Last update:
Thu Apr 25 08:15:17 MDT 2024
Moshe Y. Vardi Editor's letter: More debate, please! 5--5 CACM Staff Letters to the Editor: Software still as much an art as science . . . . . . . . . 7--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Wendy Hall ACM's annual report . . . . . . . . . . 9--13 Greg Linden and Ruben Ortega and Jason Hong blog@CACM: Software engineering, smartphones and health systems, and security warnings . . . . . . . . . . . 16--17 David Roman CACM online: The corollary of empowerment . . . . . . . . . . . . . . 18--18 Tom Geller News: Rebuilding for eternity . . . . . 19--21 Leah Hoffmann News: Amir Pnueli: ahead of his time . . 22--23 Gary Anthes News: Automated translation of Indian languages . . . . . . . . . . . . . . . 24--26 Neil Savage News: New search challenges and opportunities . . . . . . . . . . . . . 27--28 Kirk L. Kroeker News: Future Internet design summit . . 29--29 Karen A. Frenkel News: Robert Lovett Ashenhurst: 1929--2009 . . . . . . . . . . . . . . . 30--30 Samuel Greengard News: ACM and India . . . . . . . . . . 31--31 Michael Cusumano Viewpoints: Technology strategy and management: The evolution of platform thinking . . . . . . . . . . . . . . . . 32--34 Phillip G. Armour Viewpoints: The business of software: In praise of bad programmers . . . . . . . 35--36 Arti Rai Viewpoints: Law and technology: Unstandard standardization: the case of biology . . . . . . . . . . . . . . . . 37--39 Bjarne Stroustrup Viewpoint: What should we teach new software developers? Why? . . . . . . . 40--42 William Aspray and Len Shustek and Norbert Ryska Viewpoints: Computer museum series: Great computing museums of the world, part one . . . . . . . . . . . . . . . . 43--46 Julian Hyde Data in flight . . . . . . . . . . . . . 48--52 Stephen Petschulat Other people's data . . . . . . . . . . 53--57 Adam Leventhal Triple-parity RAID and beyond . . . . . 58--63 Michael Stonebraker and Daniel Abadi and David J. DeWitt and Sam Madden and Erik Paulson and Andrew Pavlo and Alexander Rasin MapReduce and parallel DBMSs: friends or foes? . . . . . . . . . . . . . . . . . 64--71 Jeffrey Dean and Sanjay Ghemawat MapReduce: a flexible data processing tool . . . . . . . . . . . . . . . . . . 72--77 Raz Lin and Sarit Kraus Can automated agents proficiently negotiate with humans? . . . . . . . . . 78--88 Dan Wallach Technical perspective: Native Client: a clever alternative . . . . . . . . . . . 90--90 Bennet Yee and David Sehr and Gregory Dardyk and J. Bradley Chen and Robert Muth and Tavis Ormandy and Shiki Okasaka and Neha Narula and Nicholas Fullagar Native Client: a sandbox for portable, untrusted x86 native code . . . . . . . 91--99 Alon Halevy Technical perspective: Schema mappings: rules for mixing data . . . . . . . . . 100--100 Balder ten Cate and Phokion G. Kolaitis Structural characterizations of schema-mapping languages . . . . . . . . 101--110 Leah Hoffmann Last Byte: Q&A: HP's running man . . . . 120--ff Dongback Seo and King-Tim Mak Using the thread-fabric perspective to analyze industry dynamics . . . . . . . 121--125 Randal Burns and Zachary Peterson Security constructs for regulatory-compliant storage . . . . . . 126--130 Wonchang Hur and Dongsoo Kim The future of digital imaging . . . . . 131--135 Seongwoon Kim and Inseong Lee and Kiho Lee and Seungki Jung and Joonah Park and Yeun Bae Kim and Sang Ryong Kim and Jinwoo Kim Mobile Web 2.0 with multi-display buttons . . . . . . . . . . . . . . . . 136--141 Paul D. Witman and Terry Ryan Think big for reuse . . . . . . . . . . 142--147 Vijay Khatri and Carol V. Brown Designing data governance . . . . . . . 148--152 Vittorio Miori and Dario Russo and Massimo Aliberti Domotic technologies incompatibility becomes user transparent . . . . . . . . 153--157 Zvi Drezner Technical opinion: Random selection from a stream of events . . . . . . . . . . . 158--159
Diane Crawford An issue of teamwork . . . . . . . . . . 5--5 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Valerie Barr blog@CACM: Connecting women and technology . . . . . . . . . . . . . . . 10--11 David Roman CACM online: Where the data is . . . . . 12--12 Kirk L. Kroeker News: Alternate interface technologies emerge . . . . . . . . . . . . . . . . . 13--15 Alex Wright News: Type theory comes of age . . . . . 16--17 Sarah Underwood News: Improving disaster management . . 18--20 CACM Staff News: ACM Fellows honored . . . . . . . 21--21 M. Angela Sasse Privacy and security: Not seeing the crime for the cameras? . . . . . . . . . 22--25 Dennis P. Groth and Jeffrey K. MacKie-Mason Education: Why an informatics degree? 26--28 Douglas Maughan Inside risks: The need for a national cybersecurity research and development agenda . . . . . . . . . . . . . . . . . 29--31 Michel Beaudouin-Lafon Open access to scientific publications 32--34 George V. Neville-Neil Kode Vicious: Taking your network's temperature . . . . . . . . . . . . . . 35--36 Dennis Shasha An interview with Michael Rabin . . . . 37--42 Eric Saxe Power-efficient software . . . . . . . . 44--48 Alexandra Fedorova and Sergey Blagodurov and Sergey Zhuravlev Managing contention for shared resources on multicore processors . . . . . . . . 49--57 Steven P. Miller and Michael W. Whalen and Darren D. Cofer Software model checking takes off . . . 58--64 Al Bessey and Ken Block and Ben Chelf and Andy Chou and Bryan Fulton and Seth Hallem and Charles Henri-Gros and Asya Kamsky and Scott McPeak and Dawson Engler A few billion lines of code later: using static analysis to find bugs in the real world . . . . . . . . . . . . . . . . . 66--75 Eric Benhamou and Jon Eisenberg and Randy H. Katz Assessing the changing U.S. IT R&D ecosystem . . . . . . . . . . . . . . . 76--83 Dave Bacon and Wim van Dam Recent progress in quantum algorithms 84--93 Sanjoy Dasgupta Strange effects in high dimension . . . 96--96 Nir Ailon and Bernard Chazelle Faster dimension reduction . . . . . . . 97--104 Shekhar Y. Borkar Want to be a bug buster? . . . . . . . . 105--105 Sung-Boem Park and Subhasish Mitra Post-silicon bug localization for processors using IFRA . . . . . . . . . 106--113 Peter Winkler Last Byte: Puzzled: Breaking chocolate bars . . . . . . . . . . . . . . . . . . 120--120 Dongmin Kim and Izak Benbasat Designs for effective implementation of trust assurances in Internet stores . . 121--126 Irma Becerra-Fernandez and Joyce Elam and Susan Clemmons Reversing the landslide in computer-related degree programs . . . . 127--133 Tim Chenoweth and Robert Minch and Sharon Tabor Wireless insecurity: examining user security behavior on public networks . . 134--138 Farheen Altaf and David Schuff Taking a flexible approach to ASPs . . . 139--143 John Minor Ross Informatics creativity: a role for abductive reasoning? . . . . . . . . . . 144--148 Damien Joseph and Soon Ang and Roger H. L. Chang and Sandra A. Slaughter Practical intelligence in IT: assessing soft skills of IT professionals . . . . 149--154 Vijay K. Gurbani and Anita Garvert and James D. Herbsleb Managing a corporate open source software asset . . . . . . . . . . . . . 155--159 Nikhil Mehta and Anju Mehta It takes two to tango: how relational investments improve IT outsourcing partnerships . . . . . . . . . . . . . . 160--164
Moshe Y. Vardi Revisiting the publication culture in computing research . . . . . . . . . . . 5--5 CACM Staff Letters to the Editor: Too much debate? 6--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Mark Guzdial and Judy Robertson BLOG@CACM: Too much programming too soon? . . . . . . . . . . . . . . . . . 10--11 David Roman CACM online: Granting a second life . . 12--12 Gregory Goth News: CS and biology's growing pains . . 13--15 Kirk L. Kroeker News: Engineering the Web's third decade 16--18 Samuel Greengard News: Tracking garbage . . . . . . . . . 19--20 CACM Staff News: Katayanagi prizes and other CS awards . . . . . . . . . . . . . . . . . 21--21 Tim Chang Economic and business dimensions: Gaming will save us all . . . . . . . . . . . . 22--24 Pamela Samuelson Legally speaking: Only technological processes are patentable . . . . . . . . 25--27 Rachelle Hollander Computing ethics: The ethics beat . . . 28--29 Peter J. Denning and Fernando Flores and Peter Luzmore The Profession of IT: Orchestrating coordination in pluralistic networks . . 30--32 Richard Tapia Broadening participation: Hiring and developing minority faculty at research universities . . . . . . . . . . . . . . 33--35 Cameron Wilson and Peter Harsha IT Policy: Making the case for computing 36--38 Kieron O'Hara and Nigel Shadbolt Privacy: Privacy on the data web . . . . 39--41 Kirk McKusick and Sean Quinlan GFS: evolution on fast-forward . . . . . 42--49 David J. Brown and Charles Reams Toward energy-efficient computing . . . 50--58 Siew Kien Sia and Christina Soh and Peter Weill Global IT management: structuring for scale, responsiveness, and innovation 59--64 Thomas Lengauer and André Altmann and Alexander Thielen and Rolf Kaiser Chasing the AIDS virus . . . . . . . . . 66--74 Cameron Seay and Gary Tucker Virtual computing initiative at a small public university . . . . . . . . . . . 75--83 Vincent Conitzer Making decisions based on the preferences of multiple agents . . . . . 84--94 Daniele Micciancio A first glimpse of cryptography's Holy Grail . . . . . . . . . . . . . . . . . 96--96 Craig Gentry Computing arbitrary functions of encrypted data . . . . . . . . . . . . . 97--105 Pietro Perona Seeing the trees, the forest, and much more . . . . . . . . . . . . . . . . . . 106--106 A. Torralba and K. P. Murphy and W. T. Freeman Using the forest to see the trees: exploiting context for visual object detection and localization . . . . . . . 107--114 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 118--118 Ari Juels Last Byte: Future tense: The Primal Cue 120--ff Fabio Arduini and Vincenzo Morabito Business continuity and the banking industry . . . . . . . . . . . . . . . . 121--125 Sherrie Drye Cannoy and A. F. Salam A framework for health care information assurance policy and compliance . . . . 126--131 Lin Lin and Paul Jen-Hwa Hu and Olivia R. Liu Sheng and Johnny Lee Is stickiness profitable for electronic retailers? . . . . . . . . . . . . . . . 132--136 Ramanath Subramanyam and Fei Lee Weisstein and M. S. Krishnan User participation in software development projects . . . . . . . . . . 137--141 S. T. Parkinson and R. M. Hierons and M. Lycett and M. Norman Practitioner-based measurement: a collaborative approach . . . . . . . . . 142--147 Del Nagy and Areej M. Yassin and Anol Bhattacherjee Organizational adoption of open source software: barriers and remedies . . . . 148--151 John H. Benamati and Zafer D. Ozdemir and H. Jeff Smith Aligning undergraduate IS curricula with industry needs . . . . . . . . . . . . . 152--156 Hing Kai Chan Agent-oriented embedded electronic measuring systems . . . . . . . . . . . 157--162
Calvin Gotlieb and James Horning The work of ACM's awards committee . . . 5--5 CACM Staff Letters to the Editor: Computing paradigm not a branch of science . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Michael Stonebraker BLOG@CACM: SQL databases v. NoSQL databases . . . . . . . . . . . . . . . 10--11 David Roman CACM Online: Going mobile . . . . . . . 12--12 Alex Wright News: Data streaming 2.0 . . . . . . . . 13--14 Gary Anthes News: Robots gear up for disaster response . . . . . . . . . . . . . . . . 15--16 Samuel Greengard News: Spies among us? . . . . . . . . . 17--19 Richard Heeks Emerging Markets: Development 2.0: the IT-enabled transformation of international development . . . . . . . 22--24 Martin Campbell-Kelly Historical reflection: Be careful what you wish for . . . . . . . . . . . . . . 25--26 Michael Cusumano Technology strategy and management: Cloud computing and SaaS as new computing platforms . . . . . . . . . . 27--29 Paul Ohm Viewpoint: When network neutrality met privacy . . . . . . . . . . . . . . . . 30--32 George V. Neville-Neil Kode Vicious: The data-structure canon 33--34 Andy Woods Cooling the data center . . . . . . . . 36--42 Mache Creeger CTO roundtable: malware defense . . . . 43--49 Michael Armbrust and Armando Fox and Rean Griffith and Anthony D. Joseph and Randy Katz and Andy Konwinski and Gunho Lee and David Patterson and Ariel Rabkin and Ion Stoica and Matei Zaharia A view of cloud computing . . . . . . . 50--58 Parthasarathy Ranganathan Recipe for efficiency: principles of power-aware computing . . . . . . . . . 60--67 Sergey Yekhanin Private information retrieval . . . . . 68--73 Sergio Antoy and Michael Hanus Functional logic programming . . . . . . 74--85 Padhraic Smyth and Charles Elkan Technical perspective: Creativity helps influence prediction precision . . . . . 88--88 Yehuda Koren Collaborative filtering with temporal dynamics . . . . . . . . . . . . . . . . 89--97 Leslie Pack Kaelbling Technical perspective New bar set for intelligent vehicles . . . . . . . . . . 98--98 Sebastian Thrun Toward robotic cars . . . . . . . . . . 99--106 Leah Hoffmann Last Byte: Q&A: Systematic Thinking: Andrew S. Tanenbaum talks about MINIX, microkernels, and electronic voting systems . . . . . . . . . . . . . . . . 112--ff Pak-Lok Poon and Sau-Fun Tang and T. H. Tse and T. Y. Chen CHOC'LATE: a framework for specification-based testing . . . . . . 113--118 Robert J. Aalberts and Percy S. Poon and Paul D. Thistle A tale of two Internet service providers 119--123 Keith Wright Capstone programming courses considered harmful . . . . . . . . . . . . . . . . 124--127 Surya Rebbapragada and Amit Basu and John Semple Data mining and revenue management methodologies in college admissions . . 128--133 Dawn G. Gregg Designing for collective intelligence 134--138 Stefano Ferretti and Marco Furini and Claudio E. Palazzi and Marco Roccetti and Paola Salomoni WWW recycling for a better world . . . . 139--143 Rhoda C. Joseph Individual resistance to IT innovations 144--146
Moshe Y. Vardi \em Globalization and Offshoring of Software revisited . . . . . . . . . . . 5--5 CACM Staff Letters to the Editor: Roots of publication delay . . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Jeannette M. Wing and Daniel Reed BLOG@CACM: NSF funding advice: 21st century innovation . . . . . . . . . . . 10--11 David Roman CACM Online: Looking for control . . . . 12--12 Jeff Kanipe News: Modeling the astronomical . . . . 13--15 Gary Anthes News: Happy Birthday, RDBMS! . . . . . . 16--17 Samuel Greengard News: Cloud computing and developing nations . . . . . . . . . . . . . . . . 18--20 Jack Rosenberger News: Thacker wins Turing Award . . . . 21--21 CACM Staff ACM's 2010 general election . . . . . . 23--31 Erik Brynjolfsson and Paul Hofmann and John Jordan Economic and business dimensions: Cloud computing and electricity: beyond the utility model . . . . . . . . . . . . . 32--34 Cameron Wilson and Mark Guzdial Education: How to make progress in computing education . . . . . . . . . . 35--37 Roman Beck Viewpoint: Can IT lean against the wind? 38--40 Ofir Turel and Alexander Serenko Viewpoint: Is mobile email addiction overlooked? . . . . . . . . . . . . . . 41--43 William Aspray Computer museum series: Great computing museums of the world, part two . . . . . 45--49 Peter Phillips Enhanced debugging with traces . . . . . 50--53 Julien Ridoux and Darryl Veitch Principles of robust timing over the Internet . . . . . . . . . . . . . . . . 54--61 Dave Durkee Why cloud computing will never be free 62--69 Abigail J. Sellen and Steve Whittaker Beyond total capture: a constructive critique of lifelogging . . . . . . . . 70--77 Clayton Lewis and Michele H. Jackson and William M. Waite Student and faculty attitudes and beliefs about computer science . . . . . 78--85 Susanne Albers Energy-efficient algorithms . . . . . . 86--96 Peter L. Bartlett Learning to act in uncertain environments: technical perspective . . 98--98 Kuzman Ganchev and Yuriy Nevmyvaka and Michael Kearns and Jennifer Wortman Vaughan Censored exploration and the dark pool problem . . . . . . . . . . . . . . . . 99--107 Mark Harman Automated patching techniques: the fix is in: technical perspective . . . . . . 108--108 Westley Weimer and Stephanie Forrest and Claire Le Goues and ThanhVu Nguyen Automatic program repair with evolutionary computation . . . . . . . . 109--116 Peter Winkler Last Byte: Puzzled: Variations on the Ham Sandwich Theorem . . . . . . . . . . 120--120 Paul P. Tallon Understanding the dynamics of information management costs . . . . . . 121--125 Blaize Horner Reich and Chris Sauer Roles of the external IT project manager 126--129 Wonil Hwang and Gavriel Salvendy Number of people required for usability evaluation: the $10 \pm 2$ rule . . . . 130--133 Charles E. Downing Is Web-based supply chain integration right for your company? . . . . . . . . 134--137 Demin Wang and Dharma P. Agrawal and Wassana Toruksa and Chaichana Chaiwatpongsakorn and Mingming Lu and Tim C. Keener Monitoring ambient air quality with carbon monoxide sensor-based wireless network . . . . . . . . . . . . . . . . 138--141 Theophanis C. Stratopoulos and Jee-Hae Lim IT innovation persistence: an oxymoron? 142--146 E. Vance Wilson and Bengisu Tulu The rise of a health-IT academic focus 147--150 Hyeyoung Kim and Jae-Nam Lee and Jaemin Han The role of IT in business ecosystems 151--156
Patricia Ryan A tour of ACM's HQ . . . . . . . . . . . 5--5 CACM Staff Workflow tools for distributed teams? 6--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Greg Linden and Ed H. Chi and Mark Guzdial The chaos of the Internet as an external brain; and more . . . . . . . . . . . . 10--11 David Roman CACM online: Interact naturally . . . . 12--12 Neil Savage News: Straightening out heavy tails . . 13--15 Tom Geller News: Beyond the Smart Grid . . . . . . 16--17 Leah Hoffmann News: Mine your business . . . . . . . . 18--19 Leah Hoffmann News: Robin Milner: the elegant pragmatist . . . . . . . . . . . . . . . 20--21 Jack Rosenberger News: CS and technology leaders honored 22--22 Arvind Narayanan and Vitaly Shmatikov Privacy and security: Myths and fallacies of `personally identifiable information' . . . . . . . . . . . . . . 24--26 Stuart S. Shapiro Inside risks: Privacy by design: moving from art to practice . . . . . . . . . . 27--29 Peter J. Denning and Jack B. Dennis The profession of IT: The resurgence of parallelism . . . . . . . . . . . . . . 30--32 George V. Neville-Neil Kode Vicious: Plotting away . . . . . . 33--34 François Lévêque Law and technology: Intel's rebates: above board or below the belt? . . . . . 35--37 Simson L. Garfinkel and Lorrie Faith Cranor Viewpoint: Institutional review boards and your research . . . . . . . . . . . 38--40 Len Shustek Interview: An interview with Ed Feigenbaum . . . . . . . . . . . . . . . 41--45 Dustin Owens Securing elasticity in the cloud . . . . 46--51 George Phillips Simplicity betrayed . . . . . . . . . . 52--58 Jeffrey Heer and Michael Bostock and Vadim Ogievetsky A tour through the visualization zoo . . 59--67 Anastasia Ailamaki and Verena Kantere and Debabrata Dash Managing scientific data . . . . . . . . 68--78 Jilin Chen and Joseph A. Konstan Conference paper selectivity and impact 79--83 Kristen Grauman Efficiently searching for similar images 84--94 Vivek Sarkar Building confidence in multicore software . . . . . . . . . . . . . . . . 96--96 Jacob Burnim and Koushik Sen Asserting and checking determinism for multithreaded programs . . . . . . . . . 97--105 K. Rustan M. Leino Learning to do program verification . . 106--106 Gerwin Klein and June Andronick and Kevin Elphinstone and Gernot Heiser and David Cock and Philip Derrin and Dhammika Elkaduwe and Kai Engelhardt and Rafal Kolanski and Michael Norrish and Thomas Sewell and Harvey Tuch and Simon Winwood seL4: formal verification of an operating-system kernel . . . . . . . . 107--115 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 118--118 David Brin Last Byte: Future tense: How the Net ensures our cosmic survival . . . . . . 120, 119 Jun Sun and Marshall Scott Poole Beyond connection: situated wireless communities . . . . . . . . . . . . . . 121--125 Sergio de Cesare and Mark Lycett and Robert D. Macredie and Chaitali Patel and Ray Paul Examining perceptions of agility in software development practice . . . . . 126--130 Alexander Nill and John Schibrowsky and James W. Peltier Factors that influence software piracy: a view from Germany . . . . . . . . . . 131--134 Jan Kietzmann and Ian Angell Panopticon revisited . . . . . . . . . . 135--138 Benoit Baudry and Sudipto Ghosh and Franck Fleurey and Robert France and Yves Le Traon and Jean-Marie Mottu Barriers to systematic model transformation testing . . . . . . . . . 139--143 Kevin P. Gallagher and Kate M. Kaiser and Judith C. Simon and Cynthia M. Beath and Tim Goles The requisite variety of skills for IT professionals . . . . . . . . . . . . . 144--148 Sandra A. Vannoy and Prashant Palvia The social influence model of technology adoption . . . . . . . . . . . . . . . . 149--153 Cheul Rhee and G. Lawrence Sanders and Natalie C. Simpson I, myself and e-myself . . . . . . . . . 154--157
Moshe Y. Vardi Hypercriticality . . . . . . . . . . . . 5--5 CACM Staff Letters to the Editor: Don't ignore security offshore, or in the cloud . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Ruben Ortega and Mark Guzdial and Daniel Reed BLOG@CACM: Software development and crunch time; and more . . . . . . . . . 10--11 David Roman CACM online: In case you missed it . . . 12--12 David Lindley News: Sharing computational perspectives 13--15 Samuel Greengard News: Censored! . . . . . . . . . . . . 16--18 Kirk L. Kroeker News: Mainstreaming augmented reality 19--21 Gary Anthes News: Committed to success . . . . . . . 22--23 Gregory Goth News: Eric Brewer: change agent . . . . 24--24 Sarah Underwood News: Visions of the future . . . . . . 25--25 Mari Sako Outsourcing versus shared services . . . 27--29 Jason Borenstein Computing ethics: Work life in the robotic age . . . . . . . . . . . . . . 30--31 Pamela Samuelson Legally speaking: Should the Google book settlement be approved? . . . . . . . . 32--34 Valerie E. Taylor Broadening participation: Cultivating cultural diversity in information technology . . . . . . . . . . . . . . . 35--36 Gonzalo Génova Viewpoint: Is computer science truly scientific? . . . . . . . . . . . . . . 37--39 Marc Snir and Telle Whitney Distinguished members: Advice to members seeking ACM distinction . . . . . . . . 40--41 Eugene Loh The ideal HPC programming language . . . 42--47 Brendan Gregg Visualizing system latency . . . . . . . 48--54 Poul-Henning Kamp You're doing it wrong . . . . . . . . . 55--59 Gary Lewandowski and Dennis J. Bouvier and Tzu-Yi Chen and Robert McCartney and Kate Sanders and Beth Simon and Tammy VanDeGrift Commonsense understanding of concurrency: computing students and concert tickets . . . . . . . . . . . . 60--70 Takeo Igarashi Computer graphics for all . . . . . . . 71--77 Tim Roughgarden Algorithmic game theory . . . . . . . . 78--86 Hans-J. Boehm A solid foundation for x86 shared memory: technical perspective . . . . . 88--88 Peter Sewell and Susmit Sarkar and Scott Owens and Francesco Zappa Nardelli and Magnus O. Myreen x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors . . . . . . . . . . . . 89--97 Mary Jane Irwin Technology scaling redirects main memories: technical perspective . . . . 98--98 Benjamin C. Lee and Engin Ipek and Onur Mutlu and Doug Burger Phase change memory architecture and the quest for scalability . . . . . . . . . 99--106 Leah Hoffmann Last Byte: Q&A: From Single Core to Multicore . . . . . . . . . . . . . . . 112, 111 Yurong Yao and Edward Watson and Beverly K. Kahn Application service providers: market and adoption decisions . . . . . . . . . 113--117 Jorge A. Romero and Nirup Menon and Rajiv D. Banker and Mark Anderson ERP: drilling for profit in the oil and gas industry . . . . . . . . . . . . . . 118--121 Wei-Lun Chang and Soe-Tsyr Yuan and Carol W. Hsu Creating the experience economy in e-commerce . . . . . . . . . . . . . . . 122--127 Oded Nov and Chen Ye Why do people tag?: motivations for photo tagging . . . . . . . . . . . . . 128--131 Domenico Talia and Paolo Trunfio How distributed data mining tasks can thrive as knowledge services . . . . . . 132--137 Alan R. Dennis and Thomas M. Duffy and Hasan Cakir IT programs in high schools: lessons from the Cisco Networking Academy program . . . . . . . . . . . . . . . . 138--141 John C. Ruhnka and John W. Bagby Using ESI discovery teams to manage electronic data discovery . . . . . . . 142--144
Victor Vianu JACM at the start of a new decade . . . 5--5 CACM Staff In the Virtual Extension . . . . . . . . 6--6 CACM Staff Letters to the Editor: CS expertise for institutional review boards . . . . . . 7--7 Greg Linden and Michael Bernstein and Erika Shehan Poole BLOG@CACM: The war against spam: and more . . . . . . . . . . . . . . . . . . 8--9 David Roman CACM online: Print is not just ink anymore . . . . . . . . . . . . . . . . 10--10 Gary Anthes News: Mechanism design meets computer science . . . . . . . . . . . . . . . . 11--13 Kirk L. Kroeker News: Looking beyond stereoscopic $3$D's revival . . . . . . . . . . . . . . . . 14--16 Sarah Underwood News: Making sense of real-time behavior 17--18 Kirk L. Kroeker News: Celebrating the legacy of PLATO 19--20 Jack Rosenberger News: Gödel Prize and other CS awards . . 21--21 Christopher S. Yoo Is the Internet a maturing market? . . . 24--26 David S. Touretzky Preparing computer science students for the robotics revolution . . . . . . . . 27--29 Ping Gao and Jiang Yu Has China caught up in IT? . . . . . . . 30--32 George V. Neville-Neil Kode Vicious: Presenting your project 33--34 Eugene H. Spafford Privacy and security: Remembrances of things pest . . . . . . . . . . . . . . 35--37 Samir Chopra Rights for autonomous artificial agents? 38--40 Thomas J. Misa An interview with Edsger W. Dijkstra . . 41--47 Robert DeLine and Gina Venolia and Kael Rowan Software development with code maps . . 48--54 Mache Creeger Moving to the edge: a CTO roundtable on network virtualization . . . . . . . . . 55--62 Jan Damsgaard and Jan Karlsbjerg Seven principles for selecting software packages . . . . . . . . . . . . . . . . 63--71 James Larus and Galen Hunt The Singularity system . . . . . . . . . 72--79 Gabor Szabo and Bernardo A. Huberman Predicting the popularity of online content . . . . . . . . . . . . . . . . 80--88 Sarita V. Adve and Hans-J. Boehm Memory models: a case for rethinking parallel languages and hardware . . . . 90--101 Helen Wang Attacks target Web server logic and prey on XCS weaknesses: technical perspective 104--104 Hristo Bojinov and Elie Bursztein and Dan Boneh The emergence of cross channel scripting 105--113 Fritz Henglein Large-scale sound and precise program analysis: technical perspective . . . . 114--114 Isil Dillig and Thomas Dillig and Alex Aiken Reasoning about the unknown in static analysis . . . . . . . . . . . . . . . . 115--123 Peter Winkler Last Byte: Puzzled: Figures on a Plane 128--128 Wei-Fung Tung and Soe-Tsyr Yuan Intelligent service machine . . . . . . 129--134 Marc N. Haines and Marcus A. Rothenberger How a service-oriented architecture may change the software development process 135--140 Eugenio Tisselli thinkflickrthink: a case study on strategic tagging . . . . . . . . . . . 141--145 Lutz Prechelt Plat\_Forms: is there one best Web development technology? . . . . . . . . 146--149
Moshe Y. Vardi Science has only two legs . . . . . . . 5--5 CACM Staff Letters to the Editor: More than one way to annotate metadata . . . . . . . . . . 7--7 Ed H. Chi and Ruben Ortega BLOG@CACM: Expanding CS education; improving software development . . . . . 8--9 David Roman CACM online: More \em Communications . . 12--12 David Lindley News: Brains and bytes . . . . . . . . . 13--15 Samuel Greengard Obituary: Carl Adam Petri, 1926--2010 14--14 Phil Scott Security: New Passwords Approach . . . . 15--15 Neil Savage News: Cycling through data . . . . . . . 16--17 Marina Krakovsky News: Degrees, distance, and dollars . . 18--19 Tom Geller News: ACM China nearing launch . . . . . 20--20 Jack Rosenberger News: Kyoto prize and other CS awards 21--21 Phillip G. Armour The business of software: Return at risk 23--25 Robert A. Hillman and Maureen A. O'Rourke Law and Technology: Principles of the law of software contracts . . . . . . . 26--28 Peter J. Denning and Dorothy E. Denning The profession of IT: Discussing cyber attack . . . . . . . . . . . . . . . . . 29--31 Mordechai Ben-Ari Viewpoint: Objects never?: well, hardly ever! . . . . . . . . . . . . . . . . . 32--35 Jennifer Rexford and Constantine Dovrolis Point/Counterpoint: Future Internet architecture: clean-slate versus evolutionary research . . . . . . . . . 36--40 Stephen V. Cantrill Computers in patient care: the promise and the challenge . . . . . . . . . . . 42--47 Steve Chessin Injecting errors for fun and profit . . 48--54 Cary Millsap Thinking clearly about performance, part 1 . . . . . . . . . . . . . . . . . . . 55--60 Dag I. K. Sjòberg Confronting the myth of rapid obsolescence in computing research . . . 62--67 Joe Armstrong Erlang . . . . . . . . . . . . . . . . . 68--75 Christel Baier and Boudewijn R. Haverkort and Holger Hermanns and Joost-Pieter Katoen Performance evaluation and model checking join forces . . . . . . . . . . 76--85 Johannes Gehrke Programming with differential privacy: technical perspective . . . . . . . . . 88--88 Frank McSherry Privacy integrated queries: an extensible platform for privacy-preserving data analysis . . . . 89--97 Mark Jerrum Constraint satisfaction problems and computational complexity: technical perspective . . . . . . . . . . . . . . 98--98 Andrei A. Bulatov and Dániel Marx Constraint satisfaction problems and global cardinality constraints . . . . . 99--106 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 110--110 Greg Bear Last Byte: Future tense: Little Brother is Watching . . . . . . . . . . . . . . 112--ff
Alain Chesnais ACM is built on volunteers' shoulders 5--5 CACM Staff Letters to the Editor: How to celebrate Codd's RDBMS vision . . . . . . . . . . 7--7 Michael Stonebraker BLOG@CACM: In search of database consistency . . . . . . . . . . . . . . 8--9 David Roman CACM online: The mobile road ahead . . . 10--10 Alex Wright News: Linear logic . . . . . . . . . . . 11--13 Graeme Stemp-Morlock News: Personal fabrication . . . . . . . 14--15 Dennis McCafferty News: Should code be released? . . . . . 16--17 Martin Campbell-Kelly Victorian data processing . . . . . . . 19--21 Michael A. Cusumano Platforms and services: understanding the resurgence of Apple . . . . . . . . 22--24 David L. Parnas Inside Risks: Risks of undisciplined development . . . . . . . . . . . . . . 25--27 George V. Neville-Neil Kode Vicious: Version aversion . . . . . 28--29 Michael Hicks and Jeffrey S. Foster Viewpoint: SCORE: agile research group management . . . . . . . . . . . . . . . 30--31 ACM Case Study Photoshop scalability: keeping it simple 32--38 Cary Millsap Thinking clearly about performance, part 2 . . . . . . . . . . . . . . . . . . . 39--45 Kevin Montagne Tackling architectural complexity with modeling . . . . . . . . . . . . . . . . 46--52 Thomas Serre and Tomaso Poggio A neuromorphic approach to computer vision . . . . . . . . . . . . . . . . . 54--61 Prasanna B. Tambe and Lorin M. Hitt How offshoring affects IT workers . . . 62--70 Rodrigo Rodrigues and Peter Druschel Peer-to-peer systems . . . . . . . . . . 72--82 Carl Waldspurger A VM `Engine' that makes a difference: technical perspective . . . . . . . . . 84--84 Diwaker Gupta and Sangmin Lee and Michael Vrable and Stefan Savage and Alex C. Snoeren and George Varghese and Geoffrey M. Voelker and Amin Vahdat Difference engine: harnessing memory redundancy in virtual machines . . . . . 85--93 Yair Weiss and Judea Pearl Belief propagation: technical perspective . . . . . . . . . . . . . . 94--94 Erik B. Sudderth and Alexander T. Ihler and Michael Isard and William T. Freeman and Alan S. Willsky Nonparametric belief propagation . . . . 95--103 Leah Hoffmann Last Byte: Q&A: Gray's Paradigm . . . . . 112--ff
Moshe Y. Vardi On P, NP, and computational complexity 5--5 CACM Staff Letters to the Editor: How to think about objects . . . . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Tessa Lau BLOG@CACM: Rethinking the systems review process . . . . . . . . . . . . . . . . 10--11 David Roman CACM online: a preference for PDF . . . 12--12 Gregory Goth News: Turning data into knowledge . . . 13--15 Gary Anthes News: Security in the cloud . . . . . . 16--18 Leah Hoffmann News: Career opportunities . . . . . . . 19--21 Neil Savage News: Wide open spaces . . . . . . . . . 23--23 Pablo J. Boczkowski Economic and business dimensions: The divergent online news preferences of journalists and readers . . . . . . . . 24--25 Stephen Cooper and Lance C. Pérez and Daphne Rainey Education: K--12 computational learning 27--29 Pamela Samuelson Legally speaking: Why do software startups patent (or not)? . . . . . . . 30--32 Joel F. Brenner Privacy and security: Why isn't cyberspace more secure? . . . . . . . . 33--35 Matt Welsh Viewpoint: Sensor networks for the sciences . . . . . . . . . . . . . . . . 36--39 Brian W. Fitzpatrick and JJ Lueck The case against data lock-in . . . . . 42--46 David S. H. Rosenthal Keeping bits safe: how hard can it be? 47--55 Poul-Henning Kamp Sir, please step away from the ASR-33! 56--57 Michael Garland and David B. Kirk Understanding throughput-oriented architectures . . . . . . . . . . . . . 58--66 Patrick Vogl and Michael Barrett Regulating the information gatekeepers 67--72 Piotr Faliszewski and Edith Hemaspaandra and Lane A. Hemaspaandra Using complexity to protect elections 74--82 Sarita Adve Data races are evil with no exceptions: technical perspective . . . . . . . . . 84--84 Tayfun Elmas and Shaz Qadeer and Serdar Tasiran Goldilocks: a race-aware Java runtime 85--92 Cormac Flanagan and Stephen N. Freund FastTrack: efficient and precise dynamic race detection . . . . . . . . . . . . . 93--101 Peter Winkler Last Byte: Puzzled: Rectangles Galore 112--112 Duncan Buell Viewpoints: Virtual extension: In support of computer science teachers and the CSTA . . . . . . . . . . . . . . . . 113--115 Massimo Ficco and Roberto Pietrantuono and Stefano Russo Virtual extension: Supporting ubiquitous location information in interworking 3G and wireless networks . . . . . . . . . 116--123 Jill Freyne and Lorcan Coyle and Barry Smyth and Padraig Cunningham Virtual extension: Relative status of journal and conference publications in computer science . . . . . . . . . . . . 124--132
David A. Patterson Diverse connections . . . . . . . . . . 5--5 CACM Staff Science has four legs . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Greg Linden and Jason Hong and Mark Guzdial Security advice; malvertisements; and CS education in Qatar . . . . . . . . . . . 10--11 David Roman School grades need improvement . . . . . 12--12 Gregory Goth The eyes have it . . . . . . . . . . . . 13--15 Gary Anthes Topic models vs. unstructured data . . . 16--18 Marina Krakovsky CSEdWeek expands its reach . . . . . . . 19--19 Samuel Greengard The new face of war . . . . . . . . . . 20--22 David Lindley A matter of privacy . . . . . . . . . . 23--23 Seymour Goodman and Andrew Harris The coming African tsunami of information insecurity . . . . . . . . . 24--27 Mark Smotherman and Dag Spicer IBM's single-processor supercomputer efforts . . . . . . . . . . . . . . . . 28--30 Ann Quiroz Gates The role of Hispanic-serving institutions in contributing to an educated work force . . . . . . . . . . 31--33 Peter J. Denning and Robert E. Kahn The long quest for universal information access . . . . . . . . . . . . . . . . . 34--36 George V. Neville-Neil Literate coding . . . . . . . . . . . . 37--38 Francine Berman We need a research data census . . . . . 39--41 CACM Staff A conversation with Ed Catmull . . . . . 42--47 Mache Creeger The theft of business innovation: an ACM--BCS roundtable on threats to global competitiveness . . . . . . . . . . . . 48--55 Zhong Shao Certified software . . . . . . . . . . . 56--66 Stephen J. Andriole Business impact of Web 2.0 technologies 67--79 Adnan Darwiche Bayesian networks . . . . . . . . . . . 80--90 Michael Elad and Raja Giryes Iterative signal recovery from incomplete samples: technical perspective . . . . . . . . . . . . . . 92--92 Deanna Needell and Joel A. Tropp CoSaMP: iterative signal recovery from incomplete and inaccurate samples . . . 93--100 Scott Aaronson QIP = PSPACE breakthrough: technical perspective . . . . . . . . . . . . . . 101--101 Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and John Watrous QIP $=$ PSPACE . . . . . . . . . . . . . 102--109 Peter Winkler Last Byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 126--126 Rumilisoun Future tense: Rebirth of worlds . . . . 128--ff Massimo Franceschet The role of conference publications in CS . . . . . . . . . . . . . . . . . . . 129--132 Barry Lunt and J. Ekstrom and Han Reichgelt and Michael Bailey and Richard Leblanc IT 2008: the history of a new computing discipline . . . . . . . . . . . . . . . 133--141 Ralph Morelli and Chamindra de Silva and Trishan de Lanerolle and Rebecca Curzon and Xin Sheng Mao A global collaboration to deploy help to China . . . . . . . . . . . . . . . . . 142--149
Moshe Y. Vardi Where have all the workshops gone? . . . 5--5 CACM Staff To change the world, take a chance . . . 6--7 Anonymous In the Virtual Extension . . . . . . . . 8--8 Wendy Hall ACM's annual report . . . . . . . . . . 9--13 Jack Rosenberger and Judy Robertson Smart career advice: laptops as a classroom distraction . . . . . . . . . 14--15 David Roman Scholarly publishing model needs an update . . . . . . . . . . . . . . . . . 16--ff Gary Anthes Nonlinear systems made easy . . . . . . 17--19 Alex Wright The touchy subject of haptics . . . . . 20--22 Marina Krakovsky India's elephantine effort . . . . . . . 23--24 Jack Rosenberger EMET prize and other awards . . . . . . 25--25 Phillip G. Armour Don't bring me a good idea . . . . . . . 27--29 Stefan Bechtold Google AdWords and European trademark law . . . . . . . . . . . . . . . . . . 30--32 Michael A. Cusumano Reflections on the Toyota debacle . . . 33--35 Mark D. Ryan Cloud computing privacy concerns on our doorstep . . . . . . . . . . . . . . . . 36--38 Guy L. Steele Jr. An interview with Frances E. Allen . . . 39--45 Eben M. Haber and Eser Kandogan and Paul P. Maglio Collaboration in system administration 46--53 Anonymous UX design and agile: a natural fit? . . 54--60 Evangelos Kotsovinos Virtualization: blessing or curse? . . . 61--65 Gio Wiederhold Follow the intellectual property . . . . 66--74 Uzi Vishkin Using simple abstraction to reinvent computing for parallelism . . . . . . . 75--85 Cynthia Dwork A firm foundation for private data analysis . . . . . . . . . . . . . . . . 86--95 Dina Katabi Sora promises lasting impact: technical perspective . . . . . . . . . . . . . . 98--98 Kun Tan and He Liu and Jiansong Zhang and Yongguang Zhang and Ji Fang and Geoffrey M. Voelker Sora: high-performance software radio using general-purpose multi-core processors . . . . . . . . . . . . . . . 99--107 Damon Wischik Multipath: a new control architecture for the Internet: technical perspective 108--108 Peter Key and Laurent Massoulié and Don Towsley Path selection and multipath congestion control . . . . . . . . . . . . . . . . 109--116 Dennis McCafferty Last Byte: Q&A: a Journey of Discovery 128--ff Michael E. Locasto and Anup K. Ghosh and Sushil Jajodia and Angelos Stavrou The ephemeral legion: producing an expert cyber-security work force from thin air . . . . . . . . . . . . . . . . 129--131 Peter Fröhlich and Antti Oulasvirta and Matthias Baldauf and Antti Nurminen On the move, wirelessly connected to the world . . . . . . . . . . . . . . . . . 132--138 Matthias Häsel Opensocial: an enabler for social applications on the Web . . . . . . . . 139--144
Tom Rodden ICPS offers major research venue . . . . 5--5 CACM Staff Shine the light of computational complexity . . . . . . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Jason Hong Matters of design . . . . . . . . . . . 10--11 David Roman End of days for Communications in print? 12--12 Gregory Goth Chipping away at greenhouse gases . . . 13--15 Neil Savage Information theory after Shannon . . . . 16--18 Leah Hoffmann Maurice Wilkes: the last pioneer . . . . 19--19 Samuel Greengard Following the crowd . . . . . . . . . . 20--22 Gary Anthes ACM launches new Digital Library . . . . 23--24 CACM Staff ACM Fellows honored . . . . . . . . . . 25--25 Maura Conway Against cyberterrorism . . . . . . . . . 26--28 Gregory Rosston and Scott Savage and Donald Waldman Household demand for broadband Internet service . . . . . . . . . . . . . . . . 29--31 George Ledin, Jr. The growing harm of not teaching malware 32--34 George V. Neville-Neil Forest for the trees . . . . . . . . . . 35--36 Mark Guzdial From science to engineering . . . . . . 37--39 Jonathan Grudin Technology, conferences, and community 41--43 Julian Harty Finding usability bugs with automated tests . . . . . . . . . . . . . . . . . 44--49 Thomas A. Limoncelli A plea from sysadmins to software vendors: 10 do's and don'ts . . . . . . 50--51 Christina Lear System administration soft skills . . . 52--58 Juan Pablo Wachs and Mathias Kölsch and Helman Stern and Yael Edan Vision-based hand-gesture applications 60--71 Michael J. Cafarella and Alon Halevy and Jayant Madhavan Structured data on the Web . . . . . . . 72--79 Stephen Davies Still building the Memex . . . . . . . . 80--88 Fernando Pereira Markov meets Bayes: technical perspective . . . . . . . . . . . . . . 90--90 Frank Wood and Jan Gasthaus and Cédric Archambeau and Lancelot James and Yee Whye Teh The sequence memoizer . . . . . . . . . 91--98 Norman P. Jouppi DRAM errors in the wild: technical perspective . . . . . . . . . . . . . . 99--99 Bianca Schroeder and Eduardo Pinheiro and Wolf-Dietrich Weber DRAM errors in the wild: a large-scale field study . . . . . . . . . . . . . . 100--107 Peter Winkler Last Byte: Puzzled: Parsing Partitions 112--112 John K. Estell and Ken Christensen The need for a new graduation rite of passage . . . . . . . . . . . . . . . . 113--115 Qinping Zhao 10 scientific problems in virtual reality . . . . . . . . . . . . . . . . 116--118 David Wright and Paul De Hert and Serge Gutwirth Are the OECD guidelines at 30 showing their age? . . . . . . . . . . . . . . . 119--127
Moshe Y. Vardi Fumbling the future . . . . . . . . . . 5--5 CACM Staff Free speech for algorithms? . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 11--11 Mark Guzdial and Greg Linden Scientists, engineers, and computer science; industry and research groups 12--13 David Roman Time to change . . . . . . . . . . . . . 14--14 Kirk L. Kroeker Grid computing's future . . . . . . . . 15--17 Neil Savage Twitter as medium and message . . . . . 18--20 Tom Geller Evaluating government funding . . . . . 21--21 Gary Anthes Memristors: pass or fail? . . . . . . . 22--24 Samuel Greengard Gary Chapman, technologist: 1952--2010 25--25 Pamela Samuelson Do you own the software you buy? . . . . 26--28 Kenneth D. Pimple Surrounded by machines . . . . . . . . . 29--31 Peter J. Denning Managing time . . . . . . . . . . . . . 32--34 Daryl E. Chubin and Roosevelt Y. Johnson A program greater than the sum of its parts: the BPC alliances . . . . . . . . 35--37 Marc Snir Computer and information science and engineering: one discipline, many specialties . . . . . . . . . . . . . . 38--43 Mark Burgess Testable system administration . . . . . 44--49 Ross Stapleton-Gray and William Woodcock National Internet defense---small states on the skirmish line . . . . . . . . . . 50--55 Poul-Henning Kamp B.Y.O.C (1,342 times and counting) . . . 56--58 Katy Börner Plug-and-play macroscopes . . . . . . . 60--69 Frank Stajano and Paul Wilson Understanding scam victims: seven principles for systems security . . . . 70--75 Nir Shavit Data structures in the multicore age . . 76--84 Juan Bello and Yann LeCun and Robert Rowe Concerto for violin and Markov model: technical perspective . . . . . . . . . 86--86 Christopher Raphael The informatics philharmonic . . . . . . 87--93 Jennifer Rexford VL2: technical perspective . . . . . . . 94--94 Albert Greenberg and James R. Hamilton and Navendu Jain and Srikanth Kandula and Changhoon Kim and Parantap Lahiri and David A. Maltz and Parveen Patel and Sudipta Sengupta VL2: a scalable and flexible data center network . . . . . . . . . . . . . . . . 95--104 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 109--109 Gregory Benford Future tense . . . . . . . . . . . . . . 112--ff Frances Rosamond and Roswitha Bardohl and Stephan Diehl and Uwe Geisler and Gordon Bolduan and Annette Lessmöllmann and Andreas Schwill and Ulrike Stege Reaching out to the media: become a computer science ambassador . . . . . . 113--116 R. Kelly Garrett and James N. Danziger The Internet electorate . . . . . . . . 117--123 Steven De Hertogh and Stijn Viaene and Guido Dedene Governing Web 2.0 . . . . . . . . . . . 124--130
Robert B. Schnabel Educating computing's next generation 5--5 CACM Staff In the Virtual Extension . . . . . . . . 8--8 CACM Staff I want a personal information pod . . . 9--9 Jason Hong Matters of design, part II . . . . . . . 10--11 Scott E. Delman ACM on the move . . . . . . . . . . . . 12--12 Gary Anthes The quest for randomness . . . . . . . . 13--15 Kirk L. Kroeker Engineering sensation in artificial limbs . . . . . . . . . . . . . . . . . 16--18 Samuel Greengard Social games, virtual goods . . . . . . 19--22 Sarah Underwood British computer scientists reboot . . . 23--23 Fred Niederman and Felix B. Tan Managing global IT teams: considering cultural dynamics . . . . . . . . . . . 24--27 Nathan Ensmenger Building castles in the air . . . . . . 28--30 Michael A. Cusumano Platform wars come to social media . . . 31--33 George V. Neville-Neil Coder's block . . . . . . . . . . . . . 34--35 José Luis Gómez-Barroso and Claudio Feijóo Asymmetries and shortages of the network neutrality principle . . . . . . . . . . 36--37 Jonathan Parri and Daniel Shapiro and Miodrag Bolic and Voicu Groza Returning control to the programmer: SIMD intrinsics for virtual machines . . 38--43 Thomas A. Limoncelli and Vinton G. Cerf Successful strategies for IPv6 rollouts: Really . . . . . . . . . . . . . . . . . 44--48 Erik Meijer and Gavin Bierman A co-relational model of data for large shared data banks . . . . . . . . . . . 49--58 Maneesh Agrawala and Wilmot Li and Floraine Berthouzoz Design principles for visual communication . . . . . . . . . . . . . 60--69 Aleksandar Dragojevik and Pascal Felber and Vincent Gramoli and Rachid Guerraoui Why STM can be more than a research toy 70--77 John C. Tang and Manuel Cebrian and Nicklaus A. Giacobe and Hyun-Woo Kim and Taemie Kim and Douglas ``Beaker'' Wickert Reflecting on the DARPA Red Balloon Challenge . . . . . . . . . . . . . . . 78--85 Anhai Doan and Raghu Ramakrishnan and Alon Y. Halevy Crowdsourcing systems on the World-Wide Web . . . . . . . . . . . . . . . . . . 86--96 Daniel M. Berry Liability issues in software engineering: technical perspective . . . 98--98 Daniel Le Métayer and Manuel Maarek and Eduardo Mazza and Marie-Laure Potet and Stéphane Frénot and Valérie Viet Triem Tong and Nicolas Craipeau and Ronan Hardouin Liability issues in software engineering: the use of formal methods to reduce legal uncertainties . . . . . 99--106 Madhu Sudan Patterns hidden from simple algorithms: technical perspective . . . . . . . . . 107--107 Mark Braverman Poly-logarithmic independence fools bounded-depth Boolean circuits . . . . . 108--115 Leah Hoffmann Last Byte: Q&A: The Chief Computer . . . 120--ff Patricia Morreale and David Joiner Reaching future computer scientists . . 121--124 Ann Majchrzak and Philip H. B. More Emergency! Web 2.0 to the rescue! . . . 125--132 Fred Grossman and Charles Tappert and Joe Bergin and Susan M. Merritt A research doctorate for computing professionals . . . . . . . . . . . . . 133--141 Gerardo Canfora and Massimiliano Di Penta and Luigi Cerulo Achievements and challenges in software reverse engineering . . . . . . . . . . 142--151
Moshe Y. Vardi Technology has social consequences . . . 5--5 CACM Staff Preserve privacy in statistical correlations . . . . . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Michael Stonebraker Stonebraker on data warehouses . . . . . 10--11 Scott E. Delman Let ACM help you find your next job `online' . . . . . . . . . . . . . . . . 12--12 Neil Savage Sorting through photos . . . . . . . . . 13--15 Gregory Goth I, domestic robot . . . . . . . . . . . 16--17 Leah Hoffmann Data optimization in developing nations 18--20 Marina Krakovsky Deus ex machina . . . . . . . . . . . . 22--22 Alex Wright Web science meets network science . . . 23--23 Avi Goldfarb and Catherine E. Tucker Online advertising, behavioral targeting, and privacy . . . . . . . . . 25--27 Brian Dorn Reaching learners beyond our hallowed halls . . . . . . . . . . . . . . . . . 28--30 Tim Wu Bell Labs and centralized innovation . . 31--33 Jason Fitzpatrick An interview with Steve Furber . . . . . 34--39 Juan A. Añel The importance of reviewing the code . . 40--41 Poul-Henning Kamp The one-second war . . . . . . . . . . . 44--48 Andre Charland and Brian Leroux Mobile application development: Web vs. native . . . . . . . . . . . . . . . . . 49--53 Patrick McKenzie Weapons of mass assignment . . . . . . . 54--59 Dennis J. McFarland and Jonathan R. Wolpaw Brain-computer interfaces for communication and control . . . . . . . 60--66 Shekhar Borkar and Andrew A. Chien The future of microprocessors . . . . . 67--77 Mikhail Afanasyev and Tadayoshi Kohno and Justin Ma and Nick Murphy and Stefan Savage and Alex C. Snoeren and Geoffrey M. Voelker Privacy-preserving network forensics . . 78--87 Byron Cook and Andreas Podelski and Andrey Rybalchenko Proving program termination . . . . . . 88--98 David C. Parkes Complex financial products: caveat emptor: technical perspective . . . . . 100--100 Sanjeev Arora and Boaz Barak and Markus Brunnermeier and Rong Ge Computational complexity and information asymmetry in financial products . . . . 101--107 Guillermo Sapiro Images everywhere: looking for models: technical perspective . . . . . . . . . 108--108 Antoni Buades and Bartomeu Coll and Jean-Michel Morel Self-similarity-based image denoising 109--117 Peter Winkler Last Byte: Puzzled: Games, Roles, Turns 120--120 Subhankar Dhar and Upkar Varshney Challenges and business models for mobile location-based services and advertising . . . . . . . . . . . . . . 121--128 Guido Schryen Is open source security a myth? . . . . 130--140 Jacques Wainer and Cleo Billa and Siome Goldenstein Invisible work in standard bibliometric evaluation of computer science . . . . . 141--146
P. J. Narayanan and Anand Deshpanda Computing and India . . . . . . . . . . 5--5 CACM Staff Why concurrent objects are recurrently complicated . . . . . . . . . . . . . . 6--6 CACM Staff In the Virtual Extension . . . . . . . . 7--7 Daniel Reed and Mark Guzdial and Judy Robertson Simple design; research vs. teaching; and quest to learn . . . . . . . . . . . 8--9 Scott E. Delman Say it with video . . . . . . . . . . . 10--10 Kirk L. Kroeker Biology-inspired networking . . . . . . 11--13 Gary Anthes Beauty and elegance: Leslie Valiant talks about machine learning, parallel computing, and his quest for simplicity 14--15 Tom Geller The promise of flexible displays . . . . 16--18 Gregory Goth Unlimited possibilities . . . . . . . . 19--19 Marina Krakovsky All the news that's fit for you . . . . 20--21 Ari Schwartz Identity management and privacy: a rare opportunity to get it right . . . . . . 22--24 Peter J. Denning and Dennis J. Frailey Who are we---now? . . . . . . . . . . . 25--27 Phillip G. Armour Practical application of theoretical estimation . . . . . . . . . . . . . . . 28--30 David Lorge Parnas The risks of stopping too soon . . . . . 31--33 George V. Neville-Neil Think before you fork . . . . . . . . . 34--35 Clayton T. Morrison and Richard T. Snodgrass Computer science can use more science 36--38 Pat Helland If you have too much data, then `good enough' is good enough . . . . . . . . . 40--47 Michael Rys Scalable SQL . . . . . . . . . . . . . . 48--53 Qing Hu and Zhengchuan Xu and Tamara Dinev and Hong Ling Does deterrence work in reducing information security policy abuse by employees? . . . . . . . . . . . . . . . 54--60 W. Keith Edwards and Rebecca E. Grinter and Ratul Mahajan and David Wetherall Advancing the state of home networking 62--71 Michael Stonebraker and Rick Cattell 10 rules for scalable performance in `simple operation' datastores . . . . . 72--80 Mike Barnett and Manuel Fähndrich and K. Rustan M. Leino and Peter Müller and Wolfram Schulte and Herman Venter Specification and verification: the Spec# experience . . . . . . . . . . . . 81--91 Massimo Franceschet PageRank: standing on the shoulders of giants . . . . . . . . . . . . . . . . . 92--101 Phokion G. Kolaitis The quest for a logic for polynomial-time computation: technical perspective . . . . . . . . . . . . . . 103--103 Martin Grohe From polynomial time queries to graph structure theory . . . . . . . . . . . . 104--112 Michael J. Franklin Data analysis at astonishing speed: technical perspective . . . . . . . . . 113--13 Sergey Melnik and Andrey Gubarev and Jing Jing Long and Geoffrey Romer and Shiva Shivakumar and Matt Tolton and Theo Vassilakis Dremel: interactive analysis of Web-scale datasets . . . . . . . . . . . 114--123 Peter Winkler Last Byte: Puzzled: a Lifelong Learner 126--126 Leah Hoffmann Last Byte: Q&A: a Lifelong Learner: Leslie Valiant discusses machine learning, parallel computing, and computational neuroscience . . . . . . . 128, 127 Paolo Boldi and Francesco Bonchi and Carlos Castillo and Sebastiano Vigna Viscous democracy for social networks 129--137 Denise Mcmanus and Houston Carr and Benjamin Adams Wireless on the precipice: The 14th century revisited . . . . . . . . . . . 138--143
Moshe Y. Vardi Solving the unsolvable . . . . . . . . . 5--5 CACM Staff Practical research yields fundamental insight, too . . . . . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Jeannette M. Wing and Ed H. Chi Reviewing peer review . . . . . . . . . 10--11 Scott E. Delman ACM aggregates publication statistics in the ACM Digital Library . . . . . . . . 12--12 Kirk L. Kroeker Weighing Watson's impact . . . . . . . . 13--15 Alex Wright Automotive autonomy . . . . . . . . . . 16--18 Dennis McCafferty Brave, new social world . . . . . . . . 19--21 CACM Staff ACM award recipients . . . . . . . . . . 22--22 Mari Sako Driving power in global supply chains 23--25 Cory Knobel and Geoffrey C. Bowker Values in design . . . . . . . . . . . . 26--28 Pamela Samuelson Too many copyrights? . . . . . . . . . . 29--31 Maria (Mia) Ong The status of women of color in computer science . . . . . . . . . . . . . . . . 32--34 Mordechai (Moti) Ben-Ari Non-myths about programming . . . . . . 35--37 Roberto Ierusalimschy and Luiz Henrique De Figueiredo and Waldemar Celes Passing a language through the eye of a needle . . . . . . . . . . . . . . . . . 38--43 Debasish Ghosh DSL for the uninitiated . . . . . . . . 44--50 CACM Staff Microsoft's protocol documentation program: interoperability testing at scale . . . . . . . . . . . . . . . . . 51--57 Michael Edwards Algorithmic composition: computational thinking in music . . . . . . . . . . . 58--67 Thomas Ball and Vladimir Levin and Sriram K. Rajamani A decade of software model checking with SLAM . . . . . . . . . . . . . . . . . . 68--76 Joseph M. Hellerstein and David L. Tennenhouse Searching for Jim Gray: a technical overview . . . . . . . . . . . . . . . . 77--87 Stephen B. Wicker Cellular telephony and the question of privacy . . . . . . . . . . . . . . . . 88--98 Luiz André Barroso FAWN: a Fast Array of Wimpy Nodes: technical perspective . . . . . . . . . 100--100 David G. Andersen and Jason Franklin and Michael Kaminsky and Amar Phanishayee and Lawrence Tan and Vijay Vasudevan FAWN: a Fast Array of Wimpy Nodes . . . 101--109 John Ousterhout Is scale your enemy, or is scale your friend?: technical perspective . . . . . 110--110 Kinshuman Kinshumann and Kirk Glerum and Steve Greenberg and Gabriel Aul and Vince Orgovan and Greg Nichols and David Grant and Gretchen Loihle and Galen Hunt Debugging in the (very) large: ten years of implementation and experience . . . . 111--116 Rudy Rucker Future tense . . . . . . . . . . . . . . 120--ff John Ousterhout and Parag Agrawal and David Erickson and Christos Kozyrakis and Jacob Leverich and David Mazi\`eres and Subhasish Mitra and Aravind Narayanan and Diego Ongaro and Guru Parulkar and Mendel Rosenblum and Stephen M. Rumble and Eric Stratmann and Ryan Stutsman The case for RAMCloud . . . . . . . . . 121--130 Gargi Dasgupta and Amit Sharma and Akshat Verma and Anindya Neogi and Ravi Kothari Workload management for power efficiency in virtualized data centers . . . . . . 131--141
Sorel Reisman and Alain Chesnais From the Presidents of the IEEE Computer Society and ACM . . . . . . . . . . . . 5--5 CACM Staff A policy that deters violation of security policy . . . . . . . . . . . . 7--7 CACM Staff In the Virtual Extension . . . . . . . . 8--8 Michael Stonebraker Stonebraker on NoSQL and enterprises . . 10--11 Scott E. Delman Why you should be happy to sign in! . . 12--12 Kirk L. Kroeker A new benchmark for artificial intelligence . . . . . . . . . . . . . . 13--15 Tom Geller Supercomputing's exaflop target . . . . 16--18 Samuel Greengard Life, translated . . . . . . . . . . . . 19--21 Jonathon N. Cummings Geography is alive and well in virtual teams . . . . . . . . . . . . . . . . . 24--26 Betsy DiSalvo and Amy Bruckman From interests to values . . . . . . . . 27--29 S. M. Bellovin and S. O. Bradner and W. Diffie and S. Landau and J. Rexford Privacy and Security: As simple as possible---but not more so: An assessment of the U.S. government's EINSTEIN project . . . . . . . . . . . . 30--33 George V. Neville-Neil Storage strife . . . . . . . . . . . . . 34--35 Joseph Y. Halpern and David C. Parkes Journals for certification, conferences for rapid dissemination . . . . . . . . 36--38 Eric Allman The robustness principle reconsidered 40--45 Satnam Singh Computing without processors . . . . . . 46--54 Oren Eini The pain of implementing LINQ providers 55--61 Dharmendra S. Modha and Rajagopal Ananthanarayanan and Steven K. Esser and Anthony Ndirango and Anthony J. Sherbondy and Raghavendra Singh Cognitive computing . . . . . . . . . . 62--71 J. McGrath Cohoon and Sergey Nigai and Joseph ``Jofish'' Kaye Gender and computing conference papers 72--80 Luca De Alfaro and Ashutosh Kulshreshtha and Ian Pye and B. Thomas Adler Reputation systems for open collaboration . . . . . . . . . . . . . 81--87 Surajit Chaudhuri and Umeshwar Dayal and Vivek Narasayya An overview of business intelligence technology . . . . . . . . . . . . . . . 88--98 Peter J. Haas Sketches get sketchier . . . . . . . . . 100--100 Ping Li and Arnd Christian König Theory and applications of $b$-bit minwise hashing . . . . . . . . . . . . 101--109 Scott Klemmer Skintroducing the future . . . . . . . . 110--110 Chris Harrison and Desney Tan and Dan Morris Skinput: appropriating the skin as an interactive canvas . . . . . . . . . . . 111--118 Peter Winkler Last Byte: Puzzled: Uncommon Divisors 120--120 David Wright Should privacy impact assessments be mandatory? . . . . . . . . . . . . . . . 121--131 Sanjay Goel Cyberwarfare: connecting the dots in cyber intelligence . . . . . . . . . . . 132--140
Moshe Y. Vardi Are you talking to me? . . . . . . . . . 5--5 CACM Staff Solved, for all practical purposes . . . 7--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Jeannette M. Wing and Valerie Barr Jeannette M. Wing @ PCAST; Barbara Liskov keynote . . . . . . . . . . . . . 10--11 Kirk L. Kroeker A breakthrough in algorithm design . . . 13--15 Gary Anthes Invasion of the mobile apps . . . . . . 16--18 Samuel Greengard In Memoriam: Robert Morris, 1932--2011 17--17 Neil Savage Remaking American medicine . . . . . . . 19--21 Rebecca Tushnet Remix nation . . . . . . . . . . . . . . 22--24 Martin Campbell-Kelly In praise of 'Wilkes, Wheeler, and Gill' 25--27 Ron Babin and Steve Briggs and Brian Nicholson Corporate social responsibility and global IT outsourcing . . . . . . . . . 28--30 Peter J. Denning and Ritu Raj Managing time, part 2 . . . . . . . . . 31--33 Ben Shneiderman and Jennifer Preece and Peter Pirolli Realizing the value of social media requires innovative computing research 34--37 Paul Vixie Arrogance in business planning . . . . . 38--41 Poul-Henning Kamp The most expensive one-byte mistake . . 42--44 Mache Creeger ACM CTO roundtable on mobile devices in the enterprise . . . . . . . . . . . . . 45--53 Stephen J. Lukasik Protecting users of the cyber commons 54--61 Craig Partridge Realizing the future of wireless data communications . . . . . . . . . . . . . 62--68 Leonardo De Moura and Nikolaj Bjòrner Satisfiability modulo theories: introduction and applications . . . . . 69--77 Patricia Bouyer and Uli Fahrenberg and Kim G. Larsen and Nicolas Markey Quantitative analysis of real-time systems using priced timed automata . . 78--87 Christopher Kruegel Making browser extensions secure: technical perspective . . . . . . . . . 90--90 Sruthi Bandhakavi and Nandit Tiku and Wyatt Pittman and Samuel T. King and P. Madhusudan and Marianne Winslett Vetting browser extensions for security vulnerabilities with VEX . . . . . . . . 91--99 Olivier Danvy and Jan Midtgaard Abstracting abstract machines: technical perspective . . . . . . . . . . . . . . 100--100 David Van Horn and Matthew Might Abstracting abstract machines: a systematic approach to higher-order program analysis . . . . . . . . . . . . 101--109 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 110--110 Leah Hoffmann Last Byte: Q&A: Scaling Up . . . . . . . 112--ff Monideepa Tarafdar and Qiang Tu and T. S. Ragu-Nathan and Bhanu S. Ragu-Nathan Crossing to the dark side: examining creators, outcomes, and inhibitors of technostress . . . . . . . . . . . . . . 113--120 Murray Cantor Calculating and improving ROI in software and system programs . . . . . . 121--130
Ronald F. Boisvert and Jack W. Davidson ACM's copyright policy . . . . . . . . . 5--6 CACM Staff In the Virtual Extension . . . . . . . . 7--7 Daniel Reed and Mark Guzdial From idea to product: how schools of education can help CS . . . . . . . . . 8--9 Scott E. Delman ACM TechNews now available in the Android Market . . . . . . . . . . . . . 10--10 Kirk L. Kroeker Improving brain-computer interfaces . . 11--14 Tom Geller Seeing is not enough . . . . . . . . . . 15--16 Samuel Greengard Living in a digital world . . . . . . . 17--19 Marina Krakovsky Success at 16 . . . . . . . . . . . . . 20--20 Michael A. Cusumano The platform leader's dilemma . . . . . 21--24 George V. Neville-Neil File-system litter . . . . . . . . . . . 25--26 Carsten Schürmann Modernizing the Danish democratic process . . . . . . . . . . . . . . . . 27--29 Phillip G. Armour Testing: failing to succeed . . . . . . 30--31 Dan S. Wallach Rebooting the CS publication process . . 32--35 Rishiyur S. Nikhil Abstraction in hardware system design 36--44 Erik Meijer The world according to LINQ . . . . . . 45--51 B. Scott Andersen and George Romanski Verification of safety-critical software 52--57 John Arquilla From blitzkrieg to bitskrieg: the military encounter with computers . . . 58--65 Sarah Cohen and James T. Hamilton and Fred Turner Computational journalism . . . . . . . . 66--71 Jasmin Fisher and David Harel and Thomas A. Henzinger Biology as reactivity . . . . . . . . . 72--82 Charles Moore Power efficiency as the #1 design constraint: technical perspective . . . 84--84 Rehan Hameed and Wajahat Qadeer and Megan Wachs and Omid Azizi and Alex Solomatnikov and Benjamin C. Lee and Stephen Richardson and Christos Kozyrakis and Mark Horowitz Understanding sources of inefficiency in general-purpose chips . . . . . . . . . 85--93 Geoffrey E. Hinton A better way to learn features: technical perspective . . . . . . . . . 94--94 Honglak Lee and Roger Grosse and Rajesh Ranganath and Andrew Y. Ng Unsupervised learning of hierarchical representations with convolutional deep belief networks . . . . . . . . . . . . 95--103 Carlo Tomasi Visual reconstruction: technical perspective . . . . . . . . . . . . . . 104--104 Sameer Agarwal and Yasutaka Furukawa and Noah Snavely and Ian Simon and Brian Curless and Steven M. Seitz and Richard Szeliski Building Rome in a day . . . . . . . . . 105--112 Shumeet Baluja Future tense . . . . . . . . . . . . . . 120--ff Daniel Gayo-Avello Don't turn social media into another `Literary Digest' poll . . . . . . . . . 121--128 Zhiwei Xu and Guojie Li Computing for the masses . . . . . . . . 129--137
Moshe Y. Vardi Is Moore's Party over? . . . . . . . . . 5--5 CACM Staff Justice for Jahromi . . . . . . . . . . 6--7 CACM Staff In the Virtual Extension . . . . . . . . 9--9 Bertrand Meyer and Greg Linden In support of open reviews: better teaching through large-scale data mining 12--13 Scott E. Delman ACM offers a new approach to self-archiving . . . . . . . . . . . . . 14--14 Kirk L. Kroeker Modeling chaotic storms . . . . . . . . 15--17 Alex Wright Hacking cars . . . . . . . . . . . . . . 18--19 Leah Hoffmann Risky business . . . . . . . . . . . . . 20--22 Hannes Tschofenig Security risks in next-generation emergency services . . . . . . . . . . . 23--25 Scott Wallsten What gets measured gets done . . . . . . 26--28 Pamela Samuelson Why the Google book settlement failed: and what comes next? . . . . . . . . . . 29--31 Michael Davis Will software engineering ever be engineering? . . . . . . . . . . . . . . 32--34 SIGCSE Teaching-Oriented Faculty Working Group Teaching-oriented faculty at research universities . . . . . . . . . . . . . . 35--37 Douglas Baumann and Susanne Hambrusch and Jennifer Neville Gender demographics trends and changes in U.S. CS departments . . . . . . . . . 38--42 Poul-Henning Kamp The software industry is the problem . . 44--47 Li Gong Java security architecture revisited . . 48--52 Yaron Minsky OCaml for the masses . . . . . . . . . . 53--58 Marti A. Hearst 'Natural' search user interfaces . . . . 60--67 DongBack Seo and Albert Boonstra and Marjolein Offenbeek Managing IS adoption in ambivalent groups . . . . . . . . . . . . . . . . . 68--73 Ken Kennedy and Charles Koelbel and Hans Zima The rise and fall of High Performance Fortran . . . . . . . . . . . . . . . . 74--82 Ian F. Akyildiz and Josep Miquel Jornet and Massimiliano Pierobon Nanonetworks: a new frontier in communications . . . . . . . . . . . . . 84--89 Butler Lampson Making untrusted code useful: technical perspective . . . . . . . . . . . . . . 92--92 Nickolai Zeldovich and Silas Boyd-Wickizer and Eddie Kohler and David Mazi\`eres Making information flow explicit in HiStar . . . . . . . . . . . . . . . . . 93--101 William T. Freeman A perfect `match': technical perspective 102--102 Connelly Barnes and Dan B. Goldman and Eli Shechtman and Adam Finkelstein The PatchMatch randomized matching algorithm for image manipulation . . . . 103--110 Peter Winkler Last Byte: Puzzled: Distances Between Points on the Plane . . . . . . . . . . 120--120 Hector Garcia-Molina and Georgia Koutrika and Aditya Parameswaran Information seeking: convergence of search, recommendations, and advertising 121--130
Moshe Y. Vardi Computing for humans . . . . . . . . . . 5--5 CACM Staff To boost presentation quality, ask questions . . . . . . . . . . . . . . . 7--7 John Langford and Judy Robertson Conferences and video lectures; scientific educational games . . . . . . 8--9 CACM Staff Nominees for elections and report of the ACM Nominating Committee . . . . . . . . 10--10 Kirk L. Kroeker The rise of molecular machines . . . . . 11--13 Gregory Goth Brave NUI world . . . . . . . . . . . . 14--16 Dennis McCafferty Activism vs. slacktivism . . . . . . . . 17--19 Samuel Greengard CSEdWeek takes hold . . . . . . . . . . 20--20 Paul Hyman Dennis Ritchie, 1941--2011 . . . . . . . 21--21 Jaron Lanier The most ancient marketing . . . . . . . 22--23 Genevieve Bell Life, death, and the iPad: cultural symbols and Steve Jobs . . . . . . . . . 24--25 Michael A. Cusumano The legacy of Steve Jobs . . . . . . . . 26--28 Kentaro Toyama On turbocharged, heat-seeking, robotic fishing poles . . . . . . . . . . . . . 29--31 George V. Neville-Neil Debugging on live systems . . . . . . . 32--33 Valerie Taylor and Richard Ladner Data trends on minorities and people with disabilities in computing . . . . . 34--37 Peter J. Denning The grounding practice . . . . . . . . . 38--40 Andrew Bernat and Eric Grimson Doctoral program rankings for U.S. computing programs: the National Research Council strikes out . . . . . . 41--43 David Pacheco Postmortem debugging in dynamic environments . . . . . . . . . . . . . . 44--51 G. Bruce Berriman and Steven L. Groom How will astronomy archives survive the data tsunami? . . . . . . . . . . . . . 52--56 Robert Green and Henry Ledgard Coding guidelines: finding the art in the science . . . . . . . . . . . . . . 57--63 Brian E. Moore and Saad Ali and Ramin Mehran and Mubarak Shah Visual crowd surveillance through a hydrodynamics lens . . . . . . . . . . . 64--73 Manuel Sojer and Joachim Henkel License risks from ad hoc reuse of code from the Internet . . . . . . . . . . . 74--81 Ganesh Gopalakrishnan and Robert M. Kirby and Stephen Siegel and Rajeev Thakur and William Gropp and Ewing Lusk and Bronis R. De Supinski and Martin Schulz and Greg Bronevetsky Formal analysis of MPI-based parallel programs . . . . . . . . . . . . . . . . 82--91 Gerhard Brewka and Thomas Eiter and Miros\law Truszczy\'nski Answer set programming at a glance . . . 92--103 Xavier Leroy Safety first!: technical perspective . . 122--122 Jean Yang and Chris Hawblitzel Safe to the last instruction: automated verification of a type-safe operating system . . . . . . . . . . . . . . . . . 123--131 Vitaly Shmatikov Anonymity is not privacy: technical perspective . . . . . . . . . . . . . . 132--132 Lars Backstrom and Cynthia Dwork and Jon Kleinberg Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography . . . . . . . . 133--141 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 142--142 Leah Hoffmann Last Byte: Q&A: Scaling Up: M. Frans Kaashoek talks about multicore computing, security, and operating system design . . . . . . . . . . . . . 144, 143
Moshe Y. Vardi Artificial intelligence: past and future 5--5 CACM Staff Software engineering is engineering . . 6--7 Alain Chesnais ACM President's letter . . . . . . . . . 8--8 Alain Chesnais ACM's annual report . . . . . . . . . . 9--13 Mark Guzdial and Bertrand Meyer Understanding CS1 students; defective software . . . . . . . . . . . . . . . . 14--15 Scott Delman eBooks will abound in the ACM Digital Library . . . . . . . . . . . . . . . . 16--16 Neil Savage Better medicine through machine learning 17--19 Gary Anthes Revamping storage performance . . . . . 20--22 Samuel Greengard Law and disorder . . . . . . . . . . . . 23--25 Sarah Underwood Celebration time . . . . . . . . . . . . 26--26 Alex Wright Analyzing Apple products . . . . . . . . 27--27 Paul Hyman John McCarthy, 1927--2011 . . . . . . . 28--29 Randal C. Picker The yin and yang of copyright and technology . . . . . . . . . . . . . . . 30--32 Phillip G. Armour The difference engine . . . . . . . . . 33--34 Thomas Haigh The IBM PC: from beige box to industry standard . . . . . . . . . . . . . . . . 35--37 Kai A. Olsen and Alessio Malizia Interfaces for the ordinary user: can we hide too much? . . . . . . . . . . . . . 38--40 Philip L. Frana An interview with Stephen A. Cook . . . 41--46 Matthew Flatt Creating languages in Racket . . . . . . 48--56 Jim Gettys and Kathleen Nichols Bufferbloat: dark buffers in the Internet . . . . . . . . . . . . . . . . 57--65 Carl Waldspurger and Mendel Rosenblum I/O virtualization . . . . . . . . . . . 66--73 Jason Hong The state of phishing attacks . . . . . 74--81 Geoff Coulson and Barry Porter and Ioannis Chatzigiannakis and Christos Koninis and Stefan Fischer and Dennis Pfisterer and Daniel Bimschas and Torsten Braun and Philipp Hurni and Markus Anwander and Gerald Wagenknecht and Sándor P. Fekete and Alexander Kröller and Tobias Baumgartner Flexible experimentation in wireless sensor networks . . . . . . . . . . . . 82--90 Chi-Sung Laih and Shang-Ming Jen and Chia-Yu Lu Long-term confidentiality of PKI . . . . 91--95 Roberto Manduchi and James Coughlan (Computer) vision without sight . . . . 96--104 Frédo Durand Where do people draw lines?: technical perspective . . . . . . . . . . . . . . 106--106 Forrester Cole and Aleksey Golovinskiy and Alex Limpaecher and Heather Stoddart Barros and Adam Finkelstein and Thomas Funkhouser and Szymon Rusinkiewicz Where do people draw lines? . . . . . . 107--115 Jim Kurose Content-centric networking: technical perspective . . . . . . . . . . . . . . 116--116 Van Jacobson and Diana K. Smetters and James D. Thornton and Michael Plass and Nick Briggs and Rebecca Braynard Networking named content . . . . . . . . 117--124 Daniel H. Wilson Future tense . . . . . . . . . . . . . . 136--ff
Fabrizio Gagliardi Revisiting ACM Europe . . . . . . . . . 5--5 Phil Brooke and Vladik Kreinovich Letters: Credit non-anonymous reviewers with a name . . . . . . . . . . . . . . 6--7 Lawrence C. Paulson and Poul-Henning Kamp Letters: What Liability for Faulty Software? . . . . . . . . . . . . . . . 6--7 Ian Joyner Letters: The [Steve] Jobs Factor . . . . 6--7 August Schau and Charles H. Lindsey Letters: Give Me Competent Communication 6--7 Michael Stonebraker and Jason Hong Researchers' big data crisis; understanding design and functionality 10--11 Gregory Goth The science of better science . . . . . 13--15 Samuel Greengard The war against botnets . . . . . . . . 16--18 Alex Wright The social life of robots . . . . . . . 19--21 CACM Staff ACM Fellows inducted . . . . . . . . . . 23--23 Gregory Rosston Incentive auctions . . . . . . . . . . . 24--26 Beth Simon and Quintin Cutts Peer instruction: a teaching method to foster deep understanding . . . . . . . 27--29 Donald A. Norman Yet another technology cusp: confusion, vendor wars, and opportunities . . . . . 30--32 George V. Neville-Neil Wanton acts of debuggery . . . . . . . . 33--34 Rose McDermott Emotion and security . . . . . . . . . . 35--37 Marvin V. Zelkowitz What have we learned about software engineering? . . . . . . . . . . . . . . 38--39 Vint Cerf and Van Jacobson and Nick Weaver and Jim Gettys BufferBloat: what's wrong with the Internet? . . . . . . . . . . . . . . . 40--47 Hans-J. Boehm and Sarita V. Adve You don't know jack about shared variables or memory models . . . . . . . 48--54 Adam Oliner and Archana Ganapathi and Wei Xu Advances and challenges in log analysis 55--61 Nicholas Evangelopoulos and Lucian Visinescu Text-mining the voice of the people . . 62--69 Holger H. Hoos Programming by optimization . . . . . . 70--80 Bryce Allen and John Bresnahan and Lisa Childers and Ian Foster and Gopi Kandaswamy and Raj Kettimuthu and Jack Kordas and Mike Link and Stuart Martin and Karl Pickett and Steven Tuecke Software as a service for data scientists . . . . . . . . . . . . . . . 81--88 Miad Faezipour and Mehrdad Nourani and Adnan Saeed and Sateesh Addepalli Progress and challenges in intelligent vehicle area networks . . . . . . . . . 90--100 Rastislav Bodik Compiling what to how: technical perspective . . . . . . . . . . . . . . 102--102 Viktor Kuncak and Mikaël Mayer and Ruzica Piskac and Philippe Suter Software synthesis procedures . . . . . 103--111 Santosh S. Vempala Modeling high-dimensional data: technical perspective . . . . . . . . . 112--112 Adam Tauman Kalai and Ankur Moitra and Gregory Valiant Disentangling Gaussians . . . . . . . . 113--120 Peter Winkler Last Byte: Puzzled: Where Sets Meet (Venn Diagrams) . . . . . . . . . . . . 128--128
Moshe Y. Vardi What is an algorithm? . . . . . . . . . 5--5 CACM Staff From syntax to semantics for AI . . . . 6--7 Bertrand Meyer Knowledgeable beginners . . . . . . . . 10--11 Neil Savage Gaining wisdom from crowds . . . . . . . 13--15 Gary Anthes Computing with magnets . . . . . . . . . 16--18 Samuel Greengard Policing the future . . . . . . . . . . 19--21 Paul Hyman Stanford schooling---gratis! . . . . . . 22--22 Jack Rosenberger Computer science awards . . . . . . . . 23--23 Patrick Lin and Fritz Allhoff and Neil C. Rowe War 2.0: cyberweapons and ethics . . . . 24--26 Pamela Samuelson Legally Speaking: Do software copyrights protect what programs do? . . . . . . . 27--29 Peter J. Denning Viewpoint: The Profession of IT: The idea idea . . . . . . . . . . . . . . . 30--32 Vassilis Kostakos Viewpoint: Training users vs. training soldiers: experiences from the battlefield . . . . . . . . . . . . . . 33--35 Alessio Malizia and Andrea Bellucci Viewpoint: The artificiality of natural user interfaces . . . . . . . . . . . . 36--38 Patrice Godefroid and Michael Y. Levin and David Molnar SAGE: whitebox fuzzing for security testing . . . . . . . . . . . . . . . . 40--44 Luigi Rizzo Revisiting network I/O APIs: the netmap framework . . . . . . . . . . . . . . . 45--51 Poul-Henning Kamp The hyperdimensional tar pit . . . . . . 52--53 Youngki Lee and S. S. Iyengar and Chulhong Min and Younghyun Ju and Seungwoo Kang and Taiwoo Park and Jinwon Lee and Yunseok Rhee and Junehwa Song MobiCon: a mobile context-monitoring platform . . . . . . . . . . . . . . . . 54--65 Seung Hyun Kim and Qiu-Hong Wang and Johannes B. Ullrich A comparative study of cyberattacks . . 66--73 S. Barry Cooper Turing's Titanic machine? . . . . . . . 74--83 J. Y. Huang and C. H. Tsai and S. T. Huang The next generation of GPS navigation systems . . . . . . . . . . . . . . . . 84--93 Steven D. Gribble The benefits of capability-based protection: technical perspective . . . 96--96 Robert N. M. Watson and Jonathan Anderson and Ben Laurie and Kris Kennaway A taste of Capsicum: practical capabilities for UNIX . . . . . . . . . 97--104 Michael L. Littman A new way to search game trees: technical perspective . . . . . . . . . 105--105 Sylvain Gelly and Levente Kocsis and Marc Schoenauer and Mich\`ele Sebag and David Silver and Csaba Szepesvári and Olivier Teytaud The grand challenge of computer Go: Monte Carlo tree search and extensions 106--113 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 118--118 Leah Hoffmann Q&A: Chief Strategiest . . . . . . . . . 120--ff
Yunhao Liu and Vincent Shen ACM China Council . . . . . . . . . . . 5--5 CACM Staff The beauty of simplicity . . . . . . . . 6--7 Daniel Reed and Mark Guzdial The power of computing; design guidelines in CS education . . . . . . . 8--9 Gregory Goth Preserving digital data . . . . . . . . 11--13 Tom Geller Talking to machines . . . . . . . . . . 14--16 Leah Hoffmann Open for business . . . . . . . . . . . 17--19 Michael A. Cusumano Can services and platform thinking help the U.S. Postal Service? . . . . . . . . 21--23 Richard Heeks Information technology and gross national happiness . . . . . . . . . . . 24--26 George V. Neville-Neil The network protocol battle . . . . . . 27--28 Jill Ross and Elizabeth Litzler and J. McGrath Cohoon and Lucy Sanders Improving gender composition in computing . . . . . . . . . . . . . . . 29--31 Selma Tekir Reading CS classics . . . . . . . . . . 32--34 Daniel Soper Is human mobility tracking a good idea? 35--37 Brian Beckman Why LINQ matters: cloud composability guaranteed . . . . . . . . . . . . . . . 38--44 Jeffrey Heer and Ben Shneiderman Interactive dynamics for visual analysis 45--54 Andrew Danowitz and Kyle Kelley and James Mao and John P. Stevenson and Mark Horowitz CPU DB: recording microprocessor history 55--63 Martin Schmettow Sample size in usability studies . . . . 64--70 Laurie Williams What agile teams think of agile principles . . . . . . . . . . . . . . . 71--76 David M. Blei Probabilistic topic models . . . . . . . 77--84 Sarvapali D. Ramchurn and Perukrishnen Vytelingum and Alex Rogers and Nicholas R. Jennings Putting the `smarts' into the smart grid: a grand challenge for artificial intelligence . . . . . . . . . . . . . . 86--97 Dinesh Manocha Building robust dynamical simulation systems: technical perspective . . . . . 101--101 David Harmon and Etienne Vouga and Breannan Smith and Rasmus Tamstorf and Eitan Grinspun Asynchronous contact mechanics . . . . . 102--109 Ed H. Chi Who knows?: searching for expertise on the social web: technical perspective 110--110 Damon Horowitz and Sepandar D. Kamvar Searching the village: models and methods for social search . . . . . . . 111--118 Brian Clegg Future tense . . . . . . . . . . . . . . 120--ff
Moshe Y. Vardi Fair access . . . . . . . . . . . . . . 5--5 Judy Robertson Likert-type scales, statistical methods, and effect sizes . . . . . . . . . . . . 6--7 Neil Savage Automating scientific discovery . . . . 9--11 Alex Wright Robots like us . . . . . . . . . . . . . 12--13 Samuel Greengard Digitally possessed . . . . . . . . . . 14--16 Paul Hyman A workshop revival . . . . . . . . . . . 17--17 Gerald Segal ACM's 2012 general election . . . . . . 19--29 Peter S. Menell Design for symbiosis . . . . . . . . . . 30--32 David Anderson The future of the past . . . . . . . . . 33--34 Joel Waldfogel Digitization and copyright: some recent evidence from music . . . . . . . . . . 35--37 Alexander Repenning Programming goes back to school . . . . 38--40 Abraham Bernstein and Mark Klein and Thomas W. Malone Programming the global brain . . . . . . 41--43 Armando Fox and David Patterson Crossing the software education chasm 44--49 Eric Allman Managing technical debt . . . . . . . . 50--55 Pat Helland Idempotence is not a medical condition 56--65 Erik Meijer Your mouse is a database . . . . . . . . 66--73 Alok Choudhary and William Hendrix and Kathy Lee and Diana Palsetia and Wei-Keng Liao Social media evolution of the Egyptian revolution . . . . . . . . . . . . . . . 74--80 Daniel S. Soper and Ofir Turel An $n$-gram analysis of Communications 2000--2010 . . . . . . . . . . . . . . . 81--87 Nir Atias and Roded Sharan Comparative analysis of protein networks: hard problems, practical solutions . . . . . . . . . . . . . . . 88--97 William Gropp Best algorithms $+$ best computers $=$ powerful match . . . . . . . . . . . . . 100--100 Ilya Lashuk and Aparna Chandramowlishwaran and Harper Langston and Tuan-Anh Nguyen and Rahul Sampath and Aashay Shringarpure and Richard Vuduc and Lexing Ying and Denis Zorin and George Biros A massively parallel adaptive fast multipole method on heterogeneous architectures . . . . . . . . . . . . . 101--109 Steven Hand An experiment in determinism . . . . . . 110--110 Amittai Aviram and Shu-Chun Weng and Sen Hu and Bryan Ford Efficient system-enforced deterministic parallelism . . . . . . . . . . . . . . 111--119 Peter Winkler Last Byte: Puzzled: Designs on Square Grids . . . . . . . . . . . . . . . . . 120--120
Eugene H. Spafford USACM and U.S. legislation . . . . . . . 5--5 CACM Staff The halting problem in the clear light of probability . . . . . . . . . . . . . 6--7 Jason Hong and Greg Linden Protecting against data breaches; living with mistakes . . . . . . . . . . . . . 10--11 Scott E. Delman Don't throw the baby out with the bathwater . . . . . . . . . . . . . . . 12--12 Gregory Goth Analyzing medical data . . . . . . . . . 13--15 Gary Anthes Smarter photography . . . . . . . . . . 16--18 Leah Hoffmann Data mining meets city hall . . . . . . 19--21 Neil Savage Game changer . . . . . . . . . . . . . . 22--23 Paul Hyman An influential theoretician . . . . . . 24--24 Phillip G. Armour A measure of control . . . . . . . . . . 26--28 Simson L. Garfinkel The cybersecurity risk . . . . . . . . . 29--32 George V. Neville-Neil Scale failure . . . . . . . . . . . . . 33--34 Chris Hall Security of the Internet and the known unknowns . . . . . . . . . . . . . . . . 35--37 Peter J. Denning and Nicholas Dew The myth of the elevator pitch . . . . . 38--40 Herbert Lin Why computer scientists should care about cyber conflict and U.S. national security policy . . . . . . . . . . . . 41--43 Dennis Abts and Bob Felderman A guided tour of data-center networking 44--51 David Crandall and Noah Snavely Modeling people and places with Internet photo collections . . . . . . . . . . . 52--60 Kari Pulli and Anatoly Baksheev and Kirill Kornyakov and Victor Eruhimov Real-time computer vision with OpenCV 61--69 Benjamin Doer and Mahmoud Fouz and Tobias Friedrich Why rumors spread so quickly in social networks . . . . . . . . . . . . . . . . 70--75 Bryan Parno Trust extension for commodity computers 76--85 Michael J. Carey and Nicola Onose and Michalis Petropoulos Data services . . . . . . . . . . . . . 86--97 Ketan D. Mulmuley The GCT program toward the P vs. NP problem . . . . . . . . . . . . . . . . 98--107 Pablo A. Parrilo Reconstructing the unknown, balancing structure and uncertainty: technical perspective . . . . . . . . . . . . . . 110--110 Emmanuel Cand\`es and Benjamin Recht Exact matrix completion via convex optimization . . . . . . . . . . . . . . 111--119 Peter Lee The fox and the hedgehog: technical perspective . . . . . . . . . . . . . . 120--120 Tiark Rompf and Martin Odersky Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs . . . . . . . . . . . . . 121--130 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 133--133 Leah Hoffmann Last Byte: Q&A: a Sure Thing . . . . . . 136, 135
Moshe Y. Vardi Predatory scholarly publishing . . . . . 5--5 CACM Staff An integral number and its consequences 7--8 Mark Guzdial and Judy Robertson CS and popular culture; learning from console games . . . . . . . . . . . . . 10--11 Gregory Goth Degrees of separation . . . . . . . . . 13--15 Gary Anthes HTML5 leads a Web revolution . . . . . . 16--17 Marina Krakovsky Patently inadequate . . . . . . . . . . 18--20 Paul Hyman Lost and found . . . . . . . . . . . . . 21--21 Mari Sako Business models for strategy and innovation . . . . . . . . . . . . . . . 22--24 Pamela Samuelson Can online piracy be stopped by laws? 25--27 R. T. Watson and J. Corbett and M. C. Boudreau and J. Webster An information strategy for environmental sustainability . . . . . . 28--30 Martin Campbell-Kelly Alan Turing's other universal machine 31--33 Alfred Spector and Peter Norvig and Slav Petrov Google's hybrid approach to research . . 34--37 Sarah Spiekermann The challenges of privacy by design . . 38--40 Kathleen Nichols and Van Jacobson Controlling queue delay . . . . . . . . 42--50 Poul-Henning Kamp My compiler does not understand me . . . 51--53 Eric Bouwers and Joost Visser and Arie van Deursen Getting what you measure . . . . . . . . 54--59 James Abello and Peter Broadwell and Timothy R. Tangherlini Computational folkloristics . . . . . . 60--70 Ian Sommerville and Dave Cliff and Radu Calinescu and Justin Keen and Tim Kelly and Marta Kwiatkowska and John Mcdermid and Richard Paige Large-scale complex IT systems . . . . . 71--77 Milo M. K. Martin and Mark D. Hill and Daniel J. Sorin Why on-chip cache coherence is here to stay . . . . . . . . . . . . . . . . . . 78--89 David Harel and Assaf Marron and Gera Weiss Behavioral programming . . . . . . . . . 90--100 David Patterson For better or worse, benchmarks shape a field: technical perspective . . . . . . 104--104 Hadi Esmaeilzadeh and Ting Cao and Xi Yang and Stephen M. Blackburn and Kathryn S. McKinley Looking back and looking forward: power, performance, and upheaval . . . . . . . 105--114 Amos Fiat Why study the price of anarchy?: technical perspective . . . . . . . . . 115--115 Tim Roughgarden Intrinsic robustness of the price of anarchy . . . . . . . . . . . . . . . . 116--123 Ken MacLeod Future Tense: They Just Click . . . . . 128--ff Matthew Swinarski and Diane H. Parente and Rajiv Kishore Do small IT firms benefit from higher process capability? . . . . . . . . . . 129--134
Bill Poucher Giving students the competitive edge . . 5--5 CACM Staff Composable trees for configurable behavior . . . . . . . . . . . . . . . . 7--7 John Langford and Ruben Ortega Machine learning and algorithms: agile development . . . . . . . . . . . . . . 10--11 Jeff Kanipe Cosmic simulations . . . . . . . . . . . 13--15 Tom Geller DARPA Shredder challenge solved . . . . 16--17 Samuel Greengard Advertising gets personal . . . . . . . 18--20 Karen A. Frenkel Broader horizons . . . . . . . . . . . . 21--21 Paul Tjia Inside the hermit kingdom: IT and outsourcing in North Korea . . . . . . . 22--25 Fred G. Martin Will massive open online courses change how we teach? . . . . . . . . . . . . . 26--28 Danah Boyd The politics of ``real names'' . . . . . 29--31 George V. Neville-Neil A system is not a product . . . . . . . 32--33 Chris Forman and Avi Goldfarb and Shane Greenstein The Internet is everywhere, but the payoff is not . . . . . . . . . . . . . 34--35 Kai A. Olsen and Hans Fredrik Nordhaug Internet elections: unsafe in any home? 36--38 Neil McBride The ethics of software engineering should be an ethics for the client . . . 39--41 Thomas A. Limoncelli OpenFlow: a radical new idea in networking . . . . . . . . . . . . . . . 42--47 Rafael Vanoni Polanczyk Extending the semantics of scheduling priorities . . . . . . . . . . . . . . . 48--52 Manuel Serrano and Gérard Berry Multitier programming in Hop . . . . . . 53--59 Stephen B. Wicker The loss of location privacy in the cellular age . . . . . . . . . . . . . . 60--68 Bjorn De Sutter and Aäron Van Den Oord To be or not to be cited in computer science . . . . . . . . . . . . . . . . 69--75 Wil Van Der Aalst Process mining . . . . . . . . . . . . . 76--83 Scott Aaronson and Edward Farhi and David Gosset and Avinatan Hassidim and Jonathan Kelner and Andrew Lutomirski Quantum money . . . . . . . . . . . . . 84--92 Martin C. Rinard Example-driven program synthesis for end-user programming: technical perspective . . . . . . . . . . . . . . 96--96 Sumit Gulwani and William R. Harris and Rishabh Singh Spreadsheet data manipulation using examples . . . . . . . . . . . . . . . . 97--105 Andreas Zeller Proving programs continuous: technical perspective . . . . . . . . . . . . . . 106--106 Swarat Chaudhuri and Sumit Gulwani and Roberto Lublinerman Continuity and robustness of programs 107--115 Peter Winkler Last Byte: Puzzled: Find the Magic Set 120--120
Moshe Y. Vardi Why ACM? . . . . . . . . . . . . . . . . 5--5 CACM Staff Operationalizing privacy by design . . . 7--7 Bertrand Meyer Incremental research vs. paradigm-shift mania . . . . . . . . . . . . . . . . . 8--9 Gregory Goth Atomic-level computing . . . . . . . . . 11--13 Gary Anthes Chips go upscale . . . . . . . . . . . . 14--16 Marina Krakovsky Garbage in, info out . . . . . . . . . . 17--19 Paul Hyman In honor of Alan Turing . . . . . . . . 20--23 Thomas Haigh Seven lessons from bad history . . . . . 26--29 Peter J. Denning Don't feel bad if you can't predict the future . . . . . . . . . . . . . . . . . 30--32 Tal Z. Zarsky Automated prediction: perception, law, and policy . . . . . . . . . . . . . . . 33--35 Richard E. Ladner and Elizabeth Litzler The need to balance innovation and implementation in broadening participation . . . . . . . . . . . . . 36--38 Esperanza Marcos and Juan Manuel Vara and Valeria de Castro Author order: what science can learn from the arts . . . . . . . . . . . . . 39--41 Christos H. Papadimitriou Alan and I: a personal account of Alan Turing's life and impact . . . . . . . . 42--43 David Chisnall A new Objective-C runtime: from research to production . . . . . . . . . . . . . 44--47 Emery D. Berger Software needs seatbelts and airbags . . 48--53 Erik Meijer All your database are belong to us . . . 54--60 Gary Garrison and Sanghyun Kim and Robin L. Wakefield Success factors for deploying cloud computing . . . . . . . . . . . . . . . 62--68 Radu Calinescu and Carlo Ghezzi and Marta Kwiatkowska and Raffaela Mirandola Self-adaptive software needs quantitative verification at runtime . . 69--77 Doug A. Bowman and Ryan P. McMahan and Eric D. Ragan Questioning naturalism in $3$D user interfaces . . . . . . . . . . . . . . . 78--88 William A. Buxton Innovative interaction: from concept to the wild: technical perspective . . . . 90--90 Shumin Zhai and Per Ola Kristensson The word-gesture keyboard: reimagining keyboard interaction . . . . . . . . . . 91--101 Dan Suciu SQL on an encrypted database: technical perspective . . . . . . . . . . . . . . 102--102 Raluca Ada Popa and Catherine M. S. Redfield and Nickolai Zeldovich and Hari Balakrishnan CryptDB: processing queries on an encrypted database . . . . . . . . . . . 103--111 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 117--117 Leah Hoffmann Q&A: What Women Want . . . . . . . . . . 120, 119
Vinton G. Cerf Where is the science in computer science? . . . . . . . . . . . . . . . . 5--5 CACM Staff When harm to conference reputation is self-inflicted . . . . . . . . . . . . . 6--7 Daniel Reed and Ed H. Chi Online privacy; replicating research results . . . . . . . . . . . . . . . . 8--9 Neil Savage Digging for drug facts . . . . . . . . . 11--13 Gregory Mone Redesigning the data center . . . . . . 14--16 Leah Hoffmann Computer science and the three Rs . . . 17--19 Michael A. Cusumano Reflecting on the Facebook IPO . . . . . 20--23 Phillip G. Armour The Goldilocks estimate . . . . . . . . 24--25 Peter G. Neumann The foresight saga, redux . . . . . . . 26--29 George V. Neville-Neil A nice piece of code . . . . . . . . . . 30--31 Jean-François Blanchette Computing as if infrastructure mattered 32--34 Ivan Sutherland The tyranny of the clock . . . . . . . . 35--36 Rick Ratzel and Rodney Greenstreet Toward higher precision . . . . . . . . 38--47 John Allspaw Fault injection in production . . . . . 48--52 Poul-Henning Kamp A generation lost in the bazaar . . . . 53--55 Michael Kearns Experiments in social computation . . . 56--67 Barbara Simons and Douglas W. Jones Internet voting in the U.S. . . . . . . 68--77 Pedro Domingos A few useful things to know about machine learning . . . . . . . . . . . . 78--87 Rocco A. Servedio A high-dimensional surprise: technical perspective . . . . . . . . . . . . . . 89--89 Guy Kindler and Anup Rao and Ryan O'Donnell and Avi Wigderson Spherical cubes: optimal foams from computational hardness amplification . . 90--97 Bruce Hendrickson Graph embeddings and linear equations: technical perspective . . . . . . . . . 98--98 Ioannis Koutis and Gary L. Miller and Richard Peng A fast solver for a class of linear systems . . . . . . . . . . . . . . . . 99--107 Geoffrey A. Landis Last Byte: Future tense: Fermi's Paradox and the End of the Universe . . . . . . 112--112
Moshe Y. Vardi Will MOOCs destroy academia? . . . . . . 5--5 Vinton G. Cerf Why is accessibility so hard? . . . . . 7--7 CACM Staff When predicting, start with humility . . 8--9 Michael Stonebraker New opportunities for New SQL . . . . . 10--11 Bernard Rous Major update to ACM's Computing Classification System . . . . . . . . . 12--12 Gregory Goth Software on Mars . . . . . . . . . . . . 13--15 Tom Geller Control without controllers . . . . . . 16--18 Samuel Greengard On the digital trail . . . . . . . . . . 19--21 David Basin and Srdjan Capkun The research value of publishing attacks 22--24 Pamela Samuelson Legally speaking: Oracle v. Google: are APIs copyrightable? . . . . . . . . . . 25--27 Kristina McElheran Decentralization versus centralization in IT governance . . . . . . . . . . . . 28--30 Aman Yadav and John T. Korb Learning to teach computer science: the need for a methods course . . . . . . . 31--33 Timothy Kostyk and Joseph Herkert Societal implications of the emerging smart grid . . . . . . . . . . . . . . . 34--36 Richard A. DeMillo Keeping technology promises . . . . . . 37--39 Anonymous Resilience engineering: learning to embrace failure . . . . . . . . . . . . 40--47 Kripa Krishnan Weathering the unexpected . . . . . . . 48--52 Marshall Kirk McKusick Disks from the perspective of a file system . . . . . . . . . . . . . . . . . 53--55 Dan Boneh and Amit Sahai and Brent Waters Functional encryption: a new vision for public-key cryptography . . . . . . . . 56--64 Joerg Kurt Wegner and Aaron Sterling and Rajarshi Guha and Andreas Bender and Jean-Loup Faulon and Janna Hastings and Noel O'Boyle and John Overington and Herman Van Vlijmen and Egon Willighagen Cheminformatics . . . . . . . . . . . . 65--75 Rolf Pfeifer and Max Lungarella and Fumiya Iida The challenges ahead for bio-inspired `soft' robotics . . . . . . . . . . . . 76--87 Richard Szeliski Open platforms for computational photography: technical perspective . . . 89--89 Andrew Adams and David E. Jacobs and Jennifer Dolson and Marius Tico and Kari Pulli and Eino-Ville Talvala and Boris Ajdin and Daniel Vaquero and Hendrik P. A. Lensch and Mark Horowitz and Sung Hee Park and Natasha Gelfand and Jongmin Baek and Wojciech Matusik and Marc Levoy The Frankencamera: an experimental platform for computational photography 90--98 Henning Schulzinne The realities of home broadband: technical perspective . . . . . . . . . 99--99 Srikanth Sundaresan and Walter de Donato and Nick Feamster and Renata Teixeira and Sam Crawford and Antonio Pescap\`e Measuring home broadband performance . . 100--109 Peter Winkler Last Byte: Puzzled: Weighed in the Balance . . . . . . . . . . . . . . . . 120--120
Mary Hall Understanding ACM's past . . . . . . . . 5--5 Vinton G. Cerf Computer science revisited . . . . . . . 7--7 CACM Staff Why open access? . . . . . . . . . . . . 8--9 Mark Guzdial and Judy Robertson Levels of abstraction: pre-teens and career choices . . . . . . . . . . . . . 12--13 Gregory Goth Quantum quests . . . . . . . . . . . . . 15--17 Gary Anthes Zoom in, zoom out . . . . . . . . . . . 18--19 Paul Hyman In the year of disruptive education . . 20--22 Richard Heeks IT innovation for the bottom of the pyramid . . . . . . . . . . . . . . . . 24--27 David Anderson Saving Private Gromit . . . . . . . . . 28--30 George V. Neville-Neil Can more code mean fewer bugs? . . . . . 31--32 Peter J. Denning Moods . . . . . . . . . . . . . . . . . 33--35 Teresa A. Dahlberg Why we need an ACM Special Interest Group for broadening participation . . . 36--38 William Newman Alan Turing remembered . . . . . . . . . 39--40 Ivar Jacobson and Pan-Wei Ng and Paul E. McMahon and Ian Spence and Svante Lidman The essence of software engineering: the SEMAT kernel . . . . . . . . . . . . . . 42--49 Aiman Erbad and Charles `Buck' Krasic Sender-side buffers and the case for multimedia adaptation . . . . . . . . . 50--58 Michael Cornwell Anatomy of a solid-state drive . . . . . 59--63 Bryce Thomas and Raja Jurdak and Ian Atkinson SPDYing up the web . . . . . . . . . . . 64--73 Robert M. French Moving beyond the Turing test . . . . . 74--77 David Doty Theory of algorithmic self-assembly . . 78--88 Yannis Smaragdakis High-level data structures: technical perspective . . . . . . . . . . . . . . 90--90 Peter Hawkins and Martin Rinard and Alex Aiken and Mooly Sagiv and Kathleen Fisher An introduction to data representation synthesis . . . . . . . . . . . . . . . 91--99 Ali Jadbabaie Natural algorithms in a networked world: technical perspective . . . . . . . . . 100--100 Bernard Chazelle Natural algorithms and influence systems 101--110 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 126--126 Leah Hoffmann Q&A: As Good As It Gets . . . . . . . . . 128, 127
Moshe Y. Vardi Who begat computing? . . . . . . . . . . 5--5 Vinton G. Cerf From the President: What's a robot? . . 7--7 CACM Staff Letters to the Editor: Computer science is not a science . . . . . . . . . . . . 8--9 Alain Chesnais ACM's annual report . . . . . . . . . . 11--15 Daniel Reed BLOG@CACM: Lost in translation . . . . . 16--17 Neil Savage News: Stopping the leaks . . . . . . . . 19--21 Gregory Mone News: Beyond Hadoop . . . . . . . . . . 22--24 Marina Krakovsky News: Just the facts . . . . . . . . . . 25--27 Michael A. Cusumano Technology strategy and management: The Apple--Samsung lawsuits . . . . . . . . 28--31 Phillip G. Armour The business of software: How we build things: \ldots and why things are 90% complete . . . . . . . . . . . . . . . . 32--33 Deven Desai Law and technology: Beyond location: data security in the 21st century . . . 34--36 Thomas Haigh Historical reflections: Five lessons from really good history . . . . . . . . 37--40 Salman Khan Viewpoint: What college could be like 41--43 Jonathan Grudin and Gloria Mark and John Riedl Viewpoint: Conference-journal hybrids 44--49 Pat Helland Condos and clouds . . . . . . . . . . . 50--59 CACM Staff Browser security: appearances can be deceiving . . . . . . . . . . . . . . . 60--67 Jeremiah Grossman The Web won't be safe or secure until we break it . . . . . . . . . . . . . . . . 68--72 Richard Becker and Ramón Cáceres and Karrie Hanson and Sibren Isaacman and Ji Meng Loh and Margaret Martonosi and James Rowland and Simon Urbanek and Alexander Varshavsky and Chris Volinsky Human mobility characterization from cellular network data . . . . . . . . . 74--82 Vineet Bafna and Alin Deutsch and Andrew Heiberg and Christos Kozanitis and Lucila Ohno-Machado and George Varghese Abstractions for genomics . . . . . . . 83--93 Tamara Denning and Tadayoshi Kohno and Henry M. Levy Computer security and the modern home 94--103 Doug DeCarlo and Matthew Stone Visualization, understanding, and design: technical perspective . . . . . 105--105 Niloy J. Mitra and Yong-Liang Yang and Dong-Ming Yan and Wilmot Li and Maneesh Agrawala Illustrating how mechanical assemblies work . . . . . . . . . . . . . . . . . . 106--114 James M. Rehg Finding people in depth: technical perspective . . . . . . . . . . . . . . 115--115 Jamie Shotton and Toby Sharp and Alex Kipman and Andrew Fitzgibbon and Mark Finocchio and Andrew Blake and Mat Cook and Richard Moore Real-time human pose recognition in parts from single depth images . . . . . 116--124 Rudy Rucker Last byte: Future tense: Share my enlightenment . . . . . . . . . . . . . 136, 135
Ronald F. Boisvert and Jack W. Davidson Positioning ACM for an open access future . . . . . . . . . . . . . . . . . 5--5 Vinton G. Cerf Growing the ACM family . . . . . . . . . 7--7 Bertrand Meyer When reviews do more than sting . . . . 8--9 Neil Savage Life in simulation . . . . . . . . . . . 11--13 Alex Wright Revving the rover . . . . . . . . . . . 14--16 Samuel Greengard A new model for healthcare . . . . . . . 17--19 Eben Moglen The tangled web we have woven . . . . . 20--22 Peter G. Neumann Inside risks: More sight on foresight 23--25 George V. Neville-Neil Kode Vicious: Divided by division . . . 26--27 Steve Cooper and Mehran Sahami Education: Reflections on Stanford's MOOCs . . . . . . . . . . . . . . . . . 28--30 Ana Aizcorbe and Samuel Kortum and Unni Pillai The value of microprocessor designs . . 31--32 Ali Sunyaev and Stephan Schneider Cloud services certification . . . . . . 33--36 Anita Jones The explosive growth of postdocs in computer science . . . . . . . . . . . . 37--39 William Cheswick Rethinking passwords . . . . . . . . . . 40--44 Brendan Gregg Thinking methodically about performance 45--51 Robert N. M. Watson A decade of OS access-control extensibility . . . . . . . . . . . . . 52--63 Ari Juels and Alina Oprea New approaches to security and availability for cloud data . . . . . . 64--73 Jeffrey Dean and Luiz André Barroso The tail at scale . . . . . . . . . . . 74--80 Cristian Cadar and Koushik Sen Symbolic execution for software testing: three decades later . . . . . . . . . . 82--90 Pradip Bose Is dark silicon real?: technical perspective . . . . . . . . . . . . . . 92--92 Hadi Esmaeilzadeh and Emily Blem and Renée St. Amant and Karthikeyan Sankaralingam and Doug Burger Power challenges may end the multicore era . . . . . . . . . . . . . . . . . . 93--102 Peter Winkler Last Byte: Puzzled: Tumbling Dice . . . 112--112
Moshe Y. Vardi To boycott or not to boycott . . . . . . 5--5 Vinton G. Cerf A revolution in India . . . . . . . . . 7--7 CACM Staff No place for old educational flaws in new online media . . . . . . . . . . . . 8--9 Jason Hong and Daniel Reed Passwords getting painful, computing still blissful . . . . . . . . . . . . . 10--11 Neil Savage Decoding dementia . . . . . . . . . . . 13--15 Gregory Mone Rise of the swarm . . . . . . . . . . . 16--17 Paul Hyman Cybercrime: it's serious, but exactly how serious? . . . . . . . . . . . . . . 18--20 CACM Staff ACM Fellows inducted . . . . . . . . . . 21--21 Pamela Samuelson A copyright challenge to resales of digital music . . . . . . . . . . . . . 24--26 Denice Ward Hood and Stafford Hood and Dominica McBride Academic careers workshop for underrepresented groups . . . . . . . . 27--29 Peter J. Denning Moods, wicked problems, and learning . . 30--32 Rachelle Hollander Ethics viewpoints efficacies . . . . . . 33--34 Jeff Johnson Can computer professionals and digital technology engineers help reduce gun violence? . . . . . . . . . . . . . . . 35--37 Mikkel Thorup Funding successful research . . . . . . 38--39 Arun Kumar and Feng Niu and Christopher Ré Hazy: making it easier to build and maintain big-data analytics . . . . . . 40--49 Brian Beckman and Erik Meijer The story of the teapot in DHTML . . . . 50--55 Kate Matsudaira Making the mobile web faster . . . . . . 56--61 Edwin Olson and Johannes Strom and Rob Goeddel and Ryan Morton and Pradeep Ranganathan and Andrew Richardson Exploration and mapping with autonomous robot teams . . . . . . . . . . . . . . 62--70 Nafaâ Jabeur and Sherali Zeadally and Biju Sayed Mobile social networking applications 71--79 Fedor V. Fomin and Petteri Kaski Exact exponential algorithms . . . . . . 80--88 David Oran Video quality assessment in the age of Internet video: technical perspective 90--90 Florin Dobrian and Asad Awan and Dilip Joseph and Aditya Ganjam and Jibin Zhan and Vyas Sekar and Ion Stoica and Hui Zhang Understanding the impact of video quality on user engagement . . . . . . . 91--99 Peter Winkler Last byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 102--102 Leah Hoffmann Last byte: Q&A: The Power of Distribution 104--ff
Stephen Bourne and George Neville-Neil Developing tools and resources for those in practice . . . . . . . . . . . . . . 5--5 Vinton G. Cerf Open access . . . . . . . . . . . . . . 7--7 Scott E. Delman An open access partnership . . . . . . . 9--9 CACM Staff A robot's roots . . . . . . . . . . . . 10--11 Mark Guzdial and Daniel Reed Securing the future of computer science; reconsidering analog computing . . . . . 12--13 Nidhi Subbaraman Artificial connections . . . . . . . . . 15--17 Gary Anthes Inexact design: beyond fault-tolerance 18--20 Leah Hoffmann Looking back at big data . . . . . . . . 21--23 Michael A. Cusumano Are the costs of `free' too high in online education? . . . . . . . . . . . 26--28 Michael L. Best Peacebuilding in a networked world . . . 30--32 George V. Neville-Neil Code abuse . . . . . . . . . . . . . . . 33--34 Nir Kshetri Cyber-victimization and cybersecurity in China . . . . . . . . . . . . . . . . . 35--37 Robert Rosenberger The problem with hands-free dashboard cellphones . . . . . . . . . . . . . . . 38--40 Nicholas C. Zakas The evolution of web development for mobile devices . . . . . . . . . . . . . 42--48 Patrick Meenan How fast is your website? . . . . . . . 49--55 David F. Bacon and Rodric Rabbah and Sunil Shukla FPGA programming for the masses . . . . 56--63 Zhengchuan Xu and Qing Hu and Chenghong Zhang Why computer talents become computer hackers . . . . . . . . . . . . . . . . 64--74 Nishant Thorat and Arvind Raghavendran and Nigel Groves Offline management in virtualized environments . . . . . . . . . . . . . . 75--81 Ronen Feldman Techniques and applications for sentiment analysis . . . . . . . . . . . 82--89 David Forsyth Understanding pictures of rooms: technical perspective . . . . . . . . . 91--91 Huayan Wang and Stephen Gould and Daphne Roller Discriminative learning with latent variables for cluttered indoor scene understanding . . . . . . . . . . . . . 92--99 Paul Di Filippo Future tense . . . . . . . . . . . . . . 104--ff
Moshe Y. Vardi Fricative computing . . . . . . . . . . 5--5 Vinton G. Cerf ACM President's salary increased by 300%! . . . . . . . . . . . . . . . . . 7--7 Scott E. Delman A few good reasons to publish in Communications . . . . . . . . . . . . . 9--9 CACM Staff Try old boys security network . . . . . 12--13 Jeannette M. Wing and Mark Guzdial Encouraging IT usage in future healthcare, quality in CS education . . 14--15 Alex Wright Proving grounds . . . . . . . . . . . . 17--19 Samuel Greengard Vanishing electronics . . . . . . . . . 20--22 Paul Hyman `Small data' enabled prediction of Obama's win, say economists . . . . . . 23--25 P. Bernt Hugenholtz Fair use in Europe . . . . . . . . . . . 26--28 David Anderson Max Newman: forgotten man of early British computing . . . . . . . . . . . 29--31 Mark Guzdial Human-centered computing: a new degree for Licklider's world . . . . . . . . . 32--34 Peter J. Denning The science in computer science . . . . 35--38 Michael J. Flynn and Oskar Mencer and Veljko Milutinovic and Goran Rakocevic and Per Stenstrom and Roman Trobec and Mateo Valero Moving from petaflops to petadata . . . 39--42 Latanya Sweeney Discrimination in online ad delivery . . 44--54 Peter Bailis and Ali Ghodsi Eventual consistency today: limitations, extensions, and beyond . . . . . . . . . 55--63 Adam H. Leventhal A file system all its own . . . . . . . 64--67 Mithun George Jacob and Yu-Ting Li and George A. Akingba and Juan P. Wachs Collaboration with a robotic scrub nurse 68--75 Chris F. Kemerer and Charles Zhechao Liu and Michael D. Smith Strategies for tomorrow's `winners-take-some' digital goods markets . . . . . . . . . . . . . . . . 76--82 Iris Junglas and Jeanne Harris The promise of consumer technologies in emerging markets . . . . . . . . . . . . 84--90 Matt Pharr The ray-tracing engine that could: technical perspective . . . . . . . . . 92--92 Steven G. Parker and Heiko Friedrich and David Luebke and Keith Morley and James Bigler and Jared Hoberock and David McAllister and Austin Robison and Andreas Dietrich and Greg Humphreys and Morgan McGuire and Martin Stich GPU ray tracing . . . . . . . . . . . . 93--101 Peter Winkler Last Byte: Puzzled: Ant Alice's Adventures . . . . . . . . . . . . . . . 104--104
Erik R. Altman SGB fortifies global SIG community . . . 5--5 Vinton G. Cerf From the President: Honoring our best 7--7 CACM Staff Letters to the Editor: How to claim your fair share in academic publishing . . . 8--9 Jason Hong and Judy Robertson Computer security needs refocus, and be nice about it . . . . . . . . . . . . . 10--11 Gary Anthes Deep learning comes of age . . . . . . . 13--15 Gregory Mone The future is flexible displays . . . . 16--17 Paul Hyman Augmented-reality glasses bring cloud security into sharp focus . . . . . . . 18--20 Neil Savage Proofs probable . . . . . . . . . . . . 22--24 CACM Staff ACM honors computing innovators . . . . 25--25 Stas Filshtinskiy Privacy and security: Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? . . . . . . . . . 28--30 Phillip G. Armour The business of software: What is a ``good'' estimate?: whether forecasting is valuable . . . . . . . . . . . . . . 31--32 George V. Neville-Neil Kode Vicious: Swamped by automation . . 33--34 Peter J. Denning The profession of IT: Thumb numbers . . 35--37 Nancy G. Leveson Inside risks: Learning from the past to face the risks of today . . . . . . . . 38--42 Stephen B. Wicker and Stephanie M. Santoso Viewpoint: Access to the Internet is a human right . . . . . . . . . . . . . . 43--46 Dan Geer Resolved: the Internet is no place for critical infrastructure . . . . . . . . 48--53 Bill Hsu and Marc Sosnick-Pérez Real-time GPU audio . . . . . . . . . . 54--62 Mark Cavage There is no getting around it: you are building a distributed system . . . . . 63--70 Ognjen Scekic and Hong-Linh Truong and Schahram Dustdar Incentives and rewarding in social computing . . . . . . . . . . . . . . . 72--82 Nabil Adam and Randy Stiles and Andrew Zimdars and Ryan Timmons and Jackie Leung and Greg Stachnick and Jeff Merrick and Robert Coop and Vadim Slavin and Tanya Kruglikov and John Galmiche and Sharad Mehrotra Consequence analysis of complex events on critical U.S. infrastructure . . . . 83--91 Deepak Agarwal and Bee-Chung Chen and Pradheep Elango and Raghu Ramakrishnan Content recommendation on Web portals 92--101 Yao-Wen Chang Circuit placement challenges: technical perspective . . . . . . . . . . . . . . 104--104 Myung-Chul Kim and Dong-Jin Lee and Igor L. Markov SimPL: an algorithm for placing VLSI circuits . . . . . . . . . . . . . . . . 105--113 Peter Winkler Last byte: Puzzled answers . . . . . . . 117--117 Leah Hoffmann Q&A: Cracking the Code . . . . . . . . . 120--ff
Moshe Y. Vardi The great robotics debate . . . . . . . 5--5 Vinton G. Cerf From the President: `But officer, I was only programming at 100 lines per hour!' 7--7 CACM Staff Letters to the Editor: Plenty more hacker motivations . . . . . . . . . . . 8--9 Jason Hong Ph.D. students must break away from undergraduate mentality . . . . . . . . 10--11 Esther Shein Keeping computers cool from the inside 13--16 Samuel Greengard All the items fit to print . . . . . . . 17--19 Neil Savage Backing creativity . . . . . . . . . . . 20--21 Pamela Samuelson Legally Speaking: Statutory damages as a threat to innovation . . . . . . . . . . 24--26 Christopher S. Tang and Joshua Zimmerman Computing Ethics: Information and communication technology for managing supply chain risks . . . . . . . . . . . 27--29 Mari Sako Technology strategy and management: The business of professionals . . . . . . . 30--32 Ron Eglash and Juan E. Gilbert and Ellen Foster Broadening participation: Toward culturally responsive computing education . . . . . . . . . . . . . . . 33--36 Martin Ford Viewpoint: Could artificial intelligence create an unemployment crisis? . . . . . 37--39 Paul E. McKenney Structured deferral: synchronization via procrastination . . . . . . . . . . . . 40--49 Samy Al Bahra Nonblocking algorithms and scalable multicore programming . . . . . . . . . 50--61 Mathieu Desnoyers Proving the correctness of nonblocking data structures . . . . . . . . . . . . 62--69 Yang Tang and Di Wang and Jing Bai and Xiaoyan Zhu and Ming Li Information distance between what I said and what it heard . . . . . . . . . . . 70--77 Ariel D. Procaccia Cake cutting: not just child's play . . 78--87 Madhav Marathe and Anil Kumar S. Vullikanti Computational epidemiology . . . . . . . 88--96 Peter Wonka A fresh approach to vector graphics: technical perspective . . . . . . . . . 100--100 Alexandrina Orzan and Adrien Bousseau and Pascal Barla and Holger Winnemöller and Joëlle Thollot and David Salesin Diffusion curves: a vector representation for smooth-shaded images 101--108 Mark McClelland Last Byte: Future tense . . . . . . . . 112--ff
Moshe Y. Vardi and Victor Vianu What is a flagship publication? . . . . 5--5 Vinton G. Cerf Computer science education --- revisited 7--7 CACM Staff Is computing science? . . . . . . . . . 9--9 Philip Guo Teaching programming the way it works outside the classroom . . . . . . . . . 10--11 Samuel Greengard A new approach to information storage 13--15 Alex Wright Patient, heal thyself . . . . . . . . . 16--18 Paul Hyman Software aims to ensure fairness in crowdsourcing projects . . . . . . . . . 19--21 Richard Heeks and Andrew Robinson Ultra-low-cost computing and developing countries . . . . . . . . . . . . . . . 22--24 Chrysanthos Dellarocas and Marshall Van Alstyne Money models for MOOCs . . . . . . . . . 25--28 Eric Byres The air gap: SCADA's enduring security myth . . . . . . . . . . . . . . . . . . 29--31 George V. Neville-Neil Cherry-picking and the scientific method 32--33 Leo Porter and Mark Guzdial and Charlie McDowell and Beth Simon Success in introductory programming: what works? . . . . . . . . . . . . . . 34--36 Jean-Loup Richet Overt censorship: a fatal mistake? . . . 37--38 Ariel Tseitlin The antifragile organization . . . . . . 40--44 Alex Nicolaou Best practices on the move: building web apps for mobile devices . . . . . . . . 45--51 Tammy Everts Rules for mobile performance optimization . . . . . . . . . . . . . . 52--59 Marc Lauritsen Are we free to code the law? . . . . . . 60--66 Jacques Wainer and Michael Eckmann and Siome Goldenstein and Anderson Rocha How productivity and impact differ across computer science subareas . . . . 67--73 Josh C. Bongard Evolutionary robotics . . . . . . . . . 74--83 Assaf Naor Every graph is essentially sparse . . . 86--86 Joshua Batson and Daniel A. Spielman and Nikhil Srivastava and Shang-Hua Teng Spectral sparsification of graphs: theory and algorithms . . . . . . . . . 87--94 Peter Winkler Last Byte: Puzzled: Wins in a Row . . . 96--96
Moshe Y. Vardi Has the innovation cup run dry? . . . . 5--5 Vinton G. Cerf Freedom and the social contract . . . . 7--7 CACM Staff For privacy and security, use public keys everywhere . . . . . . . . . . . . 8--9 Michael Stonebraker and Judy Robertson Big data is `buzzword du jour;' CS academics `have the best job' . . . . . 10--11 Chris Edwards Magnetic diversion for electronic switches . . . . . . . . . . . . . . . . 13--15 Keith Kirkpatrick Software-defined networking . . . . . . 16--19 Esther Shein Ephemeral data . . . . . . . . . . . . . 20--22 Laura DiDio Remembering Douglas Engelbart . . . . . 24--25 James Grimmelmann What to do about Google? . . . . . . . . 28--30 Thomas Haigh Software and souls; programs and packages . . . . . . . . . . . . . . . . 31--34 Peter J. Denning The other side of language . . . . . . . 35--37 Zeljko Obrenovi\'c Research and practice: the curious case of `small' researchers-practitioners . . 38--40 Lawrence Snyder An interview with Hadi Partovi . . . . . 41--45 Maged M. Michael The balancing act of choosing nonblocking features . . . . . . . . . . 46--53 Sean Hull 20 obstacles to scalability . . . . . . 54--59 Christoph Lameter An overview of non-uniform memory access 59--54 Steve Benford and Chris Greenhalgh and Gabriella Giannachi and Brendan Walker and Joe Marshall and Tom Rodden Uncomfortable user experience . . . . . 66--73 Mark Braverman Computing with real numbers, from Archimedes to Turing and beyond . . . . 74--83 Michael Fisher and Louise Dennis and Matt Webster Verifying autonomous systems . . . . . . 84--93 Pietro Perona Progress in visual categorization: technical perspective . . . . . . . . . 96--96 Pedro Felzenszwalb and Ross Girshick and David McAllester and Deva Ramanan Visual object detection with deformable part models . . . . . . . . . . . . . . 97--105 Peter Winkler Last Byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 110--110 Leah Hoffmann Last Byte: Q&A: Big Challenge . . . . . . 112--ff
John White On the future of ACM . . . . . . . . . . 5--5 Vinton G. Cerf Revisiting the tragedy of the commons 7--7 CACM Staff Deep accountability, beyond even liability . . . . . . . . . . . . . . . 8--9 Philip Guo Helping scientists, engineers to work up to 100 times faster . . . . . . . . . . 12--13 Alex Wright Tuning in to graphene . . . . . . . . . 15--17 Tom Geller Making the Internet safe for gadgets . . 18--20 Paul Hyman Software helps linguists reconstruct, decipher ancient languages . . . . . . . 21--23 Sarah Underwood The Alan Turing Year leaves a rich legacy . . . . . . . . . . . . . . . . . 24--25 Michael A. Cusumano Evaluating a startup venture . . . . . . 26--29 Phillip G. Armour When faster is slower . . . . . . . . . 30--32 George V. Neville-Neil Kode Vicious: The naming of hosts is a difficult matter . . . . . . . . . . . . 33--34 Kevin Fu and James Blum Controlling for cybersecurity risks of medical device software . . . . . . . . 35--37 David H. Ackley Beyond efficiency . . . . . . . . . . . 38--40 Jacob Loveless Barbarians at the gateways . . . . . . . 42--49 Jacob Loveless and Sasha Stoikov and Rolf Waeber Online algorithms in high-frequency trading . . . . . . . . . . . . . . . . 50--56 Stephen D. Strowes Passively measuring TCP round-trip times 57--64 Floris Bex and John Lawrence and Mark Snaith and Chris Reed Implementing the argument web . . . . . 66--73 Apirak Hoonlor and Boleslaw K. Szymanski and Mohammed J. Zaki Trends in computer science research . . 74--83 Rodney Van Meter and Clare Horsman A blueprint for building a quantum computer . . . . . . . . . . . . . . . . 84--93 Rajeev Alur Can we verify cyber-physical systems?: technical perspective . . . . . . . . . 96--96 Matthias Althoff and Akshay Rajhans and Bruce H. Krogh and Soner Yaldiz and Xin Li and Larry Pileggi Formal verification of phase-locked loops using reachability analysis and continuization . . . . . . . . . . . . . 97--104 Brian Clegg Last byte: Future tense . . . . . . . . 112--ff
Moshe Y. Vardi The end of the American network . . . . 5--5 Vinton G. Cerf Heidelberg Laureate Forum . . . . . . . 7--7 CACM Staff Microprocessor architectures follow markets and silicon . . . . . . . . . . 8--9 Jason Hong Considering privacy issues in the context of Google Glass . . . . . . . . 10--11 Gregory Mone Future-proof encryption . . . . . . . . 12--14 Neil Savage More than a mouse . . . . . . . . . . . 15--16 Keith Kirkpatrick Legal issues with robots . . . . . . . . 17--19 Deirdre K. Mulligan and Kenneth A. Bamberger Privacy and security: What regulators can do to advance privacy through design 20--22 Pamela Samuelson Legally speaking: Is software patentable? . . . . . . . . . . . . . . 23--25 Katina Michael and M. G. Michael Computing ethics: No limits to watching? 26--28 Marshall Van Alstyne Economic and business dimensions: Why not immortality? . . . . . . . . . . . . 29--31 Cameron Wilson Education: Making computer science count 32--33 Tobias Langlotz and Jens Grubert and Raphael Grasset Viewpoint: Augmented reality browsers: essential products or only gadgets? . . 34--36 James Roche Adopting DevOps practices in quality assurance . . . . . . . . . . . . . . . 38--43 Neil Mitchell Leaking space . . . . . . . . . . . . . 44--52 Ivar Jacobson and Ian Spence and Pan-Wei Ng Agile and SEMAT: perfect partners . . . 53--59 Neil Maiden and Sonali D'Souza and Sara Jones and Lars Müller and Lucia Pannese and Kristine Pitts and Michael Prilla and Kevin Pudney and Malcolm Rose and Ian Turner and Konstantinos Zachos Computing technologies for reflective, creative care of people with dementia 60--67 Evgeny Kaganer and Gabriel A. Giordano and Sebastien Brion and Marco Tortoriello Media tablets for mobile learning . . . 68--75 Philip Treleaven and Michal Galas and Vidhi Lalchand Algorithmic trading review . . . . . . . 76--85 Mamadou Tourad Diallo and Hassnaa Moustafa and Hossam Afifi and Nicolas Marechal Adaptation of audiovisual contents and their delivery means . . . . . . . . . . 86--93 Shekhar Borkar Centip$3$De demonstrates more than Moore\ldots: technical perspective . . . 96--96 Ronald G. Dreslinski and David Fick and Bharan Giridhar and Gyouho Kim and Sangwon Seo and Matthew Fojtik and Sudhir Satpathy and Yoonmyung Lee and Daeyeon Kim and Nurrachman Liu and Michael Wieckowski and Gregory Chen and Dennis Sylvester and David Blaauw and Trevor Mudge Centip$3$De: a many-core prototype exploring $3$D integration and near-threshold computing . . . . . . . . 97--104 Peter Winkler Last Byte: Puzzled: Coin flipping . . . 120--120
M. Tamer Özsu ACM books to launch . . . . . . . . . . 5--5 Vinton G. Cerf Software at scale . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Free the digital natives . . . . . . . . . . . . . . . . 8--9 Mark Guzdial and Valerie Barr blog@CACM: The lure of live coding; the attraction of small data . . . . . . . . 10--11 Chris Edwards News: Life points the way to a new template for chipmaking . . . . . . . . 13--15 Samuel Greengard News: Seeing the big picture . . . . . . 16--18 Karen A. Frenkel News: CS enrollments rise \ldots at the expense of the humanities? . . . . . . . 19--21 Richard Heeks Emerging markets: Information technology impact sourcing . . . . . . . . . . . . 22--25 David Anderson Historical reflections: Patrick Blackett: providing `white heat' to the British computing revolution . . . . . . 26--28 Peter J. Denning The profession of IT: Design thinking 29--31 George V. Neville-Neil Kode Vicious: A lesson in resource management . . . . . . . . . . . . . . . 32--33 Wendy M. DuBow and Ruthe Farmer and Zhen Wu and Malia Fredrickson Broadening participation: Bringing young women into computing through the NCWIT Aspirations in Computing program . . . . 34--37 Armando Fox Viewpoint: From MOOCs to SPOCs . . . . . 38--40 Ilya Grigorik Practice: Making the Web faster with HTTP 2.0 . . . . . . . . . . . . . . . . 42--49 David Chisnall Practice: The challenge of cross-language interoperability . . . . 50--56 Fred Chow Practice: Intermediate representation 57--62 Vasant Dhar Data science and prediction . . . . . . 64--73 Jonathan Lazar and Harry Hochheiser Legal aspects of interface accessibility in the U.S. . . . . . . . . . . . . . . 74--80 Doug Terry Replicated data consistency explained through baseball . . . . . . . . . . . . 82--89 Gareth Tyson and Nishanth Sastry and Ruben Cuevas and Ivica Rimac and Andreas Mauthe A survey of mobility in information-centric networks . . . . . . 90--98 Eliot Moss The cleanest garbage collection: technical perspective . . . . . . . . . 100--100 David F. Bacon and Perry Cheng and Sunil Shukla And then there were none: a stall-free real-time garbage collector for reconfigurable hardware . . . . . . . . 101--109 Peter Winkler Last Byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 126--126 Leah Hoffmann Last Byte: Q&A: Securing the Risk . . . . 128--ff
Moshe Y. Vardi Scalable conferences . . . . . . . . . . 5--5 Vinton G. Cerf From the President; Virtual reality redux . . . . . . . . . . . . . . . . . 7--7 CACM Staff Nominees for elections and report of the ACM Nominating Committee . . . . . . . . 8--8 CACM Staff ACM's FY13 annual report . . . . . . . . 9--14 CACM Staff U.S. does not control the Internet . . . 16--17 Mark Guzdial and Joel C. Adams MOOCs need more work; so do CS graduates 18--19 Gary Anthes French team invents faster code-breaking algorithm . . . . . . . . . . . . . . . 21--23 Tom Geller How do you feel?: your computer knows 24--26 Paul Hyman `Peace technologies' enable eyewitness reporting when disasters strike . . . . 27--29 Michael A. Cusumano The legacy of Steve Ballmer . . . . . . 30--32 Christopher S. Yoo Toward a closer integration of law and computer science . . . . . . . . . . . . 33--35 Thomas Haigh Actually, Turing did not invent the computer . . . . . . . . . . . . . . . . 36--41 Phillip G. Armour Estimation is not evil . . . . . . . . . 42--43 Doug Terry Publish now, judge later . . . . . . . . 44--46 Alex E. Bell The software inferno . . . . . . . . . . 48--53 Jason Lango Toward software-defined SLAs . . . . . . 54--60 Anil Madhavapeddy and David J. Scott Unikernels: the rise of the virtual library operating system . . . . . . . . 61--69 Kenton O'Hara and Gerardo Gonzalez and Abigail Sellen and Graeme Penney and Andreas Varnavas and Helena Mentis and Antonio Criminisi and Robert Corish and Mark Rouncefield and Neville Dastur and Tom Carrell Touchless interaction in surgery . . . . 70--77 Jessica Li and Arun Vishwanath and H. Raghav Rao Retweeting the Fukushima nuclear radiation disaster . . . . . . . . . . . 78--85 Vincent Gramoli and Rachid Guerraoui Democratizing transactional programming 86--93 Xuedong Huang and James Baker and Raj Reddy A historical perspective of speech recognition . . . . . . . . . . . . . . 94--103 Subramanian S. Iyer Silicon stress: technical perspective 106--106 Moongon Jung and Joydeep Mitra and David Z. Pan and Sung Kyu Lim TSV stress-aware full-chip mechanical reliability analysis and optimization for $3$D IC . . . . . . . . . . . . . . 107--115 Seth Shostak Last byte: Future Tense: The second signal . . . . . . . . . . . . . . . . . 128--ff
Andrew McGettrick Education, always . . . . . . . . . . . 5--5 Vinton G. Cerf Cognitive implants . . . . . . . . . . . 7--7 CACM Staff Contribute more than algorithmic speculation . . . . . . . . . . . . . . 9--9 Philip Guo Clarifying human-computer interaction 10--11 Don Monroe A new type of mathematics? . . . . . . . 13--15 Esther Shein Should everybody learn to code? . . . . 16--18 Samuel Greengard Computational photography comes into focus . . . . . . . . . . . . . . . . . 19--21 CACM Staff ACM Fellows inducted . . . . . . . . . . 22--22 Diana L. Burley and Jon Eisenberg and Seymour E. Goodman Would cybersecurity professionalization help address the cybersecurity crisis? 24--27 Tim Bell Establishing a nationwide CS curriculum in New Zealand high schools . . . . . . 28--30 William Young and Nancy G. Leveson An integrated approach to safety and security based on systems theory . . . . 31--35 George V. Neville-Neil Kode vicious: Bugs and bragging rights 36--37 Marco Ceccagnoli and Chris Forman and Peng Huang and D. J. Wu Digital platforms: when is participation valuable? . . . . . . . . . . . . . . . 38--39 Stephen J. Andriole Ready technology . . . . . . . . . . . . 40--42 Anonymous Node at LinkedIn: the pursuit of thinner, lighter, faster . . . . . . . . 44--51 Poul-Henning Kamp Center wheel for success . . . . . . . . 52--54 Zachary Hensley and Jibonananda Sanyal and Joshua New Provenance in sensor data management . . 55--62 Gerard J. Holzmann Mars code . . . . . . . . . . . . . . . 64--73 Thanassis Avgerinos and Sang Kil Cha and Alexandre Rebert and Edward J. Schwartz and Maverick Woo and David Brumley Automatic exploit generation . . . . . . 74--84 Silvio Micali and Michael O. Rabin Cryptography miracles, secure auctions, matching problem verification . . . . . 85--93 Reinhard Wilhelm and Daniel Grund Computation takes time, but how much? 94--103 Michael W. Mahoney A new spin on an old algorithm: technical perspective . . . . . . . . . 106--106 Grey Ballard and James Demmel and Olga Holtz and Oded Schwartz Communication costs of Strassen's matrix multiplication . . . . . . . . . . . . . 107--114 Peter Winkler Last byte: Puzzled: Lowest Number Wins 120--120
Moshe Y. Vardi Boolean satisfiability: theory and engineering . . . . . . . . . . . . . . 5--5 Vinton G. Cerf Letter from the President: What if it's us? . . . . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Develop research culture in the Arab Middle East . . . . 9--9 Kate Matsudaira Capturing and structuring data mined from the Web . . . . . . . . . . . . . . 10--11 Erica Klarreich News: Reading brains . . . . . . . . . . 12--14 Keith Kirkpatrick News: World without wires . . . . . . . 15--17 Neil Savage News: Playing at health . . . . . . . . 18--19 Pamela Samuelson Legally speaking: Mass digitization as fair use . . . . . . . . . . . . . . . . 20--22 Arvind Narayanan and Shannon Vallor Computing ethics: Why software engineering courses should include ethics coverage . . . . . . . . . . . . 23--25 Peter J. Denning The profession of IT: `Surfing toward the future' . . . . . . . . . . . . . . 26--29 Richard Ladner Broadening participation: The impact of the United Nations Convention on the Rights of Persons with Disabilities . . 30--32 David Patterson Viewpoint: How to build a bad research center . . . . . . . . . . . . . . . . . 33--36 Wojciech Golab and Muntasir R. Rahman and Alvin AuYoung and Kimberly Keeton and Xiaozhou (Steve) Li Eventually consistent: not what you were expecting? . . . . . . . . . . . . . . . 38--44 Robert F. Sproull and Jim Waldo The API performance contract . . . . . . 45--51 Andi Kleen Scaling existing lock-based applications with lock elision . . . . . . . . . . . 52--56 Junfeng Yang and Heming Cui and Jingyue Wu and Yang Tang and Gang Hu Making parallel programs reliable with stable multithreading . . . . . . . . . 58--69 Christine Alvarado and Eugene Judson Using targeted conferences to recruit women into computer science . . . . . . 70--77 Gang-Hoon Kim and Silvana Trimi and Ji-Hyong Chung Big-data applications in the government sector . . . . . . . . . . . . . . . . . 78--85 Elzbieta Zieli\'nska and Wojciech Mazurczyk and Krzysztof Szczypiorski Trends in steganography . . . . . . . . 86--95 Dan Wallach Smartphone security `taint' what it used to be: technical perspective . . . . . . 98--98 William Enck and Peter Gilbert and Byung-Gon Chun and Landon P. Cox and Jaeyeon Jung and Patrick McDaniel and Anmol N. Sheth TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones . . . . . . . . . . . . . 99--106 Peter Winkler Last byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 109--109 Leah Hoffmann Last Byte: Q&A: RISC and reward . . . . . 112--ff
Alfred Aho and Georg Gottlob A front row seat to Communications' editorial transformation . . . . . . . . 5--5 Vinton G. Cerf The Internet governance ecosystem . . . 7--7 CACM Staff Code that missed Mars . . . . . . . . . 9--9 Mark Guzdial and Daniel Reed Eyes forward . . . . . . . . . . . . . . 10--11 Chris Edwards Using patient data for personalized cancer treatments . . . . . . . . . . . 13--15 Paul Hyman Speech-to-speech translations stutter, but researchers see mellifluous future 16--19 Gregory Mone New models in cosmetics replacing animal testing . . . . . . . . . . . . . . . . 20--21 Michael A. Cusumano MOOCs revisited, with some policy suggestions . . . . . . . . . . . . . . 24--26 Michael L. Best Thinking outside the continent . . . . . 27--29 George V. Neville-Neil Kode Vicious: This is the foo field . . 30--31 Deborah Estrin Small data, where $ n = \mbox {me} $ . . 32--34 Uzi Vishkin Is multicore hardware for general-purpose parallel processing broken? . . . . . . . . . . . . . . . . 35--39 Paul Vixie Rate-limiting state . . . . . . . . . . 40--43 Ivar Jacobson and Pan-Wei Ng and Ian Spence and Paul E. McMahon Major-league SEMAT: why should an executive care? . . . . . . . . . . . . 44--50 Christoph Paasch and Olivier Bonaventure Multipath TCP . . . . . . . . . . . . . 51--57 Daniel T. Seaton and Yoav Bergner and Isaac Chuang and Piotr Mitros and David E. Pritchard Who does what in a massive open online course? . . . . . . . . . . . . . . . . 58--65 Jeremy Avigad and John Harrison Formally verified mathematics . . . . . 66--75 Martin Odersky and Tiark Rompf Unifying functional and object-oriented programming with Scala . . . . . . . . . 76--86 Franziska Roesner and Tadayoshi Kohno and David Molnar Security and privacy for augmented reality systems . . . . . . . . . . . . 88--96 Joe Warren A `reasonable' solution to deformation methods: technical perspective . . . . . 98--98 Alec Jacobson and Ilya Baran and Jovan Popovi\'c and Olga Sorkine-Hornung Bounded biharmonic weights for real-time deformation . . . . . . . . . . . . . . 99--106 Ken MacLeod Last Byte: Future Tense: Re: Search . . 112--ff
Moshe Y. Vardi Moore's law and the sand-heap paradox 5--5 Vinton G. Cerf Sometimes it takes some time! . . . . . 7--7 CACM Staff Know your steganographic enemy . . . . . 8--8 CACM Staff ACM's 2014 general election: please take this opportunity to vote . . . . . . . . 9--17 Judy Robertson Rethinking how to teach programming to newcomers . . . . . . . . . . . . . . . 18--19 Samuel Greengard How computers are changing biology . . . 21--23 Tom Geller The forever disc . . . . . . . . . . . . 24--26 Keith Kirkpatrick Technology confounds the courts . . . . 27--29 Marshall Van Alstyne Why Bitcoin has value . . . . . . . . . 30--32 Ben Depoorter What happened to video game piracy? . . 33--34 David Anderson Tom Kilburn: a tale of five computers 35--38 Steve Cooper and Shuchi Grover and Beth Simon Building a virtual community of practice for K-12 CS teachers . . . . . . . . . . 39--41 Ruzena Bajcsy Robots are coming . . . . . . . . . . . 42--43 Bob Toxen The NSA and Snowden: securing the all-seeing eye . . . . . . . . . . . . . 44--51 Lucian Carata and Sherif Akoush and Nikilesh Balakrishnan and Thomas Bytheway and Ripduman Sohan and Margo Seltzer and Andy Hopper A primer on provenance . . . . . . . . . 52--60 Wyatt Lloyd and Michael J. Freedman and Michael Kaminsky and David G. Andersen Don't settle for eventual consistency 61--68 Mihir Nanavati and Patrick Colp and Bill Aiello and Andrew Warfield Cloud security: a gathering storm . . . 70--79 Shimeon Pass and Boaz Ronen Reducing the software value gap . . . . 80--87 Manlu Liu and Sean Hansen and Qiang Tu The community source approach to software development and the Kuali experience . . . . . . . . . . . . . . . 88--96 Kevin Leyton-Brown and Holger H. Hoos and Frank Hutter and Lin Xu Understanding the empirical hardness of NP-complete problems . . . . . . . . . . 98--107 Ari Juels and Bonnie Wong The interplay of neuroscience and cryptography: technical perspective . . 109--109 Hristo Bojinov and Daniel Sanchez and Paul Reber and Dan Boneh and Patrick Lincoln Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks . . . . . . . . . . . . . . . . 110--118 Peter Winkler Last Byte: Puzzled: A Sort, of Sorts . . 120--120
Mehran Sahami and Steve Roach Computer science curricula 2013 released 5--5 Vinton G. Cerf Letter from the President: The house elves of ACM . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Efficient code to counter dying Moore's Law . . . . . . . 9--9 Daniel Reed and Chris Stephenson BLOG@ACM: First impressions, unexpected benefits . . . . . . . . . . . . . . . . 10--11 Don Monroe Neuromorphic computing gets ready for the (really) big time . . . . . . . . . 13--15 Neil Savage Time for a change . . . . . . . . . . . 16--18 CACM Staff Visualizations make big data meaningful 19--21 Neil Savage General agreement . . . . . . . . . . . 22--23 Ross Anderson and Steven J. Murdoch Inside risks: EMV: why payment systems fail . . . . . . . . . . . . . . . . . . 24--28 Phillip G. Armour The business of software: Owning and using . . . . . . . . . . . . . . . . . 29--30 Dinei Florêncio and Cormac Herley and Adam Shostack Privacy and security: FUD: a plea for intolerance . . . . . . . . . . . . . . 31--33 Peter J. Denning The profession of IT: Avalanches are coming . . . . . . . . . . . . . . . . . 34--36 George V. Neville-Neil Kode Vicious: The logic of logging . . . 37--38 Charles K. Davis Viewpoint: Beyond data and analysis . . 39--41 Andy Gill Domain-specific languages and code synthesis using Haskell . . . . . . . . 42--49 Erik Meijer The curse of the excluded middle . . . . 50--55 Bo Joel Svensson and Mary Sheeran and Ryan R. Newton Design exploration through code-generating DSLs . . . . . . . . . . 56--63 Christos Siaterlis and Béla Genge Cyber-physical testbeds . . . . . . . . 64--73 Weiguo Fan and Michael D. Gordon The power of social media analytics . . 74--81 Daniela Rosner and Marco Roccetti and Gustavo Marfia The digitization of cultural practices 82--87 Peter Musial and Nicolas Nicolaou and Alexander A. Shvartsman Implementing distributed shared memory for dynamic networks . . . . . . . . . . 88--98 Michiel van de Panne Motion fields for interactive character animation: technical perspective . . . . 100--100 Yongjoon Lee and Kevin Wampler and Gilbert Bernstein and Jovan Popovi\'c and Zoran Popovi\'c Motion fields for interactive character locomotion . . . . . . . . . . . . . . . 101--108 Peter Winkler Last byte: Puzzled: Solutions and Sources . . . . . . . . . . . . . . . . 110--110 Leah Hoffmann Last Byte: Q&A: Divide and Conquer . . . 112--ff
Vicki Hanson and Reyyan Ayfer and Bev Bachmayer European women in computing . . . . . . 5--5 Vinton G. Cerf Responsible programming . . . . . . . . 7--7 CACM Staff Snowden weak link: copying to USB device 8--9 Mark Guzdial and Philip Guo The difficulty of teaching programming languages, and the benefits of hands-on learning . . . . . . . . . . . . . . . . 10--11 Alex Wright Big data meets big science . . . . . . . 13--15 Logan Kugler Robots compete in disaster scenarios . . 16--18 Esther Shein Holographic projection systems provide eternal life . . . . . . . . . . . . . . 19--21 Pamela Samuelson Legally speaking: Watching TV on Internet-connected devices . . . . . . . 22--24 Chuck Huff and Almut Furchert Computing ethics: Toward a pedagogy of ethical practice . . . . . . . . . . . . 25--27 Mari Sako Technology strategy and management: The business of the state . . . . . . . . . 28--30 Jane Margolis and Joanna Goode and Gail Chapman and Jean J. Ryoo Broadening participation: That classroom `magic' . . . . . . . . . . . . . . . . 31--33 Batya Friedman Viewpoint: Structural challenges and the need to adapt . . . . . . . . . . . . . 34--37 Phillip A. Laplante Viewpoint: Licensing professional software engineers: seize the opportunity . . . . . . . . . . . . . . 38--40 Thomas Wadlow Who must you trust? . . . . . . . . . . 42--49 Anonymous Automated QA testing at electronic arts 50--57 Mike Bland Finding more than one worm in the apple 58--64 Matthew Faulkner and Robert Clayton and Thomas Heaton and K. Mani Chandy and Monica Kohler and Julian Bunn and Richard Guy and Annie Liu and Michael Olson and MingHei Cheng and Andreas Krause Community sense and response systems: your phone as quake detector . . . . . . 66--75 Orna Agmon Ben-Yehuda and Muli Ben-Yehuda and Assaf Schuster and Dan Tsafrir The rise of RaaS: the Resource-as-a-Service cloud . . . . . . 76--84 H. V. Jagadish and Johannes Gehrke and Alexandros Labrinidis and Yannis Papakonstantinou and Jignesh M. Patel and Raghu Ramakrishnan and Cyrus Shahabi Big data and its technical challenges 86--94 Konstantina (Dina) Papagiannaki The power of joint multiuser beamforming: technical perspective . . . 96--96 Hariharan Rahul and Swarun Kumar and Dina Katabi JMB: scaling wireless capacity with user demands . . . . . . . . . . . . . . . . 97--106 Geoffrey A. Landis Last byte: Future Tense: The Chatbot and the Drone . . . . . . . . . . . . . . . 112--ff
Moshe Y. Vardi Editor's letter: Openism, IPism, fundamentalism, and pragmatism . . . . . 5--5 Vinton G. Cerf Cerf's up: ACM and the professional programmer . . . . . . . . . . . . . . . 7--7 Mark Guzdial BLOG@CACM: Why the U.S. is not ready for mandatory CS education . . . . . . . . . 8--9 Chris Edwards News: Researchers probe security through obscurity . . . . . . . . . . . . . . . 11--13 Keith Kirkpatrick News: Surgical robots deliver care more precisely . . . . . . . . . . . . . . . 14--16 Erica Klarreich News: Hello, my name is \ldots . . . . . 17--19 Seda Gürses Privacy and security: Can you engineer privacy? . . . . . . . . . . . . . . . . 20--23 Uri Wilensky and Corey E. Brady and Michael S. Horn Education: Fostering computational literacy in science classrooms . . . . . 24--28 Chris Coward Global computing: Private then shared? 29--30 George V. Neville-Neil Kode Vicious: Forked over . . . . . . . 31--32 Frank Levy and Richard J. Murnane Viewpoint: Researching the robot revolution . . . . . . . . . . . . . . . 33--35 Jaime Teevan and Kevyn Collins-Thompson and Ryen W. White and Susan Dumais Viewpoint: Slow search . . . . . . . . . 36--38 Mark Cavage and David Pacheco Bringing arbitrary compute to authoritative data . . . . . . . . . . . 40--48 Poul-Henning Kamp Quality software costs money --- Heartbleed was free . . . . . . . . . . 49--51 Michael J. Lutz and J. Fernando Naveda and James R. Vallino Undergraduate software engineering . . . 52--58 Francesca Spezzano and V. S. Subrahmanian and Aaron Mannes Reshaping terrorist networks . . . . . . 60--69 Sumit Gulwani Example-based learning in computer-aided STEM education . . . . . . . . . . . . . 70--80 Andrew V. Goldberg and Robert E. Tarjan Efficient maximum flow algorithms . . . 82--89 Philip A. Bernstein Getting consensus for data replication: technical perspective . . . . . . . . . 92--92 Peter Bailis and Shivaram Venkataraman and Michael J. Franklin and Joseph M. Hellerstein and Ion Stoica Last byte: Quantifying eventual consistency with PBS . . . . . . . . . . 93--102 Peter Winkler Last byte: Puzzled: Paths and Matchings 104--104
Moshe Y. Vardi Editor's Letter: Would Turing have passed the Turing Test? . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: Augmented reality . . . . . . 7--7 CACM Staff Letters to the Editor: Provenance of British computing . . . . . . . . . . . 8--9 Philip Guo BLOG@CACM: Refining students' coding and reviewing skills . . . . . . . . . . . . 10--11 Samuel Greengard News: Weathering a new era of big data 12--14 Neil Savage News: The power of memory . . . . . . . 15--17 Gregory Mone News: The new digital medicine . . . . . 18--20 Stefan Bechtold and Adrian Perrig Law and technology: Accountability in future Internet architectures . . . . . 21--23 Thomas Haigh Historical reflections: We have never been digital . . . . . . . . . . . . . . 24--28 Peter J. Denning The profession of IT: Learning for the new digital age . . . . . . . . . . . . 29--31 Luke Muehlhauser and Bill Hibbard Viewpoint: Exploratory engineering in artificial intelligence . . . . . . . . 32--34 John Leslie King and Paul F. Uhlir Viewpoint: Soft infrastructure challenges to scientific knowledge discovery . . . . . . . . . . . . . . . 35--37 Christoph Kern Securing the tangled web . . . . . . . . 38--47 Peter Bailis and Kyle Kingsbury The network is reliable . . . . . . . . 48--55 Jon P. Daries and Justin Reich and Jim Waldo and Elise M. Young and Jonathan Whittinghill and Andrew Dean Ho and Daniel Thomas Seaton and Isaac Chuang Privacy, anonymity, and big data in the social sciences . . . . . . . . . . . . 56--63 Cormac Herley Security, cybercrime, and scale . . . . 64--71 Michail Tsikerdekis and Sherali Zeadally Online deception in social media . . . . 72--80 Jean-Paul Laumond and Nicolas Mansard and Jean-Bernard Lasserre Optimality in robot motion: optimal versus optimized motion . . . . . . . . 82--89 Alexei A. Efros Portraiture in the age of big data: technical perspective . . . . . . . . . 92--92 Ira Kemelmacher-Shlizerman and Eli Shechtman and Rahul Garg and Steven M. Seitz Moving portraits . . . . . . . . . . . . 93--99 Peter Winkler Last byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 102--102 Marina Krakovsky Last byte: Q&A: Finding themes . . . . . 104--ff
John White ACM's challenges and opportunities . . . 5--5 Vinton G. Cerf Cerf's up: Unconventional computing . . 7--7 CACM Staff Letters to the Editor: Responsible programming not a technical issue . . . 8--9 John Langford and Mark Guzdial BLOG@CACM: Finding a research job, and teaching CS in high school . . . . . . . 10--11 Don Monroe News: Still seeking the optical transistor . . . . . . . . . . . . . . . 13--15 Neil Savage News: Gradual evolution . . . . . . . . 16--18 Nidhi Subbaraman News: Museums go high-tech with digital forensics . . . . . . . . . . . . . . . 19--21 Michael A. Cusumano Technology strategy and management: The Bitcoin ecosystem . . . . . . . . . . . 22--24 Peter G. Neumann Inside risks: Risks and myths of cloud computing and cloud storage . . . . . . 25--27 George V. Neville-Neil Kode vicious: Outsourcing responsibility 28--29 Phillip G. Armour The business of software: Vendor: vidi, vici . . . . . . . . . . . . . . . . . . 30--31 Henry Lucas Viewpoint: Disrupting and transforming the university . . . . . . . . . . . . . 32--35 Edgar G. Daylight Viewpoint: A Turing tale . . . . . . . . 36--38 Ben Laurie Certificate transparency . . . . . . . . 40--46 Axel Arnbak and Hadi Asghari and Michel Van Eeten and Nico Van Eijk Security collapse in the HTTPS market 47--55 Sharon Goldberg Why is it taking so long to secure Internet routing? . . . . . . . . . . . 56--63 Hanan Samet and Jagan Sankaranarayanan and Michael D. Lieberman and Marco D. Adelfio and Brendan C. Fruin and Jack M. Lotkowski and Daniele Panozzo and Jon Sperling and Benjamin E. Teitler Reading news with maps by exploiting spatial synonyms . . . . . . . . . . . . 64--77 Denny Vrandeci\'c and Markus Krötzsch Wikidata: a free collaborative knowledgebase . . . . . . . . . . . . . 78--85 Martin Casado and Nate Foster and Arjun Guha Abstractions for software-defined networks . . . . . . . . . . . . . . . . 86--95 Bart Preneel Attacking a problem from the middle: technical perspective . . . . . . . . . 97--97 Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir Dissection: a new paradigm for solving bicomposite search problems . . . . . . 98--105 Daniel H. Wilson Last byte: Future Tense: Garden of Life 112--ff
Alexander L. Wolf Dealing with the deep, long-term challenges facing ACM (part I) . . . . . 5--5 Vinton G. Cerf Heidelberg Laureate Forum II . . . . . . 7--7 CACM Staff Letters to the Editor: Accountability is no excuse for surveillance . . . . . . . 9--9 Mark Guzdial and Lawrence M. Fisher BLOG@CACM: Teach the teachers, and contribute to humanity . . . . . . . . . 10--11 Gary Anthes News: Researchers simplify parallel programming . . . . . . . . . . . . . . 13--15 Esther Shein News: Computing what fits . . . . . . . 16--19 Logan Kugler News: Keeping online reviews honest . . 20--23 Arvind Malhotra and Marshall Van Alstyne Economic and business dimensions: The dark side of the sharing economy \ldots and how to lighten it . . . . . . . . . 24--27 Pamela Samuelson Legally speaking: Updates on the intellectual property front . . . . . . 28--30 Solon Barocas and Helen Nissenbaum Computing ethics: Big data's end run around procedural privacy protections 31--33 Steve Cooper and Shuchi Grover and Mark Guzdial and Beth Simon Education: A future for computing education research . . . . . . . . . . . 34--36 Susan Landau Privacy and security: Summing up . . . . 37--39 Mark Klein and Gregorio Convertino Viewpoint: An embarrassment of riches 40--42 Terrence August and Robert August and Hyoduk Shin Viewpoint: Designing user incentives for cybersecurity . . . . . . . . . . . . . 43--46 Ellen Chisa Evolution of the product manager . . . . 48--52 Alex Liu JavaScript and the Netflix user interface . . . . . . . . . . . . . . . 53--59 John T. Richards and Jonathan Brezin and Calvin B. Swart and Christine A. Halverson A decade of progress in parallel programming productivity . . . . . . . . 60--66 Stephen Gould and Xuming He Scene understanding by labeling pixels 68--77 Pasquale De Meo and Emilio Ferrara and Giacomo Fiumara and Alessandro Provetti On Facebook, most ties are weak . . . . 78--84 Beryl Nelson The data on diversity . . . . . . . . . 86--95 Szymon Rusinkiewicz The intricate dance of fabric and light: technical perspective . . . . . . . . . 97--97 Shuang Zhao and Wenzel Jakob and Steve Marschner and Kavita Bala Building volumetric appearance models of fabric using micro CT imaging . . . . . 98--105 Dennis Shasha Last byte: Upstart puzzles . . . . . . . 120--120
Bobby Schnabel and John White Pathways to computing careers . . . . . 5--5 Vinton G. Cerf Cerf's Up: Does innovation create or destroy jobs? . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: On the significance of Turing's test . . . . . 8--9 Mark Guzdial BLOG@CACM: Meeting student and teacher needs in computing education . . . . . . 10--11 Chris Edwards News: Decoding the language of human movement . . . . . . . . . . . . . . . . 12--14 Gregory Mone News: Intelligent living . . . . . . . . 15--16 Keith Kirkpatrick News: Sensors for seniors . . . . . . . 17--19 CACM Staff News: ACM's Turing Award prize raised to \$1 million . . . . . . . . . . . . . . 20--20 Michael L. Best Global computing: The Internet that Facebook built . . . . . . . . . . . . . 21--23 Peter J. Denning The profession of IT: The whole professional . . . . . . . . . . . . . . 24--27 Telle Whitney and Elizabeth Ames Broadening participation: Innovation and inclusion . . . . . . . . . . . . . . . 28--30 George V. Neville-Neil Kode vicious: Port squatting . . . . . . 31--32 Martin Naedele and Rick Kazman and Yuanfang Cai Viewpoint: Making the case for a ``manufacturing execution system'' for software development . . . . . . . . . . 33--36 Erik Meijer and Vikram Kapoor The responsive enterprise: embracing the hacker way . . . . . . . . . . . . . . . 38--43 David Chisnall No such thing as a general-purpose processor . . . . . . . . . . . . . . . 44--48 Ivar Jacobson and Ed Seidewitz A new software engineering . . . . . . . 49--54 Stacy Marsella and Jonathan Gratch Computationally modeling human emotion 56--67 Mark Silberstein and Bryan Ford and Emmett Witchel GPUfs: the case for operating system services on GPUs . . . . . . . . . . . . 68--79 N. R. Jennings and L. Moreau and D. Nicholson and S. Ramchurn and S. Roberts and T. Rodden and A. Rogers Human-agent collectives . . . . . . . . 80--88 Stephen W. Keckler Rethinking caches for throughput processors: technical perspective . . . 90--90 Timothy G. Rogers and Mike O'Connor and Tor M. Aamodt Learning your limit: managing massively multithreaded caches through scheduling 91--98 Gregory Mone Last byte: Q&A: From Esterel to HipHop 120--ff
Moshe Y. Vardi Editor's letter: The rise and fall of industrial research labs . . . . . . . . 5--5 Vinton G. Cerf Cerf's Up: A long way to have come and still to go . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Toward a map interface not inherently related to geography . . . . . . . . . . . . . . . 8--9 CACM Staff Letters to the Editor: ACM's FY14 annual report . . . . . . . . . . . . . . . . . 11--15 Valerie Barr and Michael Stonebraker BLOG@CACM: A valuable lesson, and whither Hadoop? . . . . . . . . . . . . 18--19 Erica Klarreich News: In search of Bayesian inference 21--24 Samuel Greengard News: Smart transportation networks drive gains . . . . . . . . . . . . . . 25--27 Gary Anthes News: Data brokers are watching you . . 28--30 Lawrence M. Fisher News: Google Boosts ACM's Turing Award prize to \$1 million . . . . . . . . . . 31--31 Michael A. Cusumano Technology strategy and management: How traditional firms must compete in the sharing economy . . . . . . . . . . . . 32--34 Lee A. Bygrave Law and technology: A right to be forgotten? . . . . . . . . . . . . . . . 35--37 Phillip G. Armour The business of software: A little queue theory . . . . . . . . . . . . . . . . . 38--39 Thomas Haigh Historical reflections: The tears of Donald Knuth . . . . . . . . . . . . . . 40--44 Reza Rawassizadeh and Blaine A. Price and Marian Petre Viewpoint: Wearables: has the age of smartwatches finally arrived? . . . . . 45--47 Hermann Maurer Viewpoint: Does the Internet make us stupid? . . . . . . . . . . . . . . . . 48--51 Silvio Micali Viewpoint: What it means to receive the Turing award . . . . . . . . . . . . . . 52--53 Rick Richardson Disambiguating databases . . . . . . . . 54--61 Geetanjali Sampemane Internal access controls . . . . . . . . 62--65 Davidlohr Bueso Scalability techniques for practical synchronization primitives . . . . . . . 66--74 Virender Singh and Alicia Perdigones and José Luis Garcia and Ignacio Cañas-Guerroro and Fernando R. Mazarrón Analyzing worldwide research in hardware architecture, 1997--2011 . . . . . . . . 76--85 Tuukka Ruotsalo and Giulio Jacucci and Petri Myllymäki and Samuel Kaski Interactive intent modeling: information discovery beyond search . . . . . . . . 86--92 Saket Navlakha and Ziv Bar-Joseph Distributed information processing in biological and computational systems . . 94--102 Ravi Nair Big data needs approximate computing: technical perspective . . . . . . . . . 104--104 Hadi Esmaeilzadeh and Adrian Sampson and Luis Ceze and Doug Burger Neural acceleration for general-purpose approximate programs . . . . . . . . . . 105--115 William Sims Bainbridge Last byte: Future tense: Wow! . . . . . 128--ff
Moshe Y. Vardi Editor's letter: Is information technology destroying the middle class? 5--5 Vinton G. Cerf Cerf's up: There is nothing new under the sun . . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Software engineering, like electrical engineering 8--9 Mark Guzdial BLOG@CACM: What's the best way to teach computer science to beginners? . . . . . 12--13 Neil Savage News: Visualizing sound . . . . . . . . 15--17 Logan Kugler News: Online privacy: regional differences . . . . . . . . . . . . . . 18--20 Keith Kirkpatrick News: Using technology to help people 21--23 Carl Landwehr Privacy and security: We need a building code for building code . . . . . . . . . 24--26 Ming Zeng Economic and business dimensions: Three paradoxes of building platforms . . . . 27--29 Peter G. Neumann Inside risks: Far-sighted thinking about deleterious computer-related events . . 30--33 Diana Franklin Education: Putting the computer science in computing education research . . . . 34--36 George V. Neville-Neil Kode vicious: Too big to fail . . . . . 37--39 Armando Fox and David Patterson Viewpoint: Do-it-yourself textbook publishing . . . . . . . . . . . . . . . 40--43 Benjamin Livshits and Manu Sridharan and Yannis Smaragdakis and Ondrej Lhoták and J. Nelson Amaral and Bor-Yuh Evan Chang and Samuel Z. Guyer and Uday P. Khedker and Anders Mòller and Dimitrios Vardoulakis Viewpoint: In defense of soundiness: a manifesto . . . . . . . . . . . . . . . 44--46 Harlan Stenn Securing Network Time Protocol . . . . . 48--51 Robert V. Binder and Bruno Legeard and Anne Kramer Model-based testing: where does it stand? . . . . . . . . . . . . . . . . . 52--56 Carlos Juiz and Mark Toomey To govern IT, or not to govern IT? . . . 58--64 Dalal Alrajeh and Jeff Kramer and Alessandra Russo and Sebastian Uchitel Automated support for diagnosis and repair . . . . . . . . . . . . . . . . . 65--72 Michael Walfish and Andrew J. Blumberg Verifying computations without reexecuting them . . . . . . . . . . . . 74--84 Thomas A. Henzinger and Jean-François Raskin The equivalence problem for finite automata: technical perspective . . . . 86--86 Filippo Bonchi and Damien Pous Hacking nondeterminism with induction and coinduction . . . . . . . . . . . . 87--95 Dennis Shasha Last byte: Upstart Puzzles: Take Your Seats . . . . . . . . . . . . . . . . . 104--104
Wayne Graves Raising ACM's Digital Library . . . . . 5--5 CACM Staff Letters to the Editor: Make abstracts communicate results . . . . . . . . . . 6--6 Vinton G. Cerf Letters to the Editor: `As we may think' 7--7 Valerie Barr and Mark Guzdial BLOG@CACM: Advice on teaching CS, and the learnability of programming languages . . . . . . . . . . . . . . . 8--9 Keith Kirkpatrick News: Automating organic synthesis . . . 13--15 Tom Geller News: Car talk . . . . . . . . . . . . . 16--18 Esther Shein News: Python for beginners . . . . . . . 19--21 Pamela Samuelson Legally speaking: Copyrightability of Java APIs revisited . . . . . . . . . . 22--24 Thomas J. Cortina Broadening participation: Reaching a broader population of students through ``unplugged'' activities . . . . . . . . 25--27 Peter J. Denning and Edward E. Gordon The profession of IT: A technician shortage . . . . . . . . . . . . . . . . 28--30 John Leslie King Computing ethics: Humans in computing: growing responsibilities for researchers 31--33 Shriram Krishnamurthi and Jan Vitek Viewpoint: The real software crisis: repeatability as a core value . . . . . 34--36 Maarten Bullynck and Edgar G. Daylight and Liesbeth De Mol Viewpoint: Why did computer science make a hero out of Turing? . . . . . . . . . 37--39 Poul-Henning Kamp HTTP\slash 2.0: the IETF is phoning it in . . . . . . . . . . . . . . . . . . . 40--42 Dave Long META II: digital vellum in the digital scriptorium . . . . . . . . . . . . . . 43--48 Stephen J. Andriole Who owns IT? . . . . . . . . . . . . . . 50--57 Ashwin Machanavajjhala and Daniel Kifer Designing statistical privacy for your data . . . . . . . . . . . . . . . . . . 58--67 Timothy Libert Privacy implications of health information seeking on the web . . . . . 68--77 Edward Adelson Image processing goes back to basics: technical perspective . . . . . . . . . 80--80 Sylvain Paris and Samuel W. Hasinoff and Jan Kautz Local Laplacian filters: edge-aware image processing with a Laplacian pyramid . . . . . . . . . . . . . . . . 81--91 Leah Hoffmann Last byte: Object Lessons: Q&A . . . . . 96--ff
Joseph A. Konstan and Jack W. Davidson Charting the future: scholarly publishing in CS . . . . . . . . . . . . 5--5 Vinton G. Cerf The human touch . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Human or machine? 8--9 John Langford and Mark Guzdial BLOG@CACM: The arbitrariness of reviews, and advice for school administrators . . 12--13 Alex Wright News: Molecular moonshots . . . . . . . 15--17 Chris Edwards News: Secure-system designers strive to stem data leaks . . . . . . . . . . . . 18--20 Mark Broderick News: What's the price now? . . . . . . 21--23 Dorothy E. Denning Privacy and security: Toward more secure software . . . . . . . . . . . . . . . . 24--26 Mari Sako Technology strategy and management: Competing in emerging markets . . . . . 27--29 George V. Neville-Neil Kode Vicious: Raw networking . . . . . . 30--32 Len Shustek Interview: An interview with Juris Hartmanis . . . . . . . . . . . . . . . 33--37 Leslie Lamport Viewpoint: Who builds a house without drawing blueprints? . . . . . . . . . . 38--41 Paul Vixie Go static or go home . . . . . . . . . . 42--45 Neil J. Gunther and Paul Puglia and Kristofer Tomasette Hadoop superlinear scalability . . . . . 46--55 Philip R. Cohen and Edward C. Kaiser and M. Cecelia Buchanan and Scott Lind and Michael J. Corrigan and R. Matthews Wesson Sketch-Thru-Plan: a multimodal interface for command and control . . . . . . . . 56--65 Chris Newcombe and Tim Rath and Fan Zhang and Bogdan Munteanu and Marc Brooker and Michael Deardeuff How Amazon web services uses formal methods . . . . . . . . . . . . . . . . 66--73 Johannes Sametinger and Jerzy Rozenblit and Roman Lysecky and Peter Ott Security challenges for medical devices 74--82 Trevor Mudge The specialization trend in computer hardware: technical perspective . . . . 84--84 Wajahat Qadeer and Rehan Hameed and Ofer Shacham and Preethi Venkatesan and Christos Kozyrakis and Mark Horowitz Convolution engine: balancing efficiency and flexibility in specialized computing 85--93 David Allen Batchelor Last byte: Future tense . . . . . . . . 96--ff
Moshe Y. Vardi Incentivizing quality and impact in computing research . . . . . . . . . . . 5--5 Vinton G. Cerf Cascade failure . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Abolish software warranty disclaimers . . . . . . . . . . 8--9 Joel Adams and Daniel A. Reed BLOG@CACM: Introducing young women to CS, and supporting advanced research environments . . . . . . . . . . . . . . 10--11 Logan Kugler News: Is ``good enough'' computing good enough? . . . . . . . . . . . . . . . . 12--14 Keith Kirkpatrick News: Putting the data science into journalism . . . . . . . . . . . . . . . 15--17 Gregory Mone News: Robots with a human touch . . . . 18--19 Michael Schrage and Marshall Van Alstyne Economic and business dimensions: Life of IP . . . . . . . . . . . . . . . . . 20--23 Sally Fincher Education: What are we doing when we teach computing in schools? . . . . . . 24--26 Christopher Jon Sprigman Law and technology: Oracle v. Google: a high-stakes legal fight for the software industry . . . . . . . . . . . . . . . . 27--29 Thomas Ball and Benjamin Zorn Viewpoint: Teach foundational language principles . . . . . . . . . . . . . . . 30--31 Serge Abiteboul and Benjamin André and Daniel Kaplan Viewpoint: Managing your digital life 32--35 Justin Sheehy There is no now . . . . . . . . . . . . 36--41 Spencer Rathbun Parallel processing with promises . . . 42--47 Sören Preibusch Privacy behaviors after Snowden . . . . 48--55 Roli Varma and Deepak Kapur Decoding femininity in computer science in India . . . . . . . . . . . . . . . . 56--62 Jean-Paul Laumond and Nicolas Mansard and Jean Bernard Lasserre Optimization as motion selection principle in robot action . . . . . . . 64--74 James Larus Programming multicore computers: technical perspective . . . . . . . . . 76--76 Nadathur Satish and Changkyu Kim and Jatin Chhugani and Hideki Saito and Rakesh Krishnaiyer and Mikhail Smelyanskiy and Milind Girkar and Pradeep Dubey Can traditional programming bridge the ninja performance gap for parallel computing applications? . . . . . . . . 77--86 Dennis Shasha Last byte: Upstart Puzzles: Strategic Friendship . . . . . . . . . . . . . . . 88--88
John White Thank you\ldots . . . . . . . . . . . . 5--5 Vinton G. Cerf A celebration of accomplishments . . . . 7--7 CACM Staff Letters to the Editor: To learn CS principles, start in the cafeteria line 8--9 Mark Guzdial BLOG@CACM: Bringing evidence-based education to CS . . . . . . . . . . . . 10--11 Neil Savage News: Plenty of proteins . . . . . . . . 12--14 Samuel Greengard News: Between the lines . . . . . . . . 15--17 Gary Anthes News: Estonia: a model for e-government 18--20 Andreas Reuter News: Klaus Tschira: 1940--2015 . . . . 21--21 Neil Savage News: Forging relationships . . . . . . 22--23 Vishal Misra Inside risks: Routing money, not packets 24--27 Peter J. Denning The profession of IT: Emergent innovation . . . . . . . . . . . . . . . 28--31 George V. Neville-Neil Kode vicious: Lazarus code . . . . . . . 32--33 Meg Leta Jones Viewpoint: Forgetting made (too) easy 34--35 Yannis Papakonstantinou Viewpoint: Created computed universe . . 36--38 Vinton G. Cerf Interview: An interview with U.S. chief technology officer Megan Smith . . . . . 39--43 Kate Matsudaira The science of managing data science . . 44--47 Stepán Davidovic and Kavita Guliani Reliable Cron across the planet . . . . 48--53 Reza Zafarani and Huan Liu Evaluation without ground truth in social media research . . . . . . . . . 54--60 Kurt Jensen and Lars M. Kristensen Colored Petri nets: a graphical language for formal modeling and validation of concurrent systems . . . . . . . . . . . 61--70 Leslie Lamport Turing lecture: The computer science of concurrency: the early years . . . . . . 71--76 Mark Berman and Piet Demeester and Jae Woo Lee and Kiran Nagaraja and Michael Zink and Didier Colle and Dilip Kumar Krishnappa and Dipankar Raychaudhuri and Henning Schulzrinne and Ivan Seskar and Sachin Sharma Future Internets escape the simulator 78--89 Patrick Baudisch Virtual reality in your living room: technical perspective . . . . . . . . . 92--92 Brett R. Jones and Hrvoje Benko and Eyal Ofek and Andrew D. Wilson IllumiRoom: immersive experiences beyond the TV screen . . . . . . . . . . . . . 93--100 Leah Hoffmann Last byte: Q&A: The Path to Clean Data 104--ff
Alexander L. Wolf A new Chief Executive Officer and Executive Director of ACM . . . . . . . 4--5 Vinton G. Cerf Cerf's up: Milestones . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Quality vs. quantity in faculty publications . . . . 8--9 John Arquilla and Duncan A. Buell BLOG@CACM: The dangers of military robots, the risks of online voting . . . 12--13 Chris Edwards News: Growing pains for deep learning 14--16 Gregory Goth News: Bringing big data to the big tent 17--19 Gregory Mone News: The new smart cities . . . . . . . 20--21 Lawrence M. Fisher News: ACM announces 2014 award recipients . . . . . . . . . . . . . . . 22--23 Pamela Samuelson Legally speaking: Anti-circumvention rules limit reverse engineering . . . . 24--26 L. Jean Camp Computing ethics: Respecting people and respecting privacy . . . . . . . . . . . 27--28 David Anderson Historical reflections: Preserving the digital record of computing history . . 29--31 Phillip G. Armour The business of software: An updated software almanac . . . . . . . . . . . . 32--34 Juan E. Gilbert and Jerlando F. L. Jackson and Edward C. Dillon, Jr. and LaVar J. Charleston Broadening participation: African Americans in the U.S. computing sciences workforce . . . . . . . . . . . . . . . 35--38 Vijay Kumar and Thomas A. Kalil Viewpoint: The future of computer science and engineering is in your hands 39--41 Andrew Brook Low-latency distributed applications in finance . . . . . . . . . . . . . . . . 42--50 Phelim Dowling and Kevin McGrath Using free and open source tools to manage software quality . . . . . . . . 51--55 Daniel A. Reed and Jack Dongarra Exascale computing and big data . . . . 56--68 Alexander Hogenboom and Flavius Frasincar and Franciska de Jong and Uzay Kaymak Using rhetorical structure in sentiment analysis . . . . . . . . . . . . . . . . 69--77 Joseph Bonneau and Cormac Herley and Paul C. van Oorschot and Frank Stajano Passwords and the evolution of imperfect authentication . . . . . . . . . . . . . 78--87 Stuart Russell Unifying logic and probability . . . . . 88--97 William D. Clinger The simplicity of cache efficient functional algorithms: technical perspective . . . . . . . . . . . . . . 100--100 Guy E. Blelloch and Robert Harper Cache efficient functional algorithms 101--108 Brian Clegg Last byte: Future Tense: Toy Box Earth 112--ff
Moshe Y. Vardi Editor's Letter: Why doesn't ACM have a SIG for theoretical computer science? 5--5 Vinton G. Cerf Cerf's up: Invention . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Not so easy to forget . . . . . . . . . . . . . . . . . 8--9 Mark Guzdial BLOG@CACM: Plain talk on computing education . . . . . . . . . . . . . . . 10--11 Esther Shein News: Teaching computers with illusions 13--15 Logan Kugler News: Touching the virtual . . . . . . . 16--18 Keith Kirkpatrick News: The moral challenges of driverless cars . . . . . . . . . . . . . . . . . . 19--20 David Kotz and Kevin Fu and Carl Gunter and Avi Rubin Privacy and security: Security for mobile and cloud frontiers in healthcare 21--23 Henry Chesbrough and Marshall Van Alstyne Economic and business dimensions: Permissionless innovation . . . . . . . 24--26 George V. Neville-Neil Kode Vicious: Hickory dickory doc . . . 27--28 Susanne Hambrusch and Ran Libeskind-Hadas and Eric Aaron Education: Understanding the U.S. domestic computer science Ph.D. pipeline 29--32 Leen-Kiat Soh and Duane F. Shell and Elizabeth Ingraham and Stephen Ramsay and Brian Moore Viewpoint: Learning through computational creativity . . . . . . . . 33--35 Arie van Deursen Testing web applications with state objects . . . . . . . . . . . . . . . . 36--43 Daniel C. Wang From the EDVAC to WEBVACs . . . . . . . 44--51 Beno\^\it Valiron and Neil J. Ross and Peter Selinger and D. Scott Alexander and Jonathan M. Smith Programming the quantum future . . . . . 52--61 Petra Saskia Bayerl and Babak Akhgar Surveillance and falsification implications for open source intelligence investigations . . . . . . 62--69 Rua-Huan Tsaih and David C. Yen and Yu-Chien Chang Challenges deploying complex technologies in a traditional organization . . . . . . . . . . . . . . 70--75 Thanassis Tiropanis and Wendy Hall and Jon Crowcroft and Noshir Contractor and Leandros Tassiulas Network science, web science, and Internet science . . . . . . . . . . . . 76--82 Aniket (Niki) Kittur Corralling crowd power: technical perspective . . . . . . . . . . . . . . 84--84 Michael S. Bernstein and Greg Little and Robert C. Miller and Björn Hartmann and Mark S. Ackerman and David R. Karger and David Crowell and Katrina Panovich Soylent: a word processor with a crowd inside . . . . . . . . . . . . . . . . . 85--94 Dennis Shasha Last byte: Upstart puzzles . . . . . . . 96--96
Joseph A. Konstan and Jack W. Davidson Should conferences meet journals and where? A proposal for `PACM' . . . . . . 5--5 Vinton G. Cerf Cerf's up: On (computing) artifacts . . 7--7 CACM Staff Letters to the Editor: May the computational force be with you . . . . 8--9 John Arquilla BLOG@CACM: Moving beyond the cold war 10--11 Neil Savage News: Split second . . . . . . . . . . . 12--14 Gregory Mone News: Sensing emotions . . . . . . . . . 15--16 Logan Kugler News: New news aggregator apps . . . . . 17--19 Thomas Haigh and Mark Priestley Historical reflections: Innovators assemble: Ada Lovelace, Walter Isaacson, and the superheroines of computing . . . 20--27 Joe Karaganis and Jennifer Urban Law and technology: The rise of the robo notice . . . . . . . . . . . . . . . . . 28--30 Dorothea Kleine Global computing: The value of social theories for global computing . . . . . 31--33 Peter J. Denning The profession of IT: Automated education and the professional . . . . . 34--36 Jeffrey D. Ullman Viewpoint: Experiments as research validation: have we gone too far? . . . 37--39 Michael Mitzenmacher Viewpoint: Theory without experiments: have we gone too far? . . . . . . . . . 40--42 Kathryn S. McKinley Point/Counterpoint: The pros and cons of the 'PACM' proposal: point . . . . . . . 43--44 David S. Rosenblum Point/Counterpoint: The pros and cons of the 'PACM' proposal: counterpoint . . . 44--45 Spence Green and Jeffrey Heer and Christopher D. Manning Natural language translation at the intersection of AI and HCI . . . . . . . 46--53 Philip Maddox Testing a distributed system . . . . . . 54--58 Simha Sethumadhavan and Adam Waksman and Matthew Suozzo and Yipeng Huang and Julianna Eum Trustworthy hardware from untrusted components . . . . . . . . . . . . . . . 60--71 Ignacio Laguna and Dong H. Ahn and Bronis R. de Supinski and Todd Gamblin and Gregory L. Lee and Martin Schulz and Saurabh Bagchi and Milind Kulkarni and Bowen Zhou and Zhezhe Chen and Feng Qin Debugging high-performance computing applications at massive scales . . . . . 72--81 Tanmoy Chakraborty and Suhansanu Kumar and Pawan Goyal and Niloy Ganguly and Animesh Mukherjee On the categorization of scientific citation profiles in computer science 82--90 Ernest Davis and Gary Marcus Commonsense reasoning and commonsense knowledge in artificial intelligence . . 92--103 Aviv Zohar Bitcoin: under the hood . . . . . . . . 104--113 Marc Alexa A woodworker's easy fix: technical perspective . . . . . . . . . . . . . . 115--115 Nobuyuki Umentani and Takeo Igarashi and Niloy J. Mitra Guided exploration of physically valid shapes for furniture design . . . . . . 116--124 Leah Hoffmann Last byte: Q&A: A Passion for Pairings 128--ff
Moshe Y. Vardi What can be done about gender diversity in computing?: a lot! . . . . . . . . . 5--5 Vinton G. Cerf The Third Heidelberg Laureate Forum . . 7--7 CACM Staff Letters to the Editor: Ban `naked' braces! . . . . . . . . . . . . . . . . 10--11 John Arquilla and Daniel A. Reed BLOG@CACM: The morality of online war; the fates of data analytics, HPC . . . . 12--13 Gary Anthes News: Scientists update views of light 15--17 Samuel Greengard News: Automotive systems get smarter . . 18--20 Keith Kirkpatrick News: Cyber policies on the rise . . . . 21--23 Harold `Hal' Abelson and Ross Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield `Whit' Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner Inside risks: Keys under doormats . . . 24--26 Michael A. Cusumano Technology strategy and management: In defense of IBM . . . . . . . . . . . . . 27--28 George V. Neville-Neil Kode Vicious: Storming the cubicle . . . 29--31 Phillip G. Armour The business of software: Thinking thoughts . . . . . . . . . . . . . . . . 32--34 Thomas J. Misa Historical reflections: Computing is history . . . . . . . . . . . . . . . . 35--37 Thomas G. Dietterich and Eric J. Horvitz Viewpoint: Rise of concerns about AI: reflections and directions . . . . . . . 38--40 Phillip Compeau and Pavel A. Pevzner Viewpoint: Life after MOOCs . . . . . . 41--44 T. S. Pillai and V. Chidambaram and R. Alagappan and S. Al-Kiswany and A. C. Arpaci-Dusseau and R. H. Arpaci-Dusseau Crash consistency . . . . . . . . . . . 46--51 Rich Harris Dismantling the barriers to entry . . . 52--57 Joan Feigenbaum and Bryan Ford Seeking anonymity in an Internet panopticon . . . . . . . . . . . . . . . 58--69 Patricia Lago and Sedef Akinli Koçak and Ivica Crnkovic and Birgit Penzenstadler Framing sustainability as a property of software quality . . . . . . . . . . . . 70--78 Eleazar Eskin Discovering genes involved in disease and the mystery of missing heritability 80--87 Cleve Moler Technical Perspective: Not just a matrix laboratory anymore . . . . . . . . . . . 90--90 Lloyd N. Trefethen Computing numerically with functions instead of numbers . . . . . . . . . . . 91--97 William Sims Bainbridge Last byte: Future Tense: Processional 104--ff
Bobby Schnabel A tale of ACM visions . . . . . . . . . 5--5 Vinton G. Cerf Memory with a twist . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Who will read PACM? . . . . . . . . . . . . . . . . . 8--9 Valerie Barr and Michael Stonebraker BLOG@CACM: How men can help women in CS; winning `computing's Nobel prize' . . . 10--11 Alex Wright News: Algorithmic authors . . . . . . . 12--14 Esther Shein News: Companies proactively seek out internal threats . . . . . . . . . . . . 15--17 Chris Edwards News: Brain science helps computers separate speakers in a crowded room . . 18--20 CACM Staff News: John H. Holland 1929--2015 . . . . 21--21 Steven B. Lipner Privacy and security: Security assurance 24--26 Pamela Samuelson Legally speaking: Software patents are falling down . . . . . . . . . . . . . . 27--29 Muhammad Zia Hydari and Rahul Telang and William M. Marella Economic and business dimensions: Electronic health records and patient safety . . . . . . . . . . . . . . . . . 30--32 Pratim Sengupta and Amanda Dickes and Amy Voss Farris and Ashlyn Karan and David Martin and Mason Wright Education: Programming in K--12 science classrooms . . . . . . . . . . . . . . . 33--35 Len Shustek Interview: An interview with Fred Brooks 36--40 Rafael A. Calvo and Dorian Peters and Sidney D'Mello Viewpoints: When technologies manipulate our emotions . . . . . . . . . . . . . . 41--42 Ben Maurer Fail at scale . . . . . . . . . . . . . 44--49 Tyler Mcmullen It probably works . . . . . . . . . . . 50--54 Taylor Savage Componentizing the web . . . . . . . . . 55--61 Dafna Shahaf and Carlos Guestrin and Eric Horvitz and Jure Leskovec Information cartography . . . . . . . . 62--73 So-Hyun Lee and Hee-Woong Kim Why people post benevolent and malicious comments online . . . . . . . . . . . . 74--79 Chenyan Xu and Yang Yu and Chun-Keung Hoi Hidden in-game intelligence in NBA players' tweets . . . . . . . . . . . . 80--89 Sumit Gulwani and José Hernández-Orallo and Emanuel Kitzelmann and Stephen H. Muggleton and Ute Schmid and Benjamin Zorn Inductive programming meets the real world . . . . . . . . . . . . . . . . . 90--99 Frédo Durand Technical Perspective: The Path to Light Transport . . . . . . . . . . . . . . . 102--102 Wenzel Jakob and Steve Marschner Geometric tools for exploring manifolds of light transport paths . . . . . . . . 103--111 George Varghese Technical Perspective: Treating Networks Like Programs . . . . . . . . . . . . . 112--112 Mihai Dobrescu and Katerina Argyraki Software dataplane verification . . . . 113--121 Dennis Shasha Last byte: Upstart Puzzles: Auction Triplets . . . . . . . . . . . . . . . . 136--136
Moshe Y. Vardi On lethal autonomous weapons . . . . . . 5--5 Vinton G. Cerf Advancing the ACM agenda . . . . . . . . 7--7 CACM Staff Letters to the Editor: What about statistical relational learning? . . . . 8--9 Moshe Y. Vardi and Mark Guzdial BLOG@CACM: What do we do when the jobs are gone, and why we must embrace active learning . . . . . . . . . . . . . . . . 10--11 Don Monroe News: When data is not enough . . . . . 12--14 Gregory Mone News: The hyper-intelligent bandage . . 15--16 Keith Kirkpatrick News: Technology brings online education in line with campus programs . . . . . . 17--19 David Anderson Historical reflections: The digital dark age . . . . . . . . . . . . . . . . . . 20--23 Peter J. Denning and Nicholas Dew The profession of IT: Why our theories of innovation fail us . . . . . . . . . 24--26 Nancy Tuana Computing ethics: Coupled ethical-epistemic analysis in teaching ethics . . . . . . . . . . . . . . . . . 27--29 George V. Neville-Neil Kode vicious: Pickled patches . . . . . 30--32 Richard E. Ladner and Sheryl Burgstahler Broadening participation: Increasing the participation of individuals with disabilities in computing . . . . . . . 33--36 Jeremy Scott and Alan Bundy Viewpoint: Creating a new generation of computational thinkers . . . . . . . . . 37--40 Cory Doctorow Viewpoint: I can't let you do that, Dave 41--42 Stephen Goose Point/Counterpoint: The case for banning killer robots: point . . . . . . . . . . 43--45 Ronald Arkin Point/Counterpoint: The case for banning killer robots: counterpoint . . . . . . 46--47 Olivia Angiuli and Joe Blitzstein and Jim Waldo How to de-identify your data . . . . . . 48--55 Kate Matsudaira Lean software development: building and shipping two versions . . . . . . . . . 56--58 Fabien Gaud and Baptiste Lepers and Justin Funston and Mohammad Dashti and Alexandra Fedorova and Vivien Quéma and Renaud Lachaize and Mark Roth Challenges of memory management on modern NUMA systems . . . . . . . . . . 59--66 Andrea Ballatore and Michela Bertolotto Personalizing maps . . . . . . . . . . . 68--74 Philip Wadler Propositions as types . . . . . . . . . 75--84 Soumya Sen and Carlee Joe-Wong and Sangtae Ha and Mung Chiang Smart data pricing: using economics to manage network congestion . . . . . . . 86--93 Robert Kraut and Moira Burke Internet use and psychological well-being: effects of activity and audience . . . . . . . . . . . . . . . . 94--100 Noah Snavely Technical Perspective: Paris Beyond Frommer's . . . . . . . . . . . . . . . 102--102 Carl Doersch and Saurabh Singh and Abhinav Gupta and Josef Sivic and Alexei A. Efros What makes Paris look like Paris? . . . 103--110 David Maier Technical Perspective: In-Situ Database Management . . . . . . . . . . . . . . . 111--111 Ioannis Alagiannis and Renata Borovica-Gajic and Miguel Branco and Stratos Idreos and Anastasia Ailamaki NoDB: efficient query execution on raw data files . . . . . . . . . . . . . . . 112--121 Leah Hoffmann Last byte: Q&A: Redefining Architectures 136--ff
Mark R. Nelson Focusing on teacher needs in K--12 CS education . . . . . . . . . . . . . . . 5--5 Vinton G. Cerf On the road in Latin America . . . . . . 7--7 CACM Staff Letters to the Editor: Let the liable pay . . . . . . . . . . . . . . . . . . 8--9 Vinton G. Cerf Letters to the Editor: ACM's 2016 general election . . . . . . . . . . . . 10--10 Alexander L. Wolf Letters to the Editor: ACM's annual report for FY15 . . . . . . . . . . . . 11--16 John Arquilla and Joel C. Adams BLOG@CACM: Controlling cyber arms, and creating new LEGOs . . . . . . . . . . . 18--19 Neil Savage News: Seeing more clearly . . . . . . . 20--22 Samuel Greengard News: Better memory . . . . . . . . . . 23--25 Esther Shein News: Preserving the internet . . . . . 26--28 CACM Staff News: Gene Amdahl, 1922--2015 . . . . . 29--29 Jonathan T. Weinberg Law and technology: Biometric identity 30--32 Michael A. Cusumano and David B. Yoffie Technology strategy and management: Extrapolating from Moore's law . . . . . 33--35 Phillip G. Armour The business of software: The chaos machine . . . . . . . . . . . . . . . . 36--38 Thomas Haigh and Mark Priestley Historical reflections: Where code comes from: architectures of automatic control from Babbage to Algol . . . . . . . . . 39--44 Gio Wiederhold Viewpoint: Unbalanced data leads to obsolete economic advice . . . . . . . . 45--46 Yoav Shoham Viewpoint: Why knowledge representation matters . . . . . . . . . . . . . . . . 47--49 George V. Neville-Neil Time is an illusion lunchtime doubly so 50--55 Mihir Nanavati and Malte Schwarzkopf and Jake Wires and Andrew Warfield Non-volatile storage . . . . . . . . . . 56--63 Pat Helland Immutability changes everything . . . . 64--70 Shashi Shekhar and Steven K. Feiner and Walid G. Aref Spatial computing . . . . . . . . . . . 72--81 Melissa Lee and Esteve Almirall and Jonathan Wareham Open data and civic apps: first-generation failures, second-generation improvements . . . . . 82--89 Lazaros Goutas and Juliana Sutanto and Hassan Aldarbesti The building blocks of a cloud strategy: evidence from three SaaS providers . . . 90--97 Ioannis Koutis and Ryan Williams Algebraic fingerprints for faster algorithms . . . . . . . . . . . . . . . 98--105 Steve Hand Technical Perspective: High-performance virtualization: are we done? . . . . . . 107--107 Nadav Amit and Abel Gordon and Nadav Har'El and Muli Ben-Yehuda and Alex Landau and Assaf Schuster and Dan Tsafrir Bare-metal performance for virtual machines with exitless interrupts . . . 108--116 Tova Milo Technical Perspective: Enlisting the power of the crowd . . . . . . . . . . . 117--117 Beth Trushkowsky and Tim Kraska and Michael J. Franklin and Purnamrita Sarkar Answering enumeration queries with the crowd . . . . . . . . . . . . . . . . . 118--127 Dennis Shasha Last byte: Upstart Puzzles: Ice Trap . . 136--136
Moshe Y. Vardi Editor's Letter: The moral hazard of complexity-theoretic assumptions . . . . 5--5 Vinton G. Cerf Cerf's up: Apps and the Web . . . . . . 7--7 CACM Staff Letters to the Editor: Expect `ungoverned actors' to use AI-supported weapons, too . . . . . . . . . . . . . . 8--9 Mark Guzdial BLOG@CACM: Drumming up support for AP CS principles . . . . . . . . . . . . . . . 12--13 Chris Edwards News: Self-repair techniques point to robots that design themselves . . . . . 15--17 Logan Kugler News: How a supervillain (or a hacker in his basement) could destroy the Internet 18--20 Tom Geller News: In privacy law, it's the U.S. vs. the world . . . . . . . . . . . . . . . 21--23 CACM Staff News: ACM inducts Fellows . . . . . . . 24--24 Peter C. Evans and Rahul C. Basole Economic and business dimensions: Revealing the API ecosystem and enterprise strategy via visual analytics 26--28 Carl Landwehr Privacy and security: Privacy research directions . . . . . . . . . . . . . . . 29--31 Rick Adrion and Renee Fall and Barbara Ericson and Mark Guzdial Education: Broadening access to computing education state by state . . . 32--34 George V. Neville-Neil Kode Vicious: Code hoarding . . . . . . 35--36 Satish Chandra and Suresh Thummalapenta and Saurabh Sinha Viewpoint: Lessons from the tech transfer trenches . . . . . . . . . . . 37--39 Herbert Lin Viewpoint: Having a conversation about bulk surveillance . . . . . . . . . . . 40--42 R. V. Guha and Dan Brickley and Steve Macbeth Schema.org: evolution of structured data on the web . . . . . . . . . . . . . . . 44--51 Caitie McCaffrey The verification of a distributed system 52--55 Nicholas Diakopoulos Accountability in algorithmic decision making . . . . . . . . . . . . . . . . . 56--62 Bart Thomee and David A. Shamma and Gerald Friedland and Benjamin Elizalde and Karl Ni and Douglas Poland and Damian Borth and Li-Jia Li YFCC100M: the new data in multimedia research . . . . . . . . . . . . . . . . 64--73 Michael Stonebraker Turing Lecture: The land sharks are on the squawk box . . . . . . . . . . . . . 74--83 J. P. Shim and J. Koh and S. Fister and H. Y. Seo Phonetic analytics technology and big data: real-world cases . . . . . . . . . 84--90 Daniel Abadi and Rakesh Agrawal and Anastasia Ailamaki and Magdalena Balazinska and Philip A. Bernstein and Michael J. Carey and Surajit Chaudhuri and Jeffrey Dean and AnHai Doan and Michael J. Franklin and Johannes Gehrke and Laura M. Haas and Alon Y. Halevy and Joseph M. Hellerstein and Yannis E. Ioannidis and H. V. Jagadish and Donald Kossmann and Samuel Madden and Sharad Mehrotra and Tova Milo and Jeffrey F. Naughton and Raghu Ramakrishnan and Volker Markl and Christopher Olston and Beng Chin Ooi and Christopher Ré and Dan Suciu and Michael Stonebraker and Todd Walter and Jennifer Widom The Beckman report on database research 92--99 Michael Mitzenmacher and Justin Thaler Technical Perspective: Catching lies (and mistakes) in offloaded computation 102--102 Bryan Parno and Jon Howell and Craig Gentry and Mariana Raykova Pinocchio: nearly practical verifiable computation . . . . . . . . . . . . . . 103--112 Sumit Gulwani Technical Perspective: Program synthesis using stochastic techniques . . . . . . 113--113 Eric Schkufza and Rahul Sharma and Alex Aiken Stochastic program optimization . . . . 114--122 Ken MacLeod Last byte: Future Tense: Chatterbox . . 128--ff
Eugene H. Spafford The strength of encryption . . . . . . . 5--5 Vinton G. Cerf Computer science in the curriculum . . . 7--7 CACM Staff Letters to the Editor: ACM moral imperatives vs. lethal autonomous weapons . . . . . . . . . . . . . . . . 8--9 Valerie Barr BLOG@CACM: The value of Ada . . . . . . 10--11 Gregory Goth News: Deep or shallow, NLP is breaking out . . . . . . . . . . . . . . . . . . 13--16 Tom Geller News: Rich data, poor fields . . . . . . 17--18 Neil Savage News: When computers stand in the schoolhouse door . . . . . . . . . . . . 19--21 CACM Staff News: Peter Naur: 1928--2016 . . . . . . 22--23 Pamela Samuelson Legally speaking: New exemptions to anti-circumvention rules . . . . . . . . 24--26 Jeffrey Johnson Computing ethics: The question of information justice . . . . . . . . . . 27--29 Peter J. Denning The profession of IT: Fifty years of operating systems . . . . . . . . . . . 30--32 Tiffany Barnes and George K. Thiruvathukal Broadening participation: The need for research in broadening participation . . 33--34 Maja Vukovic and Jim Laredo and Vinod Muthusamy and Aleksander Slominski and Roman Vaculin and Wei Tan and Vijay Naik and Ignacio Silva-Lepe and Arun Kumar and Biplav Srivastava and Joel W. Branch Viewpoint: Riding and thriving on the API hype cycle . . . . . . . . . . . . . 35--37 H. V. Jagadish Viewpoint: Paper presentation at conferences: time for a reset . . . . . 38--39 David Patterson Interview: An interview with Stanford University President John Hennessy . . . 40--45 CACM Staff A purpose-built global network: Google's move to SDN . . . . . . . . . . . . . . 46--54 Kate Matsudaira The paradox of autonomy and recognition 55--57 Tom Limoncelli Automation should be like Iron Man, not Ultron . . . . . . . . . . . . . . . . . 58--61 Christian Collberg and Todd A. Proebsting Repeatability in computer systems research . . . . . . . . . . . . . . . . 62--69 Andrew S. Tanenbaum Lessons learned from 30 years of MINIX 70--78 Antonio De Nicola and Michele Missikoff A lightweight methodology for rapid ontology engineering . . . . . . . . . . 79--86 Boaz Barak Hopes, fears, and software obfuscation 88--96 John Regehr Technical Perspective: STACKing up undefined behaviors . . . . . . . . . . 98--98 Xi Wang and Nickolai Zeldovich and M. Frans Kaashoek and Armando Solar-Lezama A differential approach to undefined behavior detection . . . . . . . . . . . 99--106 David Forsyth Technical Perspective: Taming the name game . . . . . . . . . . . . . . . . . . 107--107 Vicente Ordonez and Wei Liu and Jia Deng and Yejin Choi and Alexander C. Berg and Tamara L. Berg Learning to name objects . . . . . . . . 108--115 Leah Hoffmann Last byte: Q&A: A Graphics and Hypertext Innovator . . . . . . . . . . . . . . . 120--ff
Moshe Y. Vardi Are we headed toward another global tech bust? . . . . . . . . . . . . . . . . . 5--5 Vinton G. Cerf and Maggie Johnson Enrollments explode! but diversity students are leaving\ldots . . . . . . . 7--7 CACM Staff Letters to the Editor: Chaos is no catastrophe . . . . . . . . . . . . . . 8--9 Mark Guzdial and John Arquilla BLOG@CACM: Sampling bias in CS education, and where's the cyber strategy? . . . . . . . . . . . . . . . 10--11 Chris Edwards News: Automating proofs . . . . . . . . 13--15 Keith Kirkpatrick News: Existing technologies can assist the disabled . . . . . . . . . . . . . . 16--18 Gary Anthes News: Search engine agendas . . . . . . 19--21 Lawrence M. Fisher News: Marvin Minsky: 1927--2016 . . . . 22--24 Lawrence M. Fisher News: A decade of ACM efforts contribute to computer science for all . . . . . . 25--27 Kentaro Toyama Global computing: The Internet and inequality . . . . . . . . . . . . . . . 28--30 George V. Neville-Neil Kode Vicious: GNL is not Linux . . . . . 31--32 Mari Sako Technology strategy and management: The need for corporate diplomacy . . . . . . 33--35 Manuel Cebrian and Iyad Rahwan and Alex ``Sandy'' Pentland Viewpoint: Beyond viral . . . . . . . . 36--39 Poul-Henning Kamp More encryption means less privacy . . . 40--42 Carlos Baquero and Nuno Preguiça Why logical clocks are easy . . . . . . 43--47 Thomas A. Limoncelli How SysAdmins devalue themselves . . . . 48--49 Palash Bera How colors in business dashboards affect users' decision making . . . . . . . . . 50--57 Mikhail I. Gofman and Sinjini Mitra Multimodal biometrics for enhanced mobile device security . . . . . . . . . 58--65 Alberto Apostolico and Maxime Crochemore and Martin Farach-Colton and Zvi Galil and S. Muthukrishnan 40 years of suffix trees . . . . . . . . 66--73 David Wagner Technical Perspective: Fairness and the coin flip . . . . . . . . . . . . . . . 75--75 Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek Secure multiparty computations on Bitcoin . . . . . . . . . . . . . . . . 76--84 Emin Gün Sirer Technical Perspective: The state (and security) of the Bitcoin economy . . . . 85--85 Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage A fistful of Bitcoins: characterizing payments among men with no names . . . . 86--93 Dennis Shasha Last byte: Upstart Puzzles: Sleep No More . . . . . . . . . . . . . . . . . . 96--96
Moshe Y. Vardi The moral imperative of artificial intelligence . . . . . . . . . . . . . . 5--5 Vinton G. Cerf The IANA transition . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Why All Writs is a Trojan horse . . . . . . . . . . . . . 8--9 CACM Staff Letters to the Editor: ACM's 2016 general election: please take this opportunity to vote . . . . . . . . . . 11--22 Mark Guzdial BLOG@CACM: Bringing computer science to U.S. schools, state by state . . . . . . 24--25 Don Monroe News: Silicon photonics: ready to go the distance? . . . . . . . . . . . . . . . 26--28 Samuel Greengard News: Cybersecurity gets smart . . . . . 29--31 Keith Kirkpatrick News: Coding as sport . . . . . . . . . 32--33 Jason Schultz Law and technology: The Internet of Things we don't own? . . . . . . . . . . 36--38 R. Benjamin Shapiro and Matthew Ahrens Education: Beyond blocks: syntax and semantics . . . . . . . . . . . . . . . 39--41 Wen Wen and Chris Forman Economic and business dimensions: Do patent commons and standards-setting organizations help navigate patent thickets? . . . . . . . . . . . . . . . 42--43 David P. Anderson Historical reflections: Preserving hybrid objects . . . . . . . . . . . . . 44--46 Steffen Wendzel Viewpoint: How to increase the security of smart buildings? . . . . . . . . . . 47--49 Brendan Burns and Brian Grant and David Oppenheimer and Eric Brewer and John Wilkes Borg, Omega, and Kubernetes . . . . . . 50--57 Kate Matsudaira Delegation as art . . . . . . . . . . . 58--60 Ivar Jacobson and Ian Spence and Brian Kerr Use-case 2.0 . . . . . . . . . . . . . . 61--69 Stephen M. Casner and Edwin L. Hutchins and Don Norman The challenges of partially automated driving . . . . . . . . . . . . . . . . 70--77 Andrew Lenharth and Donald Nguyen and Keshav Pingali Parallel graph analytics . . . . . . . . 78--87 Hanan Samet and Sarana Nutanong and Brendan C. Fruin Static presentation consistency issues in smartphone mapping apps . . . . . . . 88--98 Mason Bretan and Gil Weinberg A survey of robotic musicianship . . . . 100--109 Boaz Barak Technical Perspective: a breakthrough in software obfuscation . . . . . . . . . . 112--112 Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters Hiding secrets in software: a cryptographic approach to program obfuscation . . . . . . . . . . . . . . 113--120 Gail C. Murphy Technical Perspective: Software is natural . . . . . . . . . . . . . . . . 121--121 Abram Hindle and Earl T. Barr and Mark Gabel and Zhendong Su and Premkumar Devanbu On the naturalness of software . . . . . 122--131 Louis Friedman Last byte: Future Tense: Becoming a Multi-Planet Species . . . . . . . . . . 136--ff
Alexander L. Wolf Moving forward . . . . . . . . . . . . . 5--5 Vinton G. Cerf Celebrations! . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: No backdoor required or expected . . . . . . . . . . 8--9 John Langford and Bertrand Meyer and Mark Guzdial BLOG@CACM: The solution to AI, what real researchers do, and expectations for CS classrooms . . . . . . . . . . . . . . . 10--11 Neil Savage News: The key to privacy . . . . . . . . 12--14 Logan Kugler News: What happens when big data blunders? . . . . . . . . . . . . . . . 15--16 Alex Wright News: Reimagining search . . . . . . . . 17--19 Gregory Mone News: What's next for digital humanities? . . . . . . . . . . . . . . 20--21 Rebecca T. Mercuri and Peter G. Neumann Inside risks: The risks of self-auditing systems . . . . . . . . . . . . . . . . 22--25 George V. Neville-Neil Kode Vicious: What are you trying to pull? . . . . . . . . . . . . . . . . . 26--27 Peter J. Denning The profession of IT: How to produce innovations . . . . . . . . . . . . . . 28--30 Derek Chiou Interview: An interview with Yale Patt 31--36 Boaz Barak Viewpoint: Computer science should stay young . . . . . . . . . . . . . . . . . 37--38 Jean-Pierre Hubaux and Ari Juels Viewpoint: Privacy is dead, long live privacy . . . . . . . . . . . . . . . . 39--41 Ankita Mitra Viewpoint: A byte is all we need . . . . 42--44 Kate Matsudaira Nine things I didn't know I would learn being an engineer manager . . . . . . . 45--47 Brendan Gregg The flame graph . . . . . . . . . . . . 48--57 Pat Helland Standing on distributed shoulders of giants . . . . . . . . . . . . . . . . . 58--61 Brad A. Myers and Jeffrey Stylos Improving API usability . . . . . . . . 62--69 Daniel Genkin and Lev Pachmanov and Itamar Pipman and Adi Shamir and Eran Tromer Physical key extraction attacks on PCs 70--79 Petros Drineas and Michael W. Mahoney RandNLA: randomized numerical linear algebra . . . . . . . . . . . . . . . . 80--90 Koushik Sen Veritesting tackles path-explosion problem . . . . . . . . . . . . . . . . 92--92 Thanassis Avgerinos and Alexandre Rebert and Sang Kil Cha and David Brumley Enhancing symbolic execution with veritesting . . . . . . . . . . . . . . 93--100 Siddharth Suri Computing with the crowd . . . . . . . . 101--101 Daniel W. Barowy and Charlie Curtsinger and Emery D. Berger and Andrew McGregor AutoMan: a platform for integrating human-based and digital computation . . 102--109 Leah Hoffmann Last byte: Q&A: Finding new directions in cryptography: Whitfield Diffie and Martin Hellman on their meeting, their research, and the results that billions use every day . . . . . . . . . . . . . 112--ff
Moshe Y. Vardi The ritual of academic-unit review . . . 5--5 Vinton G. Cerf The power of big ideas . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Rethinking computational thinking . . . . . . . . . 8--8 Jeannette M. Wing and Dan Stanzione BLOG@CACM: Progress in computational thinking, and expanding the HPC community . . . . . . . . . . . . . . . 10--11 Neil Savage News: Graph matching in theory and practice . . . . . . . . . . . . . . . . 12--14 Marina Krakovsky News: Accelerating search . . . . . . . 15--16 Lawrence M. Fisher News: Booming enrollments . . . . . . . 17--18 Keith Kirkpatrick News: Legal advice on the smartphone . . 19--21 Pamela Samuelson Legally speaking: Apple v. Samsung and the upcoming design patent wars? . . . . 22--24 Thomas Haigh Historical reflections: How Charles Bachman invented the DBMS, a foundation of our digital world . . . . . . . . . . 25--30 Jacob Metcalf Computing ethics: Big data analytics and revision of the common rule . . . . . . 31--33 Toby Walsh Viewpoint: Turing's red flag . . . . . . 34--37 Yuri Gurevich and Efim Hudis and Jeannette M. Wing Viewpoint: Inverse privacy . . . . . . . 38--42 Sachin Date Should you upload or ship big data to the cloud? . . . . . . . . . . . . . . . 44--51 Thomas A. Limoncelli The small batches principle . . . . . . 52--57 Heinrich Hartmann Statistics for engineers . . . . . . . . 58--66 Abhik Roychoudhury and Satish Chandra Formula-based software debugging . . . . 68--77 Rachel Potvin and Josh Levenberg Why Google stores billions of lines of code in a single repository . . . . . . 78--87 Gill Barequet and Günter Rote and Mira Shalah $ \lambda > 4 $: an improved lower bound on the growth constant of polyominoes 88--95 Emilio Ferrara and Onur Varol and Clayton Davis and Filippo Menczer and Alessandro Flammini The rise of social bots . . . . . . . . 96--104 Henry Kautz and Parag Singla Technical Perspective: Combining logic and probability . . . . . . . . . . . . 106--106 Vibhav Gogate and Pedro Domingos Probabilistic theorem proving . . . . . 107--115 Sam Madden Technical Perspective: Mesa takes data warehousing to new heights . . . . . . . 116--116 Ashish Gupta and Fan Yang and Jason Govig and Adam Kirsch and Kelvin Chan and Kevin Lai and Shuo Wu and Sandeep Dhoot and Abhilash Rajesh Kumar and Ankur Agiwal and Sanjay Bhansali and Mingsheng Hong and Jamie Cameron and Masood Siddiqi and David Jones and Jeff Shute and Andrey Gubarev and Shivakumar Venkataraman and Divyakant Agrawal Mesa: a geo-replicated online data warehouse for Google's advertising system . . . . . . . . . . . . . . . . . 117--125 Dennis Shasha Last byte: Upstart Puzzles: Chair Games 128--128
Vicki L. Hanson From the new ACM President . . . . . . . 5--5 Vinton G. Cerf Star struck in Lindau . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Future cyberdefenses will defeat cyberattacks on PCs . . . . . . . . . . . . . . . . . 8--9 Jason Hong BLOG@CACM: Inside the Great Wall . . . . 10--11 Marina Krakovsky News: Reinforcement renaissance . . . . 12--14 Gary Anthes News: Open source software no longer optional . . . . . . . . . . . . . . . . 15--17 Logan Kugler News: Smartphone apps for social good 18--20 Paul Kocher Privacy and security: Computer security is broken: can better hardware help fix it? . . . . . . . . . . . . . . . . . . 22--25 Yasmin B. Kafai Education: From computational thinking to computational participation in K--12 education . . . . . . . . . . . . . . . 26--27 George V. Neville-Neil Kode Vicious: Chilling the messenger . . 28--29 Ben Shneiderman Viewpoint: Teamwork in computing research . . . . . . . . . . . . . . . . 30--31 Ivan Beschastnikh and Patty Wang and Yuriy Brun and Michael D. Ernst Debugging distributed systems . . . . . 32--37 Pat Helland The singular success of SQL . . . . . . 38--41 Tom Killalea The hidden dividends of microservices 42--45 Rida Khatoun and Sherali Zeadally Smart cities: concepts, architectures, research opportunities . . . . . . . . . 46--57 Stephanie Forrest and Melanie Mitchell Adaptive computation: the multidisciplinary legacy of John H. Holland . . . . . . . . . . . . . . . . 58--63 Leon Kappelman and Mary C. Jones and Vess Johnson and Ephraim R. McLean and Kittipong Boonme Skills for success at different stages of an IT professional's career . . . . . 64--70 Bonnie Berger and Noah M. Daniels and Y. William Yu Computational biology in the 21st century: scaling with compressive algorithms . . . . . . . . . . . . . . . 72--80 Todd Millstein Technical Perspective: Toward reliable programming for unreliable hardware . . 82--82 Michael Carbin and Sasa Misailovic and Martin C. Rinard Verifying quantitative reliability for programs that execute on unreliable hardware . . . . . . . . . . . . . . . . 83--91 Philip Wadler Technical Perspective: Why didn't I think of that? . . . . . . . . . . . . . 92--92 Adam Chlipala Ur/Web: a simple model for programming the web . . . . . . . . . . . . . . . . 93--100 Ken MacLeod Last byte: Future Tense: Gut Feelings 104--ff
Moshe Y. Vardi Academic rankings considered harmful! 5--5 Vinton G. Cerf Keeping the Internet open . . . . . . . 7--7 CACM Staff Letters to the Editor: Election auditing and verifiability . . . . . . . . . . . 8--9 Chris Edwards News: Reconciling quantum physics with math . . . . . . . . . . . . . . . . . . 11--13 Samuel Greengard News: GPUs reshape computing . . . . . . 14--16 Gregory Mone News: The edge of the uncanny . . . . . 17--19 Felix Wu Law and Technology: No easy answers in the fight over iPhone decryption . . . . 20--22 Peter J. Denning The profession of IT: Software quality 23--25 Richard E. Ladner and Maya Israel Broadening participation: ``For all'' in ``computer science for all'' . . . . . . 26--28 Amitai Etzioni and Oren Etzioni Viewpoint: Designing AI systems that obey our laws and values . . . . . . . . 29--31 Ethan Katz-Bassett and Justine Sherry and Te-Yuan Huang and Maria Kazandjieva and Craig Partridge and Fahad Dogar Viewpoint: Helping conference attendees better understand research presentations 32--34 Abraham Bernstein and James Hendler and Natalya Noy Viewpoint: A new look at the Semantic Web . . . . . . . . . . . . . . . . . . 35--37 Peter Bailis and Simon Peter and Justine Sherry Introducing research for practice . . . 38--41 Kate Matsudaira Bad software architecture is a people problem . . . . . . . . . . . . . . . . 42--43 Thomas A. Limoncelli 10 optimizations on linear search . . . 44--48 Peter Buneman and Susan Davidson and James Frew Why data citation is a computational problem . . . . . . . . . . . . . . . . 50--57 Hanan Samet and Sarana Nutanong and Brendan C. Fruin Dynamic presentation consistency issues in smartphone mapping apps . . . . . . . 58--67 Percy Liang Learning executable semantic parsers for natural language understanding . . . . . 68--76 Kyros Kutulakos The dawn of computational light transport: technical perspective . . . . 78--78 Andreas Velten and Di Wu and Belen Masia and Adrian Jarabo and Christopher Barsi and Chinmaya Joshi and Everett Lawson and Moungi Bawendi and Diego Gutierrez and Ramesh Raskar Imaging the propagation of light through scenes at picosecond resolution . . . . 79--86 Andrew W. Moore Jupiter rising: technical perspective 87--87 Arjun Singh and Joon Ong and Amit Agarwal and Glen Anderson and Ashby Armistead and Roy Bannon and Seb Boving and Gaurav Desai and Bob Felderman and Paulie Germano and Anand Kanagala and Hong Liu and Jeff Provost and Jason Simmons and Eiichi Tanda and Jim Wanderer and Urs Hölzle and Stephen Stuart and Amin Vahdat Jupiter rising: a decade of Clos topologies and centralized control in Google's datacenter network . . . . . . 88--97 Leah Hoffmann Last byte: Q&A . . . . . . . . . . . . . 104--ff
Ronald F. Boisvert Departments: Incentivizing reproducibility . . . . . . . . . . . . 5--5 Vinton G. Cerf Departments: 'We're going backward!' . . 7--7 Perry R. Cook BLOG@CACM: Adding art to STEM . . . . . 8--9 Don Monroe News: Optical fibers getting full . . . 10--12 Marina Krakovsky News: Bringing holography to light . . . 13--15 Keith Kirkpatrick News: Battling algorithmic bias: how do we ensure algorithms treat us fairly? 16--17 Michael A. Cusumano Technology strategy and management: The puzzle of Japanese innovation and entrepreneurship . . . . . . . . . . . . 18--20 Michael L. Best Global computing: Mobile computing and political transformation . . . . . . . . 21--23 George V. Neville-Neil Kode vicious: Cloud calipers . . . . . . 24--25 Peter G. Neumann Inside risks: Risks of automation: a cautionary total-system perspective of our cyberfuture . . . . . . . . . . . . 26--30 Kathrin Conrad and Nysret Musliu and Reinhard Pichler and Hannes Werthner Viewpoint: Universities and computer science in the European crisis of refugees . . . . . . . . . . . . . . . . 31--33 Ulan Degenbaev and Jochen Eisinger and Manfred Ernst and Ross Mcilroy and Hannes Payer Idle-time garbage-collection scheduling 34--39 Kate Matsudaira Fresh starts . . . . . . . . . . . . . . 40--41 Andre Medeiros Dynamics of change: why reactivity matters . . . . . . . . . . . . . . . . 42--46 Robert Lychev and Michael Schapira and Sharon Goldberg Rethinking security for Internet routing 48--57 Craig Partridge and Mark Allman Ethical considerations in network measurement papers . . . . . . . . . . . 58--64 A. J. Burns and M. Eric Johnson and Peter Honeyman A brief chronology of medical device security . . . . . . . . . . . . . . . . 66--72 Johannes Gehrke Technical Perspective: Naiad . . . . . . 74--74 Derek G. Murray and Frank McSherry and Michael Isard and Rebecca Isaacs and Paul Barham and Martín Abadi Incremental, iterative data processing with timely dataflow . . . . . . . . . . 75--83 James Larus Technical Perspective: The power of parallelizing computations . . . . . . . 84--84 Saeed Maleki and Madanlal Musuvathi and Todd Mytkowicz Efficient parallelization using rank convergence in dynamic programming algorithms . . . . . . . . . . . . . . . 85--92 Dennis Shasha Last byte: Find me quickly . . . . . . . 96--96
Moshe Y. Vardi Departments: Globalization, computing, and their political impact . . . . . . . 5--5 Vinton G. Cerf Departments: Heidelberg anew . . . . . . 7--7 CACM Staff Letters to the Editor: Learn to live with academic rankings . . . . . . . . . 8--9 Valerie Barr and Mark Guzdial BLOG@CACM: Introducing CS to newcomers, and JES as a teaching tool . . . . . . . 10--11 Erica Klarreich News: Learning securely . . . . . . . . 12--14 Sarah Underwood News: Blockchain beyond Bitcoin . . . . 15--17 Tom Geller News: Farm automation gets smarter . . . 18--19 Roger R. Schell Privacy and security: Cyber defense triad for where security matters . . . . 20--23 Pamela Samuelson Legally speaking: Fair use prevails in Oracle v. Google . . . . . . . . . . . . 24--28 Bala R. Iyer and Rahul C. Basole Economic and business dimensions: Visualization to understand ecosystems 27--30 Mark Guzdial and Briana Morrison Education: Growing computer science education into a STEM education discipline . . . . . . . . . . . . . . . 31--33 Jack Copeland and Eli Dresner and Diane Proudfoot and Oron Shagrir Viewpoint: Time to reinspect the foundations? . . . . . . . . . . . . . . 34--38 Jonathan Grudin Viewpoint: Technology and academic lives 37--39 Pat Helland The power of babble . . . . . . . . . . 40--43 Adam Morrison Scaling synchronization in multicore programs . . . . . . . . . . . . . . . . 44--51 Peter Bailis and Camille Fournier and Joy Arulraj and Andrew Pavlo Research for practice: distributed consensus and implications of NVM on database management systems . . . . . . 52--55 Matei Zaharia and Reynold S. Xin and Patrick Wendell and Tathagata Das and Michael Armbrust and Ankur Dave and Xiangrui Meng and Josh Rosen and Shivaram Venkataraman and Michael J. Franklin and Ali Ghodsi and Joseph Gonzalez and Scott Shenker and Ion Stoica Apache Spark: a unified engine for big data processing . . . . . . . . . . . . 56--65 Dinei Florêncio and Cormac Herley and Paul C. Van Oorschot Pushing on string: the `don't care' region of password strength . . . . . . 66--74 Enrico Bozzo and Massimo Franceschet A theory on power in networks . . . . . 75--83 Adi Livnat and Christos Papadimitriou Sex as an algorithm: the theory of evolution under the lens of computation 84--93 Dietmar Jannach and Paul Resnick and Alexander Tuzhilin and Markus Zanker Recommender systems --- : beyond matrix completion . . . . . . . . . . . . . . . 94--102 Kurt Keutzer If I could only design one circuit \ldots: technical perspective . . . . . 104--104 Yunji Chen and Tianshi Chen and Zhiwei Xu and Ninghui Sun and Olivier Temam DianNao family: energy-efficient hardware accelerators for machine learning . . . . . . . . . . . . . . . . 105--112 James C. Hoe FPGA compute acceleration is first about energy efficiency: technical perspective 113--113 Andrew Putnam and Adrian M. Caulfield and Eric S. Chung and Derek Chiou and Kypros Constantinides and John Demme and Hadi Esmaeilzadeh and Jeremy Fowers and Gopi Prashanth Gopal and Jan Gray and Michael Haselman and Scott Hauck and Stephen Heil and Amir Hormati and Joo-Young Kim and Sitaram Lanka and James Larus and Eric Peterson and Simon Pope and Aaron Smith and Jason Thong and Phillip Yi Xiao and Doug Burger A reconfigurable fabric for accelerating large-scale datacenter services . . . . 114--122 Brian Clegg Last byte: The candidate . . . . . . . . 136--ff
Marty J. Wolf Departments: The ACM code of ethics: a call to action . . . . . . . . . . . . . 6--6 Bo Brinkman and Don Gotterbarn and Keith Miller and Marty J. Wolf Departments: Making a positive impact: updating the ACM code of ethics . . . . 7--13 Vinton G. Cerf Departments: When email isn't private 15--15 CACM Staff Letters to the Editor: Reclaim the lost promise of the Semantic Web . . . . . . 17--17 Mark Guzdial and Daniel Reed BLOG@CACM: ICER 2016, and Star Trek at 50 . . . . . . . . . . . . . . . . . . . 18--19 Samuel Greengard News: Cracking the code on biology . . . 21--23 Chris Edwards News: Containers push toward the Mayfly server . . . . . . . . . . . . . . . . . 24--26 Keith Kirkpatrick News: Can we trust autonomous weapons? 27--29 Peter J. Denning and Gloria Flores The profession of IT: Learning to learn 32--36 David P. Anderson Historical reflections: Nailing smoke 37--39 Yan Chen Broadening participation: Mentoring female assistant professors enhances their success . . . . . . . . . . . . . 40--42 Orit Hazzan and Jeff Kramer Viewpoint: Assessing abstraction skills 43--45 Jesper Larsson Träff Viewpoint: (Mis)managing parallel computing research through EU project funding . . . . . . . . . . . . . . . . 46--48 Marius Eriksen Functional at scale . . . . . . . . . . 50--55 CACM Staff React: Facebook's functional turn on writing Javascript . . . . . . . . . . . 56--62 Ivar Jacobson and Ian Spence and Ed Seidewitz Industrial-scale agile: from craft to engineering . . . . . . . . . . . . . . 63--71 Anders Ynnerman and Thomas Rydell and Daniel Antoine and David Hughes and Anders Persson and Patric Ljung Interactive visualization of $3$D scanned mummies at public venues . . . . 72--81 Mark Sagar and Mike Seymour and Annette Henderson Creating connection with autonomous facial animation . . . . . . . . . . . . 82--91 Katie Shilton and Jeffrey A. Burke and kc claffy and Lixia Zhang Anticipating policy and social implications of named data networking 92--101 Yiling Chen and Arpita Ghosh and Michael Kearns and Tim Roughgarden and Jennifer Wortman Vaughan Mathematical foundations for social computing . . . . . . . . . . . . . . . 102--108 Srinivasan Keshav The chemistry of software-defined batteries: technical perspective . . . . 110--110 Anirudh Badam and Ranveer Chandra and Jon Dutra and Anthony Ferrese and Steve Hodges and Pan Hu and Julia Meinershagen and Thomas Moscibroda and Bodhi Priyantha and Evangelia Skiani Software-defined batteries . . . . . . . 111--119 Takeo Igarashi $3$D image editing made easy: technical perspective . . . . . . . . . . . . . . 120--120 Tao Chen and Zhe Zhu and Shi-Min Hu and Daniel Cohen-Or and Ariel Shamir Extracting $3$D objects from photographs using $3$-sweep . . . . . . . . . . . . 121--129 Leah Hoffmann Last byte: A view to the future . . . . 144--ff
Moshe Y. Vardi Technology for the most effective use of mankind . . . . . . . . . . . . . . . . 5--5 Vicki L. Hanson The ACM future of computing academy . . 7--7 Vinton G. Cerf Information and misinformation on the Internet . . . . . . . . . . . . . . . . 9--9 Valerie Barr and Michael Stonebraker and Raul Castro Fernandez and Dong Deng and Michael Brodie BLOG@CACM: How we teach CS2All, and what to do about database decay . . . . . . . 10--11 Don Monroe News: Pure randomness extracted from two poor sources . . . . . . . . . . . . . . 13--15 Alex Wright News: Mapping the Internet of Things . . 16--18 Gregory Mone News: Bias in technology . . . . . . . . 19--20 Michael A. Cusumano Technology strategy and management: Is Google's Alphabet a good bet? . . . . . 22--25 Michael Geist Law and technology: Why less is more when it comes to Internet jurisdiction 26--28 Thomas Haigh Historical reflections: Colossal genius: Tutte, Flowers, and a bad imitation of Turing . . . . . . . . . . . . . . . . . 29--35 Jerry Kaplan Viewpoint: Artificial intelligence: think again . . . . . . . . . . . . . . 36--38 Jeremy Straub Viewpoint: Effects of international trafficking in arms regulations changes 39--41 Kate Matsudaira Resolving conflict . . . . . . . . . . . 42--44 Josh Bailey and Stephen Stuart Faucet: deploying SDN in the enterprise 45--49 Peter Bailis and Jean Yang and Vijay Janapa Reddi and Yuhao Zhu Research for practice: Web security and mobile Web computing . . . . . . . . . . 50--53 Peter J. Denning and Ted G. Lewis Exponential laws of computing growth . . 54--65 Cecil Eng Huang Chua and Veda C. Storey Bottom-up enterprise information systems: rethinking the roles of central IT departments . . . . . . . . . . . . . 66--72 Bülent Yener Cell-graphs: image-driven modeling of structure-function relationship . . . . 74--84 Richard Szeliski Magnifying motions the right way: technical perspective . . . . . . . . . 86--86 Neal Wadhwa and Hao-Yu Wu and Abe Davis and Michael Rubinstein and Eugene Shih and Gautham J. Mysore and Justin G. Chen and Oral Buyukozturk and John V. Guttag and William T. Freeman and Frédo Durand Eulerian video magnification and analysis . . . . . . . . . . . . . . . . 87--95 Valentina Salapura Mapping the universe: technical perspective . . . . . . . . . . . . . . 96--96 Salman Habib and Vitali Morozov and Nicholas Frontiere and Hal Finkel and Adrian Pope and Katrin Heitmann and Kalyan Kumaran and Venkatram Vishwanath and Tom Peterka and Joe Insley and David Daniel and Patricia Fasel and Zarija Luki\'c HACC: extreme scaling and performance across diverse architectures . . . . . . 97--104 Dennis Shasha Last byte: Open field tic-tac-toe . . . 112--112
Vicki L. Hanson Departments: Celebrating 50 years of the Turing award . . . . . . . . . . . . . . 5--5 Francine Berman and Vinton G. Cerf Departments: Social and ethical behavior in the Internet of Things . . . . . . . 6--7 CACM Staff Letters to the Editor: Use the scientific method in computer science 8--9 CACM Staff Panels in print: Artificial intelligence 10--11 Janet Davis BLOG@CACM: Liberal arts academia wants YOU! . . . . . . . . . . . . . . . . . . 12--13 Chris Edwards News: Secure quantum communications . . 15--17 Samuel Greengard News: Are computer chips the new security threat? . . . . . . . . . . . . 18--19 Keith Kirkpatrick News: It's not the algorithm, it's the data . . . . . . . . . . . . . . . . . . 21--23 Ulf Lindqvist and Peter G. Neumann Inside risks: The future of the Internet of Things . . . . . . . . . . . . . . . 26--30 Aman Yadav and Steve Cooper Education: Fostering creativity through computing . . . . . . . . . . . . . . . 31--33 George V. Neville-Neil Kode vicious: The unholy trinity of software development . . . . . . . . . . 34--36 Azer Bestavros and Andrei Lapets and Mayank Varia Privacy and security: User-centric distributed solutions for privacy-preserving analytics . . . . . . 37--39 Alan Bundy Viewpoint: Smart machines are not a threat to humanity . . . . . . . . . . . 40--42 Devdatt Dubhashi and Shalom Lappin Viewpoint: AI dangers: imagined and real 43--45 Pat Helland Life beyond distributed transactions . . 46--54 Thomas A. Limoncelli Are you load balancing wrong? . . . . . 55--57 Neal Cardwell and Yuchung Cheng and C. Stephen Gunn and Soheil Hassas Yeganeh and Van Jacobson BBR: congestion-based congestion control 58--66 Brett Danaher and Michael D. Smith and Rahul Telang Copyright enforcement in the digital age: empirical evidence and policy implications . . . . . . . . . . . . . . 68--75 Herbert Bruderer Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe . . . . . . . . . . . 76--84 Frits Vaandrager Model learning . . . . . . . . . . . . . 86--95 Eric Rescorla Technical Perspective: Cleaning up flaws in TLS implementations . . . . . . . . . 98--98 Benjamin Beurdouche and Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Jean Karim Zinzindohoue A messy state of the union: taming the composite state machines of TLS . . . . 99--107 Ivan Martinovic and Kasper Rasmussen and Marc Roeschlin and Gene Tsudik Authentication using pulse-response biometrics . . . . . . . . . . . . . . . 108--115 William Sims Bainbridge Last byte: Fatal guidance . . . . . . . 120--ff
Moshe Y. Vardi Departments: ACM's open-conference principle and political reality . . . . 5--5 Vicki L. Hanson Departments: ACM's commitment to accessibility . . . . . . . . . . . . . 7--7 Vinton G. Cerf Departments: Grumpy old cells . . . . . 9--9 CACM Staff Letters to the Editor: Address the consequences of AI in advance . . . . . 10--11 Mark Guzdial and Robin K. Hill BLOG@CACM: The slow evolution of CS for all, the beauty of programs . . . . . . 12--13 Neil Savage News: Thinking deeply to make better speech . . . . . . . . . . . . . . . . . 15--17 Samuel Greengard News: The future of semiconductors . . . 18--20 Keith Kirkpatrick News: Financing the dark web . . . . . . 21--22 CACM Staff News: ACM recognizes new Fellows . . . . 23--23 Pamela Samuelson Legally speaking: Supreme Court on design patent damages in Samsung v. Apple . . . . . . . . . . . . . . . . . 26--28 Elizabeth Varki Computing ethics: Where review goes wrong . . . . . . . . . . . . . . . . . 29--30 Peter J. Denning and Matti Tedre and Pat Yongpradit The profession of IT: Misconceptions about computer science . . . . . . . . . 31--33 Thomas M. Philip Viewpoint: Learning with mobile technologies . . . . . . . . . . . . . . 34--36 Theo Schlossnagle Time, but faster . . . . . . . . . . . . 38--41 Mohamed Zahran Heterogeneous computing: here to stay 42--45 Peter Bailis and Irene Zhang and Fadel Adib Research for practice: distributed transactions and networks as physical sensors . . . . . . . . . . . . . . . . 46--49 Jonathan Lazar and Elizabeth F. Churchill and Tovi Grossman and Gerrit van der Veer and Philippe Palanque and John ``Scooter'' Morris and Jennifer Mankoff Making the field of computing more inclusive . . . . . . . . . . . . . . . 50--59 Daniel J. Mazzola and Robert D. St. Louis and Mohan R. Tanniru The path to the top: insights from career histories of top CIOs . . . . . . 60--68 Simon Price and Peter A. Flach Computational support for academic peer review: a perspective from artificial intelligence . . . . . . . . . . . . . . 70--79 Srinivasan Keshav The power of wi-fi to deliver power: technical perspective . . . . . . . . . 82--82 Vamsi Talla and Bryce Kellogg and Benjamin Ransford and Saman Naderiparizi and Joshua R. Smith and Shyamnath Gollakota Powering the next billion devices with wi-fi . . . . . . . . . . . . . . . . . 83--91 Leonid Libkin Data distribution for fast joins: technical perspective . . . . . . . . . 92--92 Tom J. Ameloot and Gaetano Geck and Bas Ketsman and Frank Neven and Thomas Schwentick Reasoning on data partitioning for single-round multi-join evaluation in massively parallel systems . . . . . . . 93--100 Leah Hoffmann Last byte: Out of bounds . . . . . . . . 104--ff
Valerie Barr Departments: Gender diversity in computing: are we making any progress? 5--5 Vinton G. Cerf Departments: A genetic theory of the Silicon Valley phenomenon . . . . . . . 7--7 CACM Staff Letters to the Editor: Consider indirect threats of AI, too . . . . . . . . . . . 8--9 John Arquilla and Mark Guzdial BLOG@CACM: Crafting a national cyberdefense, and preparing to support computational literacy . . . . . . . . . 10--11 Gregory Mone News: Sensors on the brain . . . . . . . 12--14 Chris Edwards News: Digitizing the world . . . . . . . 15--16 Esther Shein News: Computing the arts . . . . . . . . 17--19 CACM Staff News: Cybersecurity . . . . . . . . . . 20--21 Ineke Buskens Global computing: Online social networks and global women's empowerment . . . . . 22--23 George V. Neville-Neil Kode vicious: The chess player who couldn't pass the salt . . . . . . . . . 24--25 William Regli Viewpoint: Wanted: toolsmiths . . . . . 26--28 Yancey Strickler Viewpoint: What it means to be an entrepreneur today . . . . . . . . . . . 29--31 Meng-Day (Mandel) Yu and Srinivas Devadas Pervasive, dynamic authentication of physical items . . . . . . . . . . . . . 32--39 Robert C. Seacord Uninitialized reads . . . . . . . . . . 40--44 Kate Matsudaira Does anybody listen to you? . . . . . . 45--46 Luiz Barroso and Mike Marty and David Patterson and Parthasarathy Ranganathan Attack of the killer microseconds . . . 48--54 Aman Yadav and Chris Stephenson and Hai Hong Computational thinking for teacher education . . . . . . . . . . . . . . . 55--62 Athman Bouguettaya and Munindar Singh and Michael Huhns and Quan Z. Sheng and Hai Dong and Qi Yu and Azadeh Ghari Neiat and Sajib Mistry and Boualem Benatallah and Brahim Medjahed and Mourad Ouzzani and Fabio Casati and Xumin Liu and Hongbing Wang and Dimitrios Georgakopoulos and Liang Chen and Surya Nepal and Zaki Malik and Abdelkarim Erradi and Yan Wang and Brian Blake and Schahram Dustdar and Frank Leymann and Michael Papazoglou A service computing manifesto: the next 10 years . . . . . . . . . . . . . . . . 64--72 Gernot Heiser Technical Perspective: Proving file systems meet expectations . . . . . . . 74--74 Tej Chajed and Haogang Chen and Adam Chlipala and M. Frans Kaashoek and Nickolai Zeldovich and Daniel Ziegler Certifying a file system using Crash Hoare logic: correctness in the presence of crashes . . . . . . . . . . . . . . . 75--84 Jonathan Ullman Technical Perspective: Building a safety net for data reuse . . . . . . . . . . . 85--85 Cynthia Dwork and Vitaly Feldman and Moritz Hardt and Toniann Pitassi and Omer Reingold and Aaron Roth Guilt-free data reuse . . . . . . . . . 86--93 Dennis Shasha Last byte: Stacking the deck . . . . . . 96--96
Moshe Y. Vardi Editor's letter: Cyber insecurity and cyber libertarianism . . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: Can liberty survive the digital age? . . . . . . . . . . . . . . 7--7 Bertrand Meyer BLOG@CACM: Ending null pointer crashes 8--9 Esther Shein News: Combating cancer with data . . . . 10--12 Samuel Greengard News: Making chips smarter . . . . . . . 13--15 Keith Kirkpatrick News: Bionics in competition . . . . . . 16--17 CACM Staff News: The Internet of Things . . . . . . 18--19 Woodrow Hartzog and Ira Rubinstein Law and Technology: The anonymization debate should be about risk, not perfection . . . . . . . . . . . . . . . 22--24 Leo Porter and Cynthia Lee and Beth Simon and Mark Guzdial Education: Preparing tomorrow's faculty to address challenges in teaching computer science . . . . . . . . . . . . 25--27 Wendell Wallach Viewpoint: Toward a ban on lethal autonomous weapons: surmounting the obstacles . . . . . . . . . . . . . . . 28--34 Erik Meijer Making money using math . . . . . . . . 36--42 Robert Guo MongoDB's JavaScript fuzzer . . . . . . 43--47 Peter Bailis and Arvind Narayanan and Andrew Miller and Song Han Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning . . . . . . . 48--51 Catherine C. Marshall and Frank M. Shipman Who owns the social web? . . . . . . . . 52--61 Marina Jirotka and Barbara Grimpe and Bernd Stahl and Grace Eden and Mark Hartswood Responsible research and innovation in the digital age . . . . . . . . . . . . 62--68 Milan Vojnovi\'c Contest theory . . . . . . . . . . . . . 70--80 Guy Blelloch Technical Perspective: Functional compilers . . . . . . . . . . . . . . . 82--82 Geoffrey Mainland and Roman Leshchinskiy and Simon Peyton Jones Exploiting vector instructions with generalized stream fusion . . . . . . . 83--91 Alon Halevy Technical Perspective: Building knowledge bases from messy data . . . . 92--92 Ce Zhang and Christopher Ré and Michael Cafarella and Christopher De Sa and Alex Ratner and Jaeho Shin and Feiran Wang and Sen Wu DeepDive: declarative knowledge base construction . . . . . . . . . . . . . . 93--102 David Allen Batchelor Last byte: Beyond `Star Trek' . . . . . 104--ff Bo Brinkman and Catherine Flick and Don Gotterbarn and Keith Miller and Kate Vazansky and Marty J. Wolf Departments: Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct . . . . 105--111
Moshe Y. Vardi Editor's letter: Ten years at the helm of \booktitleCommunications of the ACM 5--5 Vinton G. Cerf Cerf's up: Open access to academic research . . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Technologies do have ethics . . . . . . . . . . . . . . 8--9 Mark Guzdial BLOG@CACM: Balancing teaching CS efficiently with motivating students . . 10--11 Don Monroe News: Deep learning takes on translation 12--14 Chris Edwards News: Optimization search finds a heart of glass . . . . . . . . . . . . . . . . 15--16 Sarah Underwood News: Potential and peril . . . . . . . 17--19 Neil Savage News: Weaving the web . . . . . . . . . 20--22 CACM Staff News: Big data . . . . . . . . . . . . . 24--25 Peter G. Neumann Inside risks: Trustworthiness and truthfulness are essential . . . . . . . 26--28 Leslie Goodyear and Gary Silverstein and Linda P. Thurston Broadening participation: The influence and promise of alliances . . . . . . . . 29--30 George V. Neville-Neil Kode Vicious: Forced exception handling 31--32 Peter J. Denning Viewpoint: Remaining trouble spots with computational thinking . . . . . . . . . 33--39 Devon H. O'Dell The debugging mind-set . . . . . . . . . 40--45 Pat Helland and Simon Weaver and Ed Harris Too big NOT to fail . . . . . . . . . . 46--50 Kate Matsudaira and Erik Meijer Conversations with technology leaders: Erik Meijer . . . . . . . . . . . . . . 51--54 David Barrera and Laurent Chuat and Adrian Perrig and Raphael M. Reischuk and Pawel Szalachowski The SCION Internet architecture . . . . 56--65 Yili Liu and Lina Zhou The dynamics of work-family conflict . . 66--70 David Bau and Jeff Gray and Caitlin Kelleher and Josh Sheldon and Franklyn Turbak Learnable programming: blocks and beyond 72--80 Jitendra Malik Technical Perspective: What led computer vision to deep learning? . . . . . . . . 82--83 Alex Krizhevsky and Ilya Sutskever and Geoffrey E. Hinton ImageNet classification with deep convolutional neural networks . . . . . 84--90 Avi Wigderson Technical Perspective: Low-depth arithmetic circuits . . . . . . . . . . 91--91 Ankit Gupta and Pritish Kamath and Neeraj Kayal and Ramprasad Saptharishi Unexpected power of low-depth arithmetic circuits . . . . . . . . . . . . . . . . 93--100 Leah Hoffmann Last byte: This is for everyone . . . . 104--ff
Andrew A. Chien Editor's letter: Today's \booktitleCommunications of the ACM . . 5--5 Vinton G. Cerf Cerf's up: A brittle and fragile future 7--7 Mark Guzdial BLOG@CACM: 'Generation CS' drives growth in enrollments . . . . . . . . . . . . . 10--11 Neil Savage News: Building a brain may mean going analog . . . . . . . . . . . . . . . . . 13--15 Samuel Greengard News: Cracking the code on DNA storage 16--18 Gary Anthes News: Artificial intelligence poised to ride a new wave . . . . . . . . . . . . 19--21 Lawrence M. Fisher News: Jean E. Sammet 1928--2017 . . . . 22--22 Adam L. Young and Moti Yung Privacy and security: Cryptovirology: the birth, neglect, and explosion of ransomware . . . . . . . . . . . . . . . 24--26 Brad Greenwood and Gordon Burtch and Seth Carnahan Economic and business dimensions: Unknowns of the gig-economy . . . . . . 27--29 Peter J. Denning The profession of IT: The beginner's creed . . . . . . . . . . . . . . . . . 30--31 Marc Snir Viewpoint: The informal guide to ACM Fellow nominations . . . . . . . . . . . 32--34 Pat Helland Side effects, front and center . . . . . 36--39 Mark A. Overton The IDAR graph . . . . . . . . . . . . . 40--45 Peter Bailis and Peter Alvaro and Sumit Gulwani Research for practice: tracing and debugging distributed systems; programming by examples . . . . . . . . 46--49 D. Fox Harrell and Chong-U Lim Reimagining the avatar dream: modeling social identity in digital media . . . . 50--61 Pantelis Koutroumpis and Aija Leiponen and Llewellyn D. W. Thomas How important is IT? . . . . . . . . . . 62--68 Denis Nekipelov and Tammy Wang Inference and auction design in online advertising . . . . . . . . . . . . . . 70--79 Fred B. Schneider IronFleet simplifies proving safety and liveness properties: technical perspective . . . . . . . . . . . . . . 82--82 Chris Hawblitzel and Jon Howell and Manos Kapritsos and Jacob R. Lorch and Bryan Parno and Michael L. Roberts and Srinath Setty and Brian Zill IronFleet: proving safety and liveness of practical distributed systems . . . . 83--92 Michael Mitzenmacher Building a better hash function: technical perspective . . . . . . . . . 93--93 Mikkel Thorup Fast and powerful hashing using tabulation . . . . . . . . . . . . . . . 94--101 Dennis Shasha Last byte: Ruby risks . . . . . . . . . 104--104
Andrew A. Chien Editor's letter: Building the future: Communications of the ACM . . . . . . . 5--5 Vinton G. Cerf Cerf's up: In praise of under-specification? . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Embed ethical guidelines in autonomous weapons . . . . 8--9 Philip Guo BLOG@CACM: How adults ages 60+ are learning to code . . . . . . . . . . . . 10--11 Esther Shein News: Hacker-proof coding . . . . . . . 12--14 Logan Kugler News: Why virtual reality will transform a workplace near you . . . . . . . . . . 15--17 Keith Kirkpatrick News: AI in contact centers . . . . . . 18--19 Lawrence M. Fisher News: Charles P. `Chuck' Thacker: 1943--2017 . . . . . . . . . . . . . . . 20--21 David P. Anderson Historical reflections: Prophets, seers, and pioneers . . . . . . . . . . . . . . 22--25 Jennifer Wang Education: Is the U.S. education system ready for CS for all? . . . . . . . . . 26--28 George V. Neville-Neil Kode Vicious: The observer effect . . . 29--30 Dominic Horsman and Vivien Kendon and Susan Stepney Viewpoint: The natural science of computing . . . . . . . . . . . . . . . 31--34 Ricardo Olenewa and Gary M. Olson and Judith S. Olson and Daniel M. Russell Now that we can write simultaneously, how do we use that to our advantage? . . 36--43 Hans-J. Boehm Small-data computing: correct calculator arithmetic . . . . . . . . . . . . . . . 44--49 Leo Corry Turing's pre-war analog computers: the fatherhood of the modern computer revisited . . . . . . . . . . . . . . . 50--58 Longbing Cao Data science: challenges and directions 59--68 Marijn J. H. Heule and Oliver Kullmann The science of brute force . . . . . . . 70--79 Marc Shapiro Unexpected connections: technical perspective . . . . . . . . . . . . . . 82--82 Austin T. Clements and M. Frans Kaashoek and Eddie Kohler and Robert T. Morris and Nickolai Zeldovich The scalable commutativity rule: designing scalable software for multicore processors . . . . . . . . . . 83--90 Helmut Pottmann Linking form, function, and fabrication: technical perspective . . . . . . . . . 91--91 Moritz Bächer and Bernd Bickel and Emily Whiting and Olga Sorkine-Hornung Spin-it: optimizing moment of inertia for spinnable objects . . . . . . . . . 92--99 Brian Clegg Last byte: Turing's taxi . . . . . . . . 104--ff
Simson Garfinkel and Jeanna Matthews and Stuart S. Shapiro and Jonathan M. Smith Letter from USACM: Toward algorithmic transparency and accountability . . . . 5--5 Vinton G. Cerf Cerf's Up: Take two aspirin and call me in the morning . . . . . . . . . . . . . 6--6 Moshe Y. Vardi Vardi's Insights: Divination by program committee . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: Computational thinking is not necessarily computational . . . . . . . . . . . . . 8--9 Robin K. Hill BLOG@CACM: Assuring software quality by preventing neglect . . . . . . . . . . . 10--11 Samuel Greengard News: It's all about image . . . . . . . 13--15 Gregory Mone News: Broadband to Mars . . . . . . . . 16--17 Logan Kugler News: Why GPS spoofing is a threat to companies, countries . . . . . . . . . . 18--19 Lawrence M. Fisher News: Turing laureates celebrate award's 50th anniversary . . . . . . . . . . . . 20--23 Lawrence M. Fisher News: Charles W. Bachman: 1924--2017 . . 24--25 Joel R. Reidenberg Law and technology: Digitocracy . . . . 26--28 Carolina Alves de Lima Salge and Nicholas Berente Computing ethics: Is that social bot behaving unethically? . . . . . . . . . 29--31 Peter J. Denning The profession of IT: Multitasking without thrashing . . . . . . . . . . . 32--34 Gregorio Convertino and Nancy Frishberg Viewpoint: Why agile teams fail without UX research . . . . . . . . . . . . . . 35--37 Andrew Conway and Peter Eckersley Viewpoint: When does law enforcement's demand to read your data become a demand to read your mind? . . . . . . . . . . . 38--40 Ben Treynor and Mike Dahlin and Vivek Rau and Betsy Beyer The calculus of service availability . . 42--47 Graham Cormode Data sketching . . . . . . . . . . . . . 48--55 Kate Matsudaira 10 ways to be a better interviewer . . . 56--58 Carissa Schoenick and Peter Clark and Oyvind Tafjord and Peter Turney and Oren Etzioni Moving beyond the Turing Test with the Allen AI Science Challenge . . . . . . . 60--64 Petter Bae Brandtzaeg and Asbjòrn Fòlstad Trust and distrust in online fact-checking services . . . . . . . . . 65--71 Sean Peisert Security in high-performance computing environments . . . . . . . . . . . . . . 72--80 Charles (Chuck) Thacker Technical perspective: a gloomy look at the integrity of hardware . . . . . . . 82--82 Kaiyuan Yang and Matthew Hicks and Qing Dong and Todd Austin and Dennis Sylvester Exploiting the analog properties of digital circuits for malicious hardware 83--91 Ed H. Chi Technical perspective: Humans and computers working together on hard tasks 92--92 Walter S. Lasecki and Christopher D. Miller and Iftekhar Naim and Raja Kushalnagar and Adam Sadilek and Daniel Gildea and Jeffrey P. Bigham Scribe: deep integration of human and machine intelligence to caption speech in real time . . . . . . . . . . . . . . 93--100 Leah Hoffmann Last byte: All the pretty pictures . . . 104--ff
Andrew A. Chien Editor's letter: Computing is a profession . . . . . . . . . . . . . . . 5--5 Vinton G. Cerf Editor's letter: Six education . . . . . 7--7 CACM Staff Letters to the Editor: Beyond brute force . . . . . . . . . . . . . . . . . 8--9 Robin K. Hill and Mark Guzdial BLOG@CACM: Manipulating word representations, and preparing students for coding jobs? . . . . . . . . . . . . 12--13 Keith Kirkpatrick News: $3$D-printing human body parts . . 15--17 Don Monroe News: Digital hearing . . . . . . . . . 18--20 Chris Edwards News: Portable device fears show power of social development . . . . . . . . . 21--22 Michael A. Cusumano Technology strategy and management: Amazon and whole foods: follow the strategy (and the money) . . . . . . . . 24--26 David Lorge Parnas Inside risks: The real risks of artificial intelligence . . . . . . . . 27--31 Vasant Dhar and Roger M. Stein Economic and business dimensions: FinTech platforms and strategy . . . . . 32--35 George V. Neville-Neil Kode vicious: IoT: the Internet of Terror . . . . . . . . . . . . . . . . . 36--37 Roderick Chapman and Neil White and Jim Woodcock Viewpoint: What can agile methods bring to high-integrity software development? 38--41 Alvaro Videla Metaphors we compute by . . . . . . . . 42--45 Peter Bailis and Tawanna Dillahunt and Stefanie Mueller and Patrick Baudisch Research for practice: technology for underserved communities; personal fabrication . . . . . . . . . . . . . . 46--49 Thomas A. Limoncelli Four ways to make CS and IT more immersive . . . . . . . . . . . . . . . 50--52 Ewan Tempero and Tony Gorschek and Lefteris Angelis Barriers to refactoring . . . . . . . . 54--61 Heiko Gewald and Xuequn Wang and Andy Weeger and Mahesh S. Raisinghani and Gerald Grant and Otavio Sanchez and Siddhi Pittayachawan Millennials' attitudes toward IT consumerization in the workplace . . . . 62--69 Stephen B. Wicker and Kolbeinn Karlsson Internet advertising: technology, ethics, and a serious difference of opinion . . . . . . . . . . . . . . . . 70--79 Jeffrey F. Naughton Broadening and deepening query optimization yet still making progress: technical perspective . . . . . . . . . 80--80 Immanuel Trummer and Christoph Koch Multi-objective parametric query optimization . . . . . . . . . . . . . . 81--89 Jeffrey S. Foster Shedding new light on an old language debate: technical perspective . . . . . 90--90 Baishakhi Ray and Daryl Posnett and Premkumar Devanbu and Vladimir Filkov A large-scale study of programming languages and code quality in GitHub . . 91--100
Laurie Williams and Doug Baldwin Departments: Highlights of the ACM student research competition . . . . . . 5--5 Vinton G. Cerf Cerf's up: Heidelberg laureate forum . . 6--6 Moshe Y. Vardi Vardi's insights: Would Turing have won the Turing award? . . . . . . . . . . . 7--7 CACM Staff Letters to the Editor: They see what you see . . . . . . . . . . . . . . . . . . 8--9 Mei Kobayashi BLOG@CACM: Opportunities for women, minorities in information retrieval . . 10--11 Neil Savage News: A block on the old chip . . . . . 12--14 Alex Wright News: Censoring sensors . . . . . . . . 15--16 Esther Shein News: Overcoming disabilities . . . . . 17--19 Pamela Samuelson Legally speaking: Disgorging profits in design patent cases . . . . . . . . . . 20--22 Solon Barocas and Danah Boyd Computing ethics: Engaging the ethics of data science in practice . . . . . . . . 23--25 Richard Connor and Quintin Cutts and Judy Robertson Education: Keeping the machinery in computing education . . . . . . . . . . 26--28 Martin Spann and Lucas Stich and Klaus M. Schmidt Viewpoint: Pay what you want as a pricing model for open access publishing? . . . . . . . . . . . . . . 29--31 Virginia Dignum Viewpoint: Social agents: bridging simulation and engineering . . . . . . . 32--34 CACM Staff Hootsuite: in pursuit of reactive systems . . . . . . . . . . . . . . . . 36--43 Kate Matsudaira Breadth and depth . . . . . . . . . . . 44--45 Ivar Jacobson and Ian Spence and Pan-Wei Ng Is there a single method for the Internet of Things? . . . . . . . . . . 46--53 Makoto Odamaki and Shree K. Nayar Cambits: a reconfigurable camera system 54--61 Stuart Mcilroy and Weiyi Shang and Nasir Ali and Ahmed E. Hassan User reviews of top mobile apps in Apple and Google app stores . . . . . . . . . 62--67 Laurel D. Riek Healthcare robotics . . . . . . . . . . 68--78 David Silver Solving imperfect information games: technical perspective . . . . . . . . . 80--80 Michael Bowling and Neil Burch and Michael Johanson and Oskari Tammelin Heads-up limit hold'em poker is solved 81--88 Marc Alexa Exploring a kingdom by geodesic measures: technical perspective . . . . 89--89 Keenan Crane and Clarisse Weischedel and Max Wardetzky The heat method for distance computation 90--99 Seth Shostak Last byte: Butterfly effect . . . . . . 112--112
Andrew A. Chien Computing Is the Secret Ingredient (well, not so secret) . . . . . . . . . 5--5 CACM Staff Start CS Students Off with Industry Best Practices . . . . . . . . . . . . . . . 6--6 Vinton G. Cerf Cerf's up: Now for Something Entirely Different . . . . . . . . . . . . . . . 7--7 Philip Guo Building Tools to Help Students Learn to Program . . . . . . . . . . . . . . . . 8--9 Don Monroe Perovskites Boost Solar-Cell Potential 11--13 Samuel Greengard Gaming Machine Learning . . . . . . . . 14--16 Keith Kirkpatrick Parallel Computational Thinking . . . . 17--19 Peter J. Denning The Forgotten Engineer . . . . . . . . . 20--23 Louise Ann Lyon and Jill Denner Community Colleges: A Resource for Increasing Equity and Inclusion in Computer Science Education . . . . . . . 24--26 George V. Neville-Neil Cold, Hard Cache . . . . . . . . . . . . 27--28 Stephen J. Andriole The Death of Big Software . . . . . . . 29--32 Ernest Davis Lousy Advice to the Lovelorn . . . . . . 33--35 Arvind Narayanan and Jeremy Clark Bitcoin's Academic Pedigree . . . . . . 36--45 Pat Helland XML and JSON Are Like Cardboard . . . . 46--47 John Regehr and Peter Bailis Research for Practice: Vigorous Public Debates in Academic Computer Science . . 48--50 Martin E. Hellman Turing Lecture: Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic . . . . . . . . . . . . . . . . . 52--59 Ramiro Montealegre and Wayne F. Cascio Technology-Driven Changes in Work and Employment . . . . . . . . . . . . . . . 60--67 Gustavo Pinto and Fernando Castor Energy Efficiency: A New Concern for Application Software Developers . . . . 68--75 Aaron Roth Technical Perspective: Pricing Information (and Its Implications) . . . 78--78 Chao Li and Daniel Yang Li and Gerome Miklau and Dan Suciu A Theory of Pricing Private Data . . . . 79--86 James Larus Technical Perspective: A Simple, Elegant Approach to Non-Numeric Parallelization 87--87 Simone Campanoni and Kevin Brownell and Svilen Kanev and Timothy M. Jones and Gu-Yeon Wei and David Brooks Automatically Accelerating Non-Numerical Programs by Architecture-Compiler Co-Design . . . . . . . . . . . . . . . 88--97 Leah Hoffmann Last Byte: Grooming the Leaders of Tomorrow . . . . . . . . . . . . . . . . 112, 111
Vinton G. Cerf Cerf's up: The role of archives in digital preservation . . . . . . . . . . 7--7 Moshe Y. Vardi Vardi's insights: Computer professionals for social responsibility . . . . . . . 9--9 CACM Staff Letters to the editor: A leap from artificial to intelligence . . . . . . . 10--11 Mark R. Nelson BLOG@CACM: The big IDEA and the PD pipeline . . . . . . . . . . . . . . . . 12--13 Gregory Mone News: Feeling sounds, hearing sights . . 15--17 Alex Wright News: Smartphone science . . . . . . . . 18--20 Marina Krakovsky News: The new jobs . . . . . . . . . . . 21--23 Michael A. Cusumano Technology strategy and management: The sharing economy meets reality . . . . . 26--28 Chris Marsden Law and technology: How law and computer science can work together to improve the information society . . . . . . . . . . 29--31 Thomas Haigh Historical reflections: Defining American greatness: IBM from Watson to Trump . . . . . . . . . . . . . . . . . 32--37 Henry C. Lucas, Jr. Viewpoint: Technology and the failure of the university . . . . . . . . . . . . . 38--41 Chitta Baral and Shih-Fu Chang and Brian Curless and Partha Dasgupta and Julia Hirschberg and Anita Jones Viewpoint: Ask not what your postdoc can do for you \ldots . . . . . . . . . . . 42--44 Antony Alappatt Network applications are interactive . . 46--53 Peter Alvaro and Severine Tymon Abstracting the geniuses away from failure testing . . . . . . . . . . . . 54--61 Jacob Loveless Cache me if you can . . . . . . . . . . 62--68 Michele Coscia Popularity spikes hurt future chances for viral propagation of protomemes . . 70--77 Hemang Subramanian Decentralized blockchain-based electronic marketplaces . . . . . . . . 78--84 Wojciech Mazurczyk and Steffen Wendzel Information hiding: challenges for forensic experts . . . . . . . . . . . . 86--94 David C. Parkes Moving spectrum: technical perspective 96--96 Neil Newman and Alexandre Fréchette and Kevin Leyton-Brown Deep optimization for spectrum repacking 97--104 Manuel Chakravarty Can high performance be portable?: technical perspective . . . . . . . . . 105--105 Jonathan Ragan-Kelley and Andrew Adams and Dillon Sharlet and Connelly Barnes and Sylvain Paris and Marc Levoy and Saman Amarasinghe and Frédo Durand Halide: decoupling algorithms from schedules for high-performance image processing . . . . . . . . . . . . . . . 106--115 Dennis Shasha Last byte: Polychromatic choreography 120--120 Don Gotterbarn and Amy Bruckman and Catherine Flick and Keith Miller and Marty J. Wolf ACM code of ethics and professional conduct: ACM code of ethics: a guide for positive action . . . . . . . . . . . . 121--128
Jodi L. Tims From the chair of ACM-W: Achieving gender equity: ACM-W can't do it alone 5--5 Vinton G. Cerf Cerf's up: A comprehensive self-driving car test . . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: Toward an equation that anticipates AI risks . . . 8--9 John Arquilla and Mark Guzdial BLOG@CACM: Protecting the power grid, and finding bias in student evaluations 10--11 Chris Edwards News: Quantum technology forgoes unconditional security to extend its reach . . . . . . . . . . . . . . . . . 12--14 Neil Savage News: Going serverless . . . . . . . . . 15--16 Logan Kugler News: The war over the value of personal data . . . . . . . . . . . . . . . . . . 17--19 Kevin Fu and Wenyuan Xu Inside risks: Risks of trusting the physics of sensors . . . . . . . . . . . 20--23 Sarah Wille and Daphne Sajous-Brady Education: The inclusive and accessible workplace . . . . . . . . . . . . . . . 24--26 George V. Neville-Neil Kode Vicious: Reducing the attack surface . . . . . . . . . . . . . . . . 27--28 Jennifer Keating and Illah Nourbakhsh Viewpoint: Teaching artificial intelligence and humanity . . . . . . . 29--32 Shane Greenstein Viewpoint: Innovation from the edges . . 33--36 Andrew Leung and Andrew Spyker and Tim Bozarth Titus: introducing containers to the Netflix cloud . . . . . . . . . . . . . 38--45 Albert Kwon and James R. Wilcox and Peter Bailis Research for practice: private online communication; highlights in systems verification . . . . . . . . . . . . . . 46--49 Kate Matsudaira Views from the top . . . . . . . . . . . 50--52 John Zysman and Martin Kenney The next phase in the digital revolution: intelligent tools, platforms, growth, employment . . . . . 54--63 Vlasta Stavova and Lenka Dedkova and Martin Ukrop and Vashek Matyas A large-scale comparative study of beta testers and regular users . . . . . . . 64--71 Othon Michail and Paul G. Spirakis Elements of the theory of dynamic networks . . . . . . . . . . . . . . . . 72--72 Steve Zdancewic Building bug-free compilers: technical perspective . . . . . . . . . . . . . . 83--83 Nuno P. Lopes and David Menendez and Santosh Nagarakatte and John Regehr Practical verification of peephole optimizations with Alive . . . . . . . . 84--91 Vincent Conitzer Designing algorithms and the fairness criteria they should satisfy: technical perspective . . . . . . . . . . . . . . 92--92 Kobi Gal and Ariel D. Procaccia and Moshe Mash and Yair Zick Which is the fairest (rent division) of them all? . . . . . . . . . . . . . . . 93--100 David Allen Batchelor Last byte: Welcome to the singularity 104--ff
Andrew A. Chien Editor's letter: Here comes everybody \ldots to \booktitleCommunications . . . 5--5 Vinton G. Cerf Cerf's up: Unintended consequences . . . 7--7 Moshe Y. Vardi Vardi's insights: A declaration of the dependence of cyberspace . . . . . . . . 9--9 CACM Staff Letters to the Editor: Keep the ACM Code of Ethics as it is . . . . . . . . . . . 10--11 Mark Guzdial and Bertrand Meyer BLOG@CACM: The costs and pleasures of a computer science teacher . . . . . . . . 12--13 Samuel Greengard News: In pursuit of virtual life . . . . 15--17 Keith Kirkpatrick News: The construction industry in the 21st century . . . . . . . . . . . . . . 18--20 Esther Shein News: The state of fakery . . . . . . . 21--23 Ross Anderson Privacy and security: Making security sustainable . . . . . . . . . . . . . . 24--26 Pamela Samuelson Legally speaking: Will the Supreme Court nix reviews of bad patents? . . . . . . 27--29 Simon Rogerson Computing ethics: Ethics omission increases gases emission . . . . . . . . 30--32 Peter J. Denning The profession of IT: The computing profession . . . . . . . . . . . . . . . 33--35 Fred B. Schneider Viewpoint: Impediments with policy interventions to foster cybersecurity 36--38 M. S. Silberman and B. Tomlinson and R. LaPlante and J. Ross and L. Irani and A. Zaldivar Viewpoint: Responsible research with crowds: pay crowdworkers at least minimum wage . . . . . . . . . . . . . . 39--41 Hanna Wallach Viewpoint: Computational social science $ \neq $ computer science $+$ social data . . . . . . . . . . . . . . . . . . 42--44 Yonatan Sompolinsky and Aviv Zohar Bitcoin's underlying incentives . . . . 46--53 Thomas A. Limoncelli Operational excellence in April Fools' pranks . . . . . . . . . . . . . . . . . 54--57 Theo Schlossnagle Monitoring in a DevOps world . . . . . . 58--61 Matthias Felleisen and Robert Bruce Findler and Matthew Flatt and Shriram Krishnamurthi and Eli Barzilay and Jay McCarthy and Sam Tobin-Hochstadt A programmable programming language . . 62--71 Bran Knowles and Vicki L. Hanson The wisdom of older technology (non)users . . . . . . . . . . . . . . . 72--77 Tony Gorschek Evolution toward soft(er) products . . . 78--84 Benjamin Kuipers How can we trust a robot? . . . . . . . 86--95 Nicole Immorlica A graph-theoretic framework traces task planning: technical perspective . . . . 98--98 Jon Kleinberg and Sigal Oren Time-inconsistent planning: a computational problem in behavioral economics . . . . . . . . . . . . . . . 99--107 Kenny Paterson On Heartbleed: a hard beginnyng makth a good endyng John Heywood (1497--1580): technical perspective . . . . . . . . . 108--108 Liang Zhang and David Choffnes and Tudor Dumitras and Dave Levin and Alan Mislove and Aaron Schulman and Christo Wilson Analysis of SSL certificate reissues and revocations in the wake of Heartbleed 109--116 Leah Hoffmann Last byte: The network effect . . . . . 120--ff
Andrew A. Chien Department: Editor's letter: Go big! . . 5--5 Vinton G. Cerf Department: Editor's letter: The sound of programming . . . . . . . . . . . . . 6--6 Moshe Y. Vardi Departments: Open access and ACM . . . . 7--7 CACM Staff Letters to the editor: Predicting failure of the university . . . . . . . 8--9 Jodi Tims and Daniel A. Reed BLOG@CACM: Fostering inclusion, keeping the net neutral . . . . . . . . . . . . 10--11 Neil Savage News: Always out of balance . . . . . . 12--14 Don Monroe News: Chips for artificial intelligence 15--17 Marina Krakovsky News: Artificial (emotional) intelligence . . . . . . . . . . . . . . 18--19 Mari Sako Technology strategy and management: Business ecosystems: how do they matter for innovation? . . . . . . . . . . . . 20--22 George V. Neville-Neil Kode vicious: Popping kernels . . . . . 23--24 Sheldon H. Jacobson Viewpoint: Push versus pull . . . . . . 25--27 Stephen B. Wicker Viewpoint: Smartphones, contents of the mind, and the Fifth Amendment . . . . . 28--31 Nicole Forsgren DevOps delivers . . . . . . . . . . . . 32--33 Jez Humble Continuous delivery sounds great, but will it work here? . . . . . . . . . . . 34--39 Bridget Kromhout Containers will not fix your broken culture (and other hard truths) . . . . 40--43 Nicole Forsgren and Mik Kersten DevOps metrics . . . . . . . . . . . . . 44--48 Mila Gascó-Hernandez Building a smart city: lessons from Barcelona . . . . . . . . . . . . . . . 50--57 Caitlin Sadowski and Edward Aftandilian and Alex Eagle and Liam Miller-Cushon and Ciera Jaspan Lessons from building static analysis tools at Google . . . . . . . . . . . . 58--66 Francine Berman and Rob Rutenbar and Brent Hailpern and Henrik Christensen and Susan Davidson and Deborah Estrin and Michael Franklin and Margaret Martonosi and Padma Raghavan and Victoria Stodden and Alexander S. Szalay Realizing the potential of data science 67--72 Mordechai Guri and Yuval Elovici Bridgeware: the air-gap malware . . . . 74--82 David M. Blei Expressive probabilistic models and scalable method of moments: technical perspective . . . . . . . . . . . . . . 84--84 Sanjeev Arora and Rong Ge and Yoni Halpern and David Mimno and Ankur Moitra and David Sontag and Yichen Wu and Michael Zhu Learning topic models --- provably and efficiently . . . . . . . . . . . . . . 85--93 Dennis Shasha Last byte: Finding October . . . . . . . 96--ff
Vinton G. Cerf Cerf's up: Turing test 2 . . . . . . . . 5--5 Jack Davidson and Joseph Konstan and Andrew A. Chien and Scott Delman Editorial: Toward sustainable access: where are we now? . . . . . . . . . . . 6--7 Moshe Y. Vardi Vardi's insights: How we lost the women in computing . . . . . . . . . . . . . . 9--9 CACM Staff ACM's election: ACM's 2018 general election: please take this opportunity to vote . . . . . . . . . . . . . . . . 13--21 CACM Staff Letters to the editor: Get ACM (and \booktitleCommunications) out of politics . . . . . . . . . . . . . . . . 20--11 Edwin Torres and Walid Saba BLOG@CACM: Commenting on code, considering data's bottleneck . . . . . 24--25 Gregory Mone News: Shrinking machines, cellular computers . . . . . . . . . . . . . . . 26--28 Neil Savage News: Using functions for easier programming . . . . . . . . . . . . . . 29--30 Samuel Greengard News: Finding a healthier approach to managing medical data . . . . . . . . . 31--33 Ryan Calo Law and technology: Is the law ready for driverless cars? . . . . . . . . . . . . 34--36 Fred B. Schneider Privacy and security: Putting trust in security engineering . . . . . . . . . . 37--39 Alexander Repenning Education: Scale or fail . . . . . . . . 40--42 Harold ``Bud'' Lawson Viewpoint: The march into the black hole of complexity . . . . . . . . . . . . . 43--45 Margaret Martonosi Viewpoint: Science, policy, and service 46--48 Malte Schwarzkopf and Peter Bailis Research for practice: cluster scheduling for datacenters . . . . . . . 50--53 Stepán Davidovic and Betsy Beyer Canary analysis service . . . . . . . . 54--62 Kate Matsudaira How is your week going so far? . . . . . 63--64 Josh Tenenberg and Wolff-Michael Roth and Donald Chinn and Alfredo Jornet and David Socha and Skip Walter More than the code: learning rules of rejection in writing programs . . . . . 66--71 Richard R. Brooks and Lu Yu and Yu Fu and Oluwakemi Hambolu and John Gaynard and Julie Owono and Archippe Yepmou and Felix Blanc Internet freedom in West Africa: technical support for journalists and democracy advocates . . . . . . . . . . 72--82 Xiaonan Wang Data acquisition in vehicular ad hoc networks . . . . . . . . . . . . . . . . 83--88 Björn W. Schuller Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends . . . . . . . . . . . . . . . . . 90--99 Oren Etzioni Technical perspective: Breaking the mold of machine learning . . . . . . . . . . 102--102 T. Mitchell and W. Cohen and E. Hruschka and P. Talukdar and B. Yang and J. Betteridge and A. Carlson and B. Dalvi and M. Gardner and B. Kisiel and J. Krishnamurthy and N. Lao and K. Mazaitis and T. Mohamed and N. Nakashole and E. Platanios and A. Ritter and M. Samadi and B. Settles and R. Wang and D. Wijaya and A. Gupta and X. Chen and A. Saparov and M. Greaves and J. Welling Never-ending learning . . . . . . . . . 103--115 Ken MacLeod Last byte: Free press . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: Celebrating excellence . . . 5--5 CACM Staff Letters to the editor: When to hold 'em 6--7 Mark Guzdial and Susan Landau BLOG@CACM: Programming programming languages, and analyzing Facebook's failure . . . . . . . . . . . . . . . . 8--9 Neil Savage News: Rewarded for RISC . . . . . . . . 10--12 Chris Edwards News: Deep learning hunts for signals among the noise . . . . . . . . . . . . 13--14 Keith Kirkpatrick News: $3$D sensors provide security, better games . . . . . . . . . . . . . . 15--17 Logan Kugler News: Getting hooked on tech . . . . . . 18--19 Nicholas Weaver Inside risks: Risks of cryptocurrencies 20--24 Peter J. Denning The profession of IT: An interview with Dave Parnas . . . . . . . . . . . . . . 25--27 George V. Neville-Neil Kode Vicious: Watchdogs vs. snowflakes 28--29 C. Le Goues and Y. Brun and S. Apel and E. Berger and S. Khurshid and Y. Smaragdakis Viewpoint: Effectiveness of anonymization in double-blind review . . 30--33 Diptanu Gon Choudhury and Timothy Perrett Designing cluster schedulers for Internet-scale services . . . . . . . . 34--40 Tobias Lauinger and Abdelberi Chaabane and Christo B. Wilson Thou shalt not depend on me . . . . . . 41--47 Thomas A. Limoncelli Documentation is automation . . . . . . 48--53 Ricardo Baeza-Yates Bias on the web . . . . . . . . . . . . 54--61 Jacob O. Wobbrock and Krzysztof Z. Gajos and Shaun K. Kane and Gregg C. Vanderheiden Ability-based design . . . . . . . . . . 62--71 David Gefen and Jake Miller and Johnathon Kyle Armstrong and Frances H. Cornelius and Noreen Robertson and Aaron Smith-McLallen and Jennifer A. Taylor Identifying patterns in medical records through latent semantic analysis . . . . 72--77 Daniel Genkin and Dimitrios Papadopoulos and Charalampos Papamanthou Privacy in decentralized cryptocurrencies . . . . . . . . . . . . 78--88 Landon P. Cox Technical perspective: Measuring optimization potential with Coz . . . . 90--90 Charlie Curtsinger and Emery D. Berger Coz: finding code that counts with causal profiling . . . . . . . . . . . . 91--99 Leah Hoffmann Last byte: RISC management . . . . . . . 104--ff
Vicki L. Hanson Departments: Reflections on my two years 5--5 Vinton G. Cerf Cerf's up: On neural networks . . . . . 7--7 Moshe Y. Vardi Vardi's insights: How the hippies destroyed the Internet . . . . . . . . . 9--9 CACM Staff Letters to the editor: Teach the law (and the AI) `foreseeability' . . . . . 10--11 Yegor Bugayenko BLOG@CACM: We are done with `hacking' 12--13 Logan Kugler News: Why cryptocurrencies use so much energy: and what to do about it . . . . 15--17 Gary Anthes News: You've got mail! . . . . . . . . . 18--19 Keith Kirkpatrick News: Bringing the Internet to the (developing) world . . . . . . . . . . . 20--21 Pamela Samuelson Legally speaking: Copyright blocks a news-monitoring technology . . . . . . . 24--26 Hanna Halaburda Economic and business dimensions: Blockchain revolution without the blockchain? . . . . . . . . . . . . . . 27--29 Alex Ahmed Broadening participation: Beyond diversity . . . . . . . . . . . . . . . 30--32 Osman Yasar Viewpoint: A new perspective on computational thinking . . . . . . . . . 33--39 Josiah Dykstra and Eugene H. Spafford Viewpoint: The case for disappearing cyber security . . . . . . . . . . . . . 40--42 David Chisnall C is not a low-level language . . . . . 44--48 Kate Matsudaira How to come up with great ideas . . . . 49--51 Deepak Vasisht and Peter Bailis Research for practice: toward a network of connected things . . . . . . . . . . 52--54 Ian Goodfellow and Patrick McDaniel and Nicolas Papernot Making machine learning robust against adversarial inputs . . . . . . . . . . . 56--66 Christoph Schneider and Markus Weinmann and Jan vom Brocke Digital nudging: guiding online user choices through interface design . . . . 67--73 John Ousterhout Always measure one level deeper . . . . 74--83 Carlo Gabriel Porto Bellini The ABCs of effectiveness in the digital society . . . . . . . . . . . . . . . . 84--91 Sharon Goldberg and Ethan Heilman The rewards of selfish mining: technical perspective . . . . . . . . . . . . . . 94--94 Ittay Eyal and Emin Gün Sirer Majority is not enough: Bitcoin mining is vulnerable . . . . . . . . . . . . . 95--102 Dennis Shasha Last byte: String wars . . . . . . . . . 104--104
James Larus and Chris Hankin Informatics Europe and ACM Europe Council: Regulating automated decision making . . . . . . . . . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: Traceability . . . . . . . . 7--7 CACM Staff Letters to the editor: Encourage ACM to address U.S. election integrity . . . . 10--11 Robin K. Hill BLOG@CACM: Assessing responsibility for program output . . . . . . . . . . . . . 12--13 Chris Edwards News: Animals teach robots to find their way . . . . . . . . . . . . . . . . . . 14--16 Don Monroe News: Electronics are leaving the plane 17--18 Esther Shein News: Broadening the path for women in STEM . . . . . . . . . . . . . . . . . . 19--21 Kashif Ali and Kurtis Heimerl Global computing: Designing sustainable rural infrastructure through the lens of OpenCellular . . . . . . . . . . . . . . 22--25 Mark Guzdial and Amy Bruckman Education: Providing equitable access to computing education . . . . . . . . . . 26--28 George V. Neville-Neil Kode vicious: Every silver lining has a cloud . . . . . . . . . . . . . . . . . 29--30 Ehud Shapiro Pointg/counterpoint: democracy and e-democracy: Point: foundations of e-democracy . . . . . . . . . . . . . . 31--34 Douglas Schuler Point/counterpoint: democracy and e-democracy: Counterpoint: e-democracy won't save democracy. democracy will save democracy . . . . . . . . . . . . . 34--36 Alex Petrov Algorithms behind modern storage systems 38--44 Dan Crankshaw and Joseph Gonzalez and Peter Bailis Research for practice: prediction-serving systems . . . . . . . 45--49 Pat Helland Consistently eventual . . . . . . . . . 50--52 Emanuelle Burton and Judy Goldsmith and Nicholas Mattei How to teach computer ethics through science fiction . . . . . . . . . . . . 54--64 Christina Delimitrou and Christos Kozyrakis Amdahl's law for tail latency . . . . . 65--72 Jose M. Such and Natalia Criado Multiparty privacy in social media . . . 74--81 John D. Owens Technical perspective: Graphs, betweenness centrality, and the GPU . . 84--84 Adam McLaughlin and David A. Bader Accelerating GPU betweenness centrality 85--92 William Sims Bainbridge Last byte: Deadlock . . . . . . . . . . 96--ff Michael L. Best Global computing: Session details: Global computing . . . . . . . . . . . . ??
Andrew A. Chien Editor's letter: Computer architecture: disruption from above . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: The Peace of Westphalia . . . 6--6 Moshe Y. Vardi Vardi's insights: Move fast and break things . . . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: Hippie values really did build the Internet . . . . . 9--11 Yegor Bugayenko BLOG@CACM: Discovering bugs, or ensuring success? . . . . . . . . . . . . . . . . 12--13 Don Monroe News: AI holds the better hand . . . . . 14--16 Gregory Mone News: Robotic implants . . . . . . . . . 17--18 Keith Kirkpatrick News: Borders in the cloud . . . . . . . 19--21 Alan R. Wagner and Jason Borenstein and Ayanna Howard Computing ethics: Overtrust in the robotic age . . . . . . . . . . . . . . 22--24 Frank Pasquale Law and technology: When machine learning is facially invalid . . . . . . 25--27 Peter J. Denning The profession of IT: Navigating with accelerating technology change . . . . . 28--30 Adam Barker Viewpoint: An academic's observations from a sabbatical at Google . . . . . . 31--33 Edward A. Lee Viewpoint: Is software the result of top-down intelligent design or evolution? . . . . . . . . . . . . . . . 34--36 Thomas A. Limoncelli GitOps: a path to more self-service IT 38--42 Noor Mubeen Workload frequency scaling law: derivation and verification . . . . . . 43--47 Gustavo Alonso and Peter Bailis Research for practice: FPGAs in datacenters . . . . . . . . . . . . . . 48--49 Norman P. Jouppi and Cliff Young and Nishant Patil and David Patterson A domain-specific architecture for deep neural networks . . . . . . . . . . . . 50--59 Robert Perricone and X. Sharon Hu and Joseph Nahas and Michael Niemier Can beyond-CMOS devices illuminate dark silicon? . . . . . . . . . . . . . . . . 60--69 Slobodan Vucetic and Ashis Kumar Chanda and Shanshan Zhang and Tian Bai and Aniruddha Maiti Peer assessment of CS doctoral programs shows strong correlation with faculty citations . . . . . . . . . . . . . . . 70--76 Daniel J. Abadi and Jose M. Faleiro An overview of deterministic database systems . . . . . . . . . . . . . . . . 78--88 Romit Roy Choudhury Technical perspective: Is your WiFi a sensor? . . . . . . . . . . . . . . . . 90--90 Mingmin Zhao and Fadel Adib and Dina Katabi Emotion recognition using wireless signals . . . . . . . . . . . . . . . . 91--100 Dennis Shasha Last byte: Bounce blockchain . . . . . . 104--ff
Vinton G. Cerf Cerf's up: The Internet in the 21st century . . . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the editor: Hennessy and Patterson on the roots of RISC . . . . . 6--7 Amir Banifatemi BLOG@CACM: Can we use AI for global good? . . . . . . . . . . . . . . . . . 8--9 Chris Edwards News: Floating voxels provide new hope for $3$D displays . . . . . . . . . . . 11--13 Samuel Greengard News: Transient electronics take shape 14--16 Esther Shein News: The dangers of automating social programs . . . . . . . . . . . . . . . . 17--19 Michael A. Cusumano Technology strategy and management: The business of quantum computing . . . . . 20--22 Peter Swire Privacy and security: A pedagogic cybersecurity framework . . . . . . . . 23--26 George V. Neville-Neil Kode vicious: The obscene coupling known as spaghetti code . . . . . . . . . . . 27--28 Jean-François Abramatic and Roberto Di Cosmo and Stefano Zacchiroli Viewpoint: Building the universal archive of source code . . . . . . . . . 29--31 Jordi Cabot and Javier Luis Cánovas Izquierdo and Valerio Cosentino Viewpoint: Are CS conferences (too) closed communities? . . . . . . . . . . 32--34 Zachary C. Lipton The mythos of model interpretability . . 36--43 Kate Matsudaira The secret formula for choosing the right next role . . . . . . . . . . . . 44--46 Pat Helland Mind your state for your state of mind 47--54 Adnan Darwiche Human-level intelligence or animal-like abilities? . . . . . . . . . . . . . . . 56--67 Gerwin Klein and June Andronick and Matthew Fernandez and Ihor Kuz and Toby Murray and Gernot Heiser Formally verified software in the real world . . . . . . . . . . . . . . . . . 68--77 Quang ``Neo'' Bui and Sean Hansen and Manlu Liu and Qiang (John) Tu The productivity paradox in health information technology . . . . . . . . . 78--85 Bonnie Nardi and Bill Tomlinson and Donald J. Patterson and Jay Chen and Daniel Pargman and Barath Raghavan and Birgit Penzenstadler Computing within limits . . . . . . . . 86--93 John Baillieul A control theorist's view on reactive control for autonomous drones: technical perspective . . . . . . . . . . . . . . 95--95 Luca Mottola and Kamin Whitehouse Fundamental concepts of reactive control for autonomous drones . . . . . . . . . 96--104 Marc Snir The future of MPI: technical perspective 105--105 Robert Gerstenberger and Maciej Besta and Torsten Hoefler Enabling highly scalable remote memory access programming with MPI-3 one sided 106--113 Leah Hoffmann Last byte: Reaping the benefits of a diverse background . . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: The upper layers of the internet . . . . . . . . . . . . . . . . 5--5 Moshe Y. Vardi Departments: Self-reference and section 230 . . . . . . . . . . . . . . . . . . 7--7 Carl Hewitt and Vijay Kumar The gap in CS, mulling irrational exuberance . . . . . . . . . . . . . . . 8--9 Don Monroe News: AI, explain yourself . . . . . . . 11--13 Neil Savage News: A new movement in seismology . . . 14--15 Samuel Greengard News: Weighing the impact of GDPR . . . 16--18 Pamela Samuelson Legally speaking: The EU's controversial digital single market directive . . . . 20--23 Steven M. Bellovin and Peter G. Neumann Inside risks: The big picture . . . . . 24--26 R. Benjamin Shapiro and Rebecca Fiebrink and Peter Norvig Education: How machine learning impacts the undergraduate computing curriculum 27--29 C. Liaskos and A. Tsioliaridou and A. Pitsillides and S. Ioannidis and I. Akyildiz Viewpoint: Using any surface to realize a new paradigm for wireless communications . . . . . . . . . . . . . 30--33 Janne Lahtiranta and Sami Hyrynsalmi Viewpoint: Crude and rude? . . . . . . . 34--35 Andrew A. Chien China region: Introducing \booktitleCommunications' regional special sections . . . . . . . . . . . . 36--37 Wenguang Chen and Xiang-Yang Li China Region Special Section: Hot Topics: Welcome to the China region special section . . . . . . . . . . . . 38--38 Elliott Zaagman China Region Special Section: Hot Topics: China's computing ambitions . . 40--41 Chao-Yang Lu and Cheng-Zhi Peng and Jian-Wei Pan China Region Special Section: Hot Topics: Quantum communication at 7,600km and beyond . . . . . . . . . . . . . . . 42--43 Jun Zhu and Tiejun Huang and Wenguang Chen and Wen Gao China Region Special Section: Hot Topics: The future of artificial intelligence in China . . . . . . . . . 44--45 Peter Guy China Region Special Section: Hot Topics: Consumers, corporations, and government: computing in China . . . . . 46--47 San Zhang China Region Special Section: Hot Topics: Regional computing culture and personalities . . . . . . . . . . . . . 48--49 Xiang-Yang Li and Jianwei Qian and Xiaoyang Wang China Region Special Section: Hot Topics: Can China lead the development of data trading and sharing markets? . . 50--51 Luyi Xu China Region Special Section: Hot Topics: Exploiting psychology and social behavior for game stickiness . . . . . . 52--53 Wanli Min and Liang Yu and Lei Yu and Shubo He China Region Special Section: Big Trends: People logistics in smart cities 54--59 Hai Jin and Haibo Chen and Hong Gao and Xiang-Yang Li and Song Wu China Region Special Section: Big Trends: Cloud bursting for the world's largest consumer market . . . . . . . . 60--64 Yuan Qi and Jing Xiao China Region Special Section: Big Trends: Fintech: AI powers financial services to improve people's lives . . . 65--69 Huaxia Xia and Haiming Yang China Region Special Section: Big Trends: Is last-mile delivery a `killer app' for self-driving vehicles? . . . . 70--75 Yue Zhuge China Region Special Section: Big Trends: Video consumption, social networking, and influence . . . . . . . 76--81 Yutong Lu and Depei Qian and Haohuan Fu and Wenguang Chen China Region Special Section: Big Trends: Will supercomputers be super-data and super-AI machines? . . . 82--87 Matt Fata and Philippe-Joseph Arida and Patrick Hahn and Betsy Beyer Corp to cloud: Google's virtual desktops 88--94 Alex Ratner and Chris Ré and Peter Bailis Research for practice: knowledge base construction in the machine-learning era 95--97 Silvia Esparrachiari Ghirotti and Tanya Reilly and Ashleigh Rentz Tracking and controlling microservice dependencies . . . . . . . . . . . . . . 98--104 Ryen W. White Skill discovery in virtual assistants 106--113 Roberto Ierusalimschy and Luiz Henrique De Figueiredo and Waldemar Celes A look at the design of Lua . . . . . . 114--123 Diomidis Spinellis Modern debugging: the art of finding a needle in a haystack . . . . . . . . . . 124--134 Daniel Waddington and Jim Harris Software challenges for the changing storage landscape . . . . . . . . . . . 136--145 Markus G. Kuhn Backdoor engineering: technical perspective . . . . . . . . . . . . . . 147--147 Stephen Checkoway and Jacob Maskiewicz and Christina Garman and Joshua Fried and Shaanan Cohney and Matthew Green and Nadia Heninger and Ralf-Philipp Weinmann and Eric Rescorla and Hovav Shacham Where did I leave my keys?: lessons from the Juniper Dual EC incident . . . . . . 148--155 Tanzeem Choudhury Making sleep tracking more user friendly: technical perspective . . . . 156--156 Anh Nguyen and Raghda Alqurashi and Zohreh Raghebi and Farnoush Banaei-Kashani and Ann C. Halbower and Tam Vu LIBS: a bioelectrical sensing system from human ears for staging whole-night sleep study . . . . . . . . . . . . . . 157--165 Brian Clegg Last byte: Between the abbey and the edge of time . . . . . . . . . . . . . . 176--ff
Vinton G. Cerf Cerf's up: Self-authenticating identifiers . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the editor: Reclaim Internet greatness . . . . . . . . . . . . . . . 7--8 John Arquilla and Yegor Bugayenko BLOG@CACM: Securing agent 111, and the job of software architect . . . . . . . 10--11 Chris Edwards News: Learning to see . . . . . . . . . 13--15 Keith Kirkpatrick News: Technology for the deaf . . . . . 16--18 Logan Kugler News: AI judges and juries . . . . . . . 19--21 Ted G. Lewis and Peter J. Denning The profession of IT: Learning machine learning . . . . . . . . . . . . . . . . 24--27 George V. Neville-Neil Kode vicious: A chance gardener . . . . 28--29 Oren Etzioni Point/counterpoint: Point: Should AI technology be regulated?: yes, and here's how . . . . . . . . . . . . . . . 30--32 Andrea O'Sullivan and Adam Thierer Point/counterpoint: Counterpoint: Regulators should allow the greatest space for AI innovation . . . . . . . . 33--35 Ryen W. White Viewpoint: Opportunities and challenges in search interaction . . . . . . . . . 36--38 Rich Bennett and Craig Callahan and Stacy Jones and Matt Levine and Merrill Miller and Andy Ozment How to live in a post-Meltdown and -Spectre world . . . . . . . . . . . . . 40--44 Shylaja Nukala and Vivek Rau Why SRE documents matter . . . . . . . . 45--51 Kate Matsudaira How to get things done when you don't feel like it . . . . . . . . . . . . . . 52--54 Junyeong Lee and Jaylyn Jeonghyun Oh What motivates a citizen to take the initiative in e-participation?: the case of a South Korean parliamentary hearing 56--61 Bran Knowles and Alison Smith-Renner and Forough Poursabzi-Sangdeh and Di Lu and Halimat Alabi Uncertainty in current and future health wearables . . . . . . . . . . . . . . . 62--67 Barbara J. Grosz and Peter Stone A century-long commitment to assessing artificial intelligence and its impact on society . . . . . . . . . . . . . . . 68--73 Daniel McDuff and Mary Czerwinski Designing emotionally sentient agents 74--83 Rajeev Alur and Rishabh Singh and Dana Fisman and Armando Solar-Lezama Search-based program synthesis . . . . . 84--93 Tim Harris Technical perspective: Node replication divides to conquer . . . . . . . . . . . 96--96 Irina Calciu and Siddhartha Sen and Mahesh Balakrishnan and Marcos K. Aguilera How to implement any concurrent data structure . . . . . . . . . . . . . . . 97--105 Anders Mòller Technical perspective: WebAssembly: a quiet revolution of the web . . . . . . 106--106 Andreas Rossberg and Ben L. Titzer and Andreas Haas and Derek L. Schuff and Dan Gohman and Luke Wagner and Alon Zakai and J. F. Bastien and Michael Holman Bringing the web up to speed with WebAssembly . . . . . . . . . . . . . . 107--115 Leah Hoffmann Last byte: Promoting common sense, reality, dependable engineering . . . . 128--ff
Andrew A. Chien Editor's letter: Open collaboration in an age of distrust . . . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: A people-centered economy . . 6--6 Moshe Y. Vardi Departments: Are we having an ethical crisis in computing? . . . . . . . . . . 7--7 Judy Robertson BLOG@CACM: Answering children's questions about computers . . . . . . . 8--9 Don Monroe News: Quantum leap . . . . . . . . . . . 10--12 Chris Edwards News: Hidden messages fool AI . . . . . 13--14 Esther Shein News: Who owns $3$D scans of historic sites? . . . . . . . . . . . . . . . . . 15--17 Michal S. Gal Law and technology: Illegal pricing algorithms . . . . . . . . . . . . . . . 18--20 Michael A. Cusumano Technology strategy and management: CRISPR: an emerging platform for gene editing . . . . . . . . . . . . . . . . 21--23 Thomas Haigh Historical reflections: Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo . . . . . . . . . . . . . . 24--30 Niels Da Vitoria Lobo and Mubarak A. Shah Viewpoint: UCF's 30-year REU site in computer vision . . . . . . . . . . . . 31--34 Edward A. Lee Viewpoint: Modeling in engineering and science . . . . . . . . . . . . . . . . 35--36 Alpha Lam Using remote cache service for Bazel . . 38--42 Jessie Frazelle Research for practice: security for the modern age . . . . . . . . . . . . . . . 43--45 Thomas A. Limoncelli SQL is no excuse to avoid DevOps . . . . 46--49 Stefan Seidel and Nicholas Berente and Aron Lindberg and Kalle Lyytinen and Jeffrey V. Nickerson Autonomous tools and design: a triple-loop approach to human-machine learning . . . . . . . . . . . . . . . . 50--57 Sergio Orenga-Roglá and Ricardo Chalmeta Framework for implementing a big data ecosystem in organizations . . . . . . . 58--65 B. Jack Copeland and Oron Shagrir The Church--Turing thesis: logical limit or breachable barrier? . . . . . . . . . 66--74 Yolanda Gil and Suzanne A. Pierce and Hassan Babaie and Arindam Banerjee and Kirk Borne and Gary Bust and Michelle Cheatham and Imme Ebert-Uphoff and Carla Gomes and Mary Hill and John Horel and Leslie Hsu and Jim Kinter and Craig Knoblock and David Krum and Vipin Kumar and Pierre Lermusiaux and Yan Liu and Chris North and Victor Pankratius and Shanan Peters and Beth Plale and Allen Pope and Sai Ravela and Juan Restrepo and Aaron Ridley and Hanan Samet and Shashi Shekhar Intelligent systems for geosciences: an essential research agenda . . . . . . . 76--84 William Casey and Ansgar Kellner and Parisa Memarmoshrefi and Jose Andre Morales and Bud Mishra Deception, identity, and security: the game theory of sybil attacks . . . . . . 85--93 Hao Li Photorealistic facial digitization and manipulation: technical perspective . . 95--95 Justus Thies and Michael Zollhöfer and Marc Stamminger and Christian Theobalt and Matthias Nießner Face2Face: real-time face capture and reenactment of RGB videos . . . . . . . 96--104 Dan Boneh Attacking cryptographic key exchange with precomputation: technical perspective . . . . . . . . . . . . . . 105--105 David Adrian and Karthikeyan Bhargavan and Zakir Durumeric and Pierrick Gaudry and Matthew Green and J. Alex Halderman and Nadia Heninger and Drew Springall and Emmanuel Thomé and Luke Valenta and Benjamin VanderSloot and Eric Wustrow and Santiago Zanella-Béguelin and Paul Zimmermann Imperfect forward secrecy: how Diffie--Hellman fails in practice . . . 106--114 Dennis Shasha Last byte: Randomized anti-counterfeiting . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: Libraries considered hazardous . . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the editor: Between the lines in the China region special section . . 6--7 Herbert Bruderer and Robin K. Hill BLOG@CACM: Seeking digital humanities, IT tech support . . . . . . . . . . . . 8--9 Samuel Greengard News: A brave new world of genetic engineering . . . . . . . . . . . . . . 11--13 Keith Kirkpatrick News: Technologizing agriculture . . . . 14--16 Logan Kugler News: Being recognized everywhere . . . 17--19 Carl Landwher Privacy and security: 2018: a big year for privacy . . . . . . . . . . . . . . 20--22 Carol Frieze and Jeria L. Quesenberry Broadening participation: How computer science at CMU is attracting and retaining women . . . . . . . . . . . . 23--26 George V. Neville-Neil Kode Vicious: Writing a test plan . . . 27--27 Dror G. Feitelson Viewpoint: Tony's law . . . . . . . . . 28--31 Enrico Nardelli Viewpoint: Do we really need computational thinking? . . . . . . . . 32--35 CACM Staff CodeFlow: improving the code review process at Microsoft . . . . . . . . . . 36--44 Kate Matsudaira The importance of a great finish . . . . 45--47 John L. Hennessy and David A. Patterson A new golden age for computer architecture . . . . . . . . . . . . . . 48--60 Chao Gao and Zhen Su and Jiming Liu and Jürgen Kurths Even central users do not always drive information diffusion . . . . . . . . . 61--67 Juan P. Bello and Claudio Silva and Oded Nov and R. Luke Dubois and Anish Arora and Justin Salamon and Charles Mydlarz and Harish Doraiswamy SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution . . . . . . . . . . . . . . . 68--77 Maurice Herlihy Blockchains from a distributed computing perspective . . . . . . . . . . . . . . 78--85 Peter O'Hearn Separation logic . . . . . . . . . . . . 86--95 Thomas F. Wenisch How economic theories can help computers beat the heat: technical perspective . . 97--97 Songchun Fan and Seyed Majid Zahedi and Benjamin C. Lee Distributed strategies for computational sprints . . . . . . . . . . . . . . . . 98--106 Surajit Chaudhuri To do or not to do: extending SQL with integer linear programming?: technical perspective . . . . . . . . . . . . . . 107--107 Matteo Brucato and Azza Abouzied and Alexandra Meliou Scalable computation of high-order optimization queries . . . . . . . . . . 108--116 David Allen Batchelor Last byte: Hawking's nightmare . . . . . 120--ff
Andrew A. Chien Editor's letter: Owning computing's environmental impact . . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: Ownership vs. stewardship . . 6--6 Moshe Y. Vardi Departments: Lost in math? . . . . . . . 7--7 Mary Hall and Richard Ladner and Diane Levitt and Manuel A. Pérez Quiñones and Saurabh Bagchi BLOG@CACM: Smoothing the path to computing: pondering uses for big data 8--9 Logan Kugler News: Building a better battery . . . . 11--13 Esther Shein News: Exoskeletons today . . . . . . . . 14--16 Keith Kirkpatrick News: Electronics need rare earths . . . 17--18 Pamela Samuelson Legally speaking: Questioning a new intellectual property right for press publishers . . . . . . . . . . . . . . . 20--23 Ofir Turel Economic and business dimensions: Potential `dark sides' of leisure technology use in youth . . . . . . . . 24--27 Peter J. Denning The profession of IT: An interview with William Hugh Murray . . . . . . . . . . 28--30 Sepehr Vakil and Jennifer Higgs Education: It's about power . . . . . . 31--33 Mike Tissenbaum and Josh Sheldon and Hal Abelson Viewpoint: From computational thinking to computational action . . . . . . . . 34--36 Jim Waldo A hitchhiker's guide to the blockchain universe . . . . . . . . . . . . . . . . 38--42 Kate Matsudaira Design patterns for managing up . . . . 43--45 Simson Garfinkel and John M. Abowd and Christian Martindale Understanding database reconstruction attacks on public data . . . . . . . . . 46--53 Judea Pearl The seven tools of causal inference, with reflections on machine learning . . 54--60 Zhi Quan Zhou and Liqun Sun Metamorphic testing of driverless cars 61--67 Advaith Siddharthan and Kapila Ponnamperuma and Chris Mellish and Chen Zeng and Daniel Heptinstall and Annie Robinson and Stuart Benn and René Van Der Wal Blogging birds: telling informative stories about the lives of birds from telemetric data . . . . . . . . . . . . 68--77 Pamela Zave and Jennifer Rexford The compositional architecture of the Internet . . . . . . . . . . . . . . . . 78--87 Tim Roughgarden Beyond worst-case analysis . . . . . . . 88--96 Martin C. Rinard Technical perspective: Borrowing big code to automate programming activities 98--98 Veselin Raychev and Martin Vechev and Andreas Krause Predicting program properties from `big code' . . . . . . . . . . . . . . . . . 99--107 Nisheeth K. Vishnoi Technical perspective: Isolating a matching when your coins go missing . . 108--108 Stephen Fenner and Rohit Gurjar and Thomas Thierauf A deterministic parallel algorithm for bipartite perfect matching . . . . . . . 109--115 Leah Hoffmann Last byte: Guiding computers, robots to see and think . . . . . . . . . . . . . 120--ff
Vinton G. Cerf Cerf's up: In debt to the NSF . . . . . 5--5 Robin K. Hill and Mark Guzdial BLOG@CACM: Pondering variables and direct instruction . . . . . . . . . . . 6--6 Chris Edwards News: Soft robots look to new environments . . . . . . . . . . . . . . 9--9 Samuel Greengard News: The future of data storage . . . . 12--12 Sarah Underwood News: The fine line between coercion and care . . . . . . . . . . . . . . . . . . 15--15 Mari Sako Technology strategy and management: Free trade in a digital world . . . . . . . . 18--18 George V. Neville-Neil Kode Vicious: Know your algorithms . . . 22--22 Dirk Lewandowski Viewpoint: The web is missing an essential part of infrastructure: an open web index . . . . . . . . . . . . . 24--24 Panagiota Fatourou and Chris Hankin Europe region: Welcome to the Europe region special section . . . . . . . . . 28--28 Lisa Korrigane Europe Region Special Section: Hot topics: A demographic snapshot of the IT workforce in Europe . . . . . . . . . . 32--32 David Pringle Europe Region Special Section: Hot topics: Enterprises lead ICT innovation in Europe . . . . . . . . . . . . . . . 34--34 David Pringle Europe Region Special Section: Hot topics: Europe's ambitious ICT agenda 35--35 David Pringle Europe Region Special Section: Hot topics: Europe's well-connected consumers . . . . . . . . . . . . . . . 36--36 Laurence Kalman Europe Region Special Section: Hot topics: New European data privacy and cyber security laws: one year later . . 38--38 Jan Gulliksen Europe Region Special Section: Hot topics: Incorporating Europe's values in future research . . . . . . . . . . . . 40--40 Koen De Bosschere and Marc Duranton and Madeleine Gray Europe Region Special Section: Hot topics: HiPEAC: a European network built to last . . . . . . . . . . . . . . . . 42--42 Joaquim Jorge and Mashhuda Glencross and Aaron Quigley Europe Region Special Section: Hot topics: ACM Europe Council's best paper awards . . . . . . . . . . . . . . . . . 44--44 Julie A. McCann and Gian Pietro Picco and Alex Gluhak and Karl Henrik Johansson and Martin Törngren and Laila Gide Europe Region Special Section: Big trends: Connected things connecting Europe . . . . . . . . . . . . . . . . . 46--46 Panagiota Fatourou and Yota Papageorgiou and Vasiliki Petousi Europe Region Special Section: Big trends: Women are needed in STEM: European policies and incentives . . . . 52--52 Michael E. Caspersen and Judith Gal-Ezer and Andrew McGettrick and Enrico Nardelli Europe Region Special Section: Big trends: Informatics as a fundamental discipline for the 21st century . . . . 58--58 Paola Inverardi Europe Region Special Section: Big trends: The European perspective on responsible computing . . . . . . . . . 64--64 Thomas Skordas Europe Region Special Section: Big trends: Toward a European exascale ecosystem: the EuroHPC joint undertaking 70--70 Steffen Staab and Susan Halford and Wendy Hall Europe Region Special Section: Big trends: Web science in Europe: beyond boundaries . . . . . . . . . . . . . . . 74--74 Pat Helland Identity by any other name . . . . . . . 80--80 Benjamin Treynor Sloss and Shylaja Nukala and Vivek Rau Metrics that matter . . . . . . . . . . 88--88 Nitesh Mor Research for practice: edge computing 95--95 Vijay Khatri and Binny M. Samuel Analytics for managerial work . . . . . 100--100 James B. Aimone Neural algorithms and computing beyond Moore's law . . . . . . . . . . . . . . 110--110 Petros Wallden and Elham Kashefi Cyber security in the quantum era . . . 120--120 Gilles Brassard Technical perspective: Was Edgar Allan Poe wrong after all? . . . . . . . . . . 132--132 Umesh Vazirani and Thomas Vidick Fully device independent quantum key distribution . . . . . . . . . . . . . . 133--133 Dennis Shasha Last byte: Fighting for lava . . . . . . 144--144
Vinton G. Cerf Cerf's up: APIs, standards, and enabling infrastructure . . . . . . . . . . . . . 5--5 Moshe Y. Vardi Departments: Quantum hype and quantum skepticism . . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: Don't ignore the cost of `embedded energy' . . . . . . . 10--11 Ryan Carrier BLOG@CACM: Implementing guidelines for governance, oversight of AI, and automation . . . . . . . . . . . . . . . 12--13 Chris Edwards News: Questioning quantum . . . . . . . 15--17 Neil Savage News: Code talkers . . . . . . . . . . . 18--19 Samuel Greengard News: Deep insecurities: the Internet of Things shifts technology risk . . . . . 20--22 James Grimmelmann Law and technology: Continuity and change in Internet law . . . . . . . . . 24--26 Joan Feigenbaum Privacy and security: Encryption and surveillance . . . . . . . . . . . . . . 27--29 Emmanuel Schanzer and Shriram Krishnamurthi and Kathi Fisler Education: What does it mean for a computing curriculum to succeed? . . . . 30--32 Alberto Bartoli and Eric Medvet and Andrea De Lorenzo and Fabiano Tarlao Viewpoint: Enterprise wi-fi: we need devices that are secure by default . . . 33--35 Raymond Blum and Betsy Beyer Achieving digital permanence . . . . . . 36--42 Martin Kleppmann and Alastair R. Beresford and Boerge Svingen Online event processing . . . . . . . . 43--49 Aleksandar Kuzmanovic Net neutrality: unexpected solution to blockchain scaling . . . . . . . . . . . 50--55 Fay Cobb Payton and Eleni Berki Countering the negative image of women in computing . . . . . . . . . . . . . . 56--63 Yongge Wang and Qutaibah M. Malluhi The limit of blockchains: infeasibility of a smart Obama--Trump contract . . . . 64--69 Rod Downey and Denis R. Hirschfeldt Algorithmic randomness . . . . . . . . . 70--80 Zachary G. Ives Technical perspective: Compressing matrices for large-scale machine learning . . . . . . . . . . . . . . . . 82--82 Ahmed Elgohary and Matthias Boehm and Peter J. Haas and Frederick R. Reiss and Berthold Reinwald Compressed linear algebra for declarative large-scale machine learning 83--91 Ken MacLeod Last byte: Like old times . . . . . . . 96--ff
Cherri M. Pancake Editor's letter: ACM awards honor CS contributions . . . . . . . . . . . . . 5--5 Vinton G. Cerf Cerf's up: Back to the future . . . . . 7--7 Mark Guzdial and John Arquilla BLOG@CACM: Is CS really for all, and defending democracy in cyberspace . . . 8--9 Neil Savage News: Neural net worth . . . . . . . . . 10--12 Gary Anthes News: Lifelong learning in artificial neural networks . . . . . . . . . . . . 13--15 Logan Kugler The Trouble with SMS Two-Factor Authentication . . . . . . . . . . . . . 14--14 Don Monroe News: And then, there were three . . . . 16--18 Keith Kirkpatrick News: Ethics in technology jobs . . . . 19--20 Linnet Taylor Global computing: Global data justice 22--24 A. T. Markettos and R. N. M. Watson and S. W. Moore and P. Sewell and P. G. Neumann Inside risks: Through computer architecture, darkly . . . . . . . . . . 25--27 Peter J. Denning The profession of IT: An interview with David Brin on resiliency . . . . . . . . 28--31 Thomas Pasquier and David Eyers and Jean Bacon Viewpoint: Personal data and the Internet of Things . . . . . . . . . . . 32--34 Ulan Degenbaev and Michael Lippautz and Hannes Payer Garbage collection as a joint venture 36--41 Kate Matsudaira How to create a great team culture (and why it matters) . . . . . . . . . . . . 42--44 Zachary C. Lipton and Jacob Steinhardt Research for practice: troubling trends in machine-learning scholarship . . . . 45--53 Jaeyoung Do and Sudipta Sengupta and Steven Swanson Programmable solid-state storage in future cloud datacenters . . . . . . . . 54--62 O. Sami Saydjari Engineering trustworthy systems: a principled approach to cybersecurity . . 63--69 Daniel S. Weld and Gagan Bansal The challenge of crafting intelligible intelligence . . . . . . . . . . . . . . 70--79 Rishiyur S. Nikhil Technical perspective: back to the edge 82--82 Tony Nowatzki and Vinay Gangadhar and Karthikeyan Sankaralingam Heterogeneous Von Neumann/dataflow microprocessors . . . . . . . . . . . . 83--91 Leah Hoffmann Last byte: Reaching new heights with artificial neural networks . . . . . . . 96--ff
Andrew A. Chien Editor's letter: Halfway round!: growing the regional special sections . . . . . 5--5 Vinton G. Cerf Cerf's up: Back to the future, part II 6--6 Moshe Y. Vardi Departments: To serve humanity . . . . . 7--7 Gloria Townsend and Sheldon Waite BLOG@CACM: Bringing more women, immigrants, to computer science . . . . 8--9 Erica Klarreich News: Good algorithms make good neighbors . . . . . . . . . . . . . . . 11--13 Keith Kirkpatrick News: The edge of computational photography . . . . . . . . . . . . . . 14--16 Logan Kugler News: Protecting the 2020 census . . . . 17--19 Pamela Samuelson Legally speaking: API copyrights revisited . . . . . . . . . . . . . . . 20--22 Susan J. Winter Computing ethics: Who benefits? . . . . 23--25 David Nordfors and Chally Grundwag and V. R. Ferose Broadening participation: A new labor market for people with 'coolabilities' 26--28 Emery Berger and Stephen M. Blackburn and Carla Brodley and H. V. Jagadish and Kathryn S. McKinley and Mario A. Nascimento and Minjeong Shin and Kuansan Wang and Lexing Xie Viewpoint: GOTO rankings considered helpful . . . . . . . . . . . . . . . . 29--30 Pat Helland Extract, shoehorn, and load . . . . . . 32--33 Thomas A. Limoncelli The top 10 things executives should know about software . . . . . . . . . . . . . 34--40 CACM Staff Access controls and healthcare records: who owns the data? . . . . . . . . . . . 41--46 Micah Beck On the hourglass model . . . . . . . . . 48--57 Christopher Frauenberger and Peter Purgathofer Ways of thinking in informatics . . . . 58--64 Nguyen Khoi Tran and Quan Z. Sheng and M. Ali Babar and Lina Yao and Wei Emma Zhang and Schahram Dustdar Internet of Things search engine . . . . 66--73 Pedro Domingos and Daniel Lowd Unifying logical and statistical AI with Markov logic . . . . . . . . . . . . . . 74--83 Costin Raiciu Technical perspective: Do you know why your web pages load faster? . . . . . . 85--85 Arash Molavi Kakhki and Samuel Jero and David Choffnes and Cristina Nita-Rotaru and Alan Mislove Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols . . . . . . 86--94 Dennis Shasha Last byte: Opioid games . . . . . . . . 96--ff
Cherri M. Pancake From the President: Dispelling common myths about ACM awards and honors . . . 5--5 Vinton G. Cerf Cerf's up: Undo, redo, and regrets . . . 7--7 CACM Staff Letters to the editor: A case against mission-critical applications of machine learning . . . . . . . . . . . . . . . . 9--9 Mark Guzdial BLOG@CACM: Cutting the wait for CS advice . . . . . . . . . . . . . . . . . 12--13 Samuel Greengard News: The algorithm that changed quantum machine learning . . . . . . . . . . . . 15--17 Don Monroe News: I don't understand my car . . . . 18--19 Gregory Mone News: What makes a robot likable? . . . 20--21 David Weintrop Education: Block-based programming in computer science education . . . . . . . 22--25 Marshall W. Van Alstyne Economic and business dimensions: A response to fake news as a response to Citizens United . . . . . . . . . . . . 26--29 George V. Neville-Neil Kode vicious: MUST and MUST NOT . . . . 30--31 Marco Aiello Viewpoint: The success of the web: a triumph of the amateurs . . . . . . . . 32--34 Natasha Noy and Yuqing Gao and Anshu Jain and Anant Narayanan and Alan Patterson and Jamie Taylor Industry-scale knowledge graphs: lessons and challenges . . . . . . . . . . . . . 36--43 Anna Wiedemann and Nicole Forsgren and Manuel Wiesche and Heiko Gewald and Helmut Krcmar Research for practice: the DevOps phenomenon . . . . . . . . . . . . . . . 44--49 Kate Matsudaira Overly attached . . . . . . . . . . . . 50--52 Barbara J. Grosz and David Gray Grant and Kate Vredenburgh and Jeff Behrends and Lily Hu and Alison Simmons and Jim Waldo Embedded EthiCS: integrating ethics across CS education . . . . . . . . . . 54--61 Dino Distefano and Manuel Fähndrich and Francesco Logozzo and Peter W. O'Hearn Scaling static analyses at Facebook . . 62--70 Jakob E. Bardram and Steven Jeuris and Paolo Tell and Steven Houben and Stephen Voida Activity-centric computing systems . . . 72--81 Emilio Ferrara The history of digital spam . . . . . . 82--91 Graham Cormode Technical perspective: the true cost of popularity . . . . . . . . . . . . . . . 94--94 Kasper Green Larsen and Jelani Nelson and Huy L. Nguy\~ên and Mikkel Thorup Heavy hitters via cluster-preserving clustering . . . . . . . . . . . . . . . 95--100 William Sims Bainbridge Last byte: Fluid democracy . . . . . . . 104--ff
Andrew A. Chien Editor's letter: Sustaining open collaboration in universities . . . . . 5--5 Vinton G. Cerf Cerf's up: Polyglot! . . . . . . . . . . 6--6 Moshe Y. Vardi Departments: The long game of research 7--7 CACM Staff Letters to the editor: On being `random enough' . . . . . . . . . . . . . . . . 9--9 Yegor Bugayenko and Mark Guzdial BLOG@CACM: Why programmers should curb their enthusiasm, and thinking about computational thinking . . . . . . . . . 10--11 Samuel Greengard News: An inability to reproduce . . . . 13--15 Gary Anthes News: Augmented reality gets real . . . 16--18 Sarah Underwood News: Can you locate your location data? 19--21 Eric Goldman Law and technology: Internet immunity and the freedom to code . . . . . . . . 22--24 Hilarie Orman Privacy and security: Online voting: we can do it! (we have to) . . . . . . . . 25--27 Peter J. Denning and Andrew Odlyzko The profession of IT: An interview with Andrew Odlyzko on cyber security . . . . 28--30 David Auerbach Viewpoint: Bitwise: a life in code . . . 31--33 Russ Cox Surviving software dependencies . . . . 36--43 Tom Killalea Velocity in software engineering . . . . 44--47 Shaul Kfir and Camille Fournier DAML: the contract language of distributed ledgers . . . . . . . . . . 48--54 Carla Gomes and Thomas Dietterich and Christopher Barrett and Jon Conrad and Bistra Dilkina and Stefano Ermon and Fei Fang and Andrew Farnsworth and Alan Fern and Xiaoli Fern and Daniel Fink and Douglas Fisher and Alexander Flecker and Daniel Freund and Angela Fuller and John Gregoire and John Hopcroft and Steve Kelling and Zico Kolter and Warren Powell and Nicole Sintov and John Selker and Bart Selman and Daniel Sheldon and David Shmoys and Milind Tambe and Weng-Keen Wong and Christopher Wood and Xiaojian Wu and Yexiang Xue and Amulya Yadav and Abdul-Aziz Yakubu and Mary Lou Zeeman Computational sustainability: computing for a better world and a sustainable future . . . . . . . . . . . . . . . . . 56--65 Daniel Jackson Alloy: a language and tool for exploring software designs . . . . . . . . . . . . 66--76 Jason Freeman and Brian Magerko and Doug Edwards and Tom Mcklin and Taneisha Lee and Roxanne Moore EarSketch: engaging broad populations in computing through music . . . . . . . . 78--85 Yossi Gilad Metadata-private communication for the 99% . . . . . . . . . . . . . . . . . . 86--93 Sylvain Lefebvre From virtual worlds to digital fabrication: technical perspective . . . 96--96 Kiril Vidimce and Szu-Po Wang and Jonathan Ragan-Kelley and Wojciech Matusik OpenFab: a programmable pipeline for multimaterial fabrication . . . . . . . 97--105 Leah Hoffmann Last byte: Inspired by the home of the future . . . . . . . . . . . . . . . . . 112--ff
Cherri M. Pancake From the President: How ACM evolves in response to community needs . . . . . . 5--5 Vinton G. Cerf Cerf's up: AI is not an excuse! . . . . 7--7 Robin K. Hill and Edwin Torres BLOG@CACM: Pinning down variables, and taking an agile approach . . . . . . . . 8--9 Don Monroe News: Closing in on quantum error correction . . . . . . . . . . . . . . . 11--13 Keith Kirkpatrick News: Protecting industrial control systems . . . . . . . . . . . . . . . . 14--16 Esther Shein News: The CS teacher shortage . . . . . 17--18 Michael A. Cusumano Technology strategy and management: The cloud as an innovation platform for software development . . . . . . . . . . 20--22 Peter G. Neumann Inside risks: How might we increase system trustworthiness? . . . . . . . . 23--25 George V. Neville-Neil Kode Vicious: What is a chief security officer good for? . . . . . . . . . . . 26--27 Ryen W. White and Adam Fourney and Allen Herring and Paul N. Bennett and Nirupama Chandrasekaran and Robert Sim and Elnaz Nouri and Mark J. Encarnación Viewpoint: Multi-device digital assistance . . . . . . . . . . . . . . . 28--31 Jesse Frazelle Open source firmware . . . . . . . . . . 34--38 Thomas A. Limoncelli Demo data as code . . . . . . . . . . . 39--41 Kate Matsudaira The evolution of management . . . . . . 42--47 Justine S. Hastings and Mark Howison and Ted Lawless and John Ucles and Preston White Unlocking data to improve public policy 48--53 Oren Salzman Sampling-based robot motion planning . . 54--63 Jennifer Mankoff and Megan Hofmann and Xiang 'Anthony' Chen and Scott E. Hudson and Amy Hurst and Jeeeun Kim Consumer-grade fabrication and its potential to revolutionize accessibility 64--75 Mark A. Hallen and Bruce R. Donald Protein design by provable algorithms 76--84 Andrew W. Appel The scalability of CertiKOS: technical perspective . . . . . . . . . . . . . . 88--88 Ronghui Gu and Zhong Shao and Hao Chen and Jieung Kim and Jérémie Koenig and Xiongnan (Newman) Wu and Vilhelm Sjöberg and David Costanzo Building certified concurrent OS kernels 89--99 Dennis Shasha Last byte: Dust wars . . . . . . . . . . 104--ff
Vinton G. Cerf Cerf's up: Hazards of the information superhighway . . . . . . . . . . . . . . 5--5 Moshe Y. Vardi Departments: The winner-takes-all tech corporation . . . . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: You can publish it!: (you have to) . . . . . . . . . . . 8--9 Yegor Bugayenko BLOG@CACM: The benefits of indolence . . 10--11 Don Monroe News: Information is physics . . . . . . 13--15 Samuel Greengard News: When drones fly . . . . . . . . . 16--18 Logan Kugler News: Real-world applications for drones 19--21 Pamela Samuelson Legally speaking: Europe's controversial digital copyright directive finalized 24--27 Mark Guzdial and Alan Kay and Cathie Norris and Elliot Soloway Education: Computational thinking should just be good thinking . . . . . . . . . 28--30 George Varghese Interview: An interview with Leonard Kleinrock . . . . . . . . . . . . . . . 31--36 Selena Silva and Martin Kenney Viewpoint: Algorithms, platforms, and ethnic bias . . . . . . . . . . . . . . 37--39 P. J. Narayanan and Pankaj Jalote and Anand Deshpande India Region Special Section: Welcome to the India region special section . . . . 40--42 Manik Varma India Region Special Section: Hot topics: Extreme classification . . . . . 44--45 Maryam Mustafa and Amna Batool and Agha Ali Raza India Region Special Section: Hot topics: Designing ICT interventions for women in Pakistan . . . . . . . . . . . 46--47 Jayant R. Haritsa and S. Sudarshan India Region Special Section: Hot topics: Turbocharging database query processing and testing . . . . . . . . . 48--49 Neeta Verma and Savita Dawar India Region Special Section: Hot topics: Digital transformation in the Indian government . . . . . . . . . . . 50--53 Vipul Shah India Region Special Section: Hot topics: CSpathshala: bringing computational thinking to schools . . . 54--55 Ajit Samaranayake and Sampath Tilakumara and Thayaparan Sripavan and Rasika Withanawasam India Region Special Section: Hot topics: Creative disruption in fintech from Sri Lanka . . . . . . . . . . . . . 56--57 C. V. Jawahar and Venkata N. Padmanabhan India Region Special Section: Hot topics: Technology interventions for road safety and beyond . . . . . . . . . 58--59 Shashank Srikant and Rohit Takhar and Vishal Venugopal and Varun Aggarwal India Region Special Section: Hot topics: Skill evaluation . . . . . . . . 60--61 Gautam Shroff and K. Ananth Krishnan India Region Special Section: Hot topics: Computing research at Tata Consultancy Services . . . . . . . . . . 62--63 Pankaj Jalote and Pari Natarajan India Region Special Section: Big trends: The growth and evolution of India's software industry . . . . . . . 64--69 Pushpak Bhattacharyya and Hema Murthy and Surangika Ranathunga and Ranjiva Munasingh India Region Special Section: Big trends: Indic language computing . . . . 70--75 Vivek Raghavan and Sanjay Jain and Pramod Varma India Region Special Section: Big trends: India stack --- digital infrastructure as public good . . . . . 76--81 Subhashis Banerjee and Subodh Sharma India Region Special Section: Big trends: Privacy concerns with Aadhaar 80--80 Charles Assisi and Avinash Raghava and NS Ramnath India Region Special Section: Big trends: The rise of the Indian start-up ecosystem . . . . . . . . . . . . . . . 82--87 Supratik Chakraborty and Vasudeva Varma India Region Special Section: Big trends: Highlights of software R&D in India . . . . . . . . . . . . . . . . . 88--91 Meena Mahajan and Madhavan Mukund and Nitin Saxena India Region Special Section: Big trends: Research in theoretical computer science . . . . . . . . . . . . . . . . 92--95 Niloy Ganguly and Ponnurangam Kumaraguru India Region Special Section: Big trends: The positive and negative effects of social media in India . . . . 98--99 Aditya Vashistha and Umar Saif and Agha Ali Raza India Region Special Section: Big trends: The Internet of the orals . . . 100--103 Michelle Vaccaro and Jim Waldo The effects of mixing machine learning and human judgment . . . . . . . . . . . 104--110 Pat Helland The trade-offs between write and read 111--113 Raja Appuswamy and Goetz Graefe and Renata Borovica-Gajic and Anastasia Ailamaki The five-minute rule 30 years later and its impact on the storage hierarchy . . 114--120 Yan Pei and Swarnendu Biswas and Donald S. Fussell and Keshav Pingali An elementary introduction to Kalman filtering . . . . . . . . . . . . . . . 122--133 David G. Andersen A whitebox solution for blackbox-like behaviors: technical perspective . . . . 136--136 Kexin Pei and Yinzhi Cao and Junfeng Yang and Suman Jana DeepXplore: automated whitebox testing of deep learning systems . . . . . . . . 137--145 Anonymous Last byte: Cantando con la Corrente (singing with current) . . . . . . . . . 160--ff
Cherri M. Pancake Editor's letter: Engaging future generations of ACM leaders . . . . . . . 5--5 Vinton G. Cerf Cerf's up: A hands-free ride . . . . . . 7--7 CACM Staff Letters to the Editor: Online voting still security pipedream . . . . . . . . 9--9 Mark Guzdial and Robin K. Hill BLOG@CACM: Getting high school, college students interested in CS . . . . . . . 10--11 Chris Edwards News: Malevolent machine learning . . . 13--15 Paul Marks News: Robots aim to boost astronaut efficiency . . . . . . . . . . . . . . . 16--18 Keith Kirkpatrick News: Regulating information technology 19--21 David M. Douglas Computing ethics: Should researchers use data from security breaches? . . . . . . 22--24 George V. Neville-Neil Kode vicious: Koding academies . . . . . 25--25 Peter J. Denning and Ted G. Lewis The profession of IT: Uncertainty . . . 26--28 Beth Simone Noveck Viewpoint: Public entrepreneurship and policy engineering . . . . . . . . . . . 29--31 Ariana Mirian Hack for hire . . . . . . . . . . . . . 32--37 Thomas A. Limoncelli API practices if you hate your customers 38--42 Paul Castro and Vatche Ishakian and Vinod Muthusamy and Aleksander Slominski The rise of serverless computing . . . . 44--54 Claire Le Goues and Michael Pradel and Abhik Roychoudhury Automated program repair . . . . . . . . 56--65 Moshe Tennenholtz and Oren Kurland Rethinking search engines and recommendation systems: a game theoretic perspective . . . . . . . . . . . . . . 66--75 Michael B. Taylor Bootstrapping a future of open source, specialized hardware: technical perspective . . . . . . . . . . . . . . 78--78 Jonathan Balkind and Michael McKeown and Yaosheng Fu and Tri Nguyen and Yanqi Zhou and Alexey Lavrov and Mohammad Shahrad and Adi Fuchs and Samuel Payne and Xiaohua Liang and Matthew Matl and David Wentzlaff OpenPiton: an open source hardware platform for your research . . . . . . . 79--87 Leah Hoffmann Last byte: RISCy beginnings . . . . . . 96--ff