CACM - volume 60 - 2017 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Simone Campanoni Kevin Brownell Svilen Kanev Timothy M. Jones Gu-Yeon Wei David M. Brooks
A simple, elegant approach to non-numeric parallelization: technical perspective. A theory of pricing private data.Chao Li Daniel Yang Li Gerome Miklau Dan Suciu
Pricing information (and its implications): technical perspective. Energy efficiency: a new concern for application software developers. Technology-driven changes in work and employment.Ramiro Montealegre Wayne F. Cascio
Cybersecurity, nuclear security, alan turing, and illogical logic. Research for practice: vigorous public debates in academic computer science. XML and JSON are like cardboard. Bitcoin's academic pedigree. Lousy advice to the lovelorn. The death of big software. Cold, hard cache. Community colleges: a resource for increasing equity and inclusion in computer science education. The forgotten engineer. Parallel computational thinking. Gaming machine learning. Perovskites boost solar-cell potential. Building tools to help students learn to program. Now for something entirely different. Start CS students off with industry best practices.Computing is the secret ingredient (well, not so secret).
Keenan Crane Clarisse Weischedel Max Wardetzky
Technical perspective: Exploring a kingdom by geodesic measures. Heads-up limit hold'em poker is solved.Michael Bowling Neil Burch Michael Johanson Oskari Tammelin
Technical perspective: Solving imperfect information games. Healthcare robotics. User reviews of top mobile apps in Apple and Google app stores.Stuart McIlroy Weiyi Shang Nasir Ali Ahmed E. Hassan
Cambits: a reconfigurable camera system. Is there a single method for the internet of things?Ivar Jacobson Ian Spence Pan Wei Ng
Breadth and depth. Hootsuite: in pursuit of reactive systems.Social agents: bridging simulation and engineering. Pay what you want as a pricing model for open access publishing?
Martin Spann Lucas Stich Klaus M. Schmidt
Keeping the machinery in computing education.Richard C. H. Connor Quintin I. Cutts Judy Robertson
Engaging the ethics of data science in practice. Disgorging profits in design patent cases. Overcoming disabilities. Censoring sensors. A block on the old chip. Opportunities for women, minorities in information retrieval. They see what you see.Would Turing have won the Turing award? Heidelberg laureate forum. Highlights of the ACM student research competition.
Baishakhi Ray Daryl Posnett Premkumar T. Devanbu Vladimir Filkov
Technical Perspective: Shedding new light on an old language debate. Multi-objective parametric query optimization.Immanuel Trummer Christoph Koch
Technical Perspective: Broadening and deepening query optimization yet still making progress. Internet advertising: technology, ethics, and a serious difference of opinion.Stephen B. Wicker Kolbeinn Karlsson
Millennials' attitudes toward IT consumerization in the workplace.Heiko Gewald Xuequn Wang Andy Weeger Mahesh S. Raisinghani Gerald G. Grant Otávio P. Sanchez Siddhi Pittayachawan
Barriers to refactoring.Ewan D. Tempero Tony Gorschek Lefteris Angelis
Four ways to make CS and IT more immersive. Research for practice: technology for underserved communities; personal fabrication.Peter Bailis Tawanna Dillahunt Stefanie Mueller Patrick Baudisch
Metaphors we compute by. What can agile methods bring to high-integrity software development?Roderick Chapman Neil White Jim Woodcock
IoT: the internet of terror. FinTech platforms and strategy. The real risks of artificial intelligence. Amazon and whole foods: follow the strategy (and the money). Portable device fears show power of social development. Digital hearing. 3D-printing human body parts. Manipulating word representations, and preparing students for coding jobs? Beyond brute force.Six education. Computing is a profession.
Walter S. Lasecki Christopher D. Miller Iftekhar Naim Raja S. Kushalnagar Adam Sadilek Daniel Gildea Jeffrey P. Bigham
Technical perspective: Humans and computers working together on hard tasks. Exploiting the analog properties of digital circuits for malicious hardware.Kaiyuan Yang Matthew Hicks Qing Dong Todd M. Austin Dennis Sylvester
Technical perspective: A gloomy look at the integrity of hardware. Security in high-performance computing environments. Trust and distrust in online fact-checking services.Petter Bae Brandtzæg Asbjørn Følstad
Moving beyond the Turing Test with the Allen AI Science Challenge.Carissa Schoenick Peter Clark Oyvind Tafjord Peter D. Turney Oren Etzioni
10 ways to be a better interviewer. Data sketching. The calculus of service availability.Benjamin Treynor Sloss Mike Dahlin Vivek Rau Betsy Beyer
When does law enforcement's demand to read your data become a demand to read your mind? Why agile teams fail without UX research.Gregorio Convertino Nancy Frishberg
Multitasking without thrashing. Is that social bot behaving unethically?Carolina Alves de Lima Salge Nicholas Berente
Digitocracy. Charles W. Bachman: 1924-2017. Turing laureates celebrate award's 50th anniversary. Why GPS spoofing is a threat to companies, countries. Broadband to Mars. It's all about image. Assuring software quality by preventing neglect. Computational thinking is not necessarily computational.Divination by program committee. Take two aspirin and call me in the morning. Toward algorithmic transparency and accountability.
Simson L. Garfinkel Jeanna N. Matthews Stuart S. Shapiro Jonathan M. Smith
Moritz Bächer Bernd Bickel Emily Whiting Olga Sorkine-Hornung
Technical Perspective: Linking form, function, and fabrication. The scalable commutativity rule: designing scalable software for multicore processors.Austin T. Clements M. Frans Kaashoek Eddie Kohler Robert Tappan Morris Nickolai Zeldovich
Technical Perspective: Unexpected connections. The science of brute force.Marijn J. H. Heule Oliver Kullmann
Data science: challenges and directions. Turing's pre-war analog computers: the fatherhood of the modern computer revisited. Small-data computing: correct calculator arithmetic. Now that we can write simultaneously, how do we use that to our advantage?Ricardo Olenewa Gary M. Olson Judith S. Olson Daniel M. Russell
The natural science of computing.Dominic Horsman Vivien M. Kendon Susan Stepney
The observer effect. Is the U.S. education system ready for CS for all? Prophets, seers, and pioneers. Charles P. 'Chuck' Thacker: 1943-2017. AI in contact centers. Why virtual reality will transform a workplace near you. Hacker-proof coding. How adults ages 60+ are learning to code. Embed ethical guidelines in autonomous weapons.In praise of under-specification? Building the future: Communications of the ACM.
Chris Hawblitzel Jon Howell Manos Kapritsos Jacob R. Lorch Bryan Parno Michael L. Roberts Srinath T. V. Setty Brian Zill
Technical Perspective: IronFleet simplifies proving safety and liveness properties. Inference and auction design in online advertising. How important is IT?Pantelis Koutroumpis Aija Leiponen Llewellyn D. W. Thomas
Reimagining the avatar dream: modeling social identity in digital media. Research for practice: tracing and debugging distributed systems; programming by examples. The IDAR graph. Side effects, front and center. The informal guide to ACM fellow nominations. The beginner's creed. Unknowns of the gig-economy. Cryptovirology: the birth, neglect, and explosion of ransomware. Jean E. Sammet 1928-2017. Artificial intelligence poised to ride a new wave. Cracking the code on DNA storage. Building a brain may mean going analog. 'Generation CS' drives growth in enrollments. A brittle and fragile future. Today's Communications of the ACM.Ankit Gupta Pritish Kamath Neeraj Kayal Ramprasad Saptharishi
Technical Perspective: Low-depth arithmetic circuits. ImageNet classification with deep convolutional neural networks.Alex Krizhevsky Ilya Sutskever Geoffrey E. Hinton
Technical Perspective: What led computer vision to deep learning? Learnable programming: blocks and beyond.David Bau Jeff Gray Caitlin Kelleher Josh Sheldon Franklyn A. Turbak
The dynamics of work-family conflict. The SCION internet architecture.David Barrera Laurent Chuat Adrian Perrig Raphael M. Reischuk Pawel Szalachowski
Conversations with technology leaders: Erik Meijer. Too big NOT to fail.Pat Helland Simon Weaver Ed Harris
The debugging mind-set. Remaining trouble spots with computational thinking. Forced exception handling. The influence and promise of alliances.Leslie Goodyear Gary Silverstein Linda P. Thurston
Trustworthiness and truthfulness are essential. Big data.Weaving the web. Potential and peril. Optimization search finds a heart of glass. Deep learning takes on translation. Balancing teaching CS efficiently with motivating students. Technologies do have ethics.
Open access to academic research. Ten years at the helm of communications of the ACM.
Bo Brinkman Catherine Flick Don Gotterbarn Keith W. Miller Marty J. Wolf
Beyond 'Star Trek'. DeepDive: declarative knowledge base construction.Ce Zhang Christopher Ré Michael J. Cafarella Jaeho Shin Feiran Wang Sen Wu
Technical Perspective: Building knowledge bases from messy data. Exploiting vector instructions with generalized stream fusion.Geoffrey Mainland Roman Leshchinskiy Simon Peyton Jones
Technical Perspective: Functional compilers. Contest theory. Responsible research and innovation in the digital age.Marina Jirotka Barbara Grimpe Bernd Carsten Stahl Grace Eden Mark Hartswood
Who owns the social web?Catherine C. Marshall Frank M. Shipman III
Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning.Peter Bailis Arvind Narayanan Andrew Miller Song Han
MongoDB's JavaScript fuzzer. Making money using math. Toward a ban on lethal autonomous weapons: surmounting the obstacles. Preparing tomorrow's faculty to address challenges in teaching computer science.Leo Porter Cynthia Bailey Lee Beth Simon Mark Guzdial
The anonymization debate should be about risk, not perfection. The internet of things.Bionics in competition. Making chips smarter. Combating cancer with data. Ending null pointer crashes. Can liberty survive the digital age? Cyber insecurity and cyber libertarianism.
Cynthia Dwork Vitaly Feldman Moritz Hardt Toniann Pitassi Omer Reingold Aaron Roth
Technical Perspective: Building a safety net for data reuse. Certifying a file system using crash hoare logic: correctness in the presence of crashes.Tej Chajed Haogang Chen Adam Chlipala M. Frans Kaashoek Nickolai Zeldovich Daniel Ziegler
Technical Perspective: Proving file systems meet expectations. A service computing manifesto: the next 10 years.Athman Bouguettaya Munindar P. Singh Michael N. Huhns Quan Z. Sheng Hai Dong Qi Yu Azadeh Ghari Neiat Sajib Mistry Boualem Benatallah Brahim Medjahed Mourad Ouzzani Fabio Casati Xumin Liu Hongbing Wang Dimitrios Georgakopoulos Liang Chen Surya Nepal Zaki Malik Abdelkarim Erradi Yan Wang M. Brian Blake Schahram Dustdar Frank Leymann Michael P. Papazoglou
Computational thinking for teacher education.Aman Yadav Chris Stephenson Hai Hong
Attack of the killer microseconds.Luiz André Barroso Mike Marty David A. Patterson Parthasarathy Ranganathan
Does anybody listen to you? Uninitialized reads. Pervasive, dynamic authentication of physical items.Meng-Day (Mandel) Yu Srinivas Devadas
What it means to be an entrepreneur today. Wanted: toolsmiths. The chess player who couldn't pass the salt. Online social networks and global women's empowerment. Cybersecurity.Computing the arts. Digitizing the world. Sensors on the brain. Crafting a national cyberdefense, and preparing to support computational literacy. Consider indirect threats of AI, too.
A genetic theory of the Silicon Valley phenomenon. Gender diversity in computing: are we making any progress?
Tom J. Ameloot Gaetano Geck Bas Ketsman Frank Neven Thomas Schwentick
Technical Perspective: Data distribution for fast joins. Powering the next Billion devices with wi-fi.Vamsi Talla Bryce Kellogg Benjamin Ransford Saman Naderiparizi Joshua R. Smith Shyamnath Gollakota
Technical Perspective: The power of wi-fi to deliver power. Computational support for academic peer review: a perspective from artificial intelligence. The path to the top: insights from career histories of top CIOs.Daniel J. Mazzola Robert D. St. Louis Mohan Tanniru
Making the field of computing more inclusive.Jonathan Lazar Elizabeth F. Churchill Tovi Grossman Gerrit C. van der Veer Philippe A. Palanque John Morris Jennifer Mankoff
Research for practice: distributed transactions and networks as physical sensors.Peter Bailis Irene Zhang Fadel Adib
Heterogeneous computing: here to stay. Time, but faster. Learning with mobile technologies. Misconceptions about computer science.Peter J. Denning Matti Tedre Pat Yongpradit
Where review goes wrong. Supreme Court on design patent damages in Samsung v. Apple. ACM recognizes new fellows.Financing the dark web. The future of semiconductors. Thinking deeply to make better speech. The slow evolution of CS for all, the beauty of programs. Address the consequences of AI in advance.
Grumpy old cells. ACM's commitment to accessibility. ACM's open-conference principle and political reality.
Ivan Martinovic Kasper Bonne Rasmussen Marc Roeschlin Gene Tsudik
A messy state of the union: taming the composite state machines of TLS.Benjamin Beurdouche Karthikeyan Bhargavan Antoine Delignat-Lavaud Cédric Fournet Markulf Kohlweiss Alfredo Pironti Pierre-Yves Strub Jean Karim Zinzindohoue
Technical Perspective: Cleaning up flaws in TLS implementations. Model learning. Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe. Copyright enforcement in the digital age: empirical evidence and policy implications.Brett Danaher Michael D. Smith Rahul Telang
BBR: congestion-based congestion control.Neal Cardwell Yuchung Cheng C. Stephen Gunn Soheil Hassas Yeganeh Van Jacobson
Are you load balancing wrong? Life beyond distributed transactions. AI dangers: imagined and real.Devdatt P. Dubhashi Shalom Lappin
Smart machines are not a threat to humanity. User-centric distributed solutions for privacy-preserving analytics.Azer Bestavros Andrei Lapets Mayank Varia
The unholy trinity of software development. Fostering creativity through computing. The future of the internet of things.Ulf Lindqvist Peter G. Neumann
It's not the algorithm, it's the data. Are computer chips the new security threat? Secure quantum communications. Liberal arts academia wants YOU! Artificial intelligence.Use the scientific method in computer science.
Social and ethical behavior in the internet of things. Celebrating 50 years of the Turing award.
Salman Habib Vitali A. Morozov Nicholas Frontiere Hal Finkel Adrian Pope Katrin Heitmann Kalyan Kumaran Venkatram Vishwanath Tom Peterka Joseph A. Insley David Daniel Patricia K. Fasel Zarija Lukic
Technical Perspective: Mapping the universe. Eulerian video magnification and analysis.Neal Wadhwa Hao-Yu Wu Abe Davis Michael Rubinstein Eugene Shih Gautham J. Mysore Justin G. Chen Oral Büyüköztürk John V. Guttag William T. Freeman Frédo Durand
Magnifying motions the right way: technical perspective. Cell-graphs: image-driven modeling of structure-function relationship. Bottom-up enterprise information systems: rethinking the roles of central IT departments.Cecil Eng Huang Chua Veda C. Storey
Exponential laws of computing growth. Research for practice: web security and mobile web computing.Peter Bailis Jean Yang Vijay Janapa Reddi Yuhao Zhu
Faucet: deploying SDN in the enterprise. Resolving conflict. Effects of international trafficking in arms regulations changes. Artificial intelligence: think again. Colossal genius: Tutte, Flowers, and a bad imitation of Turing. Why less is more when it comes to internet jurisdiction. Is Google's alphabet a good bet? Bias in technology. Mapping the internet of things. Pure randomness extracted from two poor sources. What to do about database decay.Michael Stonebraker Raul Castro Fernandez Dong Deng Michael L. Brodie
How we teach CS2All. Information and misinformation on the internet. The ACM future of computing academy. Technology for the most effective use of mankind.