CACM - volume 62 - 2019 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Jonathan Balkind Michael McKeown Yaosheng Fu Tri Minh Nguyen Yanqi Zhou Alexey Lavrov Mohammad Shahrad Adi Fuchs Samuel Payne Xiaohua Liang Matthew Matl David Wentzlaff
Technical perspective: Bootstrapping a future of open source, specialized hardware. Rethinking search engines and recommendation systems: a game theoretic perspective.Moshe Tennenholtz Oren Kurland
Automated program repair.Claire Le Goues Michael Pradel Abhik Roychoudhury
The rise of serverless computing.Paul C. Castro Vatche Ishakian Vinod Muthusamy Aleksander Slominski
API practices if you hate your customers. Hack for hire. Public entrepreneurship and policy engineering. Uncertainty. Koding academies. Should researchers use data from security breaches? Regulating information technology. Robots aim to boost astronaut efficiency. Malevolent machine learning. Getting high school, college students interested in CS. Online voting still security pipedream. A hands-free ride. Engaging future generations of ACM leaders.DeepXplore: automated whitebox testing of deep learning systems.
Kexin Pei Yinzhi Cao Junfeng Yang Suman Jana
Technical perspective: A whitebox solution for blackbox-like behaviors. An elementary introduction to Kalman filtering.Yan Pei Swarnendu Biswas Donald S. Fussell Keshav Pingali
The five-minute rule 30 years later and its impact on the storage hierarchy.Raja Appuswamy Goetz Graefe Renata Borovica-Gajic Anastasia Ailamaki
The trade-offs between write and read. The effects of mixing machine learning and human judgment. The internet of the orals.Aditya Vashistha Umar Saif Agha Ali Raza
The positive and negative effects of social media in India.Niloy Ganguly Ponnurangam Kumaraguru
Research in theoretical computer science.Meena Mahajan Madhavan Mukund Nitin Saxena
Highlights of software R&D in India.Supratik Chakraborty Vasudeva Varma
The rise of the Indian start-up ecosystem.Charles Assisi Avinash Raghava N. S. Ramnath
Privacy concerns with Aadhaar.Subhashis Banerjee Subodh Sharma
India stack - digital infrastructure as public good.Vivek Raghavan Sanjay Jain Pramod Varma
Indic language computing.Pushpak Bhattacharyya Hema A. Murthy Surangika Ranathunga Ranjiva Munasinghe
The growth and evolution of India's software industry. Computing research at Tata Consultancy Services.Gautam M. Shroff K. Ananth Krishnan
Skill evaluation.Shashank Srikant Rohit Takhar Vishal Venugopal Varun Aggarwal
Technology interventions for road safety and beyond.C. V. Jawahar Venkata N. Padmanabhan
Creative disruption in fintech from Sri Lanka.Ajit Samaranayake Sampath Tilakumara Thayaparan Sripavan Rasika Withanawasam
CSpathshala: bringing computational thinking to schools. Digital transformation in the Indian government. Turbocharging database query processing and testing.Jayant R. Haritsa S. Sudarshan
Designing ICT interventions for women in Pakistan.Maryam Mustafa Amna Batool Agha Ali Raza
Extreme classification. Welcome to the India region special section.P. J. Narayanan Pankaj Jalote Anand Deshpande
Algorithms, platforms, and ethnic bias. An interview with Leonard Kleinrock. Computational thinking should just be good thinking. Europe's controversial digital copyright directive finalized. Real-world applications for drones. When drones fly. Information is physics. The benefits of indolence. You can publish it!: (you have to). The winner-takes-all tech corporation. Hazards of the information superhighway.Ronghui Gu Zhong Shao Hao Chen Jieung Kim Jérémie Koenig Xiongnan (Newman) Wu Vilhelm Sjöberg David Costanzo
Technical Perspective: The scalability of CertiKOS. Protein design by provable algorithms.Mark A. Hallen Bruce Randall Donald
Consumer-grade fabrication and its potential to revolutionize accessibility.Jennifer Mankoff Megan Hofmann Xiang &aposAnthony&apos Chen Scott E. Hudson Amy Hurst Jeeeun Kim
Sampling-based robot motion planning. Unlocking data to improve public policy.Justine S. Hastings Mark Howison Ted Lawless John Ucles Preston White
The evolution of management. Demo data as code. Open source firmware. Multi-device digital assistance.Ryen W. White Adam Fourney Allen Herring Paul N. Bennett Nirupama Chandrasekaran Robert Sim Elnaz Nouri Mark J. Encarnación
What is a chief security officer good for? How might we increase system trustworthiness? The cloud as an innovation platform for software development. The CS teacher shortage. Protecting industrial control systems. Closing in on quantum error correction. Pinning down variables, and taking an agile approach. AI is not an excuse! How ACM evolves in response to community needs.Kiril Vidimce Szu-Po Wang Jonathan Ragan-Kelley Wojciech Matusik
Technical perspective: From virtual worlds to digital fabrication. Metadata-private communication for the 99%. EarSketch: engaging broad populations in computing through music.Jason Freeman Brian Magerko Doug Edwards Tom McKlin Taneisha Lee Roxanne Moore
Alloy: a language and tool for exploring software designs. Computational sustainability: computing for a better world and a sustainable future.Carla P. Gomes Thomas G. Dietterich Christopher Barrett Jon Conrad Bistra Dilkina Stefano Ermon Fei Fang Andrew Farnsworth Alan Fern Xiaoli Z. Fern Daniel Fink Douglas H. Fisher Alexander Flecker Daniel Freund Angela Fuller John M. Gregoire John E. Hopcroft Steve Kelling J. Zico Kolter Warren B. Powell Nicole D. Sintov John S. Selker Bart Selman Daniel Sheldon David B. Shmoys Milind Tambe Weng-Keen Wong Christopher Wood Xiaojian Wu Yexiang Xue Amulya Yadav Abdul-Aziz Yakubu Mary Lou Zeeman
DAML: the contract language of distributed ledgers. Velocity in software engineering. Surviving software dependencies. Bitwise: a life in code. An interview with Andrew Odlyzko on cyber security. Online voting: we can do it! (we have to). Internet immunity and the freedom to code. Can you locate your location data? Augmented reality gets real. An inability to reproduce. Why programmers should curb their enthusiasm, and thinking about computational thinking. On being 'random enough'. The long game of research. Polyglot! Sustaining open collaboration in universities.Kasper Green Larsen Jelani Nelson Huy L. Nguyen Mikkel Thorup
Technical perspective: The true cost of popularity. The history of digital spam. Activity-centric computing systems.Jakob E. Bardram Steven Jeuris Paolo Tell Steven Houben Stephen Voida
Scaling static analyses at Facebook.Dino Distefano Manuel Fähndrich Francesco Logozzo Peter W. O&aposHearn
Embedded EthiCS: integrating ethics across CS education.Barbara J. Grosz David Gray Grant Kate Vredenburgh Jeff Behrends Lily Hu Alison Simmons Jim Waldo
Overly attached. Research for practice: the DevOps phenomenon.Anna Wiedemann Nicole Forsgren Manuel Wiesche Heiko Gewald Helmut Krcmar
Industry-scale knowledge graphs: lessons and challenges.Natalya Fridman Noy Yuqing Gao Anshu Jain Anant Narayanan Alan Patterson Jamie Taylor
The success of the web: a triumph of the amateurs. MUST and MUST NOT. A response to fake news as a response to Citizens United. Block-based programming in computer science education. What makes a robot likable? I don't understand my car. The algorithm that changed quantum machine learning. Cutting the wait for CS advice. A case against mission-critical applications of machine learning. Undo, redo, and regrets. Dispelling common myths about ACM awards and honors.Arash Molavi Kakhki Samuel Jero David R. Choffnes Cristina Nita-Rotaru Alan Mislove
Do you know why your web pages load faster?: technical perspective. Unifying logical and statistical AI with Markov logic. Internet of things search engine.Nguyen Khoi Tran Quan Z. Sheng Muhammad Ali Babar Lina Yao Wei Emma Zhang Schahram Dustdar
Ways of thinking in informatics.Christopher Frauenberger Peter Purgathofer
On the hourglass model. Access controls and healthcare records: who owns the data?The top 10 things executives should know about software. Extract, shoehorn, and load. GOTO rankings considered helpful.
Emery Berger Stephen M. Blackburn Carla E. Brodley H. V. Jagadish Kathryn S. McKinley Mario A. Nascimento Minjeong Shin Kuansan Wang Lexing Xie
A new labor market for people with 'coolabilities'.David Nordfors Chally Grundwag V. R. Ferose
Who benefits? API copyrights revisited. Protecting the 2020 census. The edge of computational photography. Good algorithms make good neighbors. Bringing more women, immigrants, to computer science. To serve humanity. Back to the future, part II. Halfway round!: growing the regional special sections.Tony Nowatzki Vinay Gangadhar Karthikeyan Sankaralingam
Technical perspective: Back to the edge. The challenge of crafting intelligible intelligence. Engineering trustworthy systems: a principled approach to cybersecurity. Programmable solid-state storage in future cloud datacenters.Jaeyoung Do Sudipta Sengupta Steven Swanson
Research for practice: troubling trends in machine-learning scholarship.Zachary C. Lipton Jacob Steinhardt
How to create a great team culture (and why it matters). Garbage collection as a joint venture.Ulan Degenbaev Michael Lippautz Hannes Payer
Personal data and the internet of things.Thomas F. J.-M. Pasquier David M. Eyers Jean Bacon
An interview with David Brin on resiliency. Through computer architecture, darkly.A. Theodore Markettos Robert N. M. Watson Simon W. Moore Peter Sewell Peter G. Neumann
Global data justice. Ethics in technology jobs. And then, there were three. Lifelong learning in artificial neural networks. Neural net worth. Is CS really for all, and defending democracy in cyberspace. Back to the future. ACM awards honor CS contributions.Ahmed Elgohary Matthias Boehm Peter J. Haas Frederick R. Reiss Berthold Reinwald
Technical perspective: Compressing matrices for large-scale machine learning. Algorithmic randomness.Rod Downey Denis R. Hirschfeldt
The limit of blockchains: infeasibility of a smart Obama-Trump contract.Yongge Wang Qutaibah M. Malluhi
Countering the negative image of women in computing. Net neutrality: unexpected solution to blockchain scaling. Online event processing.Martin Kleppmann Alastair R. Beresford Boerge Svingen
Achieving digital permanence. Enterprise wi-fi: we need devices that are secure by default.Alberto Bartoli Eric Medvet Andrea De Lorenzo Fabiano Tarlao
What does it mean for a computing curriculum to succeed?Emmanuel Schanzer Shriram Krishnamurthi Kathi Fisler
Encryption and surveillance. Continuity and change in internet law. Deep insecurities: the internet of things shifts technology risk. Code talkers. Questioning quantum. Implementing guidelines for governance, oversight of AI, and automation. Don't ignore the cost of 'embedded energy'.Stefan Monnier Andrew A. Chien Robert L. Glass Charles H. Davis Thorkil Naur Thomas A. Limoncelli
Quantum hype and quantum skepticism. APIs, standards, and enabling infrastructure.Umesh V. Vazirani Thomas Vidick
Was Edgar Allan Poe wrong after all?: technical perspective. Cyber security in the quantum era. Neural algorithms and computing beyond Moore's law. Analytics for managerial work. Research for practice: edge computing. Metrics that matter.Benjamin Treynor Sloss Shylaja Nukala Vivek Rau
Identity by any other name. Web science in Europe: beyond boundaries.Steffen Staab Susan Halford Wendy Hall
Toward a European exascale ecosystem: the EuroHPC joint undertaking. The European perspective on responsible computing. Informatics as a fundamental discipline for the 21st century.Michael E. Caspersen Judith Gal-Ezer Andrew D. McGettrick Enrico Nardelli
Women are needed in STEM: European policies and incentives.Panagiota Fatourou Yota Papageorgiou Vasiliki Petousi
Connected things connecting Europe.Julie A. McCann Gian Pietro Picco Alexander Gluhak Karl Henrik Johansson Martin Törngren Laila Gide
ACM Europe Council's best paper awards.Joaquim A. Jorge Mashhuda Glencross Aaron Quigley
HiPEAC: a European network built to last.Koen De Bosschere Marc Duranton Madeleine Gray
Incorporating Europe's values in future research. New European data privacy and cyber security laws: one year later. Europe's well-connected consumers. Europe's ambitious ICT agenda. Enterprises lead ICT innovation in Europe. A demographic snapshot of the IT workforce in Europe. Welcome to the Europe region special section. The web is missing an essential part of infrastructure: an open web index. Know your algorithms. Free trade in a digital world. The fine line between coercion and care. The future of data storage. Soft robots look to new environments. Pondering variables and direct instruction. In debt to the NSF.Stephen A. Fenner Rohit Gurjar Thomas Thierauf
Technical perspective: Isolating a matching when your coins go missing. Predicting program properties from 'big code'.Veselin Raychev Martin T. Vechev Andreas Krause
Technical perspective: Borrowing big code to automate programming activities. Beyond worst-case analysis. The compositional architecture of the internet. Blogging birds: telling informative stories about the lives of birds from telemetric data.Advaith Siddharthan Kapila Ponnamperuma Chris Mellish Cheng Zeng Daniel Heptinstall Annie Robinson Stuart Benn René van der Wal
Metamorphic testing of driverless cars. The seven tools of causal inference, with reflections on machine learning. Understanding database reconstruction attacks on public data.Simson L. Garfinkel John M. Abowd Christian Martindale
Design patterns for managing up. A hitchhiker's guide to the blockchain universe. From computational thinking to computational action.Mike Tissenbaum Josh Sheldon Hal Abelson
It's about power. An interview with William Hugh Murray. Potential 'dark sides' of leisure technology use in youth. Questioning a new intellectual property right for press publishers. Electronics need rare earths. Exoskeletons today. Building a better battery. Smoothing the path to computing: pondering uses for big data.Mary W. Hall Richard E. Ladner Diane Levitt Manuel A. Pérez-Quiñones Saurabh Bagchi
Lost in math? Ownership vs. stewardship. Owning computing's environmental impact.Matteo Brucato Azza Abouzied Alexandra Meliou
To do or not to do: extending SQL with integer linear programming?: technical perspective. Distributed strategies for computational sprints.Songchun Fan Seyed Majid Zahedi Benjamin C. Lee
How economic theories can help computers beat the heat: technical perspective. Separation logic. Blockchains from a distributed computing perspective. SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution.Juan Pablo Bello Cláudio T. Silva Oded Nov R. Luke DuBois Anish Arora Justin Salamon Charles Mydlarz Harish Doraiswamy
Even central users do not always drive information diffusion.Chao Gao Zhen Su Jiming Liu Jürgen Kurths
A new golden age for computer architecture.John L. Hennessy David A. Patterson
The importance of a great finish. CodeFlow: improving the code review process at Microsoft.Do we really need computational thinking? Tony's law. Writing a test plan. How computer science at CMU is attracting and retaining women.
Carol Frieze Jeria L. Quesenberry
2018: a big year for privacy. Being recognized everywhere. Technologizing agriculture. A brave new world of genetic engineering. Seeking digital humanities, IT tech support.Herbert E. Bruderer Robin K. Hill
Between the lines in the China region special section.Libraries considered hazardous.
David Adrian Karthikeyan Bhargavan Zakir Durumeric Pierrick Gaudry Matthew Green J. Alex Halderman Nadia Heninger Drew Springall Emmanuel Thomé Luke Valenta Benjamin VanderSloot Eric Wustrow Santiago Zanella Béguelin Paul Zimmermann
Technical perspective: Attacking cryptographic key exchange with precomputation. Face2Face: real-time face capture and reenactment of RGB videos.Justus Thies Michael Zollhöfer Marc Stamminger Christian Theobalt Matthias Nießner
Technical perspective: Photorealistic facial digitization and manipulation. Deception, identity, and security: the game theory of sybil attacks.William Casey Ansgar Kellner Parisa Memarmoshrefi Jose Andre Morales Bud Mishra
Intelligent systems for geosciences: an essential research agenda.Yolanda Gil Suzanne A. Pierce Hassan A. Babaie Arindam Banerjee Kirk D. Borne Gary Bust Michelle Cheatham Imme Ebert-Uphoff Carla Gomes Mary C. Hill John Horel Leslie Hsu Jim Kinter Craig A. Knoblock David M. Krum Vipin Kumar Pierre Lermusiaux Yan Liu Chris North Victor Pankratius Shanan Peters Beth Plale Allen Pope Sai Ravela Juan Restrepo Aaron J. Ridley Hanan Samet Shashi Shekhar
The Church-Turing thesis: logical limit or breachable barrier? Framework for implementing a big data ecosystem in organizations.Sergio Orenga-Roglá Ricardo Chalmeta
Autonomous tools and design: a triple-loop approach to human-machine learning.Stefan Seidel Nicholas Berente Aron Lindberg Kalle Lyytinen Jeffrey V. Nickerson
SQL is no excuse to avoid DevOps. Research for practice: security for the modern age. Using remote cache service for bazel. Modeling in engineering and science. UCF's 30-year REU site in computer vision. Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo. CRISPR: an emerging platform for gene editing. Illegal pricing algorithms. Who owns 3D scans of historic sites? Hidden messages fool AI. Quantum leap. Answering children's questions about computers. Are we having an ethical crisis in computing? A people-centered economy. Open collaboration in an age of distrust.