Volume 60, Number 12, December 2017
Grooming the leaders of tomorrow.

Leah Hoffmann

Automatically accelerating non-numerical programs by architecture-compiler co-design.

Simone Campanoni Kevin Brownell Svilen Kanev Timothy M. Jones Gu-Yeon Wei David M. Brooks

A simple, elegant approach to non-numeric parallelization: technical perspective.

James R. Larus

A theory of pricing private data.

Chao Li Daniel Yang Li Gerome Miklau Dan Suciu

Pricing information (and its implications): technical perspective.

Aaron Roth

Energy efficiency: a new concern for application software developers.

Gustavo Pinto Fernando Castor

Technology-driven changes in work and employment.

Ramiro Montealegre Wayne F. Cascio

Cybersecurity, nuclear security, alan turing, and illogical logic.

Martin E. Hellman

Research for practice: vigorous public debates in academic computer science.

John Regehr Peter Bailis

XML and JSON are like cardboard.

Pat Helland

Bitcoin's academic pedigree.

Arvind Narayanan Jeremy Clark

Lousy advice to the lovelorn.

Ernest Davis

The death of big software.

Stephen J. Andriole

Cold, hard cache.

George V. Neville-Neil

Community colleges: a resource for increasing equity and inclusion in computer science education.

Louise Ann Lyon Jill Denner

The forgotten engineer.

Peter J. Denning

Parallel computational thinking.

Keith Kirkpatrick

Gaming machine learning.

Samuel Greengard

Perovskites boost solar-cell potential.

Don Monroe

Building tools to help students learn to program.

Philip J. Guo

Now for something entirely different.

Vinton G. Cerf

Start CS students off with industry best practices.

Computing is the secret ingredient (well, not so secret).

Andrew A. Chien


Volume 60, Number 11, November 2017
Butterfly effect.

G. Seth Shostak

The heat method for distance computation.

Keenan Crane Clarisse Weischedel Max Wardetzky

Technical perspective: Exploring a kingdom by geodesic measures.

Marc Alexa

Heads-up limit hold'em poker is solved.

Michael Bowling Neil Burch Michael Johanson Oskari Tammelin

Technical perspective: Solving imperfect information games.

David Silver

Healthcare robotics.

Laurel D. Riek

User reviews of top mobile apps in Apple and Google app stores.

Stuart McIlroy Weiyi Shang Nasir Ali Ahmed E. Hassan

Cambits: a reconfigurable camera system.

Makoto Odamaki Shree K. Nayar

Is there a single method for the internet of things?

Ivar Jacobson Ian Spence Pan Wei Ng

Breadth and depth.

Kate Matsudaira

Hootsuite: in pursuit of reactive systems.

Social agents: bridging simulation and engineering.

Virginia Dignum

Pay what you want as a pricing model for open access publishing?

Martin Spann Lucas Stich Klaus M. Schmidt

Keeping the machinery in computing education.

Richard C. H. Connor Quintin I. Cutts Judy Robertson

Engaging the ethics of data science in practice.

Solon Barocas Danah Boyd

Disgorging profits in design patent cases.

Pamela Samuelson

Overcoming disabilities.

Esther Shein

Censoring sensors.

Alex Wright

A block on the old chip.

Neil Savage

Opportunities for women, minorities in information retrieval.

Mei Kobayashi

They see what you see.

Would Turing have won the Turing award?

Moshe Y. Vardi

Heidelberg laureate forum.

Vinton G. Cerf

Highlights of the ACM student research competition.

Laurie Williams Doug Baldwin


Volume 60, Number 10, October 2017
Partitioned peace.

Dennis E. Shasha

A large-scale study of programming languages and code quality in GitHub.

Baishakhi Ray Daryl Posnett Premkumar T. Devanbu Vladimir Filkov

Technical Perspective: Shedding new light on an old language debate.

Jeffrey S. Foster

Multi-objective parametric query optimization.

Immanuel Trummer Christoph Koch

Technical Perspective: Broadening and deepening query optimization yet still making progress.

Jeffrey F. Naughton

Internet advertising: technology, ethics, and a serious difference of opinion.

Stephen B. Wicker Kolbeinn Karlsson

Millennials' attitudes toward IT consumerization in the workplace.

Heiko Gewald Xuequn Wang Andy Weeger Mahesh S. Raisinghani Gerald G. Grant Otávio P. Sanchez Siddhi Pittayachawan

Barriers to refactoring.

Ewan D. Tempero Tony Gorschek Lefteris Angelis

Four ways to make CS and IT more immersive.

Thomas A. Limoncelli

Research for practice: technology for underserved communities; personal fabrication.

Peter Bailis Tawanna Dillahunt Stefanie Mueller Patrick Baudisch

Metaphors we compute by.

Alvaro Videla

What can agile methods bring to high-integrity software development?

Roderick Chapman Neil White Jim Woodcock

IoT: the internet of terror.

George V. Neville-Neil

FinTech platforms and strategy.

Vasant Dhar Roger M. Stein

The real risks of artificial intelligence.

David Lorge Parnas

Amazon and whole foods: follow the strategy (and the money).

Michael A. Cusumano

Portable device fears show power of social development.

Chris Edwards

Digital hearing.

Don Monroe

3D-printing human body parts.

Keith Kirkpatrick

Manipulating word representations, and preparing students for coding jobs?

Robin K. Hill Mark Guzdial

Beyond brute force.

Six education.

Vinton G. Cerf

Computing is a profession.

Andrew A. Chien


Volume 60, Number 9, September 2017
All the pretty pictures.

Leah Hoffmann

Scribe: deep integration of human and machine intelligence to caption speech in real time.

Walter S. Lasecki Christopher D. Miller Iftekhar Naim Raja S. Kushalnagar Adam Sadilek Daniel Gildea Jeffrey P. Bigham

Technical perspective: Humans and computers working together on hard tasks.

Ed H. Chi

Exploiting the analog properties of digital circuits for malicious hardware.

Kaiyuan Yang Matthew Hicks Qing Dong Todd M. Austin Dennis Sylvester

Technical perspective: A gloomy look at the integrity of hardware.

Charles (Chuck) Thacker

Security in high-performance computing environments.

Sean Peisert

Trust and distrust in online fact-checking services.

Petter Bae Brandtzæg Asbjørn Følstad

Moving beyond the Turing Test with the Allen AI Science Challenge.

Carissa Schoenick Peter Clark Oyvind Tafjord Peter D. Turney Oren Etzioni

10 ways to be a better interviewer.

Kate Matsudaira

Data sketching.

Graham Cormode

The calculus of service availability.

Benjamin Treynor Sloss Mike Dahlin Vivek Rau Betsy Beyer

When does law enforcement's demand to read your data become a demand to read your mind?

Andrew Conway Peter Eckersley

Why agile teams fail without UX research.

Gregorio Convertino Nancy Frishberg

Multitasking without thrashing.

Peter J. Denning

Is that social bot behaving unethically?

Carolina Alves de Lima Salge Nicholas Berente

Digitocracy.

Joel R. Reidenberg

Charles W. Bachman: 1924-2017.

Lawrence M. Fisher

Turing laureates celebrate award's 50th anniversary.

Lawrence M. Fisher

Why GPS spoofing is a threat to companies, countries.

Logan Kugler

Broadband to Mars.

Gregory Mone

It's all about image.

Samuel Greengard

Assuring software quality by preventing neglect.

Robin K. Hill

Computational thinking is not necessarily computational.

Divination by program committee.

Moshe Y. Vardi

Take two aspirin and call me in the morning.

Vinton G. Cerf

Toward algorithmic transparency and accountability.

Simson L. Garfinkel Jeanna N. Matthews Stuart S. Shapiro Jonathan M. Smith


Volume 60, Number 8, August 2017
Turing's taxi.

Brian Clegg

Spin-it: optimizing moment of inertia for spinnable objects.

Moritz Bächer Bernd Bickel Emily Whiting Olga Sorkine-Hornung

Technical Perspective: Linking form, function, and fabrication.

Helmut Pottmann

The scalable commutativity rule: designing scalable software for multicore processors.

Austin T. Clements M. Frans Kaashoek Eddie Kohler Robert Tappan Morris Nickolai Zeldovich

Technical Perspective: Unexpected connections.

Marc Shapiro

The science of brute force.

Marijn J. H. Heule Oliver Kullmann

Data science: challenges and directions.

Longbing Cao

Turing's pre-war analog computers: the fatherhood of the modern computer revisited.

Leo Corry

Small-data computing: correct calculator arithmetic.

Hans-Juergen Boehm

Now that we can write simultaneously, how do we use that to our advantage?

Ricardo Olenewa Gary M. Olson Judith S. Olson Daniel M. Russell

The natural science of computing.

Dominic Horsman Vivien M. Kendon Susan Stepney

The observer effect.

George V. Neville-Neil

Is the U.S. education system ready for CS for all?

Jennifer Wang

Prophets, seers, and pioneers.

David P. Anderson

Charles P. 'Chuck' Thacker: 1943-2017.

Lawrence M. Fisher

AI in contact centers.

Keith Kirkpatrick

Why virtual reality will transform a workplace near you.

Logan Kugler

Hacker-proof coding.

Esther Shein

How adults ages 60+ are learning to code.

Philip J. Guo

Embed ethical guidelines in autonomous weapons.

In praise of under-specification?

Vinton G. Cerf

Building the future: Communications of the ACM.

Andrew A. Chien


Volume 60, Number 7, July 2017
Ruby risks.

Dennis E. Shasha

Fast and powerful hashing using tabulation.

Mikkel Thorup

Technical Perspective: Building a better hash function.

Michael Mitzenmacher

IronFleet: proving safety and liveness of practical distributed systems.

Chris Hawblitzel Jon Howell Manos Kapritsos Jacob R. Lorch Bryan Parno Michael L. Roberts Srinath T. V. Setty Brian Zill

Technical Perspective: IronFleet simplifies proving safety and liveness properties.

Fred B. Schneider

Inference and auction design in online advertising.

Denis Nekipelov

How important is IT?

Pantelis Koutroumpis Aija Leiponen Llewellyn D. W. Thomas

Reimagining the avatar dream: modeling social identity in digital media.

D. Fox Harrell Chong-U Lim

Research for practice: tracing and debugging distributed systems; programming by examples.

Peter Bailis Peter Alvaro Sumit Gulwani

The IDAR graph.

Mark A. Overton

Side effects, front and center.

Pat Helland

The informal guide to ACM fellow nominations.

Marc Snir

The beginner's creed.

Peter J. Denning

Unknowns of the gig-economy.

Brad Greenwood Gordon Burtch

Cryptovirology: the birth, neglect, and explosion of ransomware.

Adam L. Young Moti Yung

Jean E. Sammet 1928-2017.

Lawrence M. Fisher

Artificial intelligence poised to ride a new wave.

Gary Anthes

Cracking the code on DNA storage.

Samuel Greengard

Building a brain may mean going analog.

Neil Savage

'Generation CS' drives growth in enrollments.

Mark Guzdial

A brittle and fragile future.

Vinton G. Cerf

Today's Communications of the ACM.

Andrew A. Chien


Volume 60, Number 6, June 2017
This is for everyone.

Leah Hoffmann

Unexpected power of low-depth arithmetic circuits.

Ankit Gupta Pritish Kamath Neeraj Kayal Ramprasad Saptharishi

Technical Perspective: Low-depth arithmetic circuits.

Avi Wigderson

ImageNet classification with deep convolutional neural networks.

Alex Krizhevsky Ilya Sutskever Geoffrey E. Hinton

Technical Perspective: What led computer vision to deep learning?

Jitendra Malik

Learnable programming: blocks and beyond.

David Bau Jeff Gray Caitlin Kelleher Josh Sheldon Franklyn A. Turbak

The dynamics of work-family conflict.

Yili Liu Lina Zhou

The SCION internet architecture.

David Barrera Laurent Chuat Adrian Perrig Raphael M. Reischuk Pawel Szalachowski

Conversations with technology leaders: Erik Meijer.

Kate Matsudaira Erik Meijer

Too big NOT to fail.

Pat Helland Simon Weaver Ed Harris

The debugging mind-set.

Devon H. O&aposDell

Remaining trouble spots with computational thinking.

Peter J. Denning

Forced exception handling.

George V. Neville-Neil

The influence and promise of alliances.

Leslie Goodyear Gary Silverstein Linda P. Thurston

Trustworthiness and truthfulness are essential.

Peter G. Neumann

Big data.

Weaving the web.

Neil Savage

Potential and peril.

Sarah Underwood

Optimization search finds a heart of glass.

Chris Edwards

Deep learning takes on translation.

Don Monroe

Balancing teaching CS efficiently with motivating students.

Mark Guzdial

Technologies do have ethics.

Open access to academic research.

Vinton G. Cerf

Ten years at the helm of communications of the ACM.

Moshe Y. Vardi


Volume 60, Number 5, May 2017
Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct.

Bo Brinkman Catherine Flick Don Gotterbarn Keith W. Miller Marty J. Wolf

Beyond 'Star Trek'.

David Allen Batchelor

DeepDive: declarative knowledge base construction.

Ce Zhang Christopher Ré Michael J. Cafarella Jaeho Shin Feiran Wang Sen Wu

Technical Perspective: Building knowledge bases from messy data.

Alon Y. Halevy

Exploiting vector instructions with generalized stream fusion.

Geoffrey Mainland Roman Leshchinskiy Simon Peyton Jones

Technical Perspective: Functional compilers.

Guy E. Blelloch

Contest theory.

Milan Vojnovic

Responsible research and innovation in the digital age.

Marina Jirotka Barbara Grimpe Bernd Carsten Stahl Grace Eden Mark Hartswood

Who owns the social web?

Catherine C. Marshall Frank M. Shipman III

Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning.

Peter Bailis Arvind Narayanan Andrew Miller Song Han

MongoDB's JavaScript fuzzer.

Robert Guo

Making money using math.

Erik Meijer

Toward a ban on lethal autonomous weapons: surmounting the obstacles.

Wendell Wallach

Preparing tomorrow's faculty to address challenges in teaching computer science.

Leo Porter Cynthia Bailey Lee Beth Simon Mark Guzdial

The anonymization debate should be about risk, not perfection.

Woodrow Hartzog

The internet of things.

Bionics in competition.

Keith Kirkpatrick

Making chips smarter.

Samuel Greengard

Combating cancer with data.

Esther Shein

Ending null pointer crashes.

Bertrand Meyer

Can liberty survive the digital age?

Vinton G. Cerf

Cyber insecurity and cyber libertarianism.

Moshe Y. Vardi


Volume 60, Number 4, April 2017
Stacking the deck.

Dennis E. Shasha

Guilt-free data reuse.

Cynthia Dwork Vitaly Feldman Moritz Hardt Toniann Pitassi Omer Reingold Aaron Roth

Technical Perspective: Building a safety net for data reuse.

Jonathan Ullman

Certifying a file system using crash hoare logic: correctness in the presence of crashes.

Tej Chajed Haogang Chen Adam Chlipala M. Frans Kaashoek Nickolai Zeldovich Daniel Ziegler

Technical Perspective: Proving file systems meet expectations.

Gernot Heiser

A service computing manifesto: the next 10 years.

Athman Bouguettaya Munindar P. Singh Michael N. Huhns Quan Z. Sheng Hai Dong Qi Yu Azadeh Ghari Neiat Sajib Mistry Boualem Benatallah Brahim Medjahed Mourad Ouzzani Fabio Casati Xumin Liu Hongbing Wang Dimitrios Georgakopoulos Liang Chen Surya Nepal Zaki Malik Abdelkarim Erradi Yan Wang M. Brian Blake Schahram Dustdar Frank Leymann Michael P. Papazoglou

Computational thinking for teacher education.

Aman Yadav Chris Stephenson Hai Hong

Attack of the killer microseconds.

Luiz André Barroso Mike Marty David A. Patterson Parthasarathy Ranganathan

Does anybody listen to you?

Kate Matsudaira

Uninitialized reads.

Robert C. Seacord

Pervasive, dynamic authentication of physical items.

Meng-Day (Mandel) Yu Srinivas Devadas

What it means to be an entrepreneur today.

Yancey Strickler

Wanted: toolsmiths.

William Regli

The chess player who couldn't pass the salt.

George V. Neville-Neil

Online social networks and global women's empowerment.

Ineke Buskens

Cybersecurity.

Computing the arts.

Esther Shein

Digitizing the world.

Chris Edwards

Sensors on the brain.

Gregory Mone

Crafting a national cyberdefense, and preparing to support computational literacy.

John Arquilla Mark Guzdial

Consider indirect threats of AI, too.

A genetic theory of the Silicon Valley phenomenon.

Vinton G. Cerf

Gender diversity in computing: are we making any progress?

Valerie Barr


Volume 60, Number 3, March 2017
Out of bounds.

Leah Hoffmann

Reasoning on data partitioning for single-round multi-join evaluation in massively parallel systems.

Tom J. Ameloot Gaetano Geck Bas Ketsman Frank Neven Thomas Schwentick

Technical Perspective: Data distribution for fast joins.

Leonid Libkin

Powering the next Billion devices with wi-fi.

Vamsi Talla Bryce Kellogg Benjamin Ransford Saman Naderiparizi Joshua R. Smith Shyamnath Gollakota

Technical Perspective: The power of wi-fi to deliver power.

Srinivasan Keshav

Computational support for academic peer review: a perspective from artificial intelligence.

Simon Price Peter A. Flach

The path to the top: insights from career histories of top CIOs.

Daniel J. Mazzola Robert D. St. Louis Mohan Tanniru

Making the field of computing more inclusive.

Jonathan Lazar Elizabeth F. Churchill Tovi Grossman Gerrit C. van der Veer Philippe A. Palanque John Morris Jennifer Mankoff

Research for practice: distributed transactions and networks as physical sensors.

Peter Bailis Irene Zhang Fadel Adib

Heterogeneous computing: here to stay.

Mohamed Zahran

Time, but faster.

Theo Schlossnagle

Learning with mobile technologies.

Thomas M. Philip

Misconceptions about computer science.

Peter J. Denning Matti Tedre Pat Yongpradit

Where review goes wrong.

Elizabeth Varki

Supreme Court on design patent damages in Samsung v. Apple.

Pamela Samuelson

ACM recognizes new fellows.

Financing the dark web.

Keith Kirkpatrick

The future of semiconductors.

Samuel Greengard

Thinking deeply to make better speech.

Neil Savage

The slow evolution of CS for all, the beauty of programs.

Mark Guzdial Robin K. Hill

Address the consequences of AI in advance.

Grumpy old cells.

Vinton G. Cerf

ACM's commitment to accessibility.

Vicki L. Hanson

ACM's open-conference principle and political reality.

Moshe Y. Vardi


Volume 60, Number 2, February 2017
Fatal guidance.

William Sims Bainbridge

Authentication using pulse-response biometrics.

Ivan Martinovic Kasper Bonne Rasmussen Marc Roeschlin Gene Tsudik

A messy state of the union: taming the composite state machines of TLS.

Benjamin Beurdouche Karthikeyan Bhargavan Antoine Delignat-Lavaud Cédric Fournet Markulf Kohlweiss Alfredo Pironti Pierre-Yves Strub Jean Karim Zinzindohoue

Technical Perspective: Cleaning up flaws in TLS implementations.

Eric Rescorla

Model learning.

Frits W. Vaandrager

Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe.

Herbert E. Bruderer

Copyright enforcement in the digital age: empirical evidence and policy implications.

Brett Danaher Michael D. Smith Rahul Telang

BBR: congestion-based congestion control.

Neal Cardwell Yuchung Cheng C. Stephen Gunn Soheil Hassas Yeganeh Van Jacobson

Are you load balancing wrong?

Thomas A. Limoncelli

Life beyond distributed transactions.

Pat Helland

AI dangers: imagined and real.

Devdatt P. Dubhashi Shalom Lappin

Smart machines are not a threat to humanity.

Alan Bundy

User-centric distributed solutions for privacy-preserving analytics.

Azer Bestavros Andrei Lapets Mayank Varia

The unholy trinity of software development.

George V. Neville-Neil

Fostering creativity through computing.

Aman Yadav Steve Cooper

The future of the internet of things.

Ulf Lindqvist Peter G. Neumann

It's not the algorithm, it's the data.

Keith Kirkpatrick

Are computer chips the new security threat?

Samuel Greengard

Secure quantum communications.

Chris Edwards

Liberal arts academia wants YOU!

Janet Davis

Artificial intelligence.

Use the scientific method in computer science.

Social and ethical behavior in the internet of things.

Francine Berman Vinton G. Cerf

Celebrating 50 years of the Turing award.

Vicki L. Hanson


Volume 60, Number 1, January 2017
Open field tic-tac-toe.

Dennis E. Shasha

HACC: extreme scaling and performance across diverse architectures.

Salman Habib Vitali A. Morozov Nicholas Frontiere Hal Finkel Adrian Pope Katrin Heitmann Kalyan Kumaran Venkatram Vishwanath Tom Peterka Joseph A. Insley David Daniel Patricia K. Fasel Zarija Lukic

Technical Perspective: Mapping the universe.

Valentina Salapura

Eulerian video magnification and analysis.

Neal Wadhwa Hao-Yu Wu Abe Davis Michael Rubinstein Eugene Shih Gautham J. Mysore Justin G. Chen Oral Büyüköztürk John V. Guttag William T. Freeman Frédo Durand

Magnifying motions the right way: technical perspective.

Richard Szeliski

Cell-graphs: image-driven modeling of structure-function relationship.

Bülent Yener

Bottom-up enterprise information systems: rethinking the roles of central IT departments.

Cecil Eng Huang Chua Veda C. Storey

Exponential laws of computing growth.

Peter J. Denning Ted G. Lewis

Research for practice: web security and mobile web computing.

Peter Bailis Jean Yang Vijay Janapa Reddi Yuhao Zhu

Faucet: deploying SDN in the enterprise.

Josh Bailey Stephen Stuart

Resolving conflict.

Kate Matsudaira

Effects of international trafficking in arms regulations changes.

Jeremy Straub

Artificial intelligence: think again.

Jerry Kaplan

Colossal genius: Tutte, Flowers, and a bad imitation of Turing.

Thomas Haigh

Why less is more when it comes to internet jurisdiction.

Michael Geist

Is Google's alphabet a good bet?

Michael A. Cusumano

Bias in technology.

Gregory Mone

Mapping the internet of things.

Alex Wright

Pure randomness extracted from two poor sources.

Don Monroe

What to do about database decay.

Michael Stonebraker Raul Castro Fernandez Dong Deng Michael L. Brodie

How we teach CS2All.

Valerie Barr

Information and misinformation on the internet.

Vinton G. Cerf

The ACM future of computing academy.

Vicki L. Hanson

Technology for the most effective use of mankind.

Moshe Y. Vardi