callback( { "result":{ "query":":facetid:toc:\"db/journals/cacm/cacm55.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.84" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"306", "@dc":"306", "@oc":"306", "@id":"43426106", "text":":facetid:toc:db/journals/cacm/cacm55.bht" } }, "hits":{ "@total":"306", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4280019", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Process mining.","venue":"Commun. ACM","volume":"55","number":"8","pages":"76-83","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Aalst12","doi":"10.1145/2240236.2240257","ee":"https://doi.org/10.1145/2240236.2240257","url":"https://dblp.org/rec/journals/cacm/Aalst12"}, "url":"URL#4280019" }, { "@score":"1", "@id":"4280020", "info":{"authors":{"author":[{"@pid":"56/1358","text":"Scott Aaronson"},{"@pid":"49/7029","text":"Edward Farhi"},{"@pid":"48/7411","text":"David Gosset"},{"@pid":"16/2522","text":"Avinatan Hassidim"},{"@pid":"64/4772","text":"Jonathan A. Kelner"},{"@pid":"86/3271","text":"Andrew Lutomirski"}]},"title":"Quantum money.","venue":"Commun. ACM","volume":"55","number":"8","pages":"84-92","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AaronsonFGHKL12","doi":"10.1145/2240236.2240258","ee":"https://doi.org/10.1145/2240236.2240258","url":"https://dblp.org/rec/journals/cacm/AaronsonFGHKL12"}, "url":"URL#4280020" }, { "@score":"1", "@id":"4280021", "info":{"authors":{"author":[{"@pid":"a/JamesAbello","text":"James Abello"},{"@pid":"94/860","text":"Peter Broadwell"},{"@pid":"116/5208","text":"Timothy R. Tangherlini"}]},"title":"Computational folkloristics.","venue":"Commun. ACM","volume":"55","number":"7","pages":"60-70","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AbelloBT12","doi":"10.1145/2209249.2209267","ee":"https://doi.org/10.1145/2209249.2209267","url":"https://dblp.org/rec/journals/cacm/AbelloBT12"}, "url":"URL#4280021" }, { "@score":"1", "@id":"4280022", "info":{"authors":{"author":[{"@pid":"58/2989","text":"Dennis Abts"},{"@pid":"99/11307","text":"Bob Felderman"}]},"title":"A guided tour of data-center networking.","venue":"Commun. ACM","volume":"55","number":"6","pages":"44-51","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AbtsF12","doi":"10.1145/2184319.2184335","ee":"https://doi.org/10.1145/2184319.2184335","url":"https://dblp.org/rec/journals/cacm/AbtsF12"}, "url":"URL#4280022" }, { "@score":"1", "@id":"4280023", "info":{"authors":{"author":[{"@pid":"04/5122","text":"Andrew Adams"},{"@pid":"21/1524","text":"David E. Jacobs"},{"@pid":"62/7188","text":"Jennifer Dolson"},{"@pid":"57/2376","text":"Marius Tico"},{"@pid":"61/5171","text":"Kari Pulli"},{"@pid":"81/4835","text":"Eino-Ville Talvala"},{"@pid":"64/4380","text":"Boris Ajdin"},{"@pid":"46/2513","text":"Daniel A. Vaquero"},{"@pid":"99/6552","text":"Hendrik P. A. Lensch"},{"@pid":"h/MarkHorowitz","text":"Mark Horowitz"},{"@pid":"28/7369","text":"Sung Hee Park"},{"@pid":"23/4780","text":"Natasha Gelfand"},{"@pid":"61/8293","text":"Jongmin Baek"},{"@pid":"21/6486","text":"Wojciech Matusik"},{"@pid":"l/MarcLevoy","text":"Marc Levoy"}]},"title":"The Frankencamera: an experimental platform for computational photography.","venue":"Commun. ACM","volume":"55","number":"11","pages":"90-98","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AdamsJDTPTAVLHPGBML12","doi":"10.1145/2366316.2366339","ee":"https://doi.org/10.1145/2366316.2366339","url":"https://dblp.org/rec/journals/cacm/AdamsJDTPTAVLHPGBML12"}, "url":"URL#4280023" }, { "@score":"1", "@id":"4280024", "info":{"authors":{"author":[{"@pid":"49/6566","text":"Bryce Allen"},{"@pid":"15/5040","text":"John Bresnahan"},{"@pid":"71/8523","text":"Lisa Childers"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"},{"@pid":"95/1036","text":"Gopi Kandaswamy"},{"@pid":"93/756","text":"Rajkumar Kettimuthu"},{"@pid":"91/10841","text":"Jack Kordas"},{"@pid":"33/10842","text":"Mike Link"},{"@pid":"28/997","text":"Stuart Martin"},{"@pid":"95/10841","text":"Karl Pickett"},{"@pid":"63/5605","text":"Steven Tuecke"}]},"title":"Software as a service for data scientists.","venue":"Commun. ACM","volume":"55","number":"2","pages":"81-88","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AllenBCFKKKLMPT12","doi":"10.1145/2076450.2076468","ee":"https://doi.org/10.1145/2076450.2076468","url":"https://dblp.org/rec/journals/cacm/AllenBCFKKKLMPT12"}, "url":"URL#4280024" }, { "@score":"1", "@id":"4280025", "info":{"authors":{"author":{"@pid":"71/1984","text":"Eric Allman"}},"title":"Managing technical debt.","venue":"Commun. ACM","volume":"55","number":"5","pages":"50-55","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Allman12","doi":"10.1145/2160718.2160733","ee":"https://doi.org/10.1145/2160718.2160733","url":"https://dblp.org/rec/journals/cacm/Allman12"}, "url":"URL#4280025" }, { "@score":"1", "@id":"4280026", "info":{"authors":{"author":{"@pid":"119/8602","text":"John Allspaw"}},"title":"Fault injection in production.","venue":"Commun. ACM","volume":"55","number":"10","pages":"48-52","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Allspaw12","doi":"10.1145/2347736.2347751","ee":"https://doi.org/10.1145/2347736.2347751","url":"https://dblp.org/rec/journals/cacm/Allspaw12"}, "url":"URL#4280026" }, { "@score":"1", "@id":"4280027", "info":{"authors":{"author":{"@pid":"59/2321-1","text":"David Anderson 0001"}},"title":"The future of the past.","venue":"Commun. ACM","volume":"55","number":"5","pages":"33-34","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anderson12","doi":"10.1145/2160718.2160728","ee":"https://doi.org/10.1145/2160718.2160728","url":"https://dblp.org/rec/journals/cacm/Anderson12"}, "url":"URL#4280027" }, { "@score":"1", "@id":"4280028", "info":{"authors":{"author":{"@pid":"59/2321-1","text":"David Anderson 0001"}},"title":"Saving private Gromit.","venue":"Commun. ACM","volume":"55","number":"12","pages":"28-30","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anderson12a","doi":"10.1145/2380656.2380666","ee":"https://doi.org/10.1145/2380656.2380666","url":"https://dblp.org/rec/journals/cacm/Anderson12a"}, "url":"URL#4280028" }, { "@score":"1", "@id":"4280029", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"Revamping storage performance.","venue":"Commun. ACM","volume":"55","number":"1","pages":"20-22","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12","doi":"10.1145/2063176.2063183","ee":"https://doi.org/10.1145/2063176.2063183","url":"https://dblp.org/rec/journals/cacm/Anthes12"}, "url":"URL#4280029" }, { "@score":"1", "@id":"4280030", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"Computing with magnets.","venue":"Commun. ACM","volume":"55","number":"3","pages":"16-18","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12a","doi":"10.1145/2093548.2093554","ee":"https://doi.org/10.1145/2093548.2093554","url":"https://dblp.org/rec/journals/cacm/Anthes12a"}, "url":"URL#4280030" }, { "@score":"1", "@id":"4280031", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"Smarter photography.","venue":"Commun. ACM","volume":"55","number":"6","pages":"16-18","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12b","doi":"10.1145/2184319.2184325","ee":"https://doi.org/10.1145/2184319.2184325","url":"https://dblp.org/rec/journals/cacm/Anthes12b"}, "url":"URL#4280031" }, { "@score":"1", "@id":"4280032", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"HTML5 leads a web revolution.","venue":"Commun. ACM","volume":"55","number":"7","pages":"16-17","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12c","doi":"10.1145/2209249.2209256","ee":"https://doi.org/10.1145/2209249.2209256","url":"https://dblp.org/rec/journals/cacm/Anthes12c"}, "url":"URL#4280032" }, { "@score":"1", "@id":"4280033", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"Chips go upscale.","venue":"Commun. ACM","volume":"55","number":"9","pages":"14-16","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12d","doi":"10.1145/2330667.2330673","ee":"https://doi.org/10.1145/2330667.2330673","url":"https://dblp.org/rec/journals/cacm/Anthes12d"}, "url":"URL#4280033" }, { "@score":"1", "@id":"4280034", "info":{"authors":{"author":{"@pid":"18/7593","text":"Gary Anthes"}},"title":"Zoom in, zoom out.","venue":"Commun. ACM","volume":"55","number":"12","pages":"18-19","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Anthes12e","doi":"10.1145/2380656.2380663","ee":"https://doi.org/10.1145/2380656.2380663","url":"https://dblp.org/rec/journals/cacm/Anthes12e"}, "url":"URL#4280034" }, { "@score":"1", "@id":"4280035", "info":{"authors":{"author":{"@pid":"27/763","text":"Phillip G. Armour"}},"title":"The difference engine.","venue":"Commun. ACM","volume":"55","number":"1","pages":"33-34","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Armour12","doi":"10.1145/2063176.2063191","ee":"https://doi.org/10.1145/2063176.2063191","url":"https://dblp.org/rec/journals/cacm/Armour12"}, "url":"URL#4280035" }, { "@score":"1", "@id":"4280036", "info":{"authors":{"author":{"@pid":"27/763","text":"Phillip G. Armour"}},"title":"A measure of control.","venue":"Commun. ACM","volume":"55","number":"6","pages":"26-28","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Armour12a","doi":"10.1145/2184319.2184329","ee":"https://doi.org/10.1145/2184319.2184329","url":"https://dblp.org/rec/journals/cacm/Armour12a"}, "url":"URL#4280036" }, { "@score":"1", "@id":"4280037", "info":{"authors":{"author":{"@pid":"27/763","text":"Phillip G. Armour"}},"title":"The Goldilocks estimate.","venue":"Commun. ACM","volume":"55","number":"10","pages":"24-25","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Armour12b","doi":"10.1145/2347736.2347745","ee":"https://doi.org/10.1145/2347736.2347745","url":"https://dblp.org/rec/journals/cacm/Armour12b"}, "url":"URL#4280037" }, { "@score":"1", "@id":"4280038", "info":{"authors":{"author":[{"@pid":"29/8065","text":"Nir Atias"},{"@pid":"05/902","text":"Roded Sharan"}]},"title":"Comparative analysis of protein networks: hard problems, practical solutions.","venue":"Commun. ACM","volume":"55","number":"5","pages":"88-97","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AtiasS12","doi":"10.1145/2160718.2160738","ee":"https://doi.org/10.1145/2160718.2160738","url":"https://dblp.org/rec/journals/cacm/AtiasS12"}, "url":"URL#4280038" }, { "@score":"1", "@id":"4280039", "info":{"authors":{"author":[{"@pid":"21/7662","text":"Amittai Aviram"},{"@pid":"54/1737","text":"Shu-Chun Weng"},{"@pid":"53/7997","text":"Sen Hu"},{"@pid":"f/BryanFord","text":"Bryan Ford"}]},"title":"Efficient system-enforced deterministic parallelism.","venue":"Commun. ACM","volume":"55","number":"5","pages":"111-119","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/AviramWHF12","doi":"10.1145/2160718.2160742","ee":"https://doi.org/10.1145/2160718.2160742","url":"https://dblp.org/rec/journals/cacm/AviramWHF12"}, "url":"URL#4280039" }, { "@score":"1", "@id":"4280040", "info":{"authors":{"author":[{"@pid":"b/DavidABasin","text":"David A. Basin"},{"@pid":"51/1639","text":"Srdjan Capkun"}]},"title":"The research value of publishing attacks.","venue":"Commun. ACM","volume":"55","number":"11","pages":"22-24","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/BasinC12","doi":"10.1145/2366316.2366324","ee":"https://doi.org/10.1145/2366316.2366324","url":"https://dblp.org/rec/journals/cacm/BasinC12"}, "url":"URL#4280040" }, { "@score":"1", "@id":"4280041", "info":{"authors":{"author":{"@pid":"11/5659","text":"Brian Beckman"}},"title":"Why LINQ matters: cloud composability guaranteed.","venue":"Commun. ACM","volume":"55","number":"4","pages":"38-44","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Beckman12","doi":"10.1145/2133806.2133820","ee":"https://doi.org/10.1145/2133806.2133820","url":"https://dblp.org/rec/journals/cacm/Beckman12"}, "url":"URL#4280041" }, { "@score":"1", "@id":"4280042", "info":{"authors":{"author":{"@pid":"98/4487","text":"Emery D. Berger"}},"title":"Software needs seatbelts and airbags.","venue":"Commun. ACM","volume":"55","number":"9","pages":"48-53","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Berger12","doi":"10.1145/2330667.2330683","ee":"https://doi.org/10.1145/2330667.2330683","url":"https://dblp.org/rec/journals/cacm/Berger12"}, "url":"URL#4280042" }, { "@score":"1", "@id":"4280043", "info":{"authors":{"author":[{"@pid":"b/AbrahamBernstein","text":"Abraham Bernstein"},{"@pid":"74/2158","text":"Mark Klein"},{"@pid":"m/ThomasWMalone","text":"Thomas W. Malone"}]},"title":"Programming the global brain.","venue":"Commun. ACM","volume":"55","number":"5","pages":"41-43","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/BernsteinKM12","doi":"10.1145/2160718.2160731","ee":"https://doi.org/10.1145/2160718.2160731","url":"https://dblp.org/rec/journals/cacm/BernsteinKM12"}, "url":"URL#4280043" }, { "@score":"1", "@id":"4280044", "info":{"authors":{"author":{"@pid":"17/696","text":"Jean-François Blanchette"}},"title":"Computing as if infrastructure mattered.","venue":"Commun. ACM","volume":"55","number":"10","pages":"32-34","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Blanchette12","doi":"10.1145/2347736.2347748","ee":"https://doi.org/10.1145/2347736.2347748","url":"https://dblp.org/rec/journals/cacm/Blanchette12"}, "url":"URL#4280044" }, { "@score":"1", "@id":"4280045", "info":{"authors":{"author":{"@pid":"86/1910","text":"David M. Blei"}},"title":"Probabilistic topic models.","venue":"Commun. ACM","volume":"55","number":"4","pages":"77-84","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Blei12","doi":"10.1145/2133806.2133826","ee":"https://doi.org/10.1145/2133806.2133826","url":"https://dblp.org/rec/journals/cacm/Blei12"}, "url":"URL#4280045" }, { "@score":"1", "@id":"4280046", "info":{"authors":{"author":{"@pid":"20/1858","text":"Rastislav Bodík"}},"title":"Compiling what to how: technical perspective.","venue":"Commun. ACM","volume":"55","number":"2","pages":"102","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/Bodik12","doi":"10.1145/2076450.2076471","ee":"https://doi.org/10.1145/2076450.2076471","url":"https://dblp.org/rec/journals/cacm/Bodik12"}, "url":"URL#4280046" }, { "@score":"1", "@id":"4280047", "info":{"authors":{"author":[{"@pid":"43/2339","text":"Hans-Juergen Boehm"},{"@pid":"97/4181","text":"Sarita V. Adve"}]},"title":"You don't know jack about shared variables or memory models.","venue":"Commun. ACM","volume":"55","number":"2","pages":"48-54","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/BoehmA12","doi":"10.1145/2076450.2076465","ee":"https://doi.org/10.1145/2076450.2076465","url":"https://dblp.org/rec/journals/cacm/BoehmA12"}, "url":"URL#4280047" }, { "@score":"1", "@id":"4280048", "info":{"authors":{"author":[{"@pid":"b/DanBoneh","text":"Dan Boneh"},{"@pid":"s/AmitSahai","text":"Amit Sahai"},{"@pid":"w/BrentWaters","text":"Brent Waters"}]},"title":"Functional encryption: a new vision for public-key cryptography.","venue":"Commun. ACM","volume":"55","number":"11","pages":"56-64","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cacm/BonehSW12","doi":"10.1145/2366316.2366333","ee":"https://doi.org/10.1145/2366316.2366333","url":"https://dblp.org/rec/journals/cacm/BonehSW12"}, "url":"URL#4280048" } ] } } } )