default search action
Communications of the ACM, Volume 63
Volume 63, Number 1, January 2020
- Andrew A. Chien:
Cracks in open collaboration in universities. 5
- Moshe Y. Vardi:
Publish and perish. 7
- Bertrand Meyer:
In search of the shortest possible schedule. 8-9
- Erica Klarreich:
Multiplication hits the speed limit. 11-13 - Logan Kugler:
How the internet spans the globe. 14-16 - Samuel Greengard:
Will deepfakes do deep damage? 17-19
- Elizabeth E. Joh:
Increasing automation in policing. 20-22
- Michael A. Cusumano:
'Platformizing' a bad business does not make it a good business. 23-25
- Thomas Haigh, Mark Priestley:
von Neumann thought Turing's universal machine was 'simple and neat.': but that didn't tell him how to design a computer. 26-32
- Johannes Himmelreich:
Ethics of technology needs more political philosophy. 33-35 - James W. Davis, Jeff Hachtel:
A* search: what's in a name? 36-37
- Sanjay Sha:
The reliability of enterprise applications. 38-45 - Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? 46-53 - Pat Helland:
Space time discontinuum. 54-56
- Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang:
Dependability in edge computing. 58-66
- Mengnan Du, Ninghao Liu, Xia Hu:
Techniques for interpretable machine learning. 68-77 - Sergio Rajsbaum, Michel Raynal:
Mastering concurrent computing through sequential thinking. 78-87
- Mark Guzdial:
Technical perspective: Is there a geek gene? 90 - Elizabeth Patitsas, Jesse Berlin, Michelle Craig, Steve Easterbrook:
Evidence that computer science grades are not bimodal. 91-98
- Dennis E. Shasha:
Feedback for foxes.
Volume 63, Number 2, February 2020
- Cherri M. Pancake:
Start small, then achieve big impact. 5
- Vinton G. Cerf:
On durability. 7
- Mark Guzdial:
Sizing the U.S. student cohort for computer science. 10-11
- Chris Edwards:
Learning to trust quantum computers. 13-15 - Paul Marks:
Dark web's doppelgängers aim to dupe antifraud systems. 16-18 - Keith Kirkpatrick:
Tracking shoppers. 19-21
- Carlos Iglesias, Dhanaraj Thakur, Michael L. Best:
Are we losing momentum? 22-24
- Nancy Leveson:
Are you sure your software will not kill anyone? 25-28
- George V. Neville-Neil:
Numbers are for computers, strings are for humans. 29-30
- Yen-Chia Hsu, Illah R. Nourbakhsh:
When human-computer interaction meets community citizen science. 31-34 - Clif Kussmaul:
Guiding students to develop essential skills. 35-37
- Jessie Frazelle:
Opening up the baseboard management controller. 38-40 - Matt Godbolt:
Optimizations in C++ compilers. 41-49
- Ricardo Bianchini, Marcus Fontoura, Eli Cortez, Anand Bonde, Alexandre Muzio, Ana-Maria Constantin, Thomas Moscibroda, Gabriel Magalhães, Girish Bablani, Mark Russinovich:
Toward ML-centric cloud platforms. 50-59 - Thomas Olsson, Jukka Huhtamäki, Hannu Kärkkäinen:
Directions for professional social matching systems. 60-69
- Patrice Godefroid:
Fuzzing: hack, art, and science. 70-76
- Marco Gruteser:
Lighting the way to visual privacy: technical perspective. 80 - Shilin Zhu, Chi Zhang, Xinyu Zhang:
Automating visual privacy protection using a smart LED. 81-89
- Leah Hoffmann:
'Everything fails all the time'.
Volume 63, Number 3, March 2020
- Moshe Y. Vardi:
Advancing computing as a science and profession: but to what end? 5
- CACM Staff:
Conferences and carbon impact. 6-7
- Robin K. Hill:
Coding for voting. 8-9
- Samuel Greengard:
Can nanosheet transistors keep Moore's law alive? 10-12 - Don Monroe:
Algorithms to harvest the wind. 13-14 - Keith Kirkpatrick:
Across the language barrier. 15-17
- Michael Lachney, Aman Yadav:
Computing and community in formal education. 18-21
- Peter J. Denning, Dorothy E. Denning:
Dilemmas of artificial intelligence. 22-24
- Omer Reingold:
Through the lens of a passionate theoretician. 25-27 - Kieron O'Hara, Wendy Hall:
Four internets. 28-30 - Marc C. Canellas, Rachel A. Haga:
Unsafe at any level. 31-34 - Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. 35-37
- Jessie Frazelle:
Securing the boot process. 38-42 - Richard I. Cook:
Above the line, below the line. 43-46
- Edmond Awad, Sohan Dsouza, Jean-François Bonnefon, Azim Shariff, Iyad Rahwan:
Crowdsourcing moral machines. 48-55 - Darja Smite, Nils Brede Moe, Marcin Floryan, Georgiana Levinta, Panagiota Chatzipetrou:
Spotify guilds. 56-61 - Jonny Austin, Howard Baker, Thomas Ball, James Devine, Joe Finney, Peli de Halleux, Steve Hodges, Michal Moskal, Gareth Stockdale:
The BBC micro: bit: from the U.K. to the world. 62-69
- Ohad Fried, Jennifer Jacobs, Adam Finkelstein, Maneesh Agrawala:
Editing self-image. 70-79 - Jörg Kienzle, Gunter Mussbacher, Benoît Combemale, Lucy Bastin, Nelly Bencomo, Jean-Michel Bruel, Christoph Becker, Stefanie Betz, Ruzanna Chitchyan, Betty H. C. Cheng, Sonja Klingert, Richard F. Paige, Birgit Penzenstadler, Norbert Seyff, Eugene Syriani, Colin C. Venters:
Toward model-driven sustainability evaluation. 80-91
- Rebecca Isaacs:
Technical perspective: A perspective on pivot tracing. 93 - Jonathan Mace, Ryan Roelke, Rodrigo Fonseca:
Pivot tracing: dynamic causal monitoring for distributed systems. 94-102
- Dennis E. Shasha:
Stopping tyranny.
Volume 63, Number 4, April 2020
Last byte
- Leah Hoffmann:
Reinventing virtual machines. - Cherri M. Pancake:
New ways to think about CS education. 5
- Vinton G. Cerf:
Multisensory adventures. 7
- CACM Staff:
Adding more color to patch picture. 9 - Mark Guzdial:
Teaching teachers to offer STEM to undergrads. 10-11
- Gary Anthes:
Dead languages come to life. 13-15 - Gregory Mone:
Machine learning, meet whiskey. 16-17 - Esther Shein:
How universities deploy student data. 18-20
- Alan Rubel, Kyle M. L. Jones:
The temptation of data-enabled surveillance. 22-24
- Mari Sako:
Artificial intelligence and the future of professional work. 25-27
- George V. Neville-Neil:
Master of tickets. 28-29
- Gaurav Banga:
Why is cybersecurity not a human-scale problem anymore? 30-34 - Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock:
Organizing family support services at ACM conferences. 35-38 - Jerrold M. Grochow:
A taxonomy of automated assistants. 39-41
- Sue Moon, Ann E. Nicholson, Abhik Roychoudhury:
Welcome. 44-46
- Ken-ichi Kawarabayashi:
The NII Shonan meeting in Japan. 48-49 - Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi, Annika Hinze:
Capturing cultural heritage in East Asia and Oceania. 50-52 - Carsten Rudolph, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. 53-54 - Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury:
Singapore's cybersecurity ecosystem. 55-57 - Thomas Ho Chee Tat, George Loh Chee Ping:
Innovating services and digital economy in Singapore. 58-59
- Sintia Teddy-Ang, Abigail Toh:
AI Singapore: empowering a smart nation. 60-63 - Lam Kwok Yan, Campbell Wilson:
Developing AI for law enforcement in Singapore and Australia. 62 - Chris Bain, Abraham Oshni Alvandi:
Digital healthcare across Oceania. 64-67 - Meeyoung Cha, Wei Gao, Cheng-Te Li:
Detecting fake news in social media: an Asia-Pacific perspective. 68-71 - Gernot Heiser, Gerwin Klein, June Andronick:
seL4 in Australia: from research to real-world trustworthy systems. 72-75 - Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. 76-81 - Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, Sunwoo Lee:
5G commercialization and trials in Korea. 82-85 - Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. 86-88
- Laura M. D. Maguire:
Managing the hidden costs of coordination. 90-96 - Marisa R. Grayson:
Cognitive work of hypothesis exploration during anomaly response. 97-103
- Daniel W. Woods, Tyler Moore:
Cyber warranties: market fix or marketing trick? 104-107
- Herbert E. Bruderer:
The Antikythera mechanism. 108-115
- Ariel D. Procaccia:
An answer to fair division's most enigmatic question: technical perspective. 118 - Haris Aziz, Simon Mackenzie:
A bounded and envy-free cake cutting algorithm. 119-126
Volume 63, Number 5, May 2020
- Cherri M. Pancake:
How ACM is adapting in this period of global uncertainties. 5
- Jodi L. Tims:
Partnerships can help drive gender equality. 7 - Moshe Y. Vardi:
Efficiency vs. resilience: what COVID-19 teaches computing. 9
- Gerald Segal:
ACM's 2020 general election. 11-21
- Andrew A. Chien:
Launching a new feature in Communications. 22 - Arquimedes Canedo:
Automating automation: CS at the heart of the manufacturing economy. 23
- Mark Guzdial, Jiajie Zhang:
Teaching CS humbly, and watching the AI revolution. 24-25
- Don Monroe:
A proof from 'the book'. 27-29 - Samuel Greengard:
Will RISC-V revolutionize computing? 30-32 - Keith Kirkpatrick:
Deceiving the masses on social media. 33-35
- C. Scott Hemphill:
What role for antitrust in regulating platforms? 36-38
- Adam Shostack, Mary Ellen Zurko:
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice. 39-41
- Mike Tissenbaum, Anne T. Ottenbreit-Leftwich:
A vision of K - : 12 computer science education for 2030. 42-44
- Aaron Hertzmann:
Computers do not make art, people do. 45-48 - Calvin C. Newport:
When technology goes awry. 49-52
- Jack W. Davidson, Joseph A. Konstan, Scott E. Delman:
ACM publications finances. 53-57
- J. Paul Reed:
Beyond the 'fix-it' treadmill. 58-63 - David D. Woods, John Allspaw:
Revealing the critical role of human performance in software. 64-67
- Stephen B. Wicker, Dipayan P. Ghosh:
Reading in the panopticon - : your kindle may be spying on you, but you can't be sure. 68-73 - Sandra Mattauch, Katja Lohmann, Frank Hannig, Daniel Lohmann, Jürgen Teich:
A bibliometric approach for detecting the gender gap in computer science. 74-80
- Alexandra Chouldechova, Aaron Roth:
A snapshot of the frontiers of fairness in machine learning. 82-89 - Hagit Attiya, Sergio Rajsbaum:
Indistinguishability. 90-99
- Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. 102 - Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating OAuth access token abuse by collusion networks. 103-111
- Dennis E. Shasha:
Optimal chimes. 112
Volume 63, Number 6, June 2020
- Andrew A. Chien:
What do DDT and computing have in common? 5-6
- CACM Staff:
Safety proposal points in same direction. 6
- Vinton G. Cerf:
Implications of the COVID-19 pandemic. 7
- Terrence DeFranco, Jeremy Roschelle:
Detecting/preventing infections, and moving instruction online. 8-9
- Neil Savage:
An animating spirit. 10-12 - Chris Edwards:
Leveraging unlabeled data. 13-14 - Neil Savage:
Seeing through walls. 15-16 - Esther Shein:
Hiring from the autism spectrum. 17-19
- Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han:
How to curtail oversensing in the home. 20-24
- George V. Neville-Neil:
Kode vicious plays in traffic. 25-26
- Peter J. Denning, Ted G. Lewis:
Technology adoption. 27-29
- Janet Siegmund, Norman Peitek, André Brechmann, Chris Parnin, Sven Apel:
Studying programming in the neuroage: just a crazy idea? 30-34 - Meredith Ringel Morris:
AI and accessibility. 35-37
- Jessie Frazelle:
Commit to memory. 38-41 - Thomas A. Limoncelli:
Communicate using the numbers 1, 2, 3, and more. 42-44
- Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. 46-56 - Alan Borning, Batya Friedman, Nick Logler:
The 'invisible' materiality of information technology. 57-64