Stop the war!
Остановите войну!
for scientists:
default search action
Communications of the ACM, Volume 62
Volume 62, Number 1, January 2019
- Andrew A. Chien:
Open collaboration in an age of distrust. 5
- Vinton G. Cerf:
A people-centered economy. 6
- Moshe Y. Vardi:
Are we having an ethical crisis in computing? 7
- Judy Robertson:
Answering children's questions about computers. 8-9
- Don Monroe:
Quantum leap. 10-12 - Chris Edwards:
Hidden messages fool AI. 13-14 - Esther Shein:
Who owns 3D scans of historic sites? 15-17
- Michal S. Gal:
Illegal pricing algorithms. 18-20
- Michael A. Cusumano:
CRISPR: an emerging platform for gene editing. 21-23
- Thomas Haigh:
Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo. 24-30
- Niels da Vitoria Lobo, Mubarak Shah:
UCF's 30-year REU site in computer vision. 31-34 - Edward A. Lee:
Modeling in engineering and science. 35-36
- Alpha Lam:
Using remote cache service for bazel. 38-42 - Jessie Frazelle:
Research for practice: security for the modern age. 43-45 - Thomas A. Limoncelli:
SQL is no excuse to avoid DevOps. 46-49
- Stefan Seidel, Nicholas Berente, Aron Lindberg, Kalle Lyytinen, Jeffrey V. Nickerson:
Autonomous tools and design: a triple-loop approach to human-machine learning. 50-57 - Sergio Orenga-Roglá, Ricardo Chalmeta:
Framework for implementing a big data ecosystem in organizations. 58-65 - B. Jack Copeland, Oron Shagrir:
The Church-Turing thesis: logical limit or breachable barrier? 66-74
- Yolanda Gil, Suzanne A. Pierce, Hassan A. Babaie, Arindam Banerjee, Kirk D. Borne, Gary S. Bust, Michelle Cheatham, Imme Ebert-Uphoff, Carla P. Gomes, Mary C. Hill, John D. Horel, Leslie Hsu, Jim Kinter, Craig A. Knoblock, David M. Krum, Vipin Kumar, Pierre F. J. Lermusiaux, Yan Liu, Chris North, Victor Pankratius, Shanan Peters, Beth Plale, Allen Pope, Sai Ravela, Juan Restrepo, Aaron J. Ridley, Hanan Samet, Shashi Shekhar:
Intelligent systems for geosciences: an essential research agenda. 76-84 - William Casey, Ansgar Kellner, Parisa Memarmoshrefi, Jose Andre Morales, Bud Mishra:
Deception, identity, and security: the game theory of sybil attacks. 85-93
- Hao Li:
Technical perspective: Photorealistic facial digitization and manipulation. 95 - Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner:
Face2Face: real-time face capture and reenactment of RGB videos. 96-104 - Dan Boneh:
Technical perspective: Attacking cryptographic key exchange with precomputation. 105 - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. 106-114
- Dennis E. Shasha:
Randomized anti-counterfeiting. 120-
Volume 62, Number 2, February 2019
- Vinton G. Cerf:
Libraries considered hazardous. 5
- Between the lines in the China region special section. 6-7
- Herbert E. Bruderer, Robin K. Hill:
Seeking digital humanities, IT tech support. 8-9
- Samuel Greengard:
A brave new world of genetic engineering. 11-13 - Keith Kirkpatrick:
Technologizing agriculture. 14-16 - Logan Kugler:
Being recognized everywhere. 17-19
- Carl E. Landwehr:
2018: a big year for privacy. 20-22
- Carol Frieze, Jeria L. Quesenberry:
How computer science at CMU is attracting and retaining women. 23-26
- George V. Neville-Neil:
Writing a test plan. 27
- Dror G. Feitelson:
Tony's law. 28-31 - Enrico Nardelli:
Do we really need computational thinking? 32-35
- CodeFlow: improving the code review process at Microsoft. 36-44
- Kate Matsudaira:
The importance of a great finish. 45-47
- John L. Hennessy, David A. Patterson:
A new golden age for computer architecture. 48-60 - Chao Gao, Zhen Su, Jiming Liu, Jürgen Kurths:
Even central users do not always drive information diffusion. 61-67 - Juan Pablo Bello, Cláudio T. Silva, Oded Nov, R. Luke DuBois, Anish Arora, Justin Salamon, Charles Mydlarz, Harish Doraiswamy:
SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution. 68-77
- Maurice Herlihy:
Blockchains from a distributed computing perspective. 78-85 - Peter W. O'Hearn:
Separation logic. 86-95
- Thomas F. Wenisch:
How economic theories can help computers beat the heat: technical perspective. 97 - Songchun Fan, Seyed Majid Zahedi, Benjamin C. Lee:
Distributed strategies for computational sprints. 98-106 - Surajit Chaudhuri:
To do or not to do: extending SQL with integer linear programming?: technical perspective. 107 - Matteo Brucato, Azza Abouzied, Alexandra Meliou:
Scalable computation of high-order optimization queries. 108-116
- David Allen Batchelor:
Hawking's nightmare. 120-
Volume 62, Number 3, March 2019
- Andrew A. Chien:
Owning computing's environmental impact. 5
- Vinton G. Cerf:
Ownership vs. stewardship. 6
- Moshe Y. Vardi:
Lost in math? 7
- Mary W. Hall, Richard E. Ladner, Diane Levitt, Manuel A. Pérez-Quiñones, Saurabh Bagchi:
Smoothing the path to computing: pondering uses for big data. 8-9
- Logan Kugler:
Building a better battery. 11-13 - Esther Shein:
Exoskeletons today. 14-16 - Keith Kirkpatrick:
Electronics need rare earths. 17-18
- Pamela Samuelson:
Questioning a new intellectual property right for press publishers. 20-23
- Ofir Turel:
Potential 'dark sides' of leisure technology use in youth. 24-27
- Peter J. Denning:
An interview with William Hugh Murray. 28-30
- Sepehr Vakil, Jennifer Higgs:
It's about power. 31-33
- Mike Tissenbaum, Josh Sheldon, Hal Abelson:
From computational thinking to computational action. 34-36
- Jim Waldo:
A hitchhiker's guide to the blockchain universe. 38-42 - Kate Matsudaira:
Design patterns for managing up. 43-45 - Simson L. Garfinkel, John M. Abowd, Christian Martindale:
Understanding database reconstruction attacks on public data. 46-53
- Judea Pearl:
The seven tools of causal inference, with reflections on machine learning. 54-60 - Zhi Quan Zhou, Liqun Sun:
Metamorphic testing of driverless cars. 61-67 - Advaith Siddharthan, Kapila Ponnamperuma, Chris Mellish, Cheng Zeng, Daniel Heptinstall, Annie Robinson, Stuart Benn, René van der Wal:
Blogging birds: telling informative stories about the lives of birds from telemetric data. 68-77 - Pamela Zave, Jennifer Rexford:
The compositional architecture of the internet. 78-87
- Tim Roughgarden:
Beyond worst-case analysis. 88-96
- Martin C. Rinard:
Technical perspective: Borrowing big code to automate programming activities. 98 - Veselin Raychev, Martin T. Vechev, Andreas Krause:
Predicting program properties from 'big code'. 99-107 - Nisheeth K. Vishnoi:
Technical perspective: Isolating a matching when your coins go missing. 108 - Stephen A. Fenner, Rohit Gurjar, Thomas Thierauf:
A deterministic parallel algorithm for bipartite perfect matching. 109-115
- Leah Hoffmann:
Guiding computers, robots to see and think. 120-
Volume 62, Number 4, April 2019
- Vinton G. Cerf:
In debt to the NSF. 5
- Robin K. Hill, Mark Guzdial:
Pondering variables and direct instruction. 6
- Chris Edwards:
Soft robots look to new environments. 9 - Samuel Greengard:
The future of data storage. 12 - Sarah Underwood:
The fine line between coercion and care. 15
- Mari Sako:
Free trade in a digital world. 18
- George V. Neville-Neil:
Know your algorithms. 22
- Dirk Lewandowski:
The web is missing an essential part of infrastructure: an open web index. 24
- Panagiota Fatourou, Chris Hankin:
Welcome to the Europe region special section. 28
- Lisa Korrigane:
A demographic snapshot of the IT workforce in Europe. 32 - David Pringle:
Enterprises lead ICT innovation in Europe. 34 - David Pringle:
Europe's ambitious ICT agenda. 35 - David Pringle:
Europe's well-connected consumers. 36 - Laurence Kalman:
New European data privacy and cyber security laws: one year later. 38 - Jan Gulliksen:
Incorporating Europe's values in future research. 40 - Koen De Bosschere, Marc Duranton, Madeleine Gray:
HiPEAC: a European network built to last. 42 - Joaquim A. Jorge, Mashhuda Glencross, Aaron Quigley:
ACM Europe Council's best paper awards. 44
- Julie A. McCann, Gian Pietro Picco, Alexander Gluhak, Karl Henrik Johansson, Martin Törngren, Laila Gide:
Connected things connecting Europe. 46 - Panagiota Fatourou, Yota Papageorgiou, Vasiliki Petousi:
Women are needed in STEM: European policies and incentives. 52 - Michael E. Caspersen, Judith Gal-Ezer, Andrew D. McGettrick, Enrico Nardelli:
Informatics as a fundamental discipline for the 21st century. 58 - Paola Inverardi:
The European perspective on responsible computing. 64 - Thomas Skordas:
Toward a European exascale ecosystem: the EuroHPC joint undertaking. 70 - Steffen Staab, Susan Halford, Wendy Hall:
Web science in Europe: beyond boundaries. 74
- Pat Helland:
Identity by any other name. 80 - Benjamin Treynor Sloss, Shylaja Nukala, Vivek Rau:
Metrics that matter. 88 - Nitesh Mor:
Research for practice: edge computing. 95
- Vijay Khatri, Binny M. Samuel:
Analytics for managerial work. 100
- James B. Aimone:
Neural algorithms and computing beyond Moore's law. 110 - Petros Wallden, Elham Kashefi:
Cyber security in the quantum era. 120
- Gilles Brassard:
Was Edgar Allan Poe wrong after all?: technical perspective. 132 - Umesh V. Vazirani, Thomas Vidick:
Fully device independent quantum key distribution. 133
- Dennis E. Shasha:
Fighting for lava. 144
Volume 62, Number 5, May 2019
- Vinton G. Cerf:
APIs, standards, and enabling infrastructure. 5
- Moshe Y. Vardi:
Quantum hype and quantum skepticism. 7
- Stefan Monnier, Andrew A. Chien, Robert L. Glass, Charles H. Davis, Thorkil Naur, Thomas A. Limoncelli:
Don't ignore the cost of 'embedded energy'. 10-11
- Ryan Carrier:
Implementing guidelines for governance, oversight of AI, and automation. 12-13
- Chris Edwards:
Questioning quantum. 15-17 - Neil Savage:
Code talkers. 18-19 - Samuel Greengard:
Deep insecurities: the internet of things shifts technology risk. 20-22
- James Grimmelmann:
Continuity and change in internet law. 24-26
- Joan Feigenbaum:
Encryption and surveillance. 27-29
- Emmanuel Schanzer, Shriram Krishnamurthi, Kathi Fisler:
What does it mean for a computing curriculum to succeed? 30-32
- Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao:
Enterprise wi-fi: we need devices that are secure by default. 33-35
- Raymond Blum, Betsy Beyer:
Achieving digital permanence. 36-42 - Martin Kleppmann, Alastair R. Beresford, Boerge Svingen:
Online event processing. 43-49 - Aleksandar Kuzmanovic:
Net neutrality: unexpected solution to blockchain scaling. 50-55
- Fay Cobb Payton, Eleni Berki:
Countering the negative image of women in computing. 56-63 - Yongge Wang, Qutaibah M. Malluhi:
The limit of blockchains: infeasibility of a smart Obama-Trump contract. 64-69
- Rod Downey, Denis R. Hirschfeldt:
Algorithmic randomness. 70-80
- Zachary G. Ives:
Technical perspective: Compressing matrices for large-scale machine learning. 82 - Ahmed Elgohary, Matthias Boehm, Peter J. Haas, Frederick R. Reiss, Berthold Reinwald:
Compressed linear algebra for declarative large-scale machine learning. 83-91
- Ken MacLeod:
Like old times. 96-
Volume 62, Number 6, June 2019
- Cherri M. Pancake:
ACM awards honor CS contributions. 5
- Vinton G. Cerf:
Back to the future. 7
- Mark Guzdial, John Arquilla:
Is CS really for all, and defending democracy in cyberspace. 8-9
- Neil Savage:
Neural net worth. 10-12 - Gary Anthes:
Lifelong learning in artificial neural networks. 13-15