default search action
Communications of the ACM, Volume 58
Volume 58, Number 1, January 2015
- Moshe Y. Vardi:
The rise and fall of industrial research labs. 5 - Vinton G. Cerf:
A long way to have come and still to go. 7
- Toward a map interface not inherently related to geography. 8-9
- ACM's FY14 annual report. 11-15
- Valerie Barr, Michael Stonebraker:
A valuable lesson, and whither Hadoop? 18-19
- Erica Klarreich:
In search of Bayesian inference. 21-24 - Samuel Greengard:
Smart transportation networks drive gains. 25-27 - Gary Anthes:
Data brokers are watching you. 28-30 - Lawrence M. Fisher:
Google Boosts ACM's Turing award prize to $1 million. 31
- Michael A. Cusumano:
How traditional firms must compete in the sharing economy. 32-34
- Lee A. Bygrave:
A right to be forgotten? 35-37
- Phillip G. Armour:
A little queue theory. 38-39
- Thomas Haigh:
The tears of Donald Knuth. 40-44
- Reza Rawassizadeh, Blaine A. Price, Marian Petre:
Wearables: has the age of smartwatches finally arrived? 45-47 - Hermann Maurer:
Does the internet make us stupid? 48-51 - Silvio Micali:
What it means to receive the Turing award. 52-53
- Rick Richardson:
Disambiguating databases. 54-61 - Geetanjali Sampemane:
Internal access controls. 62-65 - Davidlohr Bueso:
Scalability techniques for practical synchronization primitives. 66-74
- Virender Singh, Alicia Perdigones, José Luis García, Ignacio Cañas-Guerrero, Fernando R. Mazarrón:
Analyzing worldwide research in hardware architecture, 1997-2011. 76-85 - Tuukka Ruotsalo, Giulio Jacucci, Petri Myllymäki, Samuel Kaski:
Interactive intent modeling: information discovery beyond search. 86-92
- Ravi Nair:
Big data needs approximate computing: technical perspective. 104 - Hadi Esmaeilzadeh, Adrian Sampson, Luis Ceze, Doug Burger:
Neural acceleration for general-purpose approximate programs. 105-115
- William Sims Bainbridge:
Future tense. 128-
Volume 58, Number 2, February 2015
- Moshe Y. Vardi:
Is information technology destroying the middle class? 5 - Vinton G. Cerf:
There is nothing new under the sun. 7
- Software engineering, like electrical engineering. 8-9
- Mark Guzdial:
What's the best way to teach computer science to beginners? 12-13
- Neil Savage:
Visualizing sound. 15-17 - Logan Kugler:
Online privacy: regional differences. 18-20 - Keith Kirkpatrick:
Using technology to help people. 21-23
- Carl E. Landwehr:
We need a building code for building code. 24-26
- Ming Zeng:
Three paradoxes of building platforms. 27-29
- Peter G. Neumann:
Far-sighted thinking about deleterious computer-related events. 30-33
- Diana Franklin:
Putting the computer science in computing education research. 34-36
- George V. Neville-Neil:
Too big to fail. 37-39
- Armando Fox, David A. Patterson:
Do-it-yourself textbook publishing. 40-43 - Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ondrej Lhoták, José Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, Dimitrios Vardoulakis:
In defense of soundiness: a manifesto. 44-46
- Harlan Stenn:
Securing network time protocol. 48-51 - Robert V. Binder, Bruno Legeard, Anne Kramer:
Model-based testing: where does it stand? 52-56
- Carlos Juiz, Mark Toomey:
To govern IT, or not to govern IT? 58-64 - Dalal Alrajeh, Jeff Kramer, Alessandra Russo, Sebastián Uchitel:
Automated support for diagnosis and repair. 65-72
- Michael Walfish, Andrew J. Blumberg:
Verifying computations without reexecuting them. 74-84
- Thomas A. Henzinger, Jean-François Raskin:
The equivalence problem for finite automata: technical perspective. 86 - Filippo Bonchi, Damien Pous:
Hacking nondeterminism with induction and coinduction. 87-95
- Dennis E. Shasha:
Upstart Puzzles: Take Your Seats. 104
Volume 58, Number 3, March 2015
- Wayne Graves:
Raising ACM's Digital Library. 5
- Make abstracts communicate results. 6
- Vinton G. Cerf:
'As we may think'. 7
- Valerie Barr, Mark Guzdial:
Advice on teaching CS, and the learnability of programming languages. 8-9
- Keith Kirkpatrick:
Automating organic synthesis. 13-15 - Tom Geller:
Car talk. 16-18 - Esther Shein:
Python for beginners. 19-21
- Pamela Samuelson:
Copyrightability of Java APIs revisited. 22-24
- Thomas J. Cortina:
Reaching a broader population of students through "unplugged" activities. 25-27
- Peter J. Denning, Edward E. Gordon:
A technician shortage. 28-30
- John Leslie King:
Humans in computing: growing responsibilities for researchers. 31-33
- Shriram Krishnamurthi, Jan Vitek:
The real software crisis: repeatability as a core value. 34-36 - Maarten Bullynck, Edgar G. Daylight, Liesbeth De Mol:
Why did computer science make a hero out of Turing? 37-39
- Poul-Henning Kamp:
HTTP/2.0: the IETF is phoning it in. 40-42 - Dave Long:
META II: digital vellum in the digital scriptorium. 43-48
- Stephen J. Andriole:
Who owns IT? 50-57
- Timothy Libert:
Privacy implications of health information seeking on the web. 68-77
- Edward H. Adelson:
Image processing goes back to basics: technical perspective. 80 - Sylvain Paris, Samuel W. Hasinoff, Jan Kautz:
Local Laplacian filters: edge-aware image processing with a Laplacian pyramid. 81-91
- Leah Hoffmann:
Q&A. 96-
Volume 58, Number 4, April 2015
- Joseph A. Konstan, Jack W. Davidson:
Charting the future: scholarly publishing in CS. 5 - Vinton G. Cerf:
The human touch. 7
- Human or machine? 8-9
- John Langford, Mark Guzdial:
The arbitrariness of reviews, and advice for school administrators. 12-13
- Alex Wright:
Molecular moonshots. 15-17 - Chris Edwards:
Secure-system designers strive to stem data leaks. 18-20 - Mark Broderick:
What's the price now? 21-23
- Dorothy E. Denning:
Toward more secure software. 24-26
- Mari Sako:
Competing in emerging markets. 27-29
- George V. Neville-Neil:
Raw networking. 30-32
- Len Shustek:
An interview with Juris Hartmanis. 33-37
- Leslie Lamport:
Who builds a house without drawing blueprints? 38-41
- Paul Vixie:
Go static or go home. 42-45 - Neil J. Gunther, Paul Puglia, Kristofer Tomasette:
Hadoop superlinear scalability. 46-55
- Philip R. Cohen, Edward C. Kaiser, M. Cecelia Buchanan, Scott Lind, Michael J. Corrigan, R. Matthews Wesson:
Sketch-Thru-Plan: a multimodal interface for command and control. 56-65 - Chris Newcombe, Tim Rath, Fan Zhang, Bogdan Munteanu, Marc Brooker, Michael Deardeuff:
How Amazon web services uses formal methods. 66-73
- Johannes Sametinger, Jerzy W. Rozenblit, Roman L. Lysecky, Peter Ott:
Security challenges for medical devices. 74-82
- Trevor N. Mudge:
The specialization trend in computer hardware: techincal perspective. 84 - Wajahat Qadeer, Rehan Hameed, Ofer Shacham, Preethi Venkatesan, Christos Kozyrakis, Mark Horowitz:
Convolution engine: balancing efficiency and flexibility in specialized computing. 85-93
- David Allen Batchelor:
Future Tense: The Wealth of Planets. 96-
Volume 58, Number 5, May 2015
- Moshe Y. Vardi:
Incentivizing quality and impact in computing research. 5 - Vinton G. Cerf:
Cascade failure. 7
- Abolish software warranty disclaimers. 8-9
- Joel Adams, Daniel A. Reed:
Introducing young women to CS, and supporting advanced research environments. 10-11
- Logan Kugler:
Is "good enough" computing good enough? 12-14 - Keith Kirkpatrick:
Putting the data science into journalism. 15-17 - Gregory Mone:
Robots with a human touch. 18-19
- Michael Schrage, Marshall W. Van Alstyne:
Life of IP. 20-23
- Sally Fincher:
What are we doing when we teach computing in schools? 24-26
- Christopher Jon Sprigman:
Oracle v. Google: a high-stakes legal fight for the software industry. 27-29
- Thomas Ball, Benjamin G. Zorn:
Teach foundational language principles. 30-31 - Serge Abiteboul, Benjamin André, Daniel Kaplan:
Managing your digital life. 32-35
- Justin Sheehy:
There is no now. 36-41 - Spencer Rathbun:
Parallel processing with <code>promises</code>. 42-47
- Sören Preibusch:
Privacy behaviors after Snowden. 48-55 - Roli Varma, Deepak Kapur:
Decoding femininity in computer science in India. 56-62
- Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre:
Optimization as motion selection principle in robot action. 64-74
- James R. Larus:
Programming multicore computers: technical perspective. 76 - Nadathur Satish, Changkyu Kim, Jatin Chhugani, Hideki Saito, Rakesh Krishnaiyer, Mikhail Smelyanskiy, Milind Girkar, Pradeep Dubey:
Can traditional programming bridge the ninja performance gap for parallel computing applications? 77-86
- Dennis E. Shasha:
Upstart Puzzles: Strategic Friendship. 88
Volume 58, Number 6, June 2015
- John White:
Thank you... 5 - Vinton G. Cerf:
A celebration of accomplishments. 7
- To learn CS principles, start in the cafeteria line. 8-9
- Mark Guzdial:
Bringing evidence-based education to CS. 10-11
- Neil Savage:
Plenty of proteins. 12-14 - Samuel Greengard:
Between the lines. 15-17 - Gary Anthes:
Estonia: a model for e-government. 18-20 - Andreas Reuter:
Klaus Tschira: 1940-2015. 21 - Neil Savage:
Forging relationships. 22-23
- Vishal Misra:
Routing money, not packets. 24-27
- Peter J. Denning:
Emergent innovation. 28-31
- George V. Neville-Neil:
Lazarus code. 32-33
- Meg Leta Jones:
Forgetting made (too) easy. 34-35 - Yannis Papakonstantinou:
Created computed universe. 36-38
- Vinton G. Cerf:
An interview with U.S. chief technology officer Megan Smith. 39-43
- Kate Matsudaira:
The science of managing data science. 44-47 - Stepán Davidovic, Kavita Guliani:
Reliable Cron across the planet. 48-53
- Reza Zafarani, Huan Liu:
Evaluation without ground truth in social media research. 54-60 - Kurt Jensen, Lars Michael Kristensen:
Colored Petri nets: a graphical language for formal modeling and validation of concurrent systems. 61-70 - Leslie Lamport:
Turing lecture: The computer science of concurrency: the early years. 71-76
- Mark Berman, Piet Demeester, Jae Woo Lee, Kiran Nagaraja, Michael Zink, Didier Colle, Dilip Kumar Krishnappa, Dipankar Raychaudhuri, Henning Schulzrinne, Ivan Seskar, Sachin Sharma:
Future internets escape the simulator. 78-89
- Patrick Baudisch:
Virtual reality in your living room: technical perspective. 92 - Brett R. Jones, Hrvoje Benko, Eyal Ofek, Andrew D. Wilson:
IllumiRoom: immersive experiences beyond the TV screen. 93-100
- Leah Hoffmann:
Q&A: The Path to Clean Data. 104-
Volume 58, Number 7, July 2015
- Alexander L. Wolf:
A new chief executive officer and executive director of ACM. 4-5 - Vinton G. Cerf:
Milestones. 7
- Quality vs. quantity in faculty publications. 8-9
- John Arquilla, Duncan A. Buell:
The dangers of military robots, the risks of online voting. 12-13
- Chris Edwards:
Growing pains for deep learning. 14-16 - Gregory Goth:
Bringing big data to the big tent. 17-19 - Gregory Mone:
The new smart cities. 20-21 - Lawrence M. Fisher:
ACM announces 2014 award recipients. 22-23
- Pamela Samuelson:
Anti-circumvention rules limit reverse engineering. 24-26
- L. Jean Camp:
Respecting people and respecting privacy. 27-28
- David Anderson:
Preserving the digital record of computing history. 29-31
- Phillip G. Armour:
An updated software Almanac. 32-34
- Juan E. Gilbert, Jerlando F. L. Jackson, Edward C. Dillon Jr., LaVar J. Charleston:
African Americans in the U.S. computing sciences workforce. 35-38
- Vijay Kumar, Thomas A. Kalil:
The future of computer science and engineering is in your hands. 39-41
- Andrew Brook:
Low-latency distributed applications in finance. 42-50 - Phelim Dowling, Kevin McGrath:
Using free and open source tools to manage software quality. 51-55
- Daniel A. Reed, Jack J. Dongarra:
Exascale computing and big data. 56-68 - Alexander Hogenboom, Flavius Frasincar, Franciska de Jong, Uzay Kaymak:
Using rhetorical structure in sentiment analysis. 69-77 - Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
Passwords and the evolution of imperfect authentication. 78-87
- Stuart Russell:
Unifying logic and probability. 88-97
- William D. Clinger:
The simplicity of cache efficient functional algorithms: technical perspective. 100 - Guy E. Blelloch, Robert Harper:
Cache efficient functional algorithms. 101-108
- Brian Clegg:
Future Tense: Toy Box Earth. 112-
Volume 58, Number 8, August 2015
- Moshe Y. Vardi:
Why doesn't ACM have a SIG for theoretical computer science? 5 - Vinton G. Cerf:
Invention. 7
- Not so easy to forget. 8-9
- Mark Guzdial:
Plain talk on computing education. 10-11
- Esther Shein:
Teaching computers with illusions. 13-15 - Logan Kugler:
Touching the virtual. 16-18 - Keith Kirkpatrick:
The moral challenges of driverless cars. 19-20
- David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. 21-23
- Henry Chesbrough, Marshall W. Van Alstyne:
Permissionless innovation. 24-26
- George V. Neville-Neil:
Hickory dickory doc. 27-28
- Susanne E. Hambrusch, Ran Libeskind-Hadas, Eric Aaron:
Understanding the U.S. domestic computer science Ph.D. pipeline. 29-32
- Leen-Kiat Soh, Duane F. Shell, Elizabeth Ingraham, Stephen Ramsay, Brian Moore:
Learning through computational creativity. 33-35
- Arie van Deursen:
Testing web applications with state objects. 36-43 - Daniel C. Wang:
From the EDVAC to WEBVACs. 44-51
- Benoît Valiron, Neil J. Ross, Peter Selinger, D. Scott Alexander, Jonathan M. Smith:
Programming the quantum future. 52-61 - Petra Saskia Bayerl, Babak Akhgar:
Surveillance and falsification implications for open source intelligence investigations. 62-69 - Rua-Huan Tsaih, David C. Yen, Yu-Chien Chang:
Challenges deploying complex technologies in a traditional organization. 70-75
- Thanassis Tiropanis, Wendy Hall, Jon Crowcroft, Noshir S. Contractor, Leandros Tassiulas:
Network science, web science, and internet science. 76-82
- Aniket Kittur:
Corralling crowd power: technical perspective. 84 - Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, Katrina Panovich:
Soylent: a word processor with a crowd inside. 85-94
- Dennis E. Shasha:
Upstart puzzles. 96
Volume 58, Number 9, September 2015
- Joseph A. Konstan, Jack W. Davidson:
Should conferences meet journals and where?: a proposal for 'PACM'. 5 - Vinton G. Cerf:
On (computing) artifacts. 7
- May the computational force be with you. 8-9
- John Arquilla:
Moving beyond the cold war. 10-11
- Neil Savage:
Split second. 12-14 - Gregory Mone:
Sensing emotions. 15-16 - Logan Kugler:
New news aggregator apps. 17-19
- Thomas Haigh, Mark Priestley:
Innovators assemble: Ada Lovelace, Walter Isaacson, and the superheroines of computing. 20-27
- Joe Karaganis, Jennifer Urban:
The rise of the robo notice. 28-30
- Dorothea Kleine:
The value of social theories for global computing. 31-33
- Peter J. Denning:
Automated education and the professional. 34-36
- Jeffrey D. Ullman:
Experiments as research validation: have we gone too far? 37-39 - Michael Mitzenmacher:
Theory without experiments: have we gone too far? 40-42
- Kathryn S. McKinley:
The pros and cons of the 'PACM' proposal: point. 43-44 - David S. Rosenblum:
The pros and cons of the 'PACM' proposal: counterpoint. 44-45
- Spence Green, Jeffrey Heer, Christopher D. Manning:
Natural language translation at the intersection of AI and HCI. 46-53 - Philip Maddox:
Testing a distributed system. 54-58
- Simha Sethumadhavan, Adam Waksman, Matthew Suozzo, Yipeng Huang, Julianna Eum:
Trustworthy hardware from untrusted components. 60-71 - Ignacio Laguna, Dong H. Ahn, Bronis R. de Supinski, Todd Gamblin, Gregory L. Lee, Martin Schulz, Saurabh Bagchi, Milind Kulkarni, Bowen Zhou, Zhezhe Chen, Feng Qin:
Debugging high-performance computing applications at massive scales. 72-81 - Tanmoy Chakraborty, Suhansanu Kumar, Pawan Goyal, Niloy Ganguly, Animesh Mukherjee:
On the categorization of scientific citation profiles in computer science. 82-90
- Ernest Davis, Gary Marcus:
Commonsense reasoning and commonsense knowledge in artificial intelligence. 92-103 - Aviv Zohar:
Bitcoin: under the hood. 104-113
- Marc Alexa:
A woodworker's easy fix: technical perspective. 115 - Nobuyuki Umetani, Takeo Igarashi, Niloy J. Mitra:
Guided exploration of physically valid shapes for furniture design. 116-124
- Leah Hoffmann:
Q&A: A Passion for Pairings. 128-
Volume 58, Number 10, October 2015
- Moshe Y. Vardi:
What can be done about gender diversity in computing?: a lot! 5 - Vinton G. Cerf:
The Third Heidelberg Laureate Forum. 7
- Ban 'naked' braces! 10-11
- John Arquilla, Daniel A. Reed:
The morality of online war; the fates of data analytics, HPC. 12-13
- Gary Anthes:
Scientists update views of light. 15-17 - Samuel Greengard:
Automotive systems get smarter. 18-20 - Keith Kirkpatrick:
Cyber policies on the rise. 21-23
- Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. 24-26
- Michael A. Cusumano:
In defense of IBM. 27-28
- George V. Neville-Neil:
Storming the cubicle. 29-31
- Phillip G. Armour:
Thinking thoughts. 32-34
- Thomas J. Misa:
Computing is history. 35-37
- Thomas G. Dietterich, Eric Horvitz:
Rise of concerns about AI: reflections and directions. 38-40 - Phillip E. C. Compeau, Pavel A. Pevzner:
Life after MOOCs. 41-44
- Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Crash consistency. 46-51 - Rich Harris:
Dismantling the barriers to entry. 52-57
- Joan Feigenbaum, Bryan Ford:
Seeking anonymity in an internet panopticon. 58-69 - Patricia Lago, Sedef Akinli Koçak, Ivica Crnkovic, Birgit Penzenstadler:
Framing sustainability as a property of software quality. 70-78
- Eleazar Eskin:
Discovering genes involved in disease and the mystery of missing heritability. 80-87
- Cleve B. Moler:
Technical Perspective: Not just a matrix laboratory anymore. 90 - Lloyd N. Trefethen:
Computing numerically with functions instead of numbers. 91-97
- William Sims Bainbridge:
Future Tense: Processional. 104-
Volume 58, Number 11, November 2015
- Bobby Schnabel:
A tale of ACM visions. 5 - Vinton G. Cerf:
Memory with a twist. 7
- Who will read PACM? 8-9
- Valerie Barr, Michael Stonebraker:
How men can help women in CS; winning 'computing's Nobel prize'. 10-11
- Alex Wright:
Algorithmic authors. 12-14 - Esther Shein:
Companies proactively seek out internal threats. 15-17 - Chris Edwards:
Brain science helps computers separate speakers in a crowded room. 18-20 - John H. Holland 1929-2015. 21
- Steven B. Lipner:
Security assurance. 24-26
- Pamela Samuelson:
Software patents are falling down. 27-29
- Muhammad Zia Hydari, Rahul Telang, William M. Marella:
Electronic health records and patient safety. 30-32
- Pratim Sengupta, Amanda Dickes, Amy Voss Farris, Ashlyn Karan, David Martin, Mason Wright:
Programming in K-12 science classrooms. 33-35
- Len Shustek:
An interview with Fred Brooks. 36-40
- Rafael A. Calvo, Dorian Peters, Sidney K. D'Mello:
When technologies manipulate our emotions. 41-42
- Ben Maurer:
Fail at scale. 44-49 - Tyler McMullen:
It probably works. 50-54 - Taylor Savage:
Componentizing the web. 55-61
- Dafna Shahaf, Carlos Guestrin, Eric Horvitz, Jure Leskovec:
Information cartography. 62-73 - So-Hyun Lee, Hee-Woong Kim:
Why people post benevolent and malicious comments online. 74-79 - Chenyan Xu, Yang Yu, Chun-Keung Hoi:
Hidden in-game intelligence in NBA players' tweets. 80-89
- Sumit Gulwani, José Hernández-Orallo, Emanuel Kitzelmann, Stephen H. Muggleton, Ute Schmid, Benjamin G. Zorn:
Inductive programming meets the real world. 90-99
- Frédo Durand:
Technical Perspective: The Path to Light Transport. 102 - Wenzel Jakob, Steve Marschner:
Geometric tools for exploring manifolds of light transport paths. 103-111 - George Varghese:
Technical Perspective: Treating Networks Like Programs. 112 - Mihai Dobrescu, Katerina J. Argyraki:
Software dataplane verification. 113-121
- Dennis E. Shasha:
Upstart Puzzles: Auction Triplets. 136
Volume 58, Number 12, December 2015
- Moshe Y. Vardi:
On lethal autonomous weapons. 5 - Vinton G. Cerf:
Advancing the ACM agenda. 7
- What about statistical relational learning? 8-9
- Moshe Y. Vardi, Mark Guzdial:
What do we do when the jobs are gone, and why we must embrace active learning. 10-11
- Don Monroe:
When data is not enough. 12-14 - Gregory Mone:
The hyper-intelligent bandage. 15-16 - Keith Kirkpatrick:
Technology brings online education in line with campus programs. 17-19
- David Anderson:
The digital dark age. 20-23
- Peter J. Denning, Nicholas Dew:
Why our theories of innovation fail us. 24-26
- Nancy Tuana:
Coupled ethical-epistemic analysis in teaching ethics. 27-29
- George V. Neville-Neil:
Pickled patches. 30-32
- Richard E. Ladner, Sheryl Burgstahler:
Increasing the participation of individuals with disabilities in computing. 33-36
- Jeremy Scott, Alan Bundy:
Creating a new generation of computational thinkers. 37-40 - Cory Doctorow:
I can't let you do that, Dave. 41-42
- Stephen Goose:
The case for banning killer robots: point. 43-45 - Ronald C. Arkin:
The case for banning killer robots: counterpoint. 46-47
- Olivia Angiuli, Joe Blitzstein, Jim Waldo:
How to de-identify your data. 48-55 - Kate Matsudaira:
Lean software development: building and shipping two versions. 56-58 - Fabien Gaud, Baptiste Lepers, Justin R. Funston, Mohammad Dashti, Alexandra Fedorova, Vivien Quéma, Renaud Lachaize, Mark Roth:
Challenges of memory management on modern NUMA systems. 59-66
- Andrea Ballatore, Michela Bertolotto:
Personalizing maps. 68-74 - Philip Wadler:
Propositions as types. 75-84 - Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chiang:
Smart data pricing: using economics to manage network congestion. 86-93
- Robert E. Kraut, Moira Burke:
Internet use and psychological well-being: effects of activity and audience. 94-100
- Carl Doersch, Saurabh Singh, Abhinav Gupta, Josef Sivic, Alexei A. Efros:
What makes Paris look like Paris? 103-110 - David Maier:
Technical Perspective: In-Situ Database Management. 111 - Ioannis Alagiannis, Renata Borovica-Gajic, Miguel Branco, Stratos Idreos, Anastasia Ailamaki:
NoDB: efficient query execution on raw data files. 112-121
- Leah Hoffmann:
Q&A: Redefining Architectures. 136-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.