


Остановите войну!
for scientists:


default search action
Communications of the ACM, Volume 56
Volume 56, Number 1, January 2013 (EE)
- Moshe Y. Vardi:
Who begat computing? 5
- Vinton G. Cerf:
What's a robot? 7
- Computer science is not a science. 8-9
- Alain Chesnais:
ACM's annual report. 11-15
- Daniel Reed:
Lost in translation. 16-17
- Neil Savage:
Stopping the leaks. 19-21 - Gregory Mone:
Beyond Hadoop. 22-24 - Marina Krakovsky:
Just the facts. 25-27
- Michael A. Cusumano:
The Apple-Samsung lawsuits. 28-31
- Phillip G. Armour:
How we build things: ...and why things are 90% complete.. 32-33
- Deven R. Desai:
Beyond location: data security in the 21st century. 34-36
- Thomas Haigh:
Five lessons from really good history. 37-40
- Salman Khan:
What college could be like. 41-43 - Jonathan Grudin, Gloria Mark, John Riedl:
Conference-journal hybrids. 44-49
- Pat Helland:
Condos and clouds. 50-59 - Browser security: appearances can be deceiving. 60-67
- Jeremiah Grossman:
The web won't be safe or secure until we break it. 68-72
- Richard A. Becker, Ramón Cáceres, Karrie J. Hanson, Sibren Isaacman
, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek
, Alexander Varshavsky, Chris Volinsky:
Human mobility characterization from cellular network data. 74-82 - Vineet Bafna
, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado
, George Varghese:
Abstractions for genomics. 83-93
- Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. 94-103
- Doug DeCarlo, Matthew Stone
:
Visualization, understanding, and design: technical perspective. 105 - Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan
, Wilmot Li, Maneesh Agrawala:
Illustrating how mechanical assemblies work. 106-114 - James M. Rehg
:
Finding people in depth: technical perspective. 115 - Jamie Shotton, Toby Sharp, Alex Kipman, Andrew W. Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore:
Real-time human pose recognition in parts from single depth images. 116-124
- Rudy Rucker:
Future tense. 136-
Volume 56, Number 2, February 2013
- Ronald F. Boisvert
, Jack W. Davidson:
Positioning ACM for an open access future. 5
- Vinton G. Cerf:
Growing the ACM family. 7
- Bertrand Meyer:
When reviews do more than sting. 8-9
- Neil Savage:
Life in simulation. 11-13 - Alex Wright:
Revving the rover. 14-16 - Samuel Greengard:
A new model for healthcare. 17-19
- Eben Moglen:
The tangled web we have woven. 20-22
- Peter G. Neumann:
More sight on foresight. 23-25
- George V. Neville-Neil:
Divided by division. 26-27
- Steve Cooper, Mehran Sahami:
Reflections on Stanford's MOOCs. 28-30
- Ana Aizcorbe, Samuel Kortum, Unni Pillai
:
The value of microprocessor designs. 31-32
- Ali Sunyaev
, Stephan Schneider:
Cloud services certification. 33-36 - Anita Jones:
The explosive growth of postdocs in computer science. 37-39
- William R. Cheswick:
Rethinking passwords. 40-44 - Brendan Gregg:
Thinking methodically about performance. 45-51 - Robert N. M. Watson:
A decade of OS access-control extensibility. 52-63
- Ari Juels, Alina Oprea:
New approaches to security and availability for cloud data. 64-73 - Jeffrey Dean, Luiz André Barroso:
The tail at scale. 74-80
- Cristian Cadar
, Koushik Sen:
Symbolic execution for software testing: three decades later. 82-90
- Pradip Bose:
Is dark silicon real?: technical perspective. 92 - Hadi Esmaeilzadeh, Emily R. Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger:
Power challenges may end the multicore era. 93-102
- Peter Winkler:
Puzzled. 112
Volume 56, Number 3, March 2013
- Moshe Y. Vardi:
To boycott or not to boycott. 5
- Vinton G. Cerf:
A revolution in India. 7
- No place for old educational flaws in new online media. 8-9
- Jason I. Hong
, Daniel Reed:
Passwords getting painful, computing still blissful. 10-11
- Neil Savage:
Decoding dementia. 13-15 - Gregory Mone:
Rise of the swarm. 16-17 - Paul Hyman:
Cybercrime: it's serious, but exactly how serious? 18-20 - ACM fellows inducted. 21
- Pamela Samuelson:
A copyright challenge to resales of digital music. 24-26
- Denice Ward Hood, Stafford Hood, Dominica McBride:
Academic careers workshop for underrepresented groups. 27-29
- Peter J. Denning:
Moods, wicked problems, and learning. 30-32
- Rachelle Hollander:
Ethics viewpoints efficacies. 33-34
- Jeff A. Johnson:
Can computer professionals and digital technology engineers help reduce gun violence? 35-37 - Mikkel Thorup
:
Funding successful research. 38-39
- Arun Kumar, Feng Niu, Christopher Ré:
Hazy: making it easier to build and maintain big-data analytics. 40-49 - Brian Beckman, Erik Meijer:
The story of the teapot in DHTML. 50-55 - Kate Matsudaira:
Making the mobile web faster. 56-61
- Edwin Olson, Johannes H. Strom, Robert Goeddel, Ryan D. Morton, Pradeep Ranganathan, Andrew Richardson:
Exploration and mapping with autonomous robot teams. 62-70 - Nafaâ Jabeur, Sherali Zeadally, Biju Theruvil Sayed
:
Mobile social networking applications. 71-79
- Fedor V. Fomin
, Petteri Kaski:
Exact exponential algorithms. 80-88
- David Oran:
Video quality assessment in the age of internet video: technical perspective. 90 - Florin Dobrian, Asad Awan, Dilip Antony Joseph, Aditya Ganjam, Jibin Zhan, Vyas Sekar, Ion Stoica, Hui Zhang:
Understanding the impact of video quality on user engagement. 91-99
- Peter Winkler
:
Puzzled. 102 - Leah Hoffmann:
Q&A. 104-
Volume 56, Number 4, April 2013
- Stephen R. Bourne, George V. Neville-Neil:
Developing tools and resources for those in practice. 5
- Vinton G. Cerf:
Open access. 7 - Scott E. Delman:
An open access partnership. 9
- A robot's roots. 10-11
- Mark Guzdial
, Daniel Reed:
Securing the future of computer science; reconsidering analog computing. 12-13
- Nidhi Subbaraman:
Artificial connections. 15-17 - Gary Anthes:
Inexact design: beyond fault-tolerance. 18-20 - Leah Hoffmann:
Looking back at big data. 21-23
- Michael A. Cusumano:
Are the costs of 'free' too high in online education? 26-28
- Michael L. Best:
Peacebuilding in a networked world. 30-32
- George V. Neville-Neil
:
Code abuse. 33-34
- Nir Kshetri:
Cyber-victimization and cybersecurity in China. 35-37 - Robert Rosenberger:
The problem with hands-free dashboard cellphones. 38-40
- Nicholas C. Zakas:
The evolution of web development for mobile devices. 42-48 - Patrick Meenan:
How fast is your website? 49-55 - David F. Bacon, Rodric M. Rabbah, Sunil Shukla:
FPGA programming for the masses. 56-63
- Zhengchuan Xu, Qing Hu, Chenghong Zhang:
Why computer talents become computer hackers. 64-74 - Nishant Thorat, Arvind Raghavendran, Nigel Groves:
Offline management in virtualized environments. 75-81
- Ronen Feldman:
Techniques and applications for sentiment analysis. 82-89
- David A. Forsyth:
Understanding pictures of rooms: technical perspective. 91 - Huayan Wang, Stephen Gould, Daphne Koller:
Discriminative learning with latent variables for cluttered indoor scene understanding. 92-99
- Paul Di Filippo:
Future tense. 104-
Volume 56, Number 5, May 2013
- Moshe Y. Vardi:
Fricative computing. 5
- Vinton G. Cerf:
ACM president's salary increased by 300%! 7 - Scott E. Delman:
A few good reasons to publish in Communications. 9
- Try old boys security network. 12-13
- Jeannette M. Wing, Mark Guzdial
:
Encouraging IT usage in future healthcare, quality in CS education. 14-15
- Alex Wright:
Proving grounds. 17-19 - Samuel Greengard:
Vanishing electronics. 20-22 - Paul Hyman:
'Small data' enabled prediction of Obama's win, say economists. 23-25
- P. Bernt Hugenholtz:
Fair use in Europe. 26-28
- David Anderson:
Max Newman: forgotten man of early British computing. 29-31
- Mark Guzdial
:
Human-centered computing: a new degree for Licklider's world. 32-34
- Peter J. Denning:
The science in computer science. 35-38 - Michael J. Flynn, Oskar Mencer, Veljko M. Milutinovic, Goran Rakocevic
, Per Stenström, Roman Trobec, Mateo Valero
:
Moving from petaflops to petadata. 39-42
- Latanya Sweeney:
Discrimination in online ad delivery. 44-54 - Peter Bailis, Ali Ghodsi:
Eventual consistency today: limitations, extensions, and beyond. 55-63 - Adam H. Leventhal:
A file system all its own. 64-67
- Mithun George Jacob, Yu-Ting Li, George A. Akingba, Juan P. Wachs
:
Collaboration with a robotic scrub nurse. 68-75 - Chris F. Kemerer, Charles Zhechao Liu, Michael D. Smith
:
Strategies for tomorrow's 'winners-take-some' digital goods markets. 76-82
- Iris A. Junglas, Jeanne Harris:
The promise of consumer technologies in emerging markets. 84-90
- Matt Pharr:
The ray-tracing engine that could: technical perspective. 92 - Steven G. Parker, Heiko Friedrich, David P. Luebke, R. Keith Morley, James Bigler, Jared Hoberock, David K. McAllister, Austin Robison, Andreas Dietrich, Greg Humphreys, Morgan McGuire, Martin Stich:
GPU ray tracing. 93-101
- Peter Winkler
:
Puzzled. 104
Volume 56, Number 6, June 2013
- Erik R. Altman:
SGB fortifies global SIG community. 5
- Vinton G. Cerf:
Honoring our best. 7
- How to claim your fair share in academic publishing. 8-9
- Jason I. Hong
, Judy Robertson:
Computer security needs refocus, and be nice about it. 10-11
- Gary Anthes:
Deep learning comes of age. 13-15 - Gregory Mone:
The future is flexible displays. 16-17 - Paul Hyman:
Augmented-reality glasses bring cloud security into sharp focus. 18-20 - Neil Savage:
Proofs probable. 22-24 - ACM honors computing innovators. 25
- Stas Filshtinskiy:
Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? 28-30
- Phillip G. Armour:
What is a "good" estimate?: whether forecasting is valuable. 31-32
- George V. Neville-Neil:
Swamped by automation. 33-34
- Peter J. Denning:
Thumb numbers. 35-37
- Nancy G. Leveson:
Learning from the past to face the risks of today. 38-42
- Stephen B. Wicker, Stephanie M. Santoso:
Access to the internet is a human right. 43-46
- Dan Geer:
Resolved: the internet is no place for critical infrastructure. 48-53 - Bill Hsu, Marc Sosnick-Pérez:
Real-time GPU audio. 54-62 - Mark Cavage:
There is no getting around it: you are building a distributed system. 63-70
- Ognjen Scekic
, Hong Linh Truong
, Schahram Dustdar
:
Incentives and rewarding in social computing. 72-82 - Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim A. Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra:
Consequence analysis of complex events on critical U.S. infrastructure. 83-91