


Остановите войну!
for scientists:


default search action
Communications of the ACM, Volume 57
Volume 57, Number 1, January 2014
- Moshe Y. Vardi:
Scalable conferences. 5
- Vinton G. Cerf:
Virtual reality redux. 7 - Nominees for elections and report of the ACM nominating committee. 8
- ACM's FY13 annual report. 9-14
- U.S. does not control the internet. 16-17
- Mark Guzdial
, Joel C. Adams:
MOOCs need more work; so do CS graduates. 18-19
- Gary Anthes:
French team invents faster code-breaking algorithm. 21-23 - Tom Geller:
How do you feel?: your computer knows. 24-26 - Paul Hyman:
'Peace technologies' enable eyewitness reporting when disasters strike. 27-29
- Michael A. Cusumano:
The legacy of Steve Ballmer. 30-32
- Christopher S. Yoo:
Toward a closer integration of law and computer science. 33-35
- Thomas Haigh:
Actually, Turing did not invent the computer. 36-41
- Phillip G. Armour:
Estimation is not evil. 42-43
- Doug Terry:
Publish now, judge later. 44-46
- Alex E. Bell:
The software inferno. 48-53 - Jason Lango:
Toward software-defined SLAs. 54-60 - Anil Madhavapeddy, David J. Scott:
Unikernels: the rise of the virtual library operating system. 61-69
- Kenton O'Hara, Gerardo Gonzalez, Abigail Sellen, Graeme P. Penney, Andreas Varnavas, Helena M. Mentis, Antonio Criminisi, Robert Corish, Mark Rouncefield, Neville Dastur, Tom Carrell:
Touchless interaction in surgery. 70-77 - Jessica Pu Li, Arun Vishwanath, H. Raghav Rao:
Retweeting the Fukushima nuclear radiation disaster. 78-85 - Vincent Gramoli, Rachid Guerraoui
:
Democratizing transactional programming. 86-93
- Xuedong Huang, James Baker, Raj Reddy:
A historical perspective of speech recognition. 94-103
- Subramanian S. Iyer:
Silicon stress: technical perspective. 106 - Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim
:
TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC. 107-115
- G. Seth Shostak:
Future tense. 128-
Volume 57, Number 2, February 2014
- Andrew D. McGettrick:
Education, always. 5
- Vinton G. Cerf:
Cognitive implants. 7
- Contribute more than algorithmic speculation. 9
- Philip J. Guo:
Clarifying human-computer interaction. 10-11
- Don Monroe:
A new type of mathematics? 13-15 - Esther Shein:
Should everybody learn to code? 16-18 - Samuel Greengard:
Computational photography comes into focus. 19-21 - ACM fellows inducted. 22
- Diana L. Burley, Jon Eisenberg, Seymour E. Goodman:
Would cybersecurity professionalization help address the cybersecurity crisis? 24-27
- Tim Bell:
Establishing a nationwide CS curriculum in New Zealand high schools. 28-30
- William Young, Nancy G. Leveson:
An integrated approach to safety and security based on systems theory. 31-35
- George V. Neville-Neil:
Bugs and bragging rights. 36-37
- Marco Ceccagnoli, Chris Forman, Peng Huang
, D. J. Wu:
Digital platforms: when is participation valuable? 38-39
- Stephen J. Andriole:
Ready technology. 40-42
- Kiran Prasad, Kelly Norton, Terry Coatta:
Node at LinkedIn: the pursuit of thinner, lighter, faster. 44-51 - Poul-Henning Kamp:
Center wheel for success. 52-54 - Zachary Hensley, Jibonananda Sanyal
, Joshua R. New
:
Provenance in sensor data management. 55-62
- Gerard J. Holzmann:
Mars code. 64-73 - Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. 74-84 - Silvio Micali, Michael O. Rabin:
Cryptography miracles, secure auctions, matching problem verification. 85-93
- Reinhard Wilhelm, Daniel Grund:
Computation takes time, but how much? 94-103
- Michael W. Mahoney:
A new spin on an old algorithm: technical perspective. 106 - Grey Ballard
, James Demmel, Olga Holtz
, Oded Schwartz:
Communication costs of Strassen's matrix multiplication. 107-114
- Peter Winkler:
Puzzled: Lowest Number Wins. 120
Volume 57, Number 3, March 2014
- Moshe Y. Vardi:
Boolean satisfiability: theory and engineering. 5
- Vinton G. Cerf:
What if it's us? 7
- Develop research culture in the Arab Middle East. 9
- Kate Matsudaira:
Capturing and structuring data mined from the web. 10-11
- Erica Klarreich:
Reading brains. 12-14 - Keith Kirkpatrick:
World without wires. 15-17 - Neil Savage:
Playing at health. 18-19
- Pamela Samuelson:
Mass digitization as fair use. 20-22
- Arvind Narayanan, Shannon Vallor
:
Why software engineering courses should include ethics coverage. 23-25
- Peter J. Denning:
'Surfing toward the future'. 26-29
- Richard E. Ladner:
The impact of the United Nations convention on the rights of persons with disabilities. 30-32
- David A. Patterson:
How to build a bad research center. 33-36
- Wojciech M. Golab, Muntasir Raihan Rahman, Alvin AuYoung, Kimberly Keeton
, Xiaozhou (Steve) Li:
Eventually consistent: not what you were expecting? 38-44 - Robert F. Sproull, Jim Waldo:
The API performance contract. 45-51 - Andi Kleen:
Scaling existing lock-based applications with lock elision. 52-56
- Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu:
Making parallel programs reliable with stable multithreading. 58-69 - Christine Alvarado, Eugene Judson:
Using targeted conferences to recruit women into computer science. 70-77 - Gang-Hoon Kim, Silvana Trimi
, Ji-Hyong Chung:
Big-data applications in the government sector. 78-85
- Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski
:
Trends in steganography. 86-95
- Dan S. Wallach:
Smartphone security 'taint' what it used to be: technical perspective. 98 - William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. 99-106
- Peter Winkler:
Puzzled: Solutions and sources. 109 - Leah Hoffmann:
Q&A: RISC and reward. 112-
Volume 57, Number 4, April 2014
- Alfred V. Aho, Georg Gottlob
:
A front row seat to Communications' editorial transformation. 5
- Vinton G. Cerf:
The internet governance ecosystem. 7
- Code that missed Mars. 9
- Mark Guzdial
, Daniel Reed:
Eyes forward. 10-11
- Chris Edwards:
Using patient data for personalized cancer treatments. 13-15 - Paul Hyman:
Speech-to-speech translations stutter, but researchers see mellifluous future. 16-19 - Gregory Mone:
New models in cosmetics replacing animal testing. 20-21
- Michael A. Cusumano:
MOOCs revisited, with some policy suggestions. 24-26
- Michael L. Best:
Thinking outside the continent. 27-29
- George V. Neville-Neil:
This is the foo field. 30-31
- Deborah Estrin:
Small data, where n = me. 32-34 - Uzi Vishkin:
Is multicore hardware for general-purpose parallel processing broken? 35-39
- Paul Vixie:
Rate-limiting state. 40-43 - Ivar Jacobson, Pan Wei Ng, Ian Spence, Paul McMahon:
Major-league SEMAT: why should an executive care? 44-50 - Christoph Paasch, Olivier Bonaventure:
Multipath TCP. 51-57
- Daniel T. Seaton, Yoav Bergner
, Isaac L. Chuang, Piotr Mitros, David E. Pritchard:
Who does what in a massive open online course? 58-65 - Jeremy Avigad, John Harrison:
Formally verified mathematics. 66-75 - Martin Odersky, Tiark Rompf:
Unifying functional and object-oriented programming with Scala. 76-86
- Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. 88-96
- Joe Warren:
A 'reasonable' solution to deformation methods: technical perspective. 98 - Alec Jacobson, Ilya Baran, Jovan Popovic, Olga Sorkine-Hornung:
Bounded biharmonic weights for real-time deformation. 99-106
- Ken MacLeod:
Future Tense: Re: Search. 112-
Volume 57, Number 5, May 2014
- Moshe Y. Vardi:
Moore's law and the sand-heap paradox. 5
- Vinton G. Cerf:
Sometimes it takes some time! 7
- Know your steganographic enemy. 8
- ACM's 2014 general election: please take this opportunity to vote. 9-17
- Judy Robertson:
Rethinking how to teach programming to newcomers. 18-19
- Samuel Greengard:
How computers are changing biology. 21-23 - Tom Geller:
The forever disc. 24-26 - Keith Kirkpatrick:
Technology confounds the courts. 27-29
- Marshall W. van Alstyne:
Why Bitcoin has value. 30-32
- Ben Depoorter:
What happened to video game piracy? 33-34
- David Anderson:
Tom Kilburn: a tale of five computers. 35-38
- Steve Cooper, Shuchi Grover, Beth Simon:
Building a virtual community of practice for K-12 CS teachers. 39-41
- Ruzena Bajcsy:
Robots are coming. 42-43
- Bob Toxen:
The NSA and Snowden: securing the all-seeing eye. 44-51 - Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway
, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
A primer on provenance. 52-60 - Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen:
Don't settle for eventual consistency. 61-68
- Shimeon Pass, Boaz Ronen:
Reducing the software value gap. 80-87 - Manlu Liu, Sean Hansen, Qiang Tu:
The community source approach to software development and the Kuali experience. 88-96
- Kevin Leyton-Brown
, Holger H. Hoos
, Frank Hutter, Lin Xu:
Understanding the empirical hardness of NP-complete problems. 98-107
- Ari Juels, Bonnie Wong:
The interplay of neuroscience and cryptography: technical perspective. 109 - Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. 110-118
- Peter Winkler:
Puzzled: A Sort, of Sorts. 120
Volume 57, Number 6, June 2014
- Mehran Sahami, Steve Roach:
Computer science curricula 2013 released. 5
- Vinton G. Cerf:
The house elves of ACM. 7
- Efficient code to counter dying Moore's Law. 9
- Daniel Reed, Chris Stephenson:
First impressions, unexpected benefits. 10-11
- Don Monroe:
Neuromorphic computing gets ready for the (really) big time. 13-15 - Neil Savage:
Time for a change. 16-18 - Visualizations make big data meaningful. 19-21
- Neil Savage:
General agreement. 22-23
- Ross J. Anderson, Steven J. Murdoch
:
EMV: why payment systems fail. 24-28
- Phillip G. Armour:
Owning and using. 29-30
- Dinei Florêncio, Cormac Herley, Adam Shostack:
FUD: a plea for intolerance. 31-33
- Peter J. Denning:
Avalanches are coming. 34-36
- George V. Neville-Neil:
The logic of logging. 37-38
- Charles K. Davis:
Beyond data and analysis. 39-41
- Andy Gill:
Domain-specific languages and code synthesis using Haskell. 42-49 - Erik Meijer:
The curse of the excluded middle. 50-55 - Bo Joel Svensson, Mary Sheeran, Ryan R. Newton:
Design exploration through code-generating DSLs. 56-63
- Christos Siaterlis, Béla Genge:
Cyber-physical testbeds. 64-73 - Weiguo Fan
, Michael D. Gordon:
The power of social media analytics. 74-81 - Daniela K. Rosner, Marco Roccetti
, Gustavo Marfia
:
The digitization of cultural practices. 82-87
- Peter M. Musial, Nicolas C. Nicolaou, Alexander A. Shvartsman
:
Implementing distributed shared memory for dynamic networks. 88-98
- Michiel van de Panne:
Motion fields for interactive character animation: technical perspective. 100 - Yongjoon Lee, Kevin Wampler, Gilbert Bernstein, Jovan Popovic, Zoran Popovic:
Motion fields for interactive character locomotion. 101-108
- Peter Winkler:
Puzzled: Solutions and sources. 110