kugler News: Getting hooked on tech . . . . . . 18--19
Nicholas Weaver Inside risks: Risks of cryptocurrencies 20--24
Peter J. Denning The profession of IT: An interview with
Dave Parnas . . . . . . . . . . . . . . 25--27
George V. Neville-Neil Kode Vicious: Watchdogs vs. snowflakes 28--29
C. Le Goues and
Y. Brun and
S. Apel and
E. Berger and
S. Khurshid and
Y. Smaragdakis Viewpoint: Effectiveness of
anonymization in double-blind review . . 30--33
Diptanu Gon Choudhury and
Timothy Perrett Designing cluster schedulers for
Internet-scale services . . . . . . . . 34--40
Tobias Lauinger and
Abdelberi Chaabane and
Christo B. Wilson Thou shalt not depend on me . . . . . . 41--47
Thomas A. Limoncelli Documentation is automation . . . . . . 48--53
Ricardo Baeza-Yates Bias on the web . . . . . . . . . . . . 54--61
Jacob O. Wobbrock and
Krzysztof Z. Gajos and
Shaun K. Kane and
Gregg C. Vanderheiden Ability-based design . . . . . . . . . . 62--71
David Gefen and
Jake Miller and
Johnathon Kyle Armstrong and
Frances H. Cornelius and
Noreen Robertson and
Aaron Smith-McLallen and
Jennifer A. Taylor Identifying patterns in medical records
through latent semantic analysis . . . . 72--77
Daniel Genkin and
Dimitrios Papadopoulos and
Charalampos Papamanthou Privacy in decentralized
cryptocurrencies . . . . . . . . . . . . 78--88
Landon P. Cox Technical perspective: Measuring
optimization potential with Coz . . . . 90--90
Charlie Curtsinger and
Emery D. Berger Coz: finding code that counts with
causal profiling . . . . . . . . . . . . 91--99
Leah Hoffmann Last byte: RISC management . . . . . . . 104--ff
Vicki L. Hanson Departments: Reflections on my two years 5--5
Vinton G. Cerf Cerf's up: On neural networks . . . . . 7--7
Moshe Y. Vardi Vardi's insights: How the hippies
destroyed the Internet . . . . . . . . . 9--9
CACM Staff Letters to the editor: Teach the law
(and the AI) `foreseeability' . . . . . 10--11
Yegor Bugayenko BLOG@CACM: We are done with `hacking' 12--13
Logan Kugler News: Why cryptocurrencies use so much
energy: and what to do about it . . . . 15--17
Gary Anthes News: You've got mail! . . . . . . . . . 18--19
Keith Kirkpatrick News: Bringing the Internet to the
(developing) world . . . . . . . . . . . 20--21
Pamela Samuelson Legally speaking: Copyright blocks a
news-monitoring technology . . . . . . . 24--26
Hanna Halaburda Economic and business dimensions:
Blockchain revolution without the
blockchain? . . . . . . . . . . . . . . 27--29
Alex Ahmed Broadening participation: Beyond
diversity . . . . . . . . . . . . . . . 30--32
Osman Yasar Viewpoint: A new perspective on
computational thinking . . . . . . . . . 33--39
Josiah Dykstra and
Eugene H. Spafford Viewpoint: The case for disappearing
cyber security . . . . . . . . . . . . . 40--42
David Chisnall C is not a low-level language . . . . . 44--48
Kate Matsudaira How to come up with great ideas . . . . 49--51
Deepak Vasisht and
Peter Bailis Research for practice: toward a network
of connected things . . . . . . . . . . 52--54
Ian Goodfellow and
Patrick McDaniel and
Nicolas Papernot Making machine learning robust against
adversarial inputs . . . . . . . . . . . 56--66
Christoph Schneider and
Markus Weinmann and
Jan vom Brocke Digital nudging: guiding online user
choices through interface design . . . . 67--73
John Ousterhout Always measure one level deeper . . . . 74--83
Carlo Gabriel Porto Bellini The ABCs of effectiveness in the digital
society . . . . . . . . . . . . . . . . 84--91
Sharon Goldberg and
Ethan Heilman The rewards of selfish mining: technical
perspective . . . . . . . . . . . . . . 94--94
Ittay Eyal and
Emin Gün Sirer Majority is not enough: Bitcoin mining
is vulnerable . . . . . . . . . . . . . 95--102
Dennis Shasha Last byte: String wars . . . . . . . . . 104--104
James Larus and
Chris Hankin Informatics Europe and ACM Europe
Council: Regulating automated decision
making . . . . . . . . . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: Traceability . . . . . . . . 7--7
CACM Staff Letters to the editor: Encourage ACM to
address U.S. election integrity . . . . 10--11
Robin K. Hill BLOG@CACM: Assessing responsibility for
program output . . . . . . . . . . . . . 12--13
Chris Edwards News: Animals teach robots to find their
way . . . . . . . . . . . . . . . . . . 14--16
Don Monroe News: Electronics are leaving the plane 17--18
Esther Shein News: Broadening the path for women in
STEM . . . . . . . . . . . . . . . . . . 19--21
Kashif Ali and
Kurtis Heimerl Global computing: Designing sustainable
rural infrastructure through the lens of
OpenCellular . . . . . . . . . . . . . . 22--25
Mark Guzdial and
Amy Bruckman Education: Providing equitable access to
computing education . . . . . . . . . . 26--28
George V. Neville-Neil Kode vicious: Every silver lining has a
cloud . . . . . . . . . . . . . . . . . 29--30
Ehud Shapiro Pointg/counterpoint: democracy and
e-democracy: Point: foundations of
e-democracy . . . . . . . . . . . . . . 31--34
Douglas Schuler Point/counterpoint: democracy and
e-democracy: Counterpoint: e-democracy
won't save democracy. democracy will
save democracy . . . . . . . . . . . . . 34--36
Alex Petrov Algorithms behind modern storage systems 38--44
Dan Crankshaw and
Joseph Gonzalez and
Peter Bailis Research for practice:
prediction-serving systems . . . . . . . 45--49
Pat Helland Consistently eventual . . . . . . . . . 50--52
Emanuelle Burton and
Judy Goldsmith and
Nicholas Mattei How to teach computer ethics through
science fiction . . . . . . . . . . . . 54--64
Christina Delimitrou and
Christos Kozyrakis Amdahl's law for tail latency . . . . . 65--72
Jose M. Such and
Natalia Criado Multiparty privacy in social media . . . 74--81
John D. Owens Technical perspective: Graphs,
betweenness centrality, and the GPU . . 84--84
Adam McLaughlin and
David A. Bader Accelerating GPU betweenness centrality 85--92
William Sims Bainbridge Last byte: Deadlock . . . . . . . . . . 96--ff
Michael L. Best Global computing: Session details:
Global computing . . . . . . . . . . . . ??
Andrew A. Chien Editor's letter: Computer architecture:
disruption from above . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: The Peace of Westphalia . . . 6--6
Moshe Y. Vardi Vardi's insights: Move fast and break
things . . . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: Hippie values
really did build the Internet . . . . . 9--11
Yegor Bugayenko BLOG@CACM: Discovering bugs, or ensuring
success? . . . . . . . . . . . . . . . . 12--13
Don Monroe News: AI holds the better hand . . . . . 14--16
Gregory Mone News: Robotic implants . . . . . . . . . 17--18
Keith Kirkpatrick News: Borders in the cloud . . . . . . . 19--21
Alan R. Wagner and
Jason Borenstein and
Ayanna Howard Computing ethics: Overtrust in the
robotic age . . . . . . . . . . . . . . 22--24
Frank Pasquale Law and technology: When machine
learning is facially invalid . . . . . . 25--27
Peter J. Denning The profession of IT: Navigating with
accelerating technology change . . . . . 28--30
Adam Barker Viewpoint: An academic's observations
from a sabbatical at Google . . . . . . 31--33
Edward A. Lee Viewpoint: Is software the result of
top-down intelligent design or
evolution? . . . . . . . . . . . . . . . 34--36
Thomas A. Limoncelli GitOps: a path to more self-service IT 38--42
Noor Mubeen Workload frequency scaling law:
derivation and verification . . . . . . 43--47
Gustavo Alonso and
Peter Bailis Research for practice: FPGAs in
datacenters . . . . . . . . . . . . . . 48--49
Norman P. Jouppi and
Cliff Young and
Nishant Patil and
David Patterson A domain-specific architecture for deep
neural networks . . . . . . . . . . . . 50--59
Robert Perricone and
X. Sharon Hu and
Joseph Nahas and
Michael Niemier Can beyond-CMOS devices illuminate dark
silicon? . . . . . . . . . . . . . . . . 60--69
Slobodan Vucetic and
Ashis Kumar Chanda and
Shanshan Zhang and
Tian Bai and
Aniruddha Maiti Peer assessment of CS doctoral programs
shows strong correlation with faculty
citations . . . . . . . . . . . . . . . 70--76
Daniel J. Abadi and
Jose M. Faleiro An overview of deterministic database
systems . . . . . . . . . . . . . . . . 78--88
Romit Roy Choudhury Technical perspective: Is your WiFi a
sensor? . . . . . . . . . . . . . . . . 90--90
Mingmin Zhao and
Fadel Adib and
Dina Katabi Emotion recognition using wireless
signals . . . . . . . . . . . . . . . . 91--100
Dennis Shasha Last byte: Bounce blockchain . . . . . . 104--ff
Vinton G. Cerf Cerf's up: The Internet in the 21st
century . . . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the editor: Hennessy and
Patterson on the roots of RISC . . . . . 6--7
Amir Banifatemi BLOG@CACM: Can we use AI for global
good? . . . . . . . . . . . . . . . . . 8--9
Chris Edwards News: Floating voxels provide new hope
for $3$D displays . . . . . . . . . . . 11--13
Samuel Greengard News: Transient electronics take shape 14--16
Esther Shein News: The dangers of automating social
programs . . . . . . . . . . . . . . . . 17--19
Michael A. Cusumano Technology strategy and management: The
business of quantum computing . . . . . 20--22
Peter Swire Privacy and security: A pedagogic
cybersecurity framework . . . . . . . . 23--26
George V. Neville-Neil Kode vicious: The obscene coupling known
as spaghetti code . . . . . . . . . . . 27--28
Jean-François Abramatic and
Roberto Di Cosmo and
Stefano Zacchiroli Viewpoint: Building the universal
archive of source code . . . . . . . . . 29--31
Jordi Cabot and
Javier Luis Cánovas Izquierdo and
Valerio Cosentino Viewpoint: Are CS conferences (too)
closed communities? . . . . . . . . . . 32--34
Zachary C. Lipton The mythos of model interpretability . . 36--43
Kate Matsudaira The secret formula for choosing the
right next role . . . . . . . . . . . . 44--46
Pat Helland Mind your state for your state of mind 47--54
Adnan Darwiche Human-level intelligence or animal-like
abilities? . . . . . . . . . . . . . . . 56--67
Gerwin Klein and
June Andronick and
Matthew Fernandez and
Ihor Kuz and
Toby Murray and
Gernot Heiser Formally verified software in the real
world . . . . . . . . . . . . . . . . . 68--77
Quang ``Neo'' Bui and
Sean Hansen and
Manlu Liu and
Qiang (John) Tu The productivity paradox in health
information technology . . . . . . . . . 78--85
Bonnie Nardi and
Bill Tomlinson and
Donald J. Patterson and
Jay Chen and
Daniel Pargman and
Barath Raghavan and
Birgit Penzenstadler Computing within limits . . . . . . . . 86--93
John Baillieul A control theorist's view on reactive
control for autonomous drones: technical
perspective . . . . . . . . . . . . . . 95--95
Luca Mottola and
Kamin Whitehouse Fundamental concepts of reactive control
for autonomous drones . . . . . . . . . 96--104
Marc Snir The future of MPI: technical perspective 105--105
Robert Gerstenberger and
Maciej Besta and
Torsten Hoefler Enabling highly scalable remote memory
access programming with MPI-3 one sided 106--113
Leah Hoffmann Last byte: Reaping the benefits of a
diverse background . . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: The upper layers of the
internet . . . . . . . . . . . . . . . . 5--5
Moshe Y. Vardi Departments: Self-reference and section
230 . . . . . . . . . . . . . . . . . . 7--7
Carl Hewitt and
Vijay Kumar The gap in CS, mulling irrational
exuberance . . . . . . . . . . . . . . . 8--9
Don Monroe News: AI, explain yourself . . . . . . . 11--13
Neil Savage News: A new movement in seismology . . . 14--15
Samuel Greengard News: Weighing the impact of GDPR . . . 16--18
Pamela Samuelson Legally speaking: The EU's controversial
digital single market directive . . . . 20--23
Steven M. Bellovin and
Peter G. Neumann Inside risks: The big picture . . . . . 24--26
R. Benjamin Shapiro and
Rebecca Fiebrink and
Peter Norvig Education: How machine learning impacts
the undergraduate computing curriculum 27--29
C. Liaskos and
A. Tsioliaridou and
A. Pitsillides and
S. Ioannidis and
I. Akyildiz Viewpoint: Using any surface to realize
a new paradigm for wireless
communications . . . . . . . . . . . . . 30--33
Janne Lahtiranta and
Sami Hyrynsalmi Viewpoint: Crude and rude? . . . . . . . 34--35
Andrew A. Chien China region: Introducing
\booktitleCommunications' regional
special sections . . . . . . . . . . . . 36--37
Wenguang Chen and
Xiang-Yang Li China Region Special Section: Hot
Topics: Welcome to the China region
special section . . . . . . . . . . . . 38--38
Elliott Zaagman China Region Special Section: Hot
Topics: China's computing ambitions . . 40--41
Chao-Yang Lu and
Cheng-Zhi Peng and
Jian-Wei Pan China Region Special Section: Hot
Topics: Quantum communication at 7,600km
and beyond . . . . . . . . . . . . . . . 42--43
Jun Zhu and
Tiejun Huang and
Wenguang Chen and
Wen Gao China Region Special Section: Hot
Topics: The future of artificial
intelligence in China . . . . . . . . . 44--45
Peter Guy China Region Special Section: Hot
Topics: Consumers, corporations, and
government: computing in China . . . . . 46--47
San Zhang China Region Special Section: Hot
Topics: Regional computing culture and
personalities . . . . . . . . . . . . . 48--49
Xiang-Yang Li and
Jianwei Qian and
Xiaoyang Wang China Region Special Section: Hot
Topics: Can China lead the development
of data trading and sharing markets? . . 50--51
Luyi Xu China Region Special Section: Hot
Topics: Exploiting psychology and social
behavior for game stickiness . . . . . . 52--53
Wanli Min and
Liang Yu and
Lei Yu and
Shubo He China Region Special Section: Big
Trends: People logistics in smart cities 54--59
Hai Jin and
Haibo Chen and
Hong Gao and
Xiang-Yang Li and
Song Wu China Region Special Section: Big
Trends: Cloud bursting for the world's
largest consumer market . . . . . . . . 60--64
Yuan Qi and
Jing Xiao China Region Special Section: Big
Trends: Fintech: AI powers financial
services to improve people's lives . . . 65--69
Huaxia Xia and
Haiming Yang China Region Special Section: Big
Trends: Is last-mile delivery a `killer
app' for self-driving vehicles? . . . . 70--75
Yue Zhuge China Region Special Section: Big
Trends: Video consumption, social
networking, and influence . . . . . . . 76--81
Yutong Lu and
Depei Qian and
Haohuan Fu and
Wenguang Chen China Region Special Section: Big
Trends: Will supercomputers be
super-data and super-AI machines? . . . 82--87
Matt Fata and
Philippe-Joseph Arida and
Patrick Hahn and
Betsy Beyer Corp to cloud: Google's virtual desktops 88--94
Alex Ratner and
Chris Ré and
Peter Bailis Research for practice: knowledge base
construction in the machine-learning era 95--97
Silvia Esparrachiari Ghirotti and
Tanya Reilly and
Ashleigh Rentz Tracking and controlling microservice
dependencies . . . . . . . . . . . . . . 98--104
Ryen W. White Skill discovery in virtual assistants 106--113
Roberto Ierusalimschy and
Luiz Henrique De Figueiredo and
Waldemar Celes A look at the design of Lua . . . . . . 114--123
Diomidis Spinellis Modern debugging: the art of finding a
needle in a haystack . . . . . . . . . . 124--134
Daniel Waddington and
Jim Harris Software challenges for the changing
storage landscape . . . . . . . . . . . 136--145
Markus G. Kuhn Backdoor engineering: technical
perspective . . . . . . . . . . . . . . 147--147
Stephen Checkoway and
Jacob Maskiewicz and
Christina Garman and
Joshua Fried and
Shaanan Cohney and
Matthew Green and
Nadia Heninger and
Ralf-Philipp Weinmann and
Eric Rescorla and
Hovav Shacham Where did I leave my keys?: lessons from
the Juniper Dual EC incident . . . . . . 148--155
Tanzeem Choudhury Making sleep tracking more user
friendly: technical perspective . . . . 156--156
Anh Nguyen and
Raghda Alqurashi and
Zohreh Raghebi and
Farnoush Banaei-Kashani and
Ann C. Halbower and
Tam Vu LIBS: a bioelectrical sensing system
from human ears for staging whole-night
sleep study . . . . . . . . . . . . . . 157--165
Brian Clegg Last byte: Between the abbey and the
edge of time . . . . . . . . . . . . . . 176--ff
Vinton G. Cerf Cerf's up: Self-authenticating
identifiers . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the editor: Reclaim Internet
greatness . . . . . . . . . . . . . . . 7--8
John Arquilla and
Yegor Bugayenko BLOG@CACM: Securing agent 111, and the
job of software architect . . . . . . . 10--11
Chris Edwards News: Learning to see . . . . . . . . . 13--15
Keith Kirkpatrick News: Technology for the deaf . . . . . 16--18
Logan Kugler News: AI judges and juries . . . . . . . 19--21
Ted G. Lewis and
Peter J. Denning The profession of IT: Learning machine
learning . . . . . . . . . . . . . . . . 24--27
George V. Neville-Neil Kode vicious: A chance gardener . . . . 28--29
Oren Etzioni Point/counterpoint: Point: Should AI
technology be regulated?: yes, and
here's how . . . . . . . . . . . . . . . 30--32
Andrea O'Sullivan and
Adam Thierer Point/counterpoint: Counterpoint:
Regulators should allow the greatest
space for AI innovation . . . . . . . . 33--35
Ryen W. White Viewpoint: Opportunities and challenges
in search interaction . . . . . . . . . 36--38
Rich Bennett and
Craig Callahan and
Stacy Jones and
Matt Levine and
Merrill Miller and
Andy Ozment How to live in a post-Meltdown and
-Spectre world . . . . . . . . . . . . . 40--44
Shylaja Nukala and
Vivek Rau Why SRE documents matter . . . . . . . . 45--51
Kate Matsudaira How to get things done when you don't
feel like it . . . . . . . . . . . . . . 52--54
Junyeong Lee and
Jaylyn Jeonghyun Oh What motivates a citizen to take the
initiative in e-participation?: the case
of a South Korean parliamentary hearing 56--61
Bran Knowles and
Alison Smith-Renner and
Forough Poursabzi-Sangdeh and
Di Lu and
Halimat Alabi Uncertainty in current and future health
wearables . . . . . . . . . . . . . . . 62--67
Barbara J. Grosz and
Peter Stone A century-long commitment to assessing
artificial intelligence and its impact
on society . . . . . . . . . . . . . . . 68--73
Daniel McDuff and
Mary Czerwinski Designing emotionally sentient agents 74--83
Rajeev Alur and
Rishabh Singh and
Dana Fisman and
Armando Solar-Lezama Search-based program synthesis . . . . . 84--93
Tim Harris Technical perspective: Node replication
divides to conquer . . . . . . . . . . . 96--96
Irina Calciu and
Siddhartha Sen and
Mahesh Balakrishnan and
Marcos K. Aguilera How to implement any concurrent data
structure . . . . . . . . . . . . . . . 97--105
Anders Mòller Technical perspective: WebAssembly: a
quiet revolution of the web . . . . . . 106--106
Andreas Rossberg and
Ben L. Titzer and
Andreas Haas and
Derek L. Schuff and
Dan Gohman and
Luke Wagner and
Alon Zakai and
J. F. Bastien and
Michael Holman Bringing the web up to speed with
WebAssembly . . . . . . . . . . . . . . 107--115
Leah Hoffmann Last byte: Promoting common sense,
reality, dependable engineering . . . . 128--ff
Andrew A. Chien Editor's letter: Open collaboration in
an age of distrust . . . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: A people-centered economy . . 6--6
Moshe Y. Vardi Departments: Are we having an ethical
crisis in computing? . . . . . . . . . . 7--7
Judy Robertson BLOG@CACM: Answering children's
questions about computers . . . . . . . 8--9
Don Monroe News: Quantum leap . . . . . . . . . . . 10--12
Chris Edwards News: Hidden messages fool AI . . . . . 13--14
Esther Shein News: Who owns $3$D scans of historic
sites? . . . . . . . . . . . . . . . . . 15--17
Michal S. Gal Law and technology: Illegal pricing
algorithms . . . . . . . . . . . . . . . 18--20
Michael A. Cusumano Technology strategy and management:
CRISPR: an emerging platform for gene
editing . . . . . . . . . . . . . . . . 21--23
Thomas Haigh Historical reflections: Hey Google,
what's a moonshot?: how Silicon Valley
mocks Apollo . . . . . . . . . . . . . . 24--30
Niels Da Vitoria Lobo and
Mubarak A. Shah Viewpoint: UCF's 30-year REU site in
computer vision . . . . . . . . . . . . 31--34
Edward A. Lee Viewpoint: Modeling in engineering and
science . . . . . . . . . . . . . . . . 35--36
Alpha Lam Using remote cache service for Bazel . . 38--42
Jessie Frazelle Research for practice: security for the
modern age . . . . . . . . . . . . . . . 43--45
Thomas A. Limoncelli SQL is no excuse to avoid DevOps . . . . 46--49
Stefan Seidel and
Nicholas Berente and
Aron Lindberg and
Kalle Lyytinen and
Jeffrey V. Nickerson Autonomous tools and design: a
triple-loop approach to human-machine
learning . . . . . . . . . . . . . . . . 50--57
Sergio Orenga-Roglá and
Ricardo Chalmeta Framework for implementing a big data
ecosystem in organizations . . . . . . . 58--65
B. Jack Copeland and
Oron Shagrir The Church--Turing thesis: logical limit
or breachable barrier? . . . . . . . . . 66--74
Yolanda Gil and
Suzanne A. Pierce and
Hassan Babaie and
Arindam Banerjee and
Kirk Borne and
Gary Bust and
Michelle Cheatham and
Imme Ebert-Uphoff and
Carla Gomes and
Mary Hill and
John Horel and
Leslie Hsu and
Jim Kinter and
Craig Knoblock and
David Krum and
Vipin Kumar and
Pierre Lermusiaux and
Yan Liu and
Chris North and
Victor Pankratius and
Shanan Peters and
Beth Plale and
Allen Pope and
Sai Ravela and
Juan Restrepo and
Aaron Ridley and
Hanan Samet and
Shashi Shekhar Intelligent systems for geosciences: an
essential research agenda . . . . . . . 76--84
William Casey and
Ansgar Kellner and
Parisa Memarmoshrefi and
Jose Andre Morales and
Bud Mishra Deception, identity, and security: the
game theory of sybil attacks . . . . . . 85--93
Hao Li Photorealistic facial digitization and
manipulation: technical perspective . . 95--95
Justus Thies and
Michael Zollhöfer and
Marc Stamminger and
Christian Theobalt and
Matthias Nießner Face2Face: real-time face capture and
reenactment of RGB videos . . . . . . . 96--104
Dan Boneh Attacking cryptographic key exchange
with precomputation: technical
perspective . . . . . . . . . . . . . . 105--105
David Adrian and
Karthikeyan Bhargavan and
Zakir Durumeric and
Pierrick Gaudry and
Matthew Green and
J. Alex Halderman and
Nadia Heninger and
Drew Springall and
Emmanuel Thomé and
Luke Valenta and
Benjamin VanderSloot and
Eric Wustrow and
Santiago Zanella-Béguelin and
Paul Zimmermann Imperfect forward secrecy: how
Diffie--Hellman fails in practice . . . 106--114
Dennis Shasha Last byte: Randomized
anti-counterfeiting . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: Libraries considered
hazardous . . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the editor: Between the lines
in the China region special section . . 6--7
Herbert Bruderer and
Robin K. Hill BLOG@CACM: Seeking digital humanities,
IT tech support . . . . . . . . . . . . 8--9
Samuel Greengard News: A brave new world of genetic
engineering . . . . . . . . . . . . . . 11--13
Keith Kirkpatrick News: Technologizing agriculture . . . . 14--16
Logan Kugler News: Being recognized everywhere . . . 17--19
Carl Landwher Privacy and security: 2018: a big year
for privacy . . . . . . . . . . . . . . 20--22
Carol Frieze and
Jeria L. Quesenberry Broadening participation: How computer
science at CMU is attracting and
retaining women . . . . . . . . . . . . 23--26
George V. Neville-Neil Kode Vicious: Writing a test plan . . . 27--27
Dror G. Feitelson Viewpoint: Tony's law . . . . . . . . . 28--31
Enrico Nardelli Viewpoint: Do we really need
computational thinking? . . . . . . . . 32--35
CACM Staff CodeFlow: improving the code review
process at Microsoft . . . . . . . . . . 36--44
Kate Matsudaira The importance of a great finish . . . . 45--47
John L. Hennessy and
David A. Patterson A new golden age for computer
architecture . . . . . . . . . . . . . . 48--60
Chao Gao and
Zhen Su and
Jiming Liu and
Jürgen Kurths Even central users do not always drive
information diffusion . . . . . . . . . 61--67
Juan P. Bello and
Claudio Silva and
Oded Nov and
R. Luke Dubois and
Anish Arora and
Justin Salamon and
Charles Mydlarz and
Harish Doraiswamy SONYC: a system for monitoring,
analyzing, and mitigating urban noise
pollution . . . . . . . . . . . . . . . 68--77
Maurice Herlihy Blockchains from a distributed computing
perspective . . . . . . . . . . . . . . 78--85
Peter O'Hearn Separation logic . . . . . . . . . . . . 86--95
Thomas F. Wenisch How economic theories can help computers
beat the heat: technical perspective . . 97--97
Songchun Fan and
Seyed Majid Zahedi and
Benjamin C. Lee Distributed strategies for computational
sprints . . . . . . . . . . . . . . . . 98--106
Surajit Chaudhuri To do or not to do: extending SQL with
integer linear programming?: technical
perspective . . . . . . . . . . . . . . 107--107
Matteo Brucato and
Azza Abouzied and
Alexandra Meliou Scalable computation of high-order
optimization queries . . . . . . . . . . 108--116
David Allen Batchelor Last byte: Hawking's nightmare . . . . . 120--ff
Andrew A. Chien Editor's letter: Owning computing's
environmental impact . . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: Ownership vs. stewardship . . 6--6
Moshe Y. Vardi Departments: Lost in math? . . . . . . . 7--7
Mary Hall and
Richard Ladner and
Diane Levitt and
Manuel A. Pérez Quiñones and
Saurabh Bagchi BLOG@CACM: Smoothing the path to
computing: pondering uses for big data 8--9
Logan Kugler News: Building a better battery . . . . 11--13
Esther Shein News: Exoskeletons today . . . . . . . . 14--16
Keith Kirkpatrick News: Electronics need rare earths . . . 17--18
Pamela Samuelson Legally speaking: Questioning a new
intellectual property right for press
publishers . . . . . . . . . . . . . . . 20--23
Ofir Turel Economic and business dimensions:
Potential `dark sides' of leisure
technology use in youth . . . . . . . . 24--27
Peter J. Denning The profession of IT: An interview with
William Hugh Murray . . . . . . . . . . 28--30
Sepehr Vakil and
Jennifer Higgs Education: It's about power . . . . . . 31--33
Mike Tissenbaum and
Josh Sheldon and
Hal Abelson Viewpoint: From computational thinking
to computational action . . . . . . . . 34--36
Jim Waldo A hitchhiker's guide to the blockchain
universe . . . . . . . . . . . . . . . . 38--42
Kate Matsudaira Design patterns for managing up . . . . 43--45
Simson Garfinkel and
John M. Abowd and
Christian Martindale Understanding database reconstruction
attacks on public data . . . . . . . . . 46--53
Judea Pearl The seven tools of causal inference,
with reflections on machine learning . . 54--60
Zhi Quan Zhou and
Liqun Sun Metamorphic testing of driverless cars 61--67
Advaith Siddharthan and
Kapila Ponnamperuma and
Chris Mellish and
Chen Zeng and
Daniel Heptinstall and
Annie Robinson and
Stuart Benn and
René Van Der Wal Blogging birds: telling informative
stories about the lives of birds from
telemetric data . . . . . . . . . . . . 68--77
Pamela Zave and
Jennifer Rexford The compositional architecture of the
Internet . . . . . . . . . . . . . . . . 78--87
Tim Roughgarden Beyond worst-case analysis . . . . . . . 88--96
Martin C. Rinard Technical perspective: Borrowing big
code to automate programming activities 98--98
Veselin Raychev and
Martin Vechev and
Andreas Krause Predicting program properties from `big
code' . . . . . . . . . . . . . . . . . 99--107
Nisheeth K. Vishnoi Technical perspective: Isolating a
matching when your coins go missing . . 108--108
Stephen Fenner and
Rohit Gurjar and
Thomas Thierauf A deterministic parallel algorithm for
bipartite perfect matching . . . . . . . 109--115
Leah Hoffmann Last byte: Guiding computers, robots to
see and think . . . . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: In debt to the NSF . . . . . 5--5
Robin K. Hill and
Mark Guzdial BLOG@CACM: Pondering variables and
direct instruction . . . . . . . . . . . 6--6
Chris Edwards News: Soft robots look to new
environments . . . . . . . . . . . . . . 9--9
Samuel Greengard News: The future of data storage . . . . 12--12
Sarah Underwood News: The fine line between coercion and
care . . . . . . . . . . . . . . . . . . 15--15
Mari Sako Technology strategy and management: Free
trade in a digital world . . . . . . . . 18--18
George V. Neville-Neil Kode Vicious: Know your algorithms . . . 22--22
Dirk Lewandowski Viewpoint: The web is missing an
essential part of infrastructure: an
open web index . . . . . . . . . . . . . 24--24
Panagiota Fatourou and
Chris Hankin Europe region: Welcome to the Europe
region special section . . . . . . . . . 28--28
Lisa Korrigane Europe Region Special Section: Hot
topics: A demographic snapshot of the IT
workforce in Europe . . . . . . . . . . 32--32
David Pringle Europe Region Special Section: Hot
topics: Enterprises lead ICT innovation
in Europe . . . . . . . . . . . . . . . 34--34
David Pringle Europe Region Special Section: Hot
topics: Europe's ambitious ICT agenda 35--35
David Pringle Europe Region Special Section: Hot
topics: Europe's well-connected
consumers . . . . . . . . . . . . . . . 36--36
Laurence Kalman Europe Region Special Section: Hot
topics: New European data privacy and
cyber security laws: one year later . . 38--38
Jan Gulliksen Europe Region Special Section: Hot
topics: Incorporating Europe's values in
future research . . . . . . . . . . . . 40--40
Koen De Bosschere and
Marc Duranton and
Madeleine Gray Europe Region Special Section: Hot
topics: HiPEAC: a European network built
to last . . . . . . . . . . . . . . . . 42--42
Joaquim Jorge and
Mashhuda Glencross and
Aaron Quigley Europe Region Special Section: Hot
topics: ACM Europe Council's best paper
awards . . . . . . . . . . . . . . . . . 44--44
Julie A. McCann and
Gian Pietro Picco and
Alex Gluhak and
Karl Henrik Johansson and
Martin Törngren and
Laila Gide Europe Region Special Section: Big
trends: Connected things connecting
Europe . . . . . . . . . . . . . . . . . 46--46
Panagiota Fatourou and
Yota Papageorgiou and
Vasiliki Petousi Europe Region Special Section: Big
trends: Women are needed in STEM:
European policies and incentives . . . . 52--52
Michael E. Caspersen and
Judith Gal-Ezer and
Andrew McGettrick and
Enrico Nardelli Europe Region Special Section: Big
trends: Informatics as a fundamental
discipline for the 21st century . . . . 58--58
Paola Inverardi Europe Region Special Section: Big
trends: The European perspective on
responsible computing . . . . . . . . . 64--64
Thomas Skordas Europe Region Special Section: Big
trends: Toward a European exascale
ecosystem: the EuroHPC joint undertaking 70--70
Steffen Staab and
Susan Halford and
Wendy Hall Europe Region Special Section: Big
trends: Web science in Europe: beyond
boundaries . . . . . . . . . . . . . . . 74--74
Pat Helland Identity by any other name . . . . . . . 80--80
Benjamin Treynor Sloss and
Shylaja Nukala and
Vivek Rau Metrics that matter . . . . . . . . . . 88--88
Nitesh Mor Research for practice: edge computing 95--95
Vijay Khatri and
Binny M. Samuel Analytics for managerial work . . . . . 100--100
James B. Aimone Neural algorithms and computing beyond
Moore's law . . . . . . . . . . . . . . 110--110
Petros Wallden and
Elham Kashefi Cyber security in the quantum era . . . 120--120
Gilles Brassard Technical perspective: Was Edgar Allan
Poe wrong after all? . . . . . . . . . . 132--132
Umesh Vazirani and
Thomas Vidick Fully device independent quantum key
distribution . . . . . . . . . . . . . . 133--133
Dennis Shasha Last byte: Fighting for lava . . . . . . 144--144
Vinton G. Cerf Cerf's up: APIs, standards, and enabling
infrastructure . . . . . . . . . . . . . 5--5
Moshe Y. Vardi Departments: Quantum hype and quantum
skepticism . . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: Don't ignore the
cost of `embedded energy' . . . . . . . 10--11
Ryan Carrier BLOG@CACM: Implementing guidelines for
governance, oversight of AI, and
automation . . . . . . . . . . . . . . . 12--13
Chris Edwards News: Questioning quantum . . . . . . . 15--17
Neil Savage News: Code talkers . . . . . . . . . . . 18--19
Samuel Greengard News: Deep insecurities: the Internet of
Things shifts technology risk . . . . . 20--22
James Grimmelmann Law and technology: Continuity and
change in Internet law . . . . . . . . . 24--26
Joan Feigenbaum Privacy and security: Encryption and
surveillance . . . . . . . . . . . . . . 27--29
Emmanuel Schanzer and
Shriram Krishnamurthi and
Kathi Fisler Education: What does it mean for a
computing curriculum to succeed? . . . . 30--32
Alberto Bartoli and
Eric Medvet and
Andrea De Lorenzo and
Fabiano Tarlao Viewpoint: Enterprise wi-fi: we need
devices that are secure by default . . . 33--35
Raymond Blum and
Betsy Beyer Achieving digital permanence . . . . . . 36--42
Martin Kleppmann and
Alastair R. Beresford and
Boerge Svingen Online event processing . . . . . . . . 43--49
Aleksandar Kuzmanovic Net neutrality: unexpected solution to
blockchain scaling . . . . . . . . . . . 50--55
Fay Cobb Payton and
Eleni Berki Countering the negative image of women
in computing . . . . . . . . . . . . . . 56--63
Yongge Wang and
Qutaibah M. Malluhi The limit of blockchains: infeasibility
of a smart Obama--Trump contract . . . . 64--69
Rod Downey and
Denis R. Hirschfeldt Algorithmic randomness . . . . . . . . . 70--80
Zachary G. Ives Technical perspective: Compressing
matrices for large-scale machine
learning . . . . . . . . . . . . . . . . 82--82
Ahmed Elgohary and
Matthias Boehm and
Peter J. Haas and
Frederick R. Reiss and
Berthold Reinwald Compressed linear algebra for
declarative large-scale machine learning 83--91
Ken MacLeod Last byte: Like old times . . . . . . . 96--ff
Cherri M. Pancake Editor's letter: ACM awards honor CS
contributions . . . . . . . . . . . . . 5--5
Vinton G. Cerf Cerf's up: Back to the future . . . . . 7--7
Mark Guzdial and
John Arquilla BLOG@CACM: Is CS really for all, and
defending democracy in cyberspace . . . 8--9
Neil Savage News: Neural net worth . . . . . . . . . 10--12
Gary Anthes News: Lifelong learning in artificial
neural networks . . . . . . . . . . . . 13--15
Logan Kugler The Trouble with SMS Two-Factor
Authentication . . . . . . . . . . . . . 14--14
Don Monroe News: And then, there were three . . . . 16--18
Keith Kirkpatrick News: Ethics in technology jobs . . . . 19--20
Linnet Taylor Global computing: Global data justice 22--24
A. T. Markettos and
R. N. M. Watson and
S. W. Moore and
P. Sewell and
P. G. Neumann Inside risks: Through computer
architecture, darkly . . . . . . . . . . 25--27
Peter J. Denning The profession of IT: An interview with
David Brin on resiliency . . . . . . . . 28--31
Thomas Pasquier and
David Eyers and
Jean Bacon Viewpoint: Personal data and the
Internet of Things . . . . . . . . . . . 32--34
Ulan Degenbaev and
Michael Lippautz and
Hannes Payer Garbage collection as a joint venture 36--41
Kate Matsudaira How to create a great team culture (and
why it matters) . . . . . . . . . . . . 42--44
Zachary C. Lipton and
Jacob Steinhardt Research for practice: troubling trends
in machine-learning scholarship . . . . 45--53
Jaeyoung Do and
Sudipta Sengupta and
Steven Swanson Programmable solid-state storage in
future cloud datacenters . . . . . . . . 54--62
O. Sami Saydjari Engineering trustworthy systems: a
principled approach to cybersecurity . . 63--69
Daniel S. Weld and
Gagan Bansal The challenge of crafting intelligible
intelligence . . . . . . . . . . . . . . 70--79
Rishiyur S. Nikhil Technical perspective: back to the edge 82--82
Tony Nowatzki and
Vinay Gangadhar and
Karthikeyan Sankaralingam Heterogeneous Von Neumann/dataflow
microprocessors . . . . . . . . . . . . 83--91
Leah Hoffmann Last byte: Reaching new heights with
artificial neural networks . . . . . . . 96--ff
Andrew A. Chien Editor's letter: Halfway round!: growing
the regional special sections . . . . . 5--5
Vinton G. Cerf Cerf's up: Back to the future, part II 6--6
Moshe Y. Vardi Departments: To serve humanity . . . . . 7--7
Gloria Townsend and
Sheldon Waite BLOG@CACM: Bringing more women,
immigrants, to computer science . . . . 8--9
Erica Klarreich News: Good algorithms make good
neighbors . . . . . . . . . . . . . . . 11--13
Keith Kirkpatrick News: The edge of computational
photography . . . . . . . . . . . . . . 14--16
Logan Kugler News: Protecting the 2020 census . . . . 17--19
Pamela Samuelson Legally speaking: API copyrights
revisited . . . . . . . . . . . . . . . 20--22
Susan J. Winter Computing ethics: Who benefits? . . . . 23--25
David Nordfors and
Chally Grundwag and
V. R. Ferose Broadening participation: A new labor
market for people with 'coolabilities' 26--28
Emery Berger and
Stephen M. Blackburn and
Carla Brodley and
H. V. Jagadish and
Kathryn S. McKinley and
Mario A. Nascimento and
Minjeong Shin and
Kuansan Wang and
Lexing Xie Viewpoint: GOTO rankings considered
helpful . . . . . . . . . . . . . . . . 29--30
Pat Helland Extract, shoehorn, and load . . . . . . 32--33
Thomas A. Limoncelli The top 10 things executives should know
about software . . . . . . . . . . . . . 34--40
CACM Staff Access controls and healthcare records:
who owns the data? . . . . . . . . . . . 41--46
Micah Beck On the hourglass model . . . . . . . . . 48--57
Christopher Frauenberger and
Peter Purgathofer Ways of thinking in informatics . . . . 58--64
Nguyen Khoi Tran and
Quan Z. Sheng and
M. Ali Babar and
Lina Yao and
Wei Emma Zhang and
Schahram Dustdar Internet of Things search engine . . . . 66--73
Pedro Domingos and
Daniel Lowd Unifying logical and statistical AI with
Markov logic . . . . . . . . . . . . . . 74--83
Costin Raiciu Technical perspective: Do you know why
your web pages load faster? . . . . . . 85--85
Arash Molavi Kakhki and
Samuel Jero and
David Choffnes and
Cristina Nita-Rotaru and
Alan Mislove Taking a long look at QUIC: an approach
for rigorous evaluation of rapidly
evolving transport protocols . . . . . . 86--94
Dennis Shasha Last byte: Opioid games . . . . . . . . 96--ff
Cherri M. Pancake From the President: Dispelling common
myths about ACM awards and honors . . . 5--5
Vinton G. Cerf Cerf's up: Undo, redo, and regrets . . . 7--7
CACM Staff Letters to the editor: A case against
mission-critical applications of machine
learning . . . . . . . . . . . . . . . . 9--9
Mark Guzdial BLOG@CACM: Cutting the wait for CS
advice . . . . . . . . . . . . . . . . . 12--13
Samuel Greengard News: The algorithm that changed quantum
machine learning . . . . . . . . . . . . 15--17
Don Monroe News: I don't understand my car . . . . 18--19
Gregory Mone News: What makes a robot likable? . . . 20--21
David Weintrop Education: Block-based programming in
computer science education . . . . . . . 22--25
Marshall W. Van Alstyne Economic and business dimensions: A
response to fake news as a response to
Citizens United . . . . . . . . . . . . 26--29
George V. Neville-Neil Kode vicious: MUST and MUST NOT . . . . 30--31
Marco Aiello Viewpoint: The success of the web: a
triumph of the amateurs . . . . . . . . 32--34
Natasha Noy and
Yuqing Gao and
Anshu Jain and
Anant Narayanan and
Alan Patterson and
Jamie Taylor Industry-scale knowledge graphs: lessons
and challenges . . . . . . . . . . . . . 36--43
Anna Wiedemann and
Nicole Forsgren and
Manuel Wiesche and
Heiko Gewald and
Helmut Krcmar Research for practice: the DevOps
phenomenon . . . . . . . . . . . . . . . 44--49
Kate Matsudaira Overly attached . . . . . . . . . . . . 50--52
Barbara J. Grosz and
David Gray Grant and
Kate Vredenburgh and
Jeff Behrends and
Lily Hu and
Alison Simmons and
Jim Waldo Embedded EthiCS: integrating ethics
across CS education . . . . . . . . . . 54--61
Dino Distefano and
Manuel Fähndrich and
Francesco Logozzo and
Peter W. O'Hearn Scaling static analyses at Facebook . . 62--70
Jakob E. Bardram and
Steven Jeuris and
Paolo Tell and
Steven Houben and
Stephen Voida Activity-centric computing systems . . . 72--81
Emilio Ferrara The history of digital spam . . . . . . 82--91
Graham Cormode Technical perspective: the true cost of
popularity . . . . . . . . . . . . . . . 94--94
Kasper Green Larsen and
Jelani Nelson and
Huy L. Nguy\~ên and
Mikkel Thorup Heavy hitters via cluster-preserving
clustering . . . . . . . . . . . . . . . 95--100
William Sims Bainbridge Last byte: Fluid democracy . . . . . . . 104--ff
Andrew A. Chien Editor's letter: Sustaining open
collaboration in universities . . . . . 5--5
Vinton G. Cerf Cerf's up: Polyglot! . . . . . . . . . . 6--6
Moshe Y. Vardi Departments: The long game of research 7--7
CACM Staff Letters to the editor: On being `random
enough' . . . . . . . . . . . . . . . . 9--9
Yegor Bugayenko and
Mark Guzdial BLOG@CACM: Why programmers should curb
their enthusiasm, and thinking about
computational thinking . . . . . . . . . 10--11
Samuel Greengard News: An inability to reproduce . . . . 13--15
Gary Anthes News: Augmented reality gets real . . . 16--18
Sarah Underwood News: Can you locate your location data? 19--21
Eric Goldman Law and technology: Internet immunity
and the freedom to code . . . . . . . . 22--24
Hilarie Orman Privacy and security: Online voting: we
can do it! (we have to) . . . . . . . . 25--27
Peter J. Denning and
Andrew Odlyzko The profession of IT: An interview with
Andrew Odlyzko on cyber security . . . . 28--30
David Auerbach Viewpoint: Bitwise: a life in code . . . 31--33
Russ Cox Surviving software dependencies . . . . 36--43
Tom Killalea Velocity in software engineering . . . . 44--47
Shaul Kfir and
Camille Fournier DAML: the contract language of
distributed ledgers . . . . . . . . . . 48--54
Carla Gomes and
Thomas Dietterich and
Christopher Barrett and
Jon Conrad and
Bistra Dilkina and
Stefano Ermon and
Fei Fang and
Andrew Farnsworth and
Alan Fern and
Xiaoli Fern and
Daniel Fink and
Douglas Fisher and
Alexander Flecker and
Daniel Freund and
Angela Fuller and
John Gregoire and
John Hopcroft and
Steve Kelling and
Zico Kolter and
Warren Powell and
Nicole Sintov and
John Selker and
Bart Selman and
Daniel Sheldon and
David Shmoys and
Milind Tambe and
Weng-Keen Wong and
Christopher Wood and
Xiaojian Wu and
Yexiang Xue and
Amulya Yadav and
Abdul-Aziz Yakubu and
Mary Lou Zeeman Computational sustainability: computing
for a better world and a sustainable
future . . . . . . . . . . . . . . . . . 56--65
Daniel Jackson Alloy: a language and tool for exploring
software designs . . . . . . . . . . . . 66--76
Jason Freeman and
Brian Magerko and
Doug Edwards and
Tom Mcklin and
Taneisha Lee and
Roxanne Moore EarSketch: engaging broad populations in
computing through music . . . . . . . . 78--85
Yossi Gilad Metadata-private communication for the
99% . . . . . . . . . . . . . . . . . . 86--93
Sylvain Lefebvre From virtual worlds to digital
fabrication: technical perspective . . . 96--96
Kiril Vidimce and
Szu-Po Wang and
Jonathan Ragan-Kelley and
Wojciech Matusik OpenFab: a programmable pipeline for
multimaterial fabrication . . . . . . . 97--105
Leah Hoffmann Last byte: Inspired by the home of the
future . . . . . . . . . . . . . . . . . 112--ff
Cherri M. Pancake From the President: How ACM evolves in
response to community needs . . . . . . 5--5
Vinton G. Cerf Cerf's up: AI is not an excuse! . . . . 7--7
Robin K. Hill and
Edwin Torres BLOG@CACM: Pinning down variables, and
taking an agile approach . . . . . . . . 8--9
Don Monroe News: Closing in on quantum error
correction . . . . . . . . . . . . . . . 11--13
Keith Kirkpatrick News: Protecting industrial control
systems . . . . . . . . . . . . . . . . 14--16
Esther Shein News: The CS teacher shortage . . . . . 17--18
Michael A. Cusumano Technology strategy and management: The
cloud as an innovation platform for
software development . . . . . . . . . . 20--22
Peter G. Neumann Inside risks: How might we increase
system trustworthiness? . . . . . . . . 23--25
George V. Neville-Neil Kode Vicious: What is a chief security
officer good for? . . . . . . . . . . . 26--27
Ryen W. White and
Adam Fourney and
Allen Herring and
Paul N. Bennett and
Nirupama Chandrasekaran and
Robert Sim and
Elnaz Nouri and
Mark J. Encarnación Viewpoint: Multi-device digital
assistance . . . . . . . . . . . . . . . 28--31
Jesse Frazelle Open source firmware . . . . . . . . . . 34--38
Thomas A. Limoncelli Demo data as code . . . . . . . . . . . 39--41
Kate Matsudaira The evolution of management . . . . . . 42--47
Justine S. Hastings and
Mark Howison and
Ted Lawless and
John Ucles and
Preston White Unlocking data to improve public policy 48--53
Oren Salzman Sampling-based robot motion planning . . 54--63
Jennifer Mankoff and
Megan Hofmann and
Xiang 'Anthony' Chen and
Scott E. Hudson and
Amy Hurst and
Jeeeun Kim Consumer-grade fabrication and its
potential to revolutionize accessibility 64--75
Mark A. Hallen and
Bruce R. Donald Protein design by provable algorithms 76--84
Andrew W. Appel The scalability of CertiKOS: technical
perspective . . . . . . . . . . . . . . 88--88
Ronghui Gu and
Zhong Shao and
Hao Chen and
Jieung Kim and
Jérémie Koenig and
Xiongnan (Newman) Wu and
Vilhelm Sjöberg and
David Costanzo Building certified concurrent OS kernels 89--99
Dennis Shasha Last byte: Dust wars . . . . . . . . . . 104--ff
Vinton G. Cerf Cerf's up: Hazards of the information
superhighway . . . . . . . . . . . . . . 5--5
Moshe Y. Vardi Departments: The winner-takes-all tech
corporation . . . . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: You can publish
it!: (you have to) . . . . . . . . . . . 8--9
Yegor Bugayenko BLOG@CACM: The benefits of indolence . . 10--11
Don Monroe News: Information is physics . . . . . . 13--15
Samuel Greengard News: When drones fly . . . . . . . . . 16--18
Logan Kugler News: Real-world applications for drones 19--21
Pamela Samuelson Legally speaking: Europe's controversial
digital copyright directive finalized 24--27
Mark Guzdial and
Alan Kay and
Cathie Norris and
Elliot Soloway Education: Computational thinking should
just be good thinking . . . . . . . . . 28--30
George Varghese Interview: An interview with Leonard
Kleinrock . . . . . . . . . . . . . . . 31--36
Selena Silva and
Martin Kenney Viewpoint: Algorithms, platforms, and
ethnic bias . . . . . . . . . . . . . . 37--39
P. J. Narayanan and
Pankaj Jalote and
Anand Deshpande India Region Special Section: Welcome to
the India region special section . . . . 40--42
Manik Varma India Region Special Section: Hot
topics: Extreme classification . . . . . 44--45
Maryam Mustafa and
Amna Batool and
Agha Ali Raza India Region Special Section: Hot
topics: Designing ICT interventions for
women in Pakistan . . . . . . . . . . . 46--47
Jayant R. Haritsa and
S. Sudarshan India Region Special Section: Hot
topics: Turbocharging database query
processing and testing . . . . . . . . . 48--49
Neeta Verma and
Savita Dawar India Region Special Section: Hot
topics: Digital transformation in the
Indian government . . . . . . . . . . . 50--53
Vipul Shah India Region Special Section: Hot
topics: CSpathshala: bringing
computational thinking to schools . . . 54--55
Ajit Samaranayake and
Sampath Tilakumara and
Thayaparan Sripavan and
Rasika Withanawasam India Region Special Section: Hot
topics: Creative disruption in fintech
from Sri Lanka . . . . . . . . . . . . . 56--57
C. V. Jawahar and
Venkata N. Padmanabhan India Region Special Section: Hot
topics: Technology interventions for
road safety and beyond . . . . . . . . . 58--59
Shashank Srikant and
Rohit Takhar and
Vishal Venugopal and
Varun Aggarwal India Region Special Section: Hot
topics: Skill evaluation . . . . . . . . 60--61
Gautam Shroff and
K. Ananth Krishnan India Region Special Section: Hot
topics: Computing research at Tata
Consultancy Services . . . . . . . . . . 62--63
Pankaj Jalote and
Pari Natarajan India Region Special Section: Big
trends: The growth and evolution of
India's software industry . . . . . . . 64--69
Pushpak Bhattacharyya and
Hema Murthy and
Surangika Ranathunga and
Ranjiva Munasingh India Region Special Section: Big
trends: Indic language computing . . . . 70--75
Vivek Raghavan and
Sanjay Jain and
Pramod Varma India Region Special Section: Big
trends: India stack --- digital
infrastructure as public good . . . . . 76--81
Subhashis Banerjee and
Subodh Sharma India Region Special Section: Big
trends: Privacy concerns with Aadhaar 80--80
Charles Assisi and
Avinash Raghava and
NS Ramnath India Region Special Section: Big
trends: The rise of the Indian start-up
ecosystem . . . . . . . . . . . . . . . 82--87
Supratik Chakraborty and
Vasudeva Varma India Region Special Section: Big
trends: Highlights of software R&D in
India . . . . . . . . . . . . . . . . . 88--91
Meena Mahajan and
Madhavan Mukund and
Nitin Saxena India Region Special Section: Big
trends: Research in theoretical computer
science . . . . . . . . . . . . . . . . 92--95
Niloy Ganguly and
Ponnurangam Kumaraguru India Region Special Section: Big
trends: The positive and negative
effects of social media in India . . . . 98--99
Aditya Vashistha and
Umar Saif and
Agha Ali Raza India Region Special Section: Big
trends: The Internet of the orals . . . 100--103
Michelle Vaccaro and
Jim Waldo The effects of mixing machine learning
and human judgment . . . . . . . . . . . 104--110
Pat Helland The trade-offs between write and read 111--113
Raja Appuswamy and
Goetz Graefe and
Renata Borovica-Gajic and
Anastasia Ailamaki The five-minute rule 30 years later and
its impact on the storage hierarchy . . 114--120
Yan Pei and
Swarnendu Biswas and
Donald S. Fussell and
Keshav Pingali An elementary introduction to Kalman
filtering . . . . . . . . . . . . . . . 122--133
David G. Andersen A whitebox solution for blackbox-like
behaviors: technical perspective . . . . 136--136
Kexin Pei and
Yinzhi Cao and
Junfeng Yang and
Suman Jana DeepXplore: automated whitebox testing
of deep learning systems . . . . . . . . 137--145
Anonymous Last byte: Cantando con la Corrente
(singing with current) . . . . . . . . . 160--ff
Cherri M. Pancake Editor's letter: Engaging future
generations of ACM leaders . . . . . . . 5--5
Vinton G. Cerf Cerf's up: A hands-free ride . . . . . . 7--7
CACM Staff Letters to the Editor: Online voting
still security pipedream . . . . . . . . 9--9
Mark Guzdial and
Robin K. Hill BLOG@CACM: Getting high school, college
students interested in CS . . . . . . . 10--11
Chris Edwards News: Malevolent machine learning . . . 13--15
Paul Marks News: Robots aim to boost astronaut
efficiency . . . . . . . . . . . . . . . 16--18
Keith Kirkpatrick News: Regulating information technology 19--21
David M. Douglas Computing ethics: Should researchers use
data from security breaches? . . . . . . 22--24
George V. Neville-Neil Kode vicious: Koding academies . . . . . 25--25
Peter J. Denning and
Ted G. Lewis The profession of IT: Uncertainty . . . 26--28
Beth Simone Noveck Viewpoint: Public entrepreneurship and
policy engineering . . . . . . . . . . . 29--31
Ariana Mirian Hack for hire . . . . . . . . . . . . . 32--37
Thomas A. Limoncelli API practices if you hate your customers 38--42
Paul Castro and
Vatche Ishakian and
Vinod Muthusamy and
Aleksander Slominski The rise of serverless computing . . . . 44--54
Claire Le Goues and
Michael Pradel and
Abhik Roychoudhury Automated program repair . . . . . . . . 56--65
Moshe Tennenholtz and
Oren Kurland Rethinking search engines and
recommendation systems: a game theoretic
perspective . . . . . . . . . . . . . . 66--75
Michael B. Taylor Bootstrapping a future of open source,
specialized hardware: technical
perspective . . . . . . . . . . . . . . 78--78
Jonathan Balkind and
Michael McKeown and
Yaosheng Fu and
Tri Nguyen and
Yanqi Zhou and
Alexey Lavrov and
Mohammad Shahrad and
Adi Fuchs and
Samuel Payne and
Xiaohua Liang and
Matthew Matl and
David Wentzlaff OpenPiton: an open source hardware
platform for your research . . . . . . . 79--87
Leah Hoffmann Last byte: RISCy beginnings . . . . . . 96--ff