


default search action
Communications of the ACM, Volume 55
Volume 55, Number 1, January 2012 (EE)
- Moshe Y. Vardi:
Artificial intelligence: past and future. 5
- Software engineering is engineering. 6-7
- Alain Chesnais:
ACM president's letter. 8 - Alain Chesnais:
ACM's annual report. 9-13
- Mark Guzdial
, Bertrand Meyer
:
Understanding CS1 students; defective software. 14-15
- Scott E. Delman
:
eBooks will abound in the ACM Digital Library. 16
- Neil Savage:
Better medicine through machine learning. 17-19 - Gary Anthes:
Revamping storage performance. 20-22 - Samuel Greengard:
Law and disorder. 23-25 - Sarah Underwood:
Celebration time. 26 - Alex Wright:
Analyzing Apple products. 27 - Paul Hyman:
John McCarthy, 1927-2011. 28-29
- Randal C. Picker:
The yin and yang of copyright and technology. 30-32
- Phillip G. Armour:
The difference engine. 33-34
- Thomas Haigh
:
The IBM PC: from beige box to industry standard. 35-37
- Kai A. Olsen, Alessio Malizia
:
Interfaces for the ordinary user: can we hide too much? 38-40
- Philip L. Frana:
An interview with Stephen A. Cook. 41-46
- Matthew Flatt:
Creating languages in Racket. 48-56 - Jim Gettys, Kathleen M. Nichols:
Bufferbloat: dark buffers in the internet. 57-65 - Carl A. Waldspurger
, Mendel Rosenblum:
I/O virtualization. 66-73
- Jason I. Hong
:
The state of phishing attacks. 74-81 - Geoff Coulson, Barry Porter
, Ioannis Chatzigiannakis
, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun
, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner:
Flexible experimentation in wireless sensor networks. 82-90 - Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu:
Long-term confidentiality of PKI. 91-95
- Roberto Manduchi, James M. Coughlan:
(Computer) vision without sight. 96-104
- Frédo Durand:
Where do people draw lines?: technical perspective. 106 - Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas A. Funkhouser, Szymon Rusinkiewicz
:
Where do people draw lines? 107-115 - Jim Kurose:
Content-centric networking: technical perspective. 116 - Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nick Briggs, Rebecca Braynard:
Networking named content. 117-124
- Daniel H. Wilson:
Future tense. 136-
Volume 55, Number 2, February 2012 (EE)
- Fabrizio Gagliardi:
Revisiting ACM Europe. 5
- Credit non-anonymous reviewers with a name. 6-7
- Michael Stonebraker, Jason I. Hong:
Researchers' big data crisis; understanding design and functionality. 10-11
- Gregory Goth:
The science of better science. 13-15 - Samuel Greengard:
The war against botnets. 16-18 - Alex Wright:
The social life of robots. 19-21 - ACM Fellows inducted. 23
- Gregory L. Rosston
:
Incentive auctions. 24-26
- Beth Simon, Quintin I. Cutts:
Peer instruction: a teaching method to foster deep understanding. 27-29
- Donald A. Norman
:
Yet another technology cusp: confusion, vendor wars, and opportunities. 30-32
- George V. Neville-Neil
:
Wanton acts of debuggery. 33-34
- Rose McDermott
:
Emotion and security. 35-37
- Marvin V. Zelkowitz:
What have we learned about software engineering? 38-39
- BufferBloat: what's wrong with the internet? 40-47
- Hans-Juergen Boehm, Sarita V. Adve:
You don't know jack about shared variables or memory models. 48-54 - Adam J. Oliner, Archana Ganapathi, Wei Xu:
Advances and challenges in log analysis. 55-61
- Nicholas E. Evangelopoulos
, Lucian L. Visinescu:
Text-mining the voice of the people. 62-69 - Holger H. Hoos
:
Programming by optimization. 70-80 - Bryce Allen, John Bresnahan, Lisa Childers, Ian T. Foster, Gopi Kandaswamy, Rajkumar Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke
:
Software as a service for data scientists. 81-88
- Miad Faezipour
, Mehrdad Nourani, Adnan Saeed, Sateesh Addepalli:
Progress and challenges in intelligent vehicle area networks. 90-100
- Rastislav Bodík:
Compiling what to how: technical perspective. 102 - Viktor Kuncak, Mikaël Mayer, Ruzica Piskac
, Philippe Suter:
Software synthesis procedures. 103-111 - Santosh S. Vempala:
Modeling high-dimensional data: technical perspective. 112 - Adam Tauman Kalai, Ankur Moitra, Gregory Valiant:
Disentangling Gaussians. 113-120
- Peter Winkler
:
Puzzled. 128
Volume 55, Number 3, March 2012 (EE)
- Moshe Y. Vardi:
What is an algorithm? 5
- From syntax to semantics for AI. 6-7
- Bertrand Meyer:
Knowledgeable beginners. 10-11
- Neil Savage:
Gaining wisdom from crowds. 13-15 - Gary Anthes:
Computing with magnets. 16-18 - Samuel Greengard:
Policing the future. 19-21 - Paul Hyman:
Stanford schooling - gratis! 22 - Jack Rosenberger:
Computer science awards. 23
- Patrick Lin
, Fritz Allhoff, Neil C. Rowe:
War 2.0: cyberweapons and ethics. 24-26
- Pamela Samuelson:
Do software copyrights protect what programs do? 27-29
- Peter J. Denning:
The idea idea. 30-32
- Vassilis Kostakos
:
Training users vs. training soldiers: experiences from the battlefield. 33-35 - Alessio Malizia
, Andrea Bellucci
:
The artificiality of natural user interfaces. 36-38
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:
SAGE: whitebox fuzzing for security testing. 40-44 - Luigi Rizzo
:
Revisiting network I/O APIs: the netmap framework. 45-51 - Poul-Henning Kamp:
The hyperdimensional tar pit. 52-53
- Youngki Lee, S. S. Iyengar
, Chulhong Min, Younghyun Ju, Seungwoo Kang
, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song:
MobiCon: a mobile context-monitoring platform. 54-65 - Seung-Hyun Kim, Qiu-Hong Wang
, Johannes Ullrich:
A comparative study of cyberattacks. 66-73
- S. Barry Cooper:
Turing's Titanic machine? 74-83 - J. Y. Huang, C. H. Tsai, Shing-Tsaan Huang:
The next generation of GPS navigation systems. 84-93
- Steven D. Gribble
:
The benefits of capability-based protection: technical perspective. 96 - Robert N. M. Watson, Jonathan Anderson
, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. 97-104 - Michael L. Littman:
A new way to search game trees: technical perspective. 105 - Sylvain Gelly, Levente Kocsis, Marc Schoenauer
, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud:
The grand challenge of computer Go: Monte Carlo tree search and extensions. 106-113
- Peter Winkler
:
Puzzled. 118 - Leah Hoffmann:
Q&A. 120-
Volume 55, Number 4, April 2012 (EE)
- Yunhao Liu, Vincent Y. Shen:
ACM China Council. 5
- The beauty of simplicity. 6-7
- Daniel Reed, Mark Guzdial
:
The power of computing; design guidelines in CS education. 8-9
- Gregory Goth:
Preserving digital data. 11-13 - Tom Geller:
Talking to machines. 14-16 - Leah Hoffmann:
Open for business. 17-19
- Michael A. Cusumano:
Can services and platform thinking help the U.S. Postal Service? 21-23
- Richard Heeks
:
Information technology and gross national happiness. 24-26
- George V. Neville-Neil
:
The network protocol battle. 27-28
- Jill Ross, Elizabeth Litzler
, Joanne McGrath Cohoon, Lucy Sanders:
Improving gender composition in computing. 29-31
- Selma Tekir
:
Reading CS classics. 32-34 - Daniel S. Soper:
Is human mobility tracking a good idea? 35-37
- Brian Beckman:
Why LINQ matters: cloud composability guaranteed. 38-44 - Jeffrey Heer, Ben Shneiderman:
Interactive dynamics for visual analysis. 45-54 - Andrew Danowitz
, Kyle Kelley, James Mao, John P. Stevenson, Mark Horowitz:
CPU DB: recording microprocessor history. 55-63
- Martin Schmettow:
Sample size in usability studies. 64-70 - Laurie A. Williams:
What agile teams think of agile principles. 71-76
- David M. Blei:
Probabilistic topic models. 77-84 - Sarvapali D. Ramchurn, Perukrishnen Vytelingum, Alex Rogers, Nicholas R. Jennings
:
Putting the 'smarts' into the smart grid: a grand challenge for artificial intelligence. 86-97
- Dinesh Manocha
:
Building robust dynamical simulation systems: technical perspective. 101 - David Harmon, Etienne Vouga, Breannan Smith, Rasmus Tamstorf
, Eitan Grinspun:
Asynchronous contact mechanics. 102-109 - Ed H. Chi:
Who knows?: searching for expertise on the social web: technical perspective. 110 - Damon Horowitz, Sepandar D. Kamvar:
Searching the village: models and methods for social search. 111-118
- Brian Clegg:
Future tense. 120-
Volume 55, Number 5, May 2012 (EE)
- Moshe Y. Vardi:
Fair access. 5
- Judy Robertson
:
Likert-type scales, statistical methods, and effect sizes. 6-7
- Neil Savage:
Automating scientific discovery. 9-11 - Alex Wright:
Robots like us. 12-13 - Samuel Greengard:
Digitally possessed. 14-16 - Paul Hyman:
A workshop revival. 17
- Gerald Segal:
ACM's 2012 general election. 19-29
- Peter S. Menell:
Design for symbiosis. 30-32
- David Anderson:
The future of the past. 33-34
- Joel Waldfogel
:
Digitization and copyright: some recent evidence from music. 35-37
- Alexander Repenning
:
Programming goes back to school. 38-40
- Abraham Bernstein
, Mark Klein, Thomas W. Malone:
Programming the global brain. 41-43 - Armando Fox, David A. Patterson:
Crossing the software education chasm. 44-49
- Eric Allman:
Managing technical debt. 50-55 - Pat Helland:
Idempotence is not a medical condition. 56-65 - Erik Meijer:
Your mouse is a database. 66-73
- Alok N. Choudhary, William Hendrix, Kathy Lee, Diana Palsetia, Wei-keng Liao
:
Social media evolution of the Egyptian revolution. 74-80 - Daniel S. Soper, Ofir Turel
:
An n-gram analysis of Communications 2000-2010. 81-87
- Nir Atias, Roded Sharan:
Comparative analysis of protein networks: hard problems, practical solutions. 88-97
- William Gropp
:
Best algorithms + best computers = powerful match. 100 - Ilya Lashuk, Aparna Chandramowlishwaran
, Harper Langston, Tuan-Anh Nguyen, Rahul S. Sampath, Aashay Shringarpure, Richard W. Vuduc
, Lexing Ying, Denis Zorin, George Biros:
A massively parallel adaptive fast multipole method on heterogeneous architectures. 101-109 - Steven Hand:
An experiment in determinism. 110 - Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
:
Efficient system-enforced deterministic parallelism. 111-119
- Peter Winkler:
Puzzled. 120
Volume 55, Number 6, June 2012 (EE)
- Eugene H. Spafford
:
USACM and U.S. legislation. 5
- The halting problem in the clear light of probability. 6-7
- Jason I. Hong
, Greg Linden:
Protecting against data breaches; living with mistakes. 10-11
- Scott E. Delman
:
Don't throw the baby out with the bathwater. 12
- Gregory Goth:
Analyzing medical data. 13-15 - Gary Anthes:
Smarter photography. 16-18 - Leah Hoffmann:
Data mining meets city hall. 19-21 - Neil Savage:
Game changer. 22-23 - Paul Hyman:
An influential theoretician. 24
- Phillip G. Armour:
A measure of control. 26-28
- Simson L. Garfinkel
:
The cybersecurity risk. 29-32
- George V. Neville-Neil
:
Scale failure. 33-34
- Chris Hall:
Security of the internet and the known unknowns. 35-37
- Peter J. Denning, Nicholas Dew:
The myth of the elevator pitch. 38-40
- Herbert Lin:
Why computer scientists should care about cyber conflict and U.S. national security policy. 41-43
- Dennis Abts, Bob Felderman:
A guided tour of data-center networking. 44-51 - David J. Crandall, Noah Snavely:
Modeling people and places with internet photo collections. 52-60 - Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov:
Real-time computer vision with OpenCV. 61-69
- Benjamin Doerr, Mahmoud Fouz, Tobias Friedrich:
Why rumors spread so quickly in social networks. 70-75 - Bryan Parno:
Trust extension for commodity computers. 76-85
- Michael J. Carey, Nicola Onose, Michalis Petropoulos:
Data services. 86-97 - Ketan Mulmuley:
The GCT program toward the P vs. NP problem. 98-107
- Pablo A. Parrilo
:
Reconstructing the unknown, balancing structure and uncertainty: technical perspective. 110 - Emmanuel J. Candès, Benjamin Recht:
Exact matrix completion via convex optimization. 111-119 - Peter Lee:
The fox and the hedgehog: technical perspective. 120 - Tiark Rompf, Martin Odersky:
Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs. 121-130
- Peter Winkler
:
Puzzled. 133 - Leah Hoffmann:
Q&A. 136-
Volume 55, Number 7, July 2012 (EE)
- Moshe Y. Vardi:
Predatory scholarly publishing. 5
- An integral number and its consequences. 7-8
- Mark Guzdial
, Judy Robertson
:
CS and popular culture; learning from console games. 10-11
- Gregory Goth:
Degrees of separation. 13-15 - Gary Anthes:
HTML5 leads a web revolution. 16-17 - Marina Krakovsky:
Patently inadequate. 18-20 - Paul Hyman:
Lost and found. 21
- Mari Sako:
Business models for strategy and innovation. 22-24
- Pamela Samuelson:
Can online piracy be stopped by laws? 25-27
- Richard T. Watson, Jacqueline Corbett
, Marie-Claude Boudreau
, Jane Webster:
An information strategy for environmental sustainability. 28-30
- Martin Campbell-Kelly:
Alan Turing's other universal machine. 31-33
- Alfred Z. Spector, Peter Norvig, Slav Petrov:
Google's hybrid approach to research. 34-37 - Sarah Spiekermann:
The challenges of privacy by design. 38-40
- Kathleen M. Nichols, Van Jacobson:
Controlling queue delay. 42-50 - Poul-Henning Kamp:
My compiler does not understand me. 51-53 - Eric Bouwers, Joost Visser
, Arie van Deursen
:
Getting what you measure. 54-59
- James Abello, Peter Broadwell
, Timothy R. Tangherlini
:
Computational folkloristics. 60-70 - Ian Sommerville, Dave Cliff
, Radu Calinescu
, Justin Keen, Tim Kelly, Marta Z. Kwiatkowska, John A. McDermid
, Richard F. Paige:
Large-scale complex IT systems. 71-77 - Milo M. K. Martin, Mark D. Hill, Daniel J. Sorin:
Why on-chip cache coherence is here to stay. 78-89
- David Harel, Assaf Marron, Gera Weiss
:
Behavioral programming. 90-100
- David A. Patterson:
For better or worse, benchmarks shape a field: technical perspective. 104 - Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn
, Kathryn S. McKinley:
Looking back and looking forward: power, performance, and upheaval. 105-114 - Amos Fiat:
Why study the price of anarchy?: technical perspective. 115 - Tim Roughgarden:
Intrinsic robustness of the price of anarchy. 116-123
- Ken MacLeod:
Future Tense. 128-
- Matthew Swinarski, Diane H. Parente, Rajiv Kishore:
Do small IT firms benefit from higher process capability? 129-134
Volume 55, Number 8, August 2012 (EE)
- Bill Poucher:
Giving students the competitive edge. 5
- Composable trees for configurable behavior. 7
- John Langford, Ruben Ortega:
Machine learning and algorithms; agile development. 10-11
- Jeff Kanipe:
Cosmic simulations. 13-15 - Tom Geller:
DARPA Shredder challenge solved. 16-17 - Samuel Greengard:
Advertising gets personal. 18-20 - Karen A. Frenkel:
Broader horizons. 21
- Paul Tjia:
Inside the hermit kingdom: IT and outsourcing in North Korea. 22-25
- Fred G. Martin
:
Will massive open online courses change how we teach? 26-28
- danah boyd
:
The politics of "real names". 29-31
- George V. Neville-Neil
:
A system is not a product. 32-33
- Chris Forman, Avi Goldfarb
, Shane Greenstein:
The internet is everywhere, but the payoff is not. 34-35
- Kai A. Olsen, Hans Fredrik Nordhaug:
Internet elections: unsafe in any home? 36-38 - Neil McBride:
The ethics of software engineering should be an ethics for the client. 39-41
- Thomas A. Limoncelli:
OpenFlow: a radical new idea in networking. 42-47 - Rafael Vanoni Polanczyk:
Extending the semantics of scheduling priorities. 48-52 - Manuel Serrano, Gérard Berry:
Multitier programming in Hop. 53-59
- Stephen B. Wicker:
The loss of location privacy in the cellular age. 60-68 - Bjorn De Sutter, Aäron van den Oord:
To be or not to be cited in computer science. 69-75 - Wil M. P. van der Aalst
:
Process mining. 76-83
- Scott Aaronson, Edward Farhi, David Gosset, Avinatan Hassidim, Jonathan A. Kelner, Andrew Lutomirski:
Quantum money. 84-92
- Martin C. Rinard:
Example-driven program synthesis for end-user programming: technical perspective. 96 - Sumit Gulwani, William R. Harris, Rishabh Singh:
Spreadsheet data manipulation using examples. 97-105 - Andreas Zeller
:
Proving programs continuous: technical perspective. 106 - Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman:
Continuity and robustness of programs. 107-115
- Peter Winkler:
Puzzled. 120
Volume 55, Number 9, September 2012 (EE)
- Moshe Y. Vardi:
Why ACM? 5
- Operationalizing privacy by design. 7
- Bertrand Meyer:
Incremental research vs. paradigm-shift mania. 8-9
- Gregory Goth:
Atomic-level computing. 11-13 - Gary Anthes:
Chips go upscale. 14-16 - Marina Krakovsky:
Garbage in, info out. 17-19 - Paul Hyman:
In honor of Alan Turing. 20-23
- Thomas Haigh
:
Seven lessons from bad history. 26-29
- Peter J. Denning:
Don't feel bad if you can't predict the future. 30-32
- Tal Z. Zarsky:
Automated prediction: perception, law, and policy. 33-35
- Richard E. Ladner
, Elizabeth Litzler
:
The need to balance innovation and implementation in broadening participation. 36-38
- Esperanza Marcos
, Juan Manuel Vara
, Valeria de Castro
:
Author order: what science can learn from the arts. 39-41 - Christos H. Papadimitriou:
Alan and I. 42-43
- David Chisnall
:
A new Objective-C runtime: from research to production. 44-47 - Emery D. Berger
:
Software needs seatbelts and airbags. 48-53 - Erik Meijer:
All your database are belong to us. 54-60
- Gary Garrison, Sanghyun Kim, Robin L. Wakefield:
Success factors for deploying cloud computing. 62-68 - Radu Calinescu
, Carlo Ghezzi, Marta Z. Kwiatkowska, Raffaela Mirandola
:
Self-adaptive software needs quantitative verification at runtime. 69-77
- Doug A. Bowman
, Ryan P. McMahan
, Eric D. Ragan:
Questioning naturalism in 3D user interfaces. 78-88
- William Buxton:
Innovative interaction: from concept to the wild: technical perspective. 90 - Shumin Zhai, Per Ola Kristensson:
The word-gesture keyboard: reimagining keyboard interaction. 91-101 - Dan Suciu
:
SQL on an encrypted database: technical perspective. 102 - Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: processing queries on an encrypted database. 103-111
- Peter Winkler
:
Puzzled. 117 - Leah Hoffmann:
Q&A. 120-
Volume 55, Number 10, October 2012 (EE)
- Vinton G. Cerf:
Where is the science in computer science? 5
- When harm to conference reputation is self-inflicted. 6-7
- Daniel Reed, Ed H. Chi:
Online privacy; replicating research results. 8-9
- Neil Savage:
Digging for drug facts. 11-13 - Gregory Mone:
Redesigning the data center. 14-16 - Leah Hoffmann:
Computer science and the three Rs. 17-19
- Michael A. Cusumano:
Reflecting on the Facebook IPO. 20-23
- Phillip G. Armour:
The Goldilocks estimate. 24-25
- Peter G. Neumann:
The foresight saga, redux. 26-29
- George V. Neville-Neil
:
A nice piece of code. 30-31
- Jean-François Blanchette:
Computing as if infrastructure mattered. 32-34 - Ivan E. Sutherland:
The tyranny of the clock. 35-36
- Rick Ratzel, Rodney Greenstreet:
Toward higher precision. 38-47 - John Allspaw
:
Fault injection in production. 48-52 - Poul-Henning Kamp:
A generation lost in the bazaar. 53-55
- Michael J. Kearns:
Experiments in social computation. 56-67 - Barbara Simons, Douglas W. Jones:
Internet voting in the U.S. 68-77
- Pedro M. Domingos:
A few useful things to know about machine learning. 78-87
- Rocco A. Servedio
:
A high-dimensional surprise: technical perspective. 89 - Guy Kindler, Anup Rao, Ryan O'Donnell, Avi Wigderson:
Spherical cubes: optimal foams from computational hardness amplification. 90-97 - Bruce Hendrickson:
Graph embeddings and linear equations: technical perspective. 98 - Ioannis Koutis, Gary L. Miller, Richard Peng
:
A fast solver for a class of linear systems. 99-107
- Geoffrey A. Landis:
Future tense. 112
Volume 55, Number 11, November 2012 (EE)
- Moshe Y. Vardi:
Will MOOCs destroy academia? 5 - Vinton G. Cerf:
Why is accessibility so hard? 7
- When predicting, start with humility. 8-9
- Michael Stonebraker:
New opportunities for New SQL. 10-11 - Bernard Rous
:
Major update to ACM's Computing Classification System. 12
- Gregory Goth:
Software on Mars. 13-15 - Tom Geller:
Control without controllers. 16-18 - Samuel Greengard:
On the digital trail. 19-21
- David A. Basin, Srdjan Capkun:
The research value of publishing attacks. 22-24
- Pamela Samuelson:
Oracle v. Google: are APIs copyrightable? 25-27
- Kristina McElheran
:
Decentralization versus centralization in IT governance. 28-30
- Aman Yadav
, John T. Korb
:
Learning to teach computer science: the need for a methods course. 31-33
- Timothy Kostyk, Joseph Herkert
:
Societal implications of the emerging smart grid. 34-36
- Richard A. DeMillo:
Keeping technology promises. 37-39
- Jesse Robbins, Kripa Krishnan, John Allspaw
, Tom Limoncelli:
Resilience engineering: learning to embrace failure. 40-47 - Kripa Krishnan:
Weathering the unexpected. 48-52 - Marshall K. McKusick:
Disks from the perspective of a file system. 53-55
- Dan Boneh, Amit Sahai, Brent Waters:
Functional encryption: a new vision for public-key cryptography. 56-64 - Jörg K. Wegner
, Aaron D. Sterling, Rajarshi Guha, Andreas Bender
, Jean-Loup Faulon, Janna Hastings
, Noel M. O'Boyle
, John P. Overington
, Herman van Vlijmen, Egon L. Willighagen
:
Cheminformatics. 65-75
- Rolf Pfeifer, Max Lungarella, Fumiya Iida
:
The challenges ahead for bio-inspired 'soft' robotics. 76-87
- Richard Szeliski:
Open platforms for computational photography: technical perspective. 89 - Andrew Adams, David E. Jacobs, Jennifer Dolson, Marius Tico, Kari Pulli, Eino-Ville Talvala, Boris Ajdin, Daniel A. Vaquero, Hendrik P. A. Lensch, Mark Horowitz, Sung Hee Park, Natasha Gelfand, Jongmin Baek, Wojciech Matusik, Marc Levoy:
The Frankencamera: an experimental platform for computational photography. 90-98 - Henning Schulzinne:
The realities of home broadband: technical perspective. 99 - Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè:
Measuring home broadband performance. 100-109
- Peter Winkler:
Puzzled. 120
Volume 55, Number 12, December 2012 (EE)
- Mary W. Hall
:
Understanding ACM's past. 5
- Vinton G. Cerf:
Computer science revisited. 7
- Why open access? 8-9
- Mark Guzdial
, Judy Robertson:
Levels of abstraction: pre-teens and career choices. 12-13
- Gregory Goth:
Quantum quests. 15-17 - Gary Anthes:
Zoom in, zoom out. 18-19 - Paul Hyman:
In the year of disruptive education. 20-22
- Richard Heeks
:
IT innovation for the bottom of the pyramid. 24-27
- David Anderson:
Saving private Gromit. 28-30
- George V. Neville-Neil
:
Can more code mean fewer bugs? 31-32
- Peter J. Denning:
Moods. 33-35
- Teresa A. Dahlberg:
Why we need an ACM Special Interest Group for broadening participation. 36-38
- William Newman:
Alan Turing remembered. 39-40
- Ivar Jacobson, Pan Wei Ng, Paul McMahon, Ian Spence, Svante Lidman:
The essence of software engineering: the SEMAT kernel. 42-49 - Aiman Erbad
, Charles Krasic:
Sender-side buffers and the case for multimedia adaptation. 50-58 - Michael Cornwell:
Anatomy of a solid-state drive. 59-63
- Bryce Thomas, Raja Jurdak
, Ian Atkinson
:
SPDYing up the web. 64-73 - Robert M. French:
Moving beyond the Turing test. 74-77
- David Doty
:
Theory of algorithmic self-assembly. 78-88
- Yannis Smaragdakis:
High-level data structures: technical perspective. 90 - Peter Hawkins, Martin C. Rinard, Alex Aiken
, Mooly Sagiv, Kathleen Fisher:
An introduction to data representation synthesis. 91-99 - Ali Jadbabaie:
Natural algorithms in a networked world: technical perspective. 100 - Bernard Chazelle:
Natural algorithms and influence systems. 101-110
- Peter Winkler
:
Puzzled. 126 - Leah Hoffmann:
Q&A. 128-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.