Communications201711-Dl - Reconfigurable Cambits
Communications201711-Dl - Reconfigurable Cambits
ACM
CACM.ACM.ORG OF THE 11/2017 VOL.60 NO.11
Reconfigurable
Cambits Association for
Computing Machinery
Previous
A.M. Turing Award
Recipients
In January 2018, the Journal of Human-Robot Interaction (JHRI) will become an ACM
publication and be rebranded as the ACM Transactions on Human-Robot Interaction (THRI).
To submit, go to https://mc.manuscriptcentral.com/thri
COMMUNICATIONS OF THE ACM
44 54 68
89 Technical Perspective
About the Cover: Exploring a Kingdom
This month’s covers depict by Geodesic Measures
a simple set of blocks
that can be used to build By Marc Alexa
a variety of cameras
with very different
functionalities. Four 90 The Heat Method for
different Communications Distance Computation
covers are circulating
worldwide, each depicting By Keenan Crane, Clarisse Weischedel,
a different “Cambit.” and Max Wardetzky
Our thanks to Shree Nayar
and Anne Fleming of
Columbia University for
hosting this photoshoot.
Covers by Alexander Berg.
Communications of the ACM is the leading monthly print and online magazine for the computing and information technology fields.
Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional.
Communications brings its readership in-depth coverage of emerging areas of computer science, new trends in information technology,
and practical applications. Industry leaders use Communications as a platform to present and debate various technology implications,
public policies, engineering challenges, and market trends. The prestige and unmatched reputation that Communications of the ACM
enjoys today is built upon a 50-year commitment to high-quality editorial content and a steadfast dedication to advancing the arts,
sciences, and applications of information technology.
ACM, the world’s largest educational STA F F EDITORIAL BOARD ACM Copyright Notice
and scientific computing society, delivers DIRECTOR OF PU BL ICATIONS E DITOR- IN- C HIE F Copyright © 2017 by Association for
resources that advance computing as a Scott E. Delman Andrew A. Chien Computing Machinery, Inc. (ACM).
science and profession. ACM provides the cacm-publisher@cacm.acm.org eic@cacm.acm.org Permission to make digital or hard copies
computing field’s premier Digital Library of part or all of this work for personal
and serves its members and the computing Deputy to the Editor-in-Chief or classroom use is granted without
Executive Editor Lihan Chen
profession with leading-edge publications, fee provided that copies are not made
Diane Crawford cacm.deputy.to.eic@gmail.com
conferences, and career resources. or distributed for profit or commercial
Managing Editor
advantage and that copies bear this
Thomas E. Lambert S E NIOR E DITOR
Executive Director and CEO notice and full citation on the first
Senior Editor Moshe Y. Vardi
Bobby Schnabel page. Copyright for components of this
Andrew Rosenbloom
Deputy Executive Director and COO work owned by others than ACM must
Senior Editor/News NE W S
Patricia Ryan be honored. Abstracting with credit is
Lawrence M. Fisher Co-Chairs
Director, Office of Information Systems permitted. To copy otherwise, to republish,
Web Editor William Pulleyblank and Marc Snir
Wayne Graves to post on servers, or to redistribute to
David Roman Board Members
Director, Office of Financial Services lists, requires prior specific permission
Rights and Permissions Monica Divitini; Mei Kobayashi;
Darren Ramdin and/or fee. Request permission to publish
Deborah Cotton Michael Mitzenmacher; Rajeev Rastogi;
Director, Office of SIG Services from permissions@hq.acm.org or fax
Editorial Assistant François Sillion
Donna Cappo (212) 869-0481.
Jade Morris
Director, Office of Publications
Scott E. Delman VIE W P OINTS For other copying of articles that carry a
Art Director Co-Chairs code at the bottom of the first or last page
Andrij Borys Tim Finin; Susanne E. Hambrusch; or screen display, copying is permitted
ACM CO U N C I L John Leslie King; Paul Rosenbloom
Associate Art Director provided that the per-copy fee indicated
President Board Members
Margaret Gray in the code is paid through the Copyright
Vicki L. Hanson Stefan Bechtold; Michael L. Best;
Assistant Art Director Clearance Center; www.copyright.com.
Vice-President Judith Bishop; Mark Guzdial;
Cherri M. Pancake Mia Angelica Balaquiot
Production Manager Richard Ladner; Carl Landwehr; Subscriptions
Secretary/Treasurer Beng Chin Ooi; Loren Terveen;
Bernadette Shade An annual subscription cost is included
Elizabeth Churchill Marshall Van Alstyne; Jeannette Wing
Advertising Sales Account Manager in ACM member dues of $99 ($40 of
Past President
Ilia Rodriguez which is allocated to a subscription to
Alexander L. Wolf
Communications); for students, cost
Chair, SGB Board P R AC TIC E
is included in $42 dues ($20 of which
Jeanna Matthews Columnists Chair is allocated to a Communications
Co-Chairs, Publications Board David Anderson; Phillip G. Armour; Stephen Bourne and Theo Schlossnagle subscription). A nonmember annual
Jack Davidson and Joseph Konstan Michael Cusumano; Peter J. Denning; Board Members subscription is $269.
Members-at-Large Mark Guzdial; Thomas Haigh; Eric Allman; Samy Bahra; Peter Bailis;
Gabriele Anderst-Kotis; Susan Dumais; Leah Hoffmann; Mari Sako; Terry Coatta; Stuart Feldman; Nicole Forsgren; ACM Media Advertising Policy
Elizabeth D. Mynatt; Pamela Samuelson; Pamela Samuelson; Marshall Van Alstyne Camille Fournier; Benjamin Fried; Communications of the ACM and other
Eugene H. Spafford Pat Hanrahan; Tom Killalea; Tom Limoncelli; ACM Media publications accept advertising
SGB Council Representatives Kate Matsudaira; Marshall Kirk McKusick;
C O N TAC T P O IN TS in both print and electronic formats. All
Paul Beame; Jenna Neefe Matthews; Erik Meijer; George Neville-Neil;
Copyright permission advertising in ACM Media publications is
Barbara Boucher Owens Jim Waldo; Meredith Whittaker
permissions@hq.acm.org at the discretion of ACM and is intended
Calendar items to provide financial support for the various
BOARD C HA I R S
calendar@cacm.acm.org C ONTR IB U TE D A RTIC LES activities and services for ACM members.
Education Board Co-Chairs Current advertising rates can be found
Change of address
Mehran Sahami and Jane Chu Prey James Larus and Gail Murphy by visiting http://www.acm-media.org or
acmhelp@acm.org
Practitioners Board Board Members by contacting ACM Media Sales at
Letters to the Editor
Terry Coatta and Stephen Ibaraki William Aiello; Robert Austin; (212) 626-0686.
letters@cacm.acm.org
Elisa Bertino; Gilles Brassard; Kim Bruce;
REGIONA L C O U N C I L C HA I R S Alan Bundy; Peter Buneman; Carl Gutwin; Single Copies
W E B S IT E
ACM Europe Council Yannis Ioannidis; Gal A. Kaminka; Single copies of Communications of the
http://cacm.acm.org
Dame Professor Wendy Hall Karl Levitt; Igor Markov; Bernhard Nebel; ACM are available for purchase. Please
ACM India Council Lionel M. Ni; Adrian Perrig;Sriram Rajamani; contact acmhelp@acm.org.
Srinivas Padmanabhuni AU T H O R G U ID E L IN ES
Marie-Christine Rousset; Krishan Sabnani;
ACM China Council http://cacm.acm.org/about-
Ron Shamir; Josep Torrellas; COMMUN ICATION S OF THE ACM
Jiaguang Sun communications/author-center
Michael Vitale; Hannes Werthner; (ISSN 0001-0782) is published monthly
Reinhard Wilhelm by ACM Media, 2 Penn Plaza, Suite 701,
PUB LICATI O N S BOA R D New York, NY 10121-0701. Periodicals
ACM ADVERTISIN G DEPARTM E NT
Co-Chairs RES E A R C H HIGHLIGHTS postage paid at New York, NY 10001,
2 Penn Plaza, Suite 701, New York, NY
Jack Davidson; Joseph Konstan Co-Chairs and other mailing offices.
10121-0701
Board Members Azer Bestavros and Gregory Morrisett
T (212) 626-0686
Phoebe Ayers; Karin K. Breitman; Board Members POSTMASTER
F (212) 869-0481
Terry J. Coatta; Anne Condon; Nikil Dutt; Martin Abadi; Amr El Abbadi; Sanjeev Arora; Please send address changes to
Roch Guerrin; Chris Hankin; Carol Hutchins; Michael Backes; Maria-Florina Balcan; Communications of the ACM
Yannis Ioannidis; Michael L. Nelson; Advertising Sales Account Manager Andrei Broder; Doug Burger; Stuart K. Card; 2 Penn Plaza, Suite 701
M. Tamer Ozsu; Eugene H. Spafford; Ilia Rodriguez Jeff Chase; Jon Crowcroft; Alexei Efros; New York, NY 10121-0701 USA
Stephen N. Spencer; Alex Wade; ilia.rodriguez@hq.acm.org Alon Halevy; Sven Koenig; Steve Marschner;
Keith Webster; Julie R. Williamson Tim Roughgarden; Guy Steele, Jr.;
Printed in the U.S.A.
Media Kit acmmediasales@acm.org Margaret H. Wright; Nicholai Zeldovich;
ACM U.S. Public Policy Office Andreas Zeller
1701 Pennsylvania Ave NW, Suite 300,
Washington, DC 20006 USA WEB
T (202) 659-9711; F (202) 667-1066 Association for Computing Machinery Chair
(ACM) James Landay
Computer Science Teachers Association 2 Penn Plaza, Suite 701 Board Members A
SE
REC
Y
Deborah Seehorn, New York, NY 10121-0701 USA Marti Hearst; Jason I. Hong;
E
CL
PL
Interim Executive Director T (212) 869-7440; F (212) 869-0481 Jeff Johnson; Wendy E. MacKay
NE
TH
S
I
Z
I
M AGA
S
INCE 2003, ACM in con- sentation of their work followed by a with me in my future academic and pro-
junction with Microsoft five-minute question-and-answer ses- fessional endeavors.”
have sponsored research sion to official SRC judges and any — Michele Hu, Cornell Tech
competitions for under- conference attendees who attend the ASSETS 2015
graduate and graduate open session. At least five judges are
students in computing. The com- assigned to the semifinals. “It was a great opportunity to be able
petitions provide a vehicle for these 5. The conference’s top three final- to present at ACM SRC the work devel-
students to present their original re- ists in each category are chosen based oped during a study abroad experience
search before a panel of judges and on these presentations. in the USA. Working with students from
attendees at well-known ACM-spon- 6. The first-place winners from other places with different backgrounds
sored and co-sponsored conferences. each conference are invited to com- was an incredible experience. That was
The students have the opportunity pete in the Grand Finals. These stu- my first time presenting at a conference
to experience a research conference, dents submit an updated 4,000-word and it felt great to expose our research,
get feedback on their research, meet paper on their research that is judged discuss it, and get invaluable feedback.
academic and industrial researchers by a panel of experts. It was an amazing chance to train my
and other students, and appreciate The winner of the Grand Finals research pitch and share ideas with oth-
the practical applications of their re- and their advisors are invited to the ers.”
search. Student competitors also have Annual ACM Awards Banquet, where — Clarissa Tuxen,
the opportunity to sharpen commu- they are recognized for their accom- Fluminense Federal University
nication, visual, organizational, and plishments and can witness other Grace Hopper 2016
presentation skills in preparation for luminaries in the computing field re-
the SRC. Participation by undergradu- ceive prestigious society awards, such To learn more about the SRC, visit
ates may be literally life-changing if as the ACM A.M. Turing award. The http://src.acm.org/.
they alter their career path to pursue first-, second-, and third-place win- We acknowledge the dedication of
graduate studies and research careers ners of each conference competition the many volunteers who make the
after experiencing a conference and receive cash prizes, medals, ACM stu- SRC work. Each participating confer-
competition. dent memberships, and recognition ence has a student research compe-
The following process is used to se- among their peers and professors— tition chair and program committee
lect the SRC winners: recognition that strengthens their ré- who review the papers submitted by
1. Each student submits an 800- sumés. All students who are selected the students. This committee and ad-
word abstract of his or her research. to participate in the conference-level ditional volunteers judge the posters
The abstract is evaluated by a mini- competition receive $500 travel fund- and presentations at the conference
mum of three reviewers. Feedback ing for the conference. venue to select the winners. Evelyne
on the abstract is provided to the stu- In 2016–2017, competitions took Viegas at Microsoft supports the SRC
dents. place at 24 participating conferenc- program; she replaces Judith Bishop
2. The students submitting the es sponsored by the following ACM who was a dedicated Microsoft volun-
highest-evaluated abstracts are invit- SIGs: SIGACCESS, SIGARCH, SIGCHI, teer for many years. Finally, Nanette
ed to attend the conference and pres- SIGCOMM, SIGCSE, SIGDA, SIGDOC, Hernandez of ACM handles all logisti-
ent their work. Typically, 10 graduate SIGGRAPH, SIGHPC, SIGMIS, SIG- cal aspects of running the SRC, such
students and 10 undergraduate stu- MOBILE, SIGPLAN, SIGACT, SIGSAC, as sending materials to conference
dents are invited to compete at the SIGSOFT and SIGSPATIAL. More than sites around the world, and handles
conference. 330 students participated in these the interactions with students and
3. At the conference, the students competitions. conference volunteers.
present their work in front of a post- Students find the SRC highly re-
er. Any conference attendee may warding. Representative comments Laurie Williams, a professor of computer science in
the College of Engineering at North Carolina State
come and ask a student about their include the following: University, Raleigh, and Doug Baldwin, a professor
research. A minimum of five official “Participating in the SRC was an of mathematics at the State University of New York
at Geneseo, serve as co-chairs of the ACM Student
SRC evaluators assesses each poster. amazing opportunity. It was my first Research Competition.
4. The top five graduate and top time attending any conference, and it
five undergraduate students advance really showed me how to pitch my re-
to the semifinals. In the semifinals, search project, and interact with other
each student makes a 10-minute pre- researchers. I will carry this experience Copyright held by authors.
DOI:
DOI:10.1145/3144590 Moshe Y. Vardi
I
tion to the facts! In August 2017, Leo
N 2017, WE celebrated 50 years tional Lecture after Turing. Today, Tur- Corry published an article in Commu-
of the ACM A.M. Turing Award, ing is widely regarded as one of the most nications on “Turing’s Pre-War Ana-
known simply as the Turing outstanding scientists of the 20th cen- log Computers: The Fatherhood of
Award. The list of Turing Award tury, but that was not the case in 1966. the Modern Computer Revisited”
winners (http://amturing.acm. The question, therefore, can be posed as (https://goo.gl/M7jCaj) in which he
org), starting from Alan Perlis in 1966, follows: Had Turing been alive in 1966 carefully examined the purported
“for his influence in the area of ad- (he died in 1954), would he have been se- connection between the “Univer-
vanced computer programming tech- lected for ACM’s first National Lecture? sal Turing Machine,” as introduced
niques and compiler construction,” A debate about Turing’s accom- in Turing’s 1936 paper and the design
to Sir Tim Berners-Lee in 2016, “for in- plishments has been going on for and implementation in the mid-1940s
venting the World Wide Web, the first quite a while. In 1997, in an after-din- of the first stored-program computers.
Web browser, and the fundamental ner speech in Cambridge, U.K., Mau- He concluded “There is no straightfor-
protocols and algorithms allowing the rice Wilkes, the 1967 Turing Award ward, let alone deterministic, historical
Web to scale,” offers a bird-eye view of winner (for designing and building path leading from Turing’s 1936 ideas
the highlights of computing science the EDSAC, the first stored-program on the Universal Machine to the first
and technology over the past 50 years. computer in 1949), offered some bit- stored-program electronic computers of
Justifiably, the Turing Award is often ing comments about Turing: “How- the mid-1940s.”
accompanied by the tagline “The No- ever, on a technical level, of course I But the debate about how much
bel Prize in Computing.” How did this did not go along with his ideas about credit Turing should get for the idea
prestigious award come to be? computer architecture, and I thought of the stored-program computer di-
The early history of the Turing Award that the programming system that he minishes, in my opinion, from Tur-
is somewhat murky. The minutes of introduced at Manchester University ing’s actual contributions. The Tur-
meetings of ACM Council from the mid- was bizarre in the extreme. … Turing’s ing Machine model offered a robust
1960s shed some, but not complete light work was of course a great contribu- definition of computability that has
on this history. The Turing Award was tion to the world of mathematics, but been studied, refined, and debated
not originally created as a “big prize,” there is a question of exactly how it is since 1936, giving rise in the 1960s
but rather a lecture given at the annual related to the world of computing.” to computational complexity the-
ACM meeting. In August 1965, ACM (See Wilkes’s complete comments at ory, a gem of theoretical computer
Council considered and tabled a pro- https://goo.gl/XkjM7n.) science. Turing’s philosophical ex-
posal that “the National ACM Lecture The controversy about Turing’s ac- amination in 1950 of the possibility
be named the Allen [sic] M. Turing Lec- complishments flared again over the of machine intelligence is lucid and
ture.” In December 1965, ACM Council last few years. In a 2013 Communica- incisive today as it was then. Finally,
adopted the motion that “A.M. Turing tions’ editorial (https://goo.gl/SpkhKw) we learned in the 1970s about Tur-
be the name of the National Lectureship I argued that “The claims that Turing ing’s critical contributions to comput-
series.” In a 1966 meeting, ACM Coun- invented the stored-program computer, ing-aided code breaking.
cil voted to name Alan Perlis as first lec- which typically refers to the uniform Would Turing have won the Turing
turer. The minutes shed no light on why handling of programs and data, are sim- Award? My answer is, he should have!
the lectureship was named after Alan ply ahistorical.” In response to this edi- Follow me on Facebook, Google+,
Turing. The historical record is also not torial, Copeland et al. argued in the 2017 and Twitter.
clear on how a lectureship turned into a Turing Guide (https://goo.gl/DjC8uk)
major award. Perhaps there is a lesson that “Vardi is ignoring the fact that Moshe Y. Vardi (vardi@cs.rice.edu) is the Karen Ostrum
George Distinguished Service Professor in Computational
here for ACM to keep better minutes of some inventions belong equally to the Engineering and Director of the Ken Kennedy Institute for
its Council’s meetings! realm of mathematics and engineer- Information Technology at Rice University, Houston, TX.
He is the former Editor-in-Chief of Communications.
From today’s perspective, however, ing. The Universal Turing Machine was
we can wonder whether ACM Council one such, and this is part of its bril-
was justified in 1966 in naming its Na- liance.” So who is right? Copyright held by author.
DOI:10.1145/3145540
A
N D R E W C O N WAY ’ S A N D Pe- countries but so far has had only lim- framing its context for a wider societal
ter Eckersley’s Viewpoint ited effect because these countries are discussion we consider essential.
“When Does Law En- not sufficiently powerful individually Andrew Conway, Melbourne, Australia,
forcement’s Demand to to enforce sanctions against large mul- and Peter Eckersley, San Francisco, CA
Read Your Data Become tinational foreign-domiciled IT provid-
a Demand to Read Your Mind?” (Sept. ers. However, if Burr-Feinstein does in-
2017) was an important contribution deed become law, then these countries Bring ‘Diseased’
to the ongoing debate over electronic might be more able to pursue mass Software Up to Code
backdoors, whereby a backdoor is a surveillance domestically, as IT com- We agree with Vinton G. Cerf’s advice
means for accessing and exfiltrating panies could lose much of the legal in his Cerf’s Up column “Take Two
user information not specifically au- grounds they would need to resist. Aspirin and Call Me in the Morning”
thorized in advance by users. Here, I Conway and Eckersley also did not (Sept. 2017) that we all practice better
would like to outline several key as- mention a near-term technology that “cyber-hygiene” but must quarrel with
pects of that debate that also need to might be used to implement highly the continued use of public health as
be addressed. secure backdoors in IoT devices by a metaphor for cyber security. If we
Although Conway and Eckersley requiring that each device have a dif- as computing professionals intend to
did discuss the possibility that law ferent public key that could enable improve the cybersecurity of our criti-
enforcement could gain access to our government security services to take cal infrastructures, rather than merely
most private thoughts, they did not over the device.1 Even if hackers pen- tolerate their current “diseased” state,
mention a crucial near-term technol- etrated the security of a government- we must think differently. We thus
ogy through which this exfiltration installed virtual machine for a device, propose a return to an older metaphor
could happen. Within the next 10 they would gain no lasting advantage for software, likening its structures
years, “hologlasses,” or holographic hacking additional devices. to physical structures and its archi-
glasses, are projected by Apple, Face- Finally and most important, no tecture to the architecture of physical
book, Google, Microsoft, and Sam- mention was made of a technology buildings. Such thinking suggests we
sung, along with numerous startups, proposal1 that could ameliorate some consider how to build software that
to become almost as common as cell- of the negative effects of mass surveil- will not fall over when attacked or
phones are today, as reflected in the lance, whereby citizens’ most sensitive build it from weak materials unable to
scale of their investment in its devel- information is stored on their own de- bear expected stress.
opment. A backdoor in hologlasses vices, provided personal IoT devices Software we rely on for critical func-
could enable a “we see and hear what include protection against self-incrim- tions (such as controlling medical de-
you see and hear” capability that ination. By storing sensitive informa- vices, delivering electrical power to
would provide extraordinary insight tion on these devices, that information households, and guiding automobiles)
into what users are thinking, as well could be protected from the kind of ef- must conform to an appropriate set of
as how they are behaving online and forts Conway and Eckersley identified. constraints, just as physical structures
even in the physical world. conform to building codes before they
Also not mentioned was a legislative Reference can be occupied. A third party must be
proposal that could facilitate manda- 1. Hewitt, C. Islets protect sensitive IoT information: able to certify conformance to these
Verifiably ending use of sensitive IoT information for
tory backdoors for Internet of Things mass surveillance can foster (international) commerce constraints, just as building inspectors
devices. In 2016, Senators Richard Burr and law enforcement. Social Science Research Network certify buildings.
WP 2836282; https://papers.ssrn.com/sol3/papers.
(R., North Carolina) and Dianne Fein- cfm?abstract_id=2836282 These codes are best developed
stein (D., California) introduced leg- by those who build the systems, not
islation—The Compliance with Court Carl Hewitt, Palo Alto, CA by government, though governments
Orders Act—in the U.S. Senate to man- might use them once they are in place.
date providers of information products An industry-consensus building code,
and services also provide unencrypted Authors Respond: with third-party assessment of con-
information on IoT devices to the gov- We generally agree with Hewitt who offers formance, can help the marketplace
ernment pursuant to court order. The definite specific instances of the general reward those who build systems with
result could be “Nothing is Beyond Our issues we covered. Virtual reality, in fewer vulnerabilities.
Reach,” or no information is beyond particular, is, as he implies, a valuable window Over the past few years, with sup-
the reach of law enforcement, likewise into the mind that also involves important port from the IEEE’s Cybersecurity
pursuant to court order. Similar legis- technical and legislative dynamics. What to Initiative and the National Science
lation has been adopted in Australia, do about it is a complex question we did not Foundation, workshops have been
France, Germany, the U.K., and other attempt to answer in our Viewpoint beyond held to begin to develop such build-
ing codes for medical-device software have reliable ways of producing the kind plicitly tied the computing elements for
and for power-system software.1,2 In of code Landwehr et al. and I likely agree the EDVAC to McCulloch’s and Pitts’s
addition to these draft codes, related we need and want, we may also want to model of a neuron, saying:
promising developments include argue that infected or vulnerable devices “Following W. Pitts and W.S. Mac-
Consumers Reports’ collaboration ought not to be naively tolerated and Culloch [1943] … we ignore the more
with the Cyber Independent Testing that owners (and suppliers) bear at least complicated aspects of neuron func-
Laboratory (http://cyber-itl.org/) to some responsibility for observing diligent tioning … It is easily seen, that these
develop methods for publicly rating software hygiene. simplified neuron functions can be
software products, and UL’s (http:// Vinton G. Cerf, Mountain View, CA imitated by telegraph relays or by vac-
www.ul.com) development and use of uum tubes … We propose to use them
a standard for certifying cybersecurity accordingly for the purpose described
assurance of products. A Neuron Net Is there: as the constituent elements
Treating software security as a pub- Also a Turing Machine of the devices, for the duration of
lic health problem is not likely to lead Leo Corry’s article “Turing’s Pre-War the preliminary discussion … The
past the decades-old ideas of aftermar- Analog Computers: The Fatherhood element which we will discuss, to
ket vaccines, antivirus, and quaran- of the Modern Computer Revisited” be called an E-element … which re-
tine. Providing evidence that software (Aug. 2017) described the Turing ma- ceives the excitatory and inhibitory
is at least free of specified classes of chine as a purely mathematical notion. stimuli, and emits its own stimuli
vulnerabilities covered by an appropri- While Corry’s argument was persua- along a line attached to it. … In all
ate building code can yield a more ef- sive, there is indeed a direct connec- this we are following the procedure
fective market incentive for companies tion from Turing’s construction of the of W. Pitts and W.J. MacCulloch.” 2
to produce the cyberinfrastructures we Turing machine to the Electronic Dis- Since McCulloch and Pitts had
all need—and that are up to code. crete Variable Automatic Computer shown that neuron nets are universal
(EDVAC) in the 1940s via the McCull- computing machines in the sense of the
References och-Pitts model of the brain. For ex- Church-Turing thesis, the same connec-
1. Haigh, T. and Landwehr, C. A Building Code for Medical
Device Software Security. Technical Report. IEEE ample, during the discussion portion tion to universal computing machines
Computer Society, Mar. 2015; https://www.computer. of a 1951 talk by John von Neumann, would apply to the EDVAC.
org/cms/CYBSI/docs/BCMDSS.pdf
2. Landwehr, C.E. and Valdes, A. Building Code for Power neuroscientist Warren S. McCulloch
System Software Security. Technical Report. IEEE described the influence of Turing’s
Computer Society, Mar. 2017; https://www.computer. References
org/cms/CYBSI/docs/BCPSSS.pdf original 1936 paper, saying: 1. von Neumann, J. The general and logical theory
“… I came, from a major interest of automata. Chapter in Cerebral Mechanisms in
Behavior, L.A. Jeffress, Ed. The Hixon Symposium,
obert K. Cunningham, Lexington, MA,
R in philosophy and mathematics into John Wiley & Sons, New York, 1951, 1–41.
2. von Neumann, J. First Draft of a Report on the EDVAC
Tom Haigh, Minneapolis, MN, psychology with the problem of how (June 30, 1945). Reprinted as a chapter in Papers
Carl Landwehr, New Buffalo, MI, a thing like mathematics could ever of John von Neumann on Computing and Computer
Theory, W. Aspray and A. Burks, Eds. MIT Press,
and Alfonso Valdes, Urbana, IL arise—what sort of a thing it was … Cambridge, MA, 1987, 17–82.
The attempt to construct a theory in a
field like [neurophysiology], so that it Brad Barber, Arlington, MA
Author Responds: can be put to any verification, is tough
It is always a pleasure to hear from Carl … it was not until I saw Turing’s paper
Landwehr with whom I have had a long that I began to get going the right way Author Responds:
acquaintance and for whom I have great around, and with [logician Walter] My entire argument was about Alan
respect. An interesting challenge with his Pitts’ help formulated the required Turing’s own views prior to the war,
building/architecture metaphor relates logical calculus. What we thought we not about his influence on later
to the way software is often constructed were doing (and I think we succeeded developments. But a more general point
these days by incorporating (vast) libraries fairly well) was treating the brain as a I wanted to make was that scientific and
of code reflecting, perhaps, uncertain Turing machine.”1 technological ideas develop historically
provenance. There is also the uncertainty McCulloch’s and Pitts’s 1943 paper and that what happens later sometimes
of software interactions across the emphasized the equivalence of artificial misleads us when we try to understand
network that may never have been tested neuron nets to Turing machines, say- what happened earlier on. This may
until a chance encounter leads to a breach. ing: also be the case with McCulloch’s very
None of this invalidates the building- “It is easily shown: first, that every interesting, retrospective testimony, which
code metaphor but might make it more [neuron] net, … can compute only such by all means deserves a critical eye.
difficult to establish that the ensemble numbers as can a Turing machine … Leo Corry, Tel Aviv, Israel
meets the desired code standards and This is of interest as affording a psy-
properties. I am, in fact, very interested chological justification of the Turing
in the development of programming aids definition of computability and its Communications welcomes your opinion. To submit a Letter
to the Editor, please limit yourself to 500 words or less, and
that will do a much better job of assessing equivalents, Church’s λ-definability send to letters@cacm.acm.org.
source code against desirable properties and Kleene’s primitive recursiveness.”
of attack resistance and identifying Moreover, in the first draft of the de-
potential sources of weakness. Until we sign for the EDVAC, von Neumann ex- ©2017 ACM 0001-0782/17/11
DOI:10.1145/3137627 http://cacm.acm.org/blogs/blog-cacm
Opportunities for
Women, Minorities in
Information Retrieval
Mei Kobayashi describes activities to support diversity and
inclusion at the annual meeting of the ACM Special Interest Group
on Information Retrieval in Tokyo this summer.
Mei Kobayashi just before the welcome party. A week ˲˲ Maria Maistro, a Ph.D. student at the
SIGIR 2017: Diversity before the conference, I received an e- University of Padua, Italy, who works on
and Inclusion mail from the secretary of the session, IR evaluation with a focus on query log
http://bit.ly/2fFB1Uh Maram Hasanain, a graduate student analysis to integrate user search behavior
August 13, 2017 in computer science (CS) at Qatar Uni- into the evaluation process. Maria is a co-
versity, asking if I would like to prepare author of On Including the User Dynamic in
Hello and welcome! a one-minute introduction of myself Learning to Rank (http://dl.acm.org/cita-
Diversity was a central theme in for the session. I was so overwhelmed tion.cfm?id=3080714) at SIGIR 2017.
the ACM SIGIR 2017 held in Shinjuku by her beautifully written e-mail, ˲˲ Nazli Goharian, professor of com-
Ward in Tokyo, Japan. Upon arrival, and the excitement of a first-time con- puter science at Georgetown Univer-
all registrants were given a beautiful tact with someone from Qatar, that I sity, who works on health search and
keychain and card as commemora- immediately accepted her invitation. mining, including clinical and radio-
tive gifts from the local organizers to The session started with one-min- logical reports, social media posts for
celebrate the 40th anniversary of the ute presentations by: mental health and adverse drug reac-
conference series: ˲˲ Vanessa Murdock, Principal Ap- tions, summarization, and decision
“… the 40th Anniversary Logo…fea- plied Researcher at Cortana Research, support systems. She is a co-author of
tures Mt. Fuji, a view of Shinjuku sky- Microsoft, USA. Contextualizing Citations for Scientific
scrapers, including the Tokyo Metropoli- ˲˲ Grace Hui Yang, associate profes- Summarization using Word Embeddings
tan Government (Office), as seen from sor at Georgetown University. and Domain Knowledge (https://arxiv.
Keio Plaza the conference hotel, and fire- ˲˲ Sahar Asadi of Spotify (digital mu- org/abs/1705.08063) at SIGIR 2017.
works celebrating the 40th anniversary. sic service), USA. ˲˲ Tingting Dong, researcher at Sys-
The colorfulness of the fireworks and the ˲˲ Mei Kobayashi, an applied math- tem Platform Research Laboratories,
circles within and enclosing the logo rep- ematician turned big data algorithms NEC, Japan, who works on diversifica-
resent diversity and inclusion.” specialist. She is the first female man- tion and summarization of video search
SIGIR 2017 featured a session on ager in Customer Service of NTT Com- results to provide well-organized and
Women in IR (Information Retrieval) munications, Tokyo. intuitive views for users.
organized by Laura Dietz of the Univer- ˲˲ Zehong Tan, Senior Software Engi- ˲˲ Harumi Murakami, professor of
sity of New Hampshire on the first day, neer on the Search Team for eBay, USA. the Graduate School for Creative Cit-
ies and Vice Director of Media Center, into one main message and present
Osaka City University. it succinctly, in easily digestible form
˲˲ Xiaolu Lu, graduate student at Roy- The diversity among for the audience. Maistro noted that
al Melbourne Institute of Technology. the presenters the short talks at the beginning of
She is a co-author of: Can Deep Effective- poster sessions were also effective,
ness Metrics be Evaluated Using Shallow dispelled any notions and they provided seeds for breaking
Judgment Pools? (http://dl.acm.org/cita- of a fixed template for the ice during the remainder of the
tion.cfm?id=3080793) at SIGIR 2017. conference. For myself, it was a lot of
˲˲ Zhuyun Dai, graduate student at success or stereotype fun meeting male and female audi-
Carnegie Mellon. She is a co-author of of a woman in ence members during coffee breaks
two papers at SIGIR 2017: Learning to and evening parties who came up and
Rank Resources (http://bit.ly/2vMswxS ) the sciences. introduced themselves.
and End-to-End Neural Ad-hoc Ranking A big thanks to Dietz and Hasainan
with Kernel Pooling (https://arxiv.org/ for putting together this session, and
abs/1706.06613). to the SIGIR Organizing Committee
˲˲ Maram Hasanain, a Ph.D. student the end. Among all of the presen- Members who did not schedule com-
in computer science at the College of tations, Hasanain’s received the peting parallel technical sessions so
Engineering, Qatar University. greatest round of applause by far, all could attend Women in IR without
Murdock kicked off the lightning proving to all the possibility of suc- fear of missing out on learning about
talks and got people chuckling with cessful remote e-participation! new technical work. Dietz had a busy
the closing line, “We’re hiring!” For bet- The second part of the session was week: she co-organized a full-day
ter or for worse, it became a common a longer presentation by Hannah Bast workshop (one of eight workshops at
theme among presenters from indus- of University of Freiburg, on identi- SIGIR 2017) with Edgar Meij (Bloom-
try. Yang made everyone feel fantastic fication of discrimination and ste- berg) and Chenyan Xiong (Carnegie
with her empowering statement, “I just reotyping in the workplace. She pre- Mellon University) on Knowledge
became associate professor!” The audi- sented types of follow-up actions an Graphs and Semantics for Text Retrieval
ence broke out in a big, round of ap- individual can take, such as, pointing and Analysis. And as the first Student
plause. I pointed out my chemistry and out specific inappropriate behavior(s) Affairs Chair for SIGIR, she organized
applied mathematics background and or statistics to decision-makers, and a student buddy program for first-
stated, “Researchers in IR come from proposing concrete methods to cor- time attendees of SIGIR, and an in-
very diverse backgrounds, not just NLP.” rect the situation. Although some in expensive and enjoyable get-together
As it turned out, there was another the audience may have attended simi- featuring a karaoke stage at a nearby
mathematician in the crowd: Maistro. lar sessions at other conferences, for food court for students at the begin-
And Murakami, a SIGIR 2017 Commit- some first-time attendees, the session ning of the conference.
tee Member, said her interest in work- was an eye-opener. Royal Sequeira, a Final Note: To promote awareness
ing in IR is from a psychology perspec- graduate student at the University of of and respect for diversity—including
tive, her original area of expertise. Waterloo in Canada, sent me e-mail geographic, religious, and dietary, as
Side note: In addition to her work as saying, “Women in IR is one of my best well as gender diversity—this year’s
a faculty member at Osaka City Univer- experiences at SIGIR this year. While it SIGIR Conference featured a Diver-
sity, Murakami served as one of three has made me proud about the women sity and Inclusion Luncheon with de-
SIGIR 2017 Social & Publicity Chairs, in our community, it has also led me to licious and healthy vegetarian and
the other two being Yukino Baba of introspect on several aspects of equity Halal dishes. Since it took place on
Kyoto University, and Falk Scholer of and diversity.” The session was educa- the third day of the conference, huge
RMIT. During the SIGIR Business tional for me as well. I was shocked to boats of fresh vegetables and fruit
Meeting, chaired by Diane Kelly of learn that women were given the right were welcomed by all participants.
the University of Tennessee, Knox- to vote in all Swiss Cantons in 1991. All meals during the conference—in-
ville, attendees learned that SIGIR On a more positive note, it was ex- cluding the main banquet at the his-
2017 had been expected to run a sub- citing to hear about the work of wom- toric Hotel Chinzanso—were clearly
stantial deficit due to its expensive en from so many different countries, marked vegetarian, Halal, etc. They
venue, Tokyo. However, the outstand- backgrounds, and age groups. The were buffet or boxed to enable every-
ing work of the Social & Publicity Chairs diversity among the presenters dis- one to sit together, chat and mingle.
brought a record-breaking number of pelled any notions of a fixed template To the Conference Organizers, par-
registrants (more than 200% of initial for success or stereotype of a woman ticularly the Social Chairs for their
estimates) and drove conference cof- in the sciences. All of us need to en- thoughtfulness and impeccable orga-
fers solidly into the black. sure that anyone with the interest, nization skills—Cheers!
The closing one-minute presen- passion, and will to work hard can suc-
tation by Hasanain was a short vid- ceed. The consensus among attend- Mei Kobayashi is manager, Data Science/Text Analysis at
NTT Communications.
eo presentation. It was so impres- ees I talked with was very short pre-
sive and heart-warming that I felt sentations make a lasting impression;
as though I knew her personally by speakers have to distill their thoughts © 2017 ACM 0001-0782/17/11 $15.00
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 11
N
news
F
OR DECADES, COMPUTERS have academia are trying to perfect a proc- called block copolymers arrange them-
grown more powerful because ess that would let chemicals arrange selves into a desired pattern.
chipmakers have been able to themselves into tiny lines to serve as a Block copolymers consist of two
make ever-smaller transistors, pattern for the circuits. The lines and different materials that do not like to
allowing them to cram more spaces in most chips now are on the or- mix, like oil and water, but they are
onto a single chip. That steady march der of 40 nanometers (nm) wide, but bonded together, so they cannot fully
has always depended on optics—short- are expected to drop to less than 10 nm separate. When liquid block copoly-
er wavelengths of light allowed chip- within a few years. mers are heated, they form a structure
makers to draw smaller lines for circuit “Ten nanometers is really where in which each polymer has the least
paths, which then can be closer togeth- they’re going to be forced to imple- possible contact with the other. They
er. It has become increasingly harder, ment some new technology,” says might, for instance, form alternating
however, to reach the high resolutions Christopher Ober, professor of materi- stripes of each polymer, or create a
needed for ever-tinier features. als engineering at Cornell University in checkerboard pattern, depending on
The answer, or at least part of it, may Ithaca, NY. The technology Ober and how they were designed.
lie not with optics at all, but with chem- others are interested in is directed self- In chip manufacturing, that would
istry. Researchers in both industry and assembly (DSA), in which materials mean coating the silicon wafer with a
IMAGES COURTESY OF POLYMERIC A ND SOF T NA NOM ATERIA LS L A BO RATORY, SEOU L NATIONA L UNIVERS I T Y
Self-assembly of block copolymers on a flat substrate normally create fingerprint-like patterns having nanodomains with no long-range
order (left). To fabricate well-aligned nanostructures over a large area, the self-assembly of the block copolymers can be induced in a
confined space on the sub-micrometer scale.
neutral chemical to act as a base, then polymers can perform the same self-
adding the block copolymer on top,
and heating the whole thing. The poly- Because self- assembly as PS-PMMA, but at a smaller
size. Ellison’s group has created struc-
mers would form alternating lines— assembly is a tures just four to five nm wide.
think of them as red stripes and blue
stripes—and one set, say the red, would thermodynamic The trouble with high-chi copoly-
mers is that it can be difficult to get
be washed away. The remaining blue process, it is them to stand up straight. To form par-
stripes would act as a pattern for the
same etching process used in current controlled by allel strips, they need to orient them-
selves perpendicular to the surface
photolithography to inscribe circuits differences in surface they are on. Often, however, they will
into silicon.
Photolithography also relies on energy, and the top flop over onto their sides, destroying
the pattern.
chemicals—photoresists that are pat- “surface” is open air. Because self-assembly is a thermo-
terned through exposure to light, creat- dynamic process, it is controlled by
ing a pattern that is used to define which differences in surface energy, and the
parts of the wafer to etch. Many modern top “surface” is open air. Some re-
designs, however, require multiple searchers, such as Ellison and his col-
masks, driving up costs. The machines Over time, Ronse says, researchers league C. Grant Willson, a professor
for focusing the light beams to ever- managed to reduce the level of de- of chemical engineering at the Uni-
smaller sizes are also expensive, so DSA fects, while at the same time, EUV was versity of Texas at Austin, have been
could, the thinking goes, create smaller beginning to look more promising. working on topcoats, films of chemi-
features and do it more cheaply. The combination made it seem less cals that change the surface energy
A few years ago, DSA was seen as the likely that DSA would provide the low- on top of the copolymer so that it
next big thing, and many chipmakers cost alternative the industry sought. aligns itself correctly.
were investing heavily in it, says Kurt “After a couple of years of develop- Paul Nealey, a professor of molecular
Ronse, director of the advanced lithog- ment, the window of opportunity for engineering at the University of Chicago
raphy research program at the Inter- 28nm pitch was starting to close,” and one of the pioneers of DSA, says
university Microelectronics Center Ronse says. there are three or four methods to con-
(imec) in Leuven, Belgium. The focus Though the hype has faded, he says, trol the orientation of high-chi materi-
was on a block copolymer consisting of work continues. Some of the compa- als. Nealey and Karen Gleason, a profes-
polystyrene and polymethyl methacry- nies imec works with have ended their sor of chemical engineering at the
late, or PS-PMMA, which was targeted DSA research, while others are still go- Massachusetts Institute of Technology,
for features with a 28nm pitch, in ing, though they have directed some of Cambridge, MA, published a paper in
which lines and spaces are each 14nm their chemistry work toward develop- Nature Nanotechnology in March in
wide. At the time, the anticipated next ing photoresists for EUV. “They have which they reported using a technique
photolithography technology was ex- not stopped DSA development, but by called initiated chemical vapor deposi-
treme ultraviolet (EUV), but progress putting less effort in it, it definitely tion to create a topcoat that forced the
toward making it commercial seemed slows down,” Ronse says. block copolymer to line up the way they
to be stalled. While research into DSA is not as ag- wanted it. The approach allowed them
gressive as it once was, it has not to create features only 9.3nm wide.
Too Many Defects stopped, says Christopher Ellison, as- Another approach exposes the co-
The hype over DSA did not last, says sociate professor of chemical engi- polymer to vapor from a solvent to
Ronse. “Very quickly it turned out that neering at the University of Minnesota. change the balance of energy. A tech-
one of the big issues was going to be “I don’t think it’s going away,” he says. nique explored by IBM mixes in an ad-
defects,” he says. Sometimes the co- “It’s not growing at a rapid rate.” ditive to the copolymer that changes
polymer would leave a gap, or the Part of the reason for that slowdown how it responds to surface energy at
stripes would get too close to each may be that it is not the optical physics the air interface.
other or even cross, a phenomenon that the chipmaking industry has al- However they are controlled, block
called “line edge roughness.” The un- ways relied upon. “It makes it challeng- copolymers cannot do everything on
dercoating might have a pinhole or a ing for industry to accept because it’s their own. Some lithography must be
slight bump that would throw the so radically different,” Ellison says. used to inscribe guiding lines for them
process off. to follow—that is the “directed” part of
“It uses thermodynamics to form Surface Tension DSA. Because the material forms lines
the patterns,” says Charles Black, di- While PS-PMMA may seem less attrac- much thinner than those inscribed,
rector of the Center for Functional tive than it once did because its resolu- they require less-advanced photolithog-
Nanomaterials at Brookhaven Nation- tion limit is 11 nm, chemists are pursu- raphy processes. At some resolutions,
al Laboratory in Upton, NY. “It usually ing other block copolymers that could the guiding pattern could be created by
ends up with a defect here or a defect go even smaller. Some materials have a the current state-of-the-art process,
there, and microelectronics is really in- high chi, a measure of how incompati- 193nm immersion lithography, which
tolerant of that.” ble the two polymers are. High-chi co- uses a liquid to focus the light beam to a
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 13
news
smaller area. It could appeal to industry of shapes and forms you can produce,”
to use DSA with immersion lithography he says. “People have got very clever at Further Reading
equipment that is already paid for, rath- taking these limited set of shapes and Self-Assembly: Lego Blocks in Nature
er than needing to invest in new equip- learning how to arrange them.” Paul Nealey, University of Chicago
ment for EUV. The extra expense of DSA Researchers will continue to push https://vimeo.com/138700499
is minimal, Ober says; “It’s just an extra ahead with DSA, Ronse says, seeking Suh, H.S., Kim, D.H., Moni, P., Xiong, S., Ocola,
bottle of photoresist.” the right blend of polymers, working L.E., Zaluzec, N., Gleason, K., and Nealey, P.F.
In fact, EUV and DSA may turn out on ways to keep the chemicals consis- Sub-10-nm patterning via directed
self-assembly of block copolymer films
to be complementary technologies, tent from one batch to the next, and
with a vapour-phase deposited topcoat,
each doing things that are difficult for finding ways to bring down the number Nature Nanotechnology 12, 2017
the other. The first use for DSA, the re- of defects to acceptable levels. http://www.nature.com/nnano/journal/v12/
searchers say, will not be for drawing At the same time, the industry will n6/full/nnano.2017.34.html
lines at all, but for controlling the size push forward with EUV. The technology Sinturel, C., Bates, F.S., and Hillmyer, M.A.
of the holes through which different has failed to materialize despite a cou- High χ−Low N Block Polymers: How Far
layers of transistors are connected. ple decades of development, but it may Can We Go?, ACS Macro Letters 4, 2015
Conventional lithography makes those have turned a corner; “Although it Jiang, J., Jacobs, A.,
holes, or vias, too large. They could be looked like it was never going to hap- Thompson, M. O., and Ober, C. K.
filled with a block copolymer, which pen, now it looks really, really close,” Laser spike annealing of DSA photoresists, J
Photopolymer Science and Technology 28, 2015.
would assemble to form a narrower Ober says. https://www.jstage.jst.go.jp/article/
channel through which connections While it is not certain what mix of photopolymer/28/5/28_631/_article
could be made. technologies will succeed, the re- Lane, A.P., Maher, M.J., Willson, C.G.,
searchers are not worried about reach- and Ellison, C.J.
Design Challenges ing the limits of semiconductor tech- Photopatterning of Block Copolymer Thin
One shortcoming of DSA is that it can- nology any time soon. “The demise of Films, ACS Macro Letters 5, 2016
not inscribe sharp 90-degree turns, photolithography has been predicted http://pubs.acs.org/doi/abs/10.1021/
acsmacrolett.6b00075
while photolithography can. Any of forever,” Black says. “Probably for 20
these technologies will impose some years people have been saying ‘the end
Neil Savage is a science and technology writer based in
constraints on chip designers, but chip is here,’ and those photolithography Lowell, MA.
architects have learned to deal with the guys have been coming up with ways to
existing ones, Ober says. “You have a set get around it.” © 2017 ACM 0001-0782/17/11 $15.00
Milestones
Censoring Sensors
Amid growing outcry over controversial online videos,
tech firms grapple with how best to police online advertising.
F
O LLOW I N G TH E WAV E of U.K.
terror attacks in the spring of
2017, prime minister Theresa
May called on technology
companies like Facebook and
YouTube to create better tools for
screening out controversial content—
especially digital video—that directly
promotes terrorism.
Meanwhile, in the U.S., major adver-
tisers including AT&T, Verizon, and Wal-
Mart have pulled ad campaigns from their own devices in terms of develop- treasonous in another. Navigating this
YouTube after discovering their content ing ethics,” says Sarah T. Roberts, an shifting terrain of international laws,
had been appearing in proximity to assistant professor in the Department regulations, and advertiser sensibili-
videos espousing terrorism, anti-Semi- of Information Studies of the Universi- ties—while continuing to provide as
tism, and other forms of hate speech. ty of California, Los Angeles. “The pub- open a forum as possible to grow their
In response to these controversies, lic is starting to ask questions about audiences—presents companies like
Google expanded its advertising rules the power these companies have.” Google and Facebook with a complex,
to take a more aggressive stance While certain types of content multidimensional challenge.
against hate speech, and released a clearly violate the law (child pornogra- In an attempt to give the public
suite of tools allowing advertisers to phy, for example), far more material some visibility into its internal dia-
block their ads from appearing on falls into a vast grey area ranging from logue around these questions, Face-
certain sites. The company also de- the mildly insensitive or tasteless to book launched a series of blog posts
ployed new teams of human monitors outright hate speech. Much of this called “Hard Questions” that pro-
to review videos for objectionable content falls well within the free vides a window into the company’s
content. In a similar vein, Facebook speech protections of the First Amend- current thinking.
announced that it would add 3,000 ment in the U.S., yet remains unpalat- “How aggressively should social me-
new employees to screen videos for able to advertisers who fear being as- dia companies monitor and remove
inappropriate content. sociated with anything that could controversial posts and images from
Yet these kinds of manual fixes won’t alienate potential consumers. their platforms?,” Facebook vice presi-
solve the problem, especially as video be- In the absence of government- dent of Public Policy and Communica-
comes more and more ubiquitous enforced laws and regulations, however, tions Eric Schrage wrote in an intro-
thanks to smartphones, car cameras, what ethical obligations do these com- ductory post. “Who gets to decide
and other embedded capture devices. panies have toward safeguarding the what’s controversial, especially in a
Ultimately, monitoring user-generat- public digital commons that provides global community with a multitude of
ed content at scale will demand both the foundation for their businesses? cultural norms?”
computational and policy solutions. “It’s hard to argue with a straight The company currently employs a
At the heart of this problem lies a con- face about freedom of speech online combination of image matching, lan-
flict that is deeply embedded in the his- when that speech is commoditized and guage understanding, and human
tory of the Internet itself: between the highly lucrative,” says Roberts. “This is monitoring to identify and remove
network’s capacity for unleashing cre- a particular version of free speech that Facebook groups that promote terror-
ative self-expression, and platform pro- is deeply influenced by the politics and ist activity around the world.
viders’ business need to give advertisers’ ethos of Silicon Valley.” “Although our use of AI against ter-
control over their messages. Caught be- Laws and regulations around free- rorism is fairly recent, it’s already
tween these opposing forces, compa- dom of expression also vary widely from changing the ways we keep potential
nies like Google and Facebook make country to country. For example, most terrorist propaganda and accounts off
judgment calls about what kinds of con- European Union countries place much Facebook,” wrote Facebook’s head of
tent to deem acceptable—decisions that tighter restrictions around hate speech Global Policy Management Monika
are often obscured from public view. than the U.S. does, and a political video Bickert in a recent blog post.
“These platforms and the firms that commentary that’s considered satirical Policy matters aside, the sheer vast-
control them have largely been left to in one country might be considered ness of the Internet—with over one
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 15
news
Overcoming Disabilities
Brain-computer interfaces hold the promise of fully featured
replacements for body parts that don’t work or are missing.
I
N THE MOVIE Star Wars: The Empire
Strikes Back, Luke Skywalker is
given a mechanical hand that
moves and perform functions as
well as his real hand. Konrad
Kording, an avid Star Wars fan, has no
doubt that advances in brain-machine
interfaces (BMIs) will make this bit of
science fiction a reality; he just doesn’t
know when.
“We have applications for one chan-
nel and a few channels,” says Kording, a
neuroscientist and professor of Physical
Medicine and Rehabilitation, Physiolo-
gy, and Biomedical Engineering at
Northwestern University in Evanston,
IL. “The question is, what are the BMI
applications with hundreds of thou-
sands of channels, and no one knows
that at the moment.” The channels he’s
referring to are electrical wires or opti-
cal connectors that can be attached to
the brain and can be controlled and
measured. Michel Fornasier, one of the presenters of the Cybathlon, uses his bionic hand prosthesis to
“The blind will see, and the amputat- demonstrate one of the Cybathlon disciplines.
ed will move with limb replacements as
well as you and me,’’ Kording predicts. eral years to study and facilitate BCI ap- channel of input from the user to the
A BMI is also sometimes referred to plications in the public, private, and ed- computer, in addition to the keyboard,
as a brain-computer interface (BCI), a ucational sectors. mouse, etc.,’’ Jacob says.
mind-machine interface (MMI), or Most brain-computer interface re- The research organization Brain-
direct neural interface (DNI). The bot- search focuses on reading signals from Gate (http://www.braingate.org) has
tom line is such systems facilitate a di- the brain to the computer, usually EEG been working to develop and test BCI
rect communication pathway between (electroencephalogram) or fNIRS (func- devices to restore the communication,
an enhanced or wired brain and an ex- tional near-infrared spectroscopy), mobility, and overall independence of
ternal device. notes Robert Jacob, a computer science people with a spinal cord injury, brain-
BMIs are nothing new. Kording professor at Tufts University, Medford, stem stroke, or Amyotrophic lateral
points to one of the earliest simple MA. EEGs can be invasive, as when a pa- sclerosis (ALS). The Intelligence Ad-
brain machines, the cochlear implant, tient’s head is cut open to insert elec- vanced Research Projects Activity (IAR-
which was invented in 1961. Deep brain trodes, whereas fNIRS is always non-in- PA), part of the U.S. Office of the Direc-
stimulation, a surgical procedure to im- vasive, he says. “There are other ways of tor of National Intelligence, sponsors
plant a hair-thin electrode wire in the reading information from the brain to research programs using multidisci-
part of the brain responsible for abnor- the computer, like fMRI or MEG [mag- plinary approaches “to advance under-
mal movement, is being used in treat- netoencephalography], but these are standing of cognition and computa-
PHOTO BY BSIP/UIG VIA GETT Y IM AGES
ing diseases like Parkinson’s and epi- generally too clumsy for reasonable BCI tion in the brain.”
lepsy. “What they all have in common,’’ applications,’’ Jacob says. In 2013, then-President Barak Obama
he says, “is that [they are] low-dimen- Most of this work used to be targeted announced $100 million in funding for
sional brain machine interfaces,’’ at helping physically disabled people, the Brain Research through Advancing
meaning there are not many wires or but now, it is “spreading into more Innovative Neurotechnologies (BRAIN)
channels going into the brain. mainstream applications, where the initiative to help neuroscientists under-
Research has been under way for sev- brain information provides an extra stand the origins of cognition, percep-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 17
news
tion, and other brain activities. The counted for over 50% of the market in ing a balance between the usability and
thought was the research could lead to 2014, followed by communication and accuracy of both hardware and software
new and more effective treatments for control, entertainment & gaming, and before they are likely to be adopted by
conditions like autism and mood disor- smart home control, according to the mainstream users. “For instance, heart
ders, as well as people suffering from Grand View report. rate monitors, another type of biosig-
brain injuries. As part of its mission, the Portland, OR-based Allied Market Re- nals system, could only become more
BRAIN initiative will develop and deploy search is forecasting the BCI market will widespread with the existence of practi-
neurotechnologies to further under- reach $1.46 billion by 2020, with a CAGR cal and decently accurate wearables like
standing of the links between brain of 11.5% over that period. chestbands and watches, alongside the
function and behavior. The key factors driving this sector’s development of a number of fitness
This prompted federal agencies like growth are increasing focus on integrat- apps,’’ she says.
the Defense Advanced Research Projects ing the technology into various health- Already, systems allowing for gestur-
Agency (DARPA) to get involved, with the care and military applications, as well as ing and voice input have created new
formation of the Neural Engineering on developing communication technol- and intuitive ways for people to interact
System Design (NESD) program to en- ogy for the disabled and geriatric popu- with computers without the need for the
hance research capabilities in neuro- lations, according to market research more traditional combination of key-
technology and provide an interface for firm Future Market Insights, Valley Cot- boards and mice, Liu notes.
new therapies. tage, NY. The firm anticipates there will “Brain-computer systems push this a
So it was only a matter of time before also be a growing focus on utilizing BCI step further, with the goal of more di-
BCI began receiving greater commercial to control Internet of Things (IoT) devic- rectly using the brain to convey our in-
attention from the likes of billionaire en- es, smart home applications, and vari- tentions, rather than having an extra,
trepreneurs like Elon Musk and Bryan ous virtual reality applications. physical step translating those inten-
Johnson. Musk, CEO of Tesla and Fannie Liu, a Ph.D. student in the tions to text, speech, or gestures.” This,
SpaceX, is backing Neuralink, a BCI ven- Human-Computer Interaction Institute she says, could make our interactions
ture to create devices that can be im- at Carnegie Mellon University, agrees easier, faster, and ideally more natural.
planted in human brains to eventually with the research, but stresses that use Not only can these systems support
improve memory and interface with of BCIs right now is fairly limited. human-computer interaction, but po-
computer systems. Johnson, who found- “Industries have been focusing on tentially human-human interaction as
ed online payments company Braintree gaming and medical applications, par- well, Liu says. Her work is investigating
(which was acquired by eBay in 2013 for ticularly for disabled or paralyzed indi- whether “we could potentially use BCI to
$800 million), has invested $100 million viduals,” she says, “though research in better understand and communicate
into startup venture Kernel, whose goal this field has shown potential in a variety with each other,” by clarifying our un-
is to enhance human intelligence with of areas, such as communication, thera- derlying thoughts and feelings.
brain implants that can link people’s py, and controlling computer tools and In addition to Neuralink, a slew of
thoughts with computers. devices.” other startups are also hoping to capi-
“Once one or two billionaires do Liu, who is working closely with her talize on the BCI market. Among them
something, everyone wants to be in- advisor, Geoff Kaufman, an assistant is NeuroPace, a medical device compa-
volved,’’ observes Kording. “If I was a professor at the Institute, adds that ny aimed at improving the lives of pa-
successful business person with the while several applications are possible, tients suffering from epilepsy, which
chance to build something really, really BCI systems still face challenges in strik- the company says affects approximately
cool and be part of something that’s re- 1% of the population worldwide. Neuro-
ally, really exciting, what’s more interest- Pace has developed a medical device
ing than the brain?” BCI systems called the RNS System, which was ap-
That interest has spiked growth in proved by the FDA in November 2013
the global BCI market, which was valued face challenges and which uses responsive neurostimu-
at $723.64 million in 2014 and is expect- in balancing the lation (RNS) technology to monitor and
ed to grow at a compound annual growth control seizures in patients with drug-
rate (CAGR) of over 10% through 2022, usability and resistant epilepsy, according to CEO
according to San Francisco-based Grand accuracy of hardware Frank Fischer. RNS is an approach to
View Research. treating medically uncontrolled partial
“Rising occurrence of target disor- and software before onset seizures, and works by continu-
ders and neurodegenerative conditions they are likely ously monitoring brain activity, detect-
are expected to propel market growth ing abnormal patterns, and in response,
over the forecast period,” the firm notes. to be adopted by delivering imperceptible electrical puls-
“R&D efforts have led to pioneering in mainstream users. es to normalize the activity before an in-
the engineering of headset develop- dividual experiences a seizure.
ment, which provides treatment for im- The RNS System can be used on indi-
paired cognitive function.” viduals 18 and older to monitor and re-
Healthcare applications make up by spond to brain activity in real time, pre-
far the largest vertical segment, and ac- venting epileptic seizures at their source,
Liu is investigating
like the devices being developed by
Musk and others, these are the higher- ACM
whether “we could
dimensional, more complex BCI sys-
tems, he says.
In addition to heat concerns, if the
Member
potentially use BCI devices are not encased properly, they News
to better understand could potentially corrode and damage
the brain, Kording adds.
and communicate “So there are lots of problems, but
AT THE INTERSECTION
OF PROGRAMMING
with each other” lots of opportunities,’’ and neurotech- LANGUAGES AND
MACHINE LEARNING
nology is helping keep technology so in-
by clarifying our teresting, he says. “In some way, neuro-
“My goal is
to make
underlying thoughts technology is the final frontier, because programmers
more
if we understand how the brain works,
and feelings. we can understand a lot of the things productive, and
enable them to
that ultimately affect us and make us be write programs
humans.” It is also probably the hardest more easily,” says Ganesan
area to figure out, Kording says. Ramalingam, a principal
researcher for Microsoft
Fischer says. The system costs $37,000, “Understanding any other part of sci- Research India. Ramalingam’s
which includes the implantable device, ence is probably easier than under- expertise is in static program
leads, and remote monitor. standing the brain and arguably, less analysis, or the identification
of bugs and errors in code
Both Kording and Liu caution that it exciting.”
without having to execute
will take years before BCIs become more the program being analyzed.
widespread, with Liu observing that ex- “When the programs don’t
Further Reading work as they are expected to,
isting systems require a lot of setup. “Us-
Jankowska, E. you want to know what they are
ers need to be equipped either invasively doing,” he explains.
Spinal control of motor outputs by intrinsic
through surgical implantation or nonin- and externally induced electric field Ramalingam earned his
vasively with several sensors or hardware potentials, Journal of Neurophysiology. 24 undergraduate degree in
that can take a while to calibrate.” As a May 2017. DOI: 10.1152/jn.00169.2017 computer science from the
Indian Institute of Technology,
result, right now, both options “are not http://bit.ly/2sk6FIY
in Madras, and earned his
practical for everyday use,” she says. Stevenson, I.H. and Kording, K.P. Ph.D. in the discipline in
Although more usable consumer- How Advances in neural recording affect 1993 from the University of
data analysis. Nature Neuroscience. 26 Wisconsin–Madison. He then
grade devices have come out in the last took a position at IBM’s T.J.
January 2011.
decade, they tend to be less accurate, she http://go.nature.com/2rFboTQ Watson Research Center in
observes. “Future iterations of BCI New York, where he stayed until
Marblestone, A.H., Zamft, B.M., Maguire, Y.G., 2006, when he joined Microsoft
would likely continue to be noninvasive,
Shapiro, M.G., Cybulski, T.R., Glaser, J.I., Research India.
but with new methods that can enable Amodei, D., Stranges, P.B., Kalhor, R., Currently, Ramalingam
the recording and processing of stron- Dalrymple, D.A., Seo, D., Alon, E., Maharbiz, is primarily interested in
ger and better signals from the brain.” M.M., Carmena, J.M., Rabaey, J.M., Boyden, E.S., programming languages and
Church, G.M., and Kording, K.P. their interaction with machine
Major hurdles like privacy concerns
Physical principles for scalable neural learning, which he thinks has
also need to be addressed. Liu says her recording. NCBI. 21 Oct., 2013. become more important thanks
research has found people are reluctant http://bit.ly/2tbf1CQ to rapid advances in this area
to allow systems to tap into their brains over the past decade. “We
Bansal, A.K., Truccolo, W., Vargas-Irwin, C.E., are still in the early stages of
and understand their intentions, as they Donoghue, J.P. machine learning, and it is quite
may feel their inner thoughts can be Decoding 3D reach and grasp from hybrid challenging to build applications
read and revealed to anyone with access signals in motor and premotor cortices: in this area,” he adds.
to the system. “BCI systems need to pro- spikes, multiunit activity, and local field Ramalingam feels machine
potentials. Journal of Neurophysiology. 1 learning is going to be an
tect users’ privacy if they are ever to be- increasingly important field,
March, 2012, Vol. 107, no. 5.
come prevalent,” she says. http://bit.ly/2tw7uy3 with a much wider spectrum
How to keep implants in the brain, of programmers wanting
Pohlmeyer, E.A., Oby, E.R., Perreault, E.J., Solla, to incorporate it into their
particularly if a device involves wiring, S.A., Kilgore, K.L., Kirsch, R.F., and Miller, L.E. programs. “We need to
also needs to be determined because the Toward the Restoration of Hand Use to a make it easier for non-expert
brain can reject them, adds Kording. “At Paralyzed Monkey: Brain-Controlled programmers to incorporate
the moment, we don’t have ways of inter- Functional Electrical Stimulation of Forearm machine learning into their
Muscles. PLOS Journals. 15 June, 2009. programs, and that these
facing with the brain in ways where de- machine learning programs
http://bit.ly/2sa32XJ
vices will last a lifetime.” interact correctly with the rest of
Scientists and researchers also need the programs these non-expert
Esther Shein is a freelance technology and business programmers write,” he says. “I
to deal with issues involving the heat writer based in the Boston area. think there be lots of interesting
BCI devices give off, and how to analyze challenges here.”
and control the data they produce. Un- © 2017 ACM 0001-0782/17/11 $15.00 —John Delaney
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 19
V
viewpoints
Legally Speaking
Disgorging Profits in
Design Patent Cases
Does the recent U.S. Supreme Court decision in
the Apple v. Samsung case represent a quagmire?
A
S RE P O RT ED I N my March On remand, Apple is still insisting Samsung’s victory notwithstanding,
2017 column, the U.S. Su- that the relevant article is the whole it is premature to assume the risk of
preme Court struck down smartphone. (For the sake of brevity, excessive awards in design patent cas-
a $399 million award I will use the term “article” instead of es has subsided. The Supreme Court
against Samsung for in- repeating “article of manufacture” or did not rule that the relevant article
fringing three Apple design patents. adopting AOM as an acronym.) Sam- would necessarily and always be an
Samsung’s win concerned an impor- sung, however, contends the relevant individual component of a multicom-
tant but narrow issue. The Court ruled articles are the relatively small compo- ponent device, only that it might be a
that Apple is entitled to be awarded nents that embody the three designs component. How the relevant article
Samsung’s profits from sale of the at issue (that is, a rectangular flat face and profits-from-that-article issues are
article(s) of manufacture to which the with rounded corners, a rectangu- resolved in Apple v. Samsung will have
protected designs were applied. How- lar flat face with bezel, and a colorful significant implications for future de-
ever, lower courts erred in ruling that screen with 16 icons). Apple will be sign patent cases involving multicom-
the relevant article of manufacture was entitled to a much more modest award ponent devices.
necessarily the whole smartphone; it than $399 million if Samsung prevails
could instead be one or more compo- on this issue. Recap on Design
nents of the smartphones. Samsung was not the only tech- Patent Disgorgement
The Apple v. Samsung case has been nology company relieved by the Su- Disgorgement of infringer profits as
sent back to the trial court to deter- preme Court’s ruling. Facebook, a remedy in design patent cases came
mine, first, to what relevant article(s) Google, eBay, Hewlett-Packard, and about because Congress got upset
of manufacture were the patented Dell, along with several high-technol- about a set of cases decided the 1880s.
designs applied, and second, what ogy industry associations, filed am- It reacted to Supreme Court rulings
part of the $399 million total profits icus curiae briefs in support of Sam- that the owner of a patent for a car-
Samsung made from sales of the in- sung’s appeal. The briefs argued that pet design was entitled to only nomi-
fringing smartphones is attributable when design patent infringement oc- nal damages (at the time, six cents,
to the relevant article(s) of manufac- curs as to only one or a small number now worth about $1.50) against two
ture. The Court offered no guidance of components, it would be improper infringers. The Court rejected a plea
about how lower courts should make to disgorge total profits from the sale for disgorgement, saying that the pat-
either assessment. of multicomponent devices. entee had failed to prove what portion
of the profits were attributable to the infringement more than an appor- erators because they like the design
infringing designs. tionment remedy would. of its interior light. However, if the
Soon thereafter, Congress effective- light and switch mechanism is sold
ly overturned the Court’s ruling by cre- What’s the Relevant Article? as a component to be incorporated
ating a new remedy for design patent In many, and perhaps most, design into other refrigerator models or oth-
infringement. Under it, design paten- patent cases, the article embodying a er products with doors, it should be
tees could elect, as an alternative to an patented design will be the product as possible to estimate what profits to
award of actual damages (for example, a whole. The design of a carpet, wallpa- disgorge against an infringer of this
lost profits or a reasonable royalty), a per, or chair, for instance, will often be design. It would be patently unfair,
disgorgement of the defendant’s “to- the main selling point for the product, though, to disgorge profits from in-
tal profits” on the sale of any articles of even though the quality of the materi- fringer’s sales of refrigerators when
manufacture embodying the protected als used in the manufacturing process, only the interior light embodies the
design, or at least $250 (approximately the skill of the craftsmen, and other patented design.
equivalent to $6,100 today). characteristics of the product or pro- Identifying the relevant article for
The legislative history made clear ducer may contribute to the value of disgorgement purposes is more diffi-
that courts should not try to deter- the product. If, however, the design is cult, however, in cases involving com-
mine how much of the defendant’s what actually drives demand for the plex multicomponent products, such
profits were attributable to the in- product, it seems fair that infringers as smartphones, when there is no sep-
fringing design, as opposed to the should have to disgorge all profits. arate market for components that may
IMAGE BY ALICIA KUBISTA /A ND RIJ BORYS ASSOCIAT ES
non-aesthetic attributes of the arti- A patented design may, of course, embody a patented design. What evi-
cle. Instead, they should award total also be embodied in a component dence or factors should a judge or jury
profits from the sale of the article of of a multicomponent product. Prof- consider in determining the relevant
manufacture embodying the design. its disgorgement should be relative- article in such cases?
Congress recognized that this might ly straightforward when there is a The place to start a relevant ar-
overcompensate some design paten- separate market for the component. ticle inquiry should be looking at the
tees, but that was better than under- Consider, for instance, a patented design patent, which is supposed to
compensating them. Moreover, the design for an interior light that turns identify the article intended to embody
potential availability of a total profits on when a refrigerator door opens. the design. The patent must include
award would also deter design patent Consumers are unlikely to buy refrig- a drawing of the patented design as it
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 21
viewpoints
would appear in the article. The patent uct and service features or attributes.
may also have a textual description of By asking many people to express a
the intended article. In addition, one One might consider preference between a few dozen pairs
should examine the patentee’s and al- how much total profit of designs that differ on features and
leged infringer’s products to discern attributes, product marketers can use
how the patented design was embod- Samsung would have clever mathematical techniques to es-
ied in the litigants’ products. These made from sales timate the importance of each feature
types of evidence may sometimes suf- in isolation. This technique has been
fice to identify the relevant article as to of smartphones used in some patent infringement cas-
which disgorgement should occur. if it had not infringed es, and would seem well suited for reso-
In her argument before the Su- lution of cases such as Apple v. Samsung
preme Court, Samsung’s lawyer rec- Apple’s design. in which design patents may cover only
ommended these steps for the relevant one or a small number of components
article inquiry. She also suggested that of multicomponent products.
market studies might be useful to un- Alternatively, a profits disgorge-
derstand what consumers perceive the er reports about Apple smartphones, ment assessment might be built on a
article embodying the design to be. which typically discuss features that counterfactual scenario. As applied in
Another indicator might be the costs consumers find most desirable. Apple v. Samsung, one might consider
incurred in developing the component how much total profit Samsung would
embodying the design. What Profits to Disgorge? have made from sales of smartphones
The Solicitor General of the United Once the relevant article inquiry is re- if it had not infringed Apple’s design
States, in a brief supporting Samsung’s solved, the next question is what “total patents and compare this estimate to
appeal and during oral argument, pro- profits” did the infringer make from the total profit Samsung actually made
posed consideration of four factors in sale of that article. With a multicompo- on infringing smartphones. The differ-
making the relevant article determina- nent product whose components are ence between the two profit scenarios
tion: first, the scope of the patented de- sold only as a package, “total profits” would be the amount that Samsung
sign; second, the prominence of the de- on one or more component-article(s) should have to pay Apple under this
sign in the challenged product; third, will almost certainly be some percent- model of the disgorgement remedy.
whether the design is conceptually age of the profits made from sales of This approach contrasts with a more
distinct from the product as a whole; the infringing products. In Apple v. compensatory approach that would
and fourth, the physical relationship Samsung, $399 million was determined focus on how much total profit Apple
between the patented design and the as the total profit Samsung made sell- made from sales of its smartphones
rest of the product. The Supreme Court ing the infringing smartphones. So if and how much profit it would have
did not endorse use of these factors. the relevant article is not the smart- made if Samsung had not infringed.
In support of its claim that the phone as a whole, how should one de- Economic experts could create models
smartphone as a whole should still be cide what portion of those profits are for undertaking these assessments.
considered the relevant article, Apple attributable to the components held to
can be expected to argue that the pat- be the relevant article(s)? Conclusion
ented designs are inseparable from the Expert witnesses are likely to play Samsung won an important victory
products embodying them, and that a significant role in assessing a total- for itself and for other high technol-
consumer demand for Apple products profits-attributable-to-the-relevant- ogy companies in challenging the total
is due to its well-integrated designs. article award in design patent cases. profits award in the Apple case. Howev-
Would Samsung have sold so many Experts hired by the patentee and by er, uncertainty exists about how courts
millions of smartphones if it had not the alleged infringer are, of course, un- or juries should go about determining
misappropriated the cool look of Apple likely to agree on the bottom line. How- the relevant embodiment of a patented
designs? Apple thinks not. ever, their assessments, as set forth in design to serve as the “article” on which
Samsung will argue that the flat face reports and testimony, will generally the infringer’s “total profits” should be
of the smartphone and the flat face with set the bounds within which the trier disgorged. Because high-tech compa-
bezel are two minor components of the of fact, whether a judge or a jury, will nies are utilizing design patents much
exterior design of its smartphones. make the award. Juries, in particular, more now than in the past, they have
The colorful 16-icon design is similar- are likely to consider the relative culpa- reason to worry about the legal quag-
ly one small component of the screen bility of the infringer in making such mire hovering over disgorgement of
displays of which smartphones are ca- awards. It is consistent with principles profits awards in design patent cases
pable. These should be the three “ar- of unjust enrichment for them to do so. involving multicomponent products.
ticles” to which the Apple designs have Conjoint analysis may be a useful
been applied. Samsung will point to economic technique to contribute to Pamela Samuelson (pam@law.berkeley.edu) is the
Richard M. Sherman Distinguished Professor of Law and
the very large number of components a design patent profits disgorgement Information at the University of California, Berkeley, and a
analysis. It is often used to analyze how member of the ACM Council.
in smartphones to put the infringing
components into proper perspective. consumers conceive, integrate, value,
Samsung could also point to consum- and trade off different clusters of prod- Copyright held by author.
Computing Ethics
Engaging the Ethics of
Data Science in Practice
Seeking more common ground between data scientists and their critics.
C
RI T I CA L C OM M E N TARY ON
data science has converged
on a worrisome idea: that
data scientists do not recog-
nize their power and, thus,
wield it carelessly. These criticisms
channel legitimate concerns about
data science into doubts about the eth-
ical awareness of its practitioners. For
these critics, carelessness and indiffer-
ence explains much of the problem—
to which only they can offer a solution.
Such a critique is not new. In the
1990s, Science and Technology Studies
(STS) scholars challenged efforts by AI
researchers to replicate human behav-
iors and organizational functions in
software (for example, Collins3). The
scholarship from the time was damn-
ing: expert systems routinely failed,
critical researchers argued, because
developers had impoverished under-
standings of the social worlds into
which they intended to introduce their understandings of the relevant tech- trying to make machines learn some-
tools.6 At the end of the decade, how- niques, they also expressed frustration thing useful, valuable, and reliable.
ever, Mark Ackerman reframed this as that critics failed to account for the For example, dealing with dirty and in-
a social-technical gap between “what careful thinking and critical reflection complete data is as much a moral as a
we know we must support socially and that data scientists already do as part practical concern. It requires making a
what we can support technically.”1 He of their everyday work. This was more series of small decisions that are often
argued that AI’s deficiencies did not than resentment at being subject to fraught, forcing reflection at each step.
reflect a lack of care on the part of re- outside judgment by non-experts. In- How was this data collected? Does it
searchers, but a profound challenge of stead, these data scientists felt that capture the entire population and full
dealing with the full complexity of the easy criticisms overlooked the kinds of range of behavior that is of interest?
social world. Yet here we are again. routine deliberative activities that out- The same is true for validating a model
Our interviews with data scientists siders seem to have in mind when they and settling on an acceptable error rate.
give us reason to think we can avoid talk about ethics. What must a data scientist do to prove
IMAGE BY LIU ZISH AN
this repetition. While practitioners to herself that a model will indeed per-
were quick to point out that common Ethics in Practice form well when deployed? How do data
criticisms of data science tend to lack Data scientists engage in countless acts scientists decide that a reported error
technical specificity or rest on faulty of implicit ethical deliberation while rate is tolerable—and defendable? Eth-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 23
viewpoints
Call for
of decisions—and real-world effects— check whether his model might exhibit
drive data scientists to develop a model some kind of gender bias; without it, he
be wrongly incarcerated, while white which such learning can occur. Many
defendants were more likely to be set data scientists feel as though critics
free but nevertheless recidivate. North- Technical actors only talk at them. When we asked one
pointe (now Equivant), the company are often far more informant why he did not try to talk
behind the risk assessment, countered back, he explained that social scien-
that its tool was equally accurate in sophisticated tists and humanists were taught to
predicting recidivism for black and than critics at debate and that he was not. Critics get
white defendants. Since then, com- rewarded for speaking out publicly, he
puter scientists and statisticians have understanding the said, garnering rewards for writing es-
debated the different qualities that an limits of their analysis. says addressed to a general audience.
intuitive sense of fairness might imply: This was not his skillset nor recognized
that a risk score is equally accurate in as productive by his peers.
predicting the likelihood of recidivism The gaps between data scientists
for members of different racial groups; and critics are wide, but critique di-
that members of different groups have vorced from practice only increases
the same chance of being wrongly pre- standing the limits of their analysis. In them. Data scientists, as the ones clos-
dicted to recidivate; or that failure to many ways, the work of data scientists est to the work, are often the best posi-
predict recidivism happens at the same is a qualitative practice: they are called tioned to address ethical concerns, but
rate across groups. While each of these upon to parse an amorphous problem, they often need help from those who
expectations of a fair score might seem wrangle a messy collection of data, are willing to take time to understand
like complementary requirements, re- and make it amenable to systematic what they are doing and the challenges
cent work has established that satisfy- analysis. To do this work well, they of their practice. We must work col-
ing all three at the same time would be must constantly struggle to under- lectively to make the deliberation that
impossible in most situations; meet- stand the contours and the limitations is already a crucial part of data science
ing two will mean failing to comply of both the data and their analysis. visible. Doing so will reveal far more
with the third.4,7 Even if Northpointe Practitioners want their analysis to be common ground between data sci-
had been more sensitive to disparities accurate and they are deeply troubled entists and their critics and provide a
in the false positive and false negative by the limits of tests of validity, the meaningful foundation from which to
rates, the appropriate way to handle problems with reproducibility, and the articulate shared values.
such a situation may not have been ob- shortcomings of their methods.
vious. Favoring certain fairness proper- Many data scientists are also deeply References
1. Ackerman, M.S. The intellectual challenge of CSCW:
ties over others could just as well have disturbed by those who are coming The gap between social requirements and technical
reflected a difference in values, rather into the field without rigorous train- feasibility. Human-Computer Interaction 15, (2–3),
2000, 179–203.
than a failure to recognize the values ing and those who are playing into the 2. Angwin, J. et al. Machine bias. ProPublica. (May 23,
2016); https://www.propublica.org/article/machine-
at stake. One thing is for certain: this hype by promising analyses that are bias-risk-assessments-in-criminal-sentencing
use of data science has prompted a not technically or socially responsible. 3. Collins, H.M. Artificial Experts: Social Knowledge and
Intelligent Machines. MIT Press, 1993.
vigorous debate, making clear that our In this way, they should serve as allies 4. Corbett-Davies, S. et al. A computer program used
normative commitments are not well with critics. Both see a need for nuanc- for bail and sentencing decisions was labeled biased
against blacks. It’s actually not that clear. Washington
articulated, that fuzzy values will be es within the field. Unfortunately, uni- Post (Oct. 17, 2016); https://www.washingtonpost.
difficult to resolve computationally, versalizing critiques may undermine com/news/monkey-cage/wp/2016/10/17/can-an-
algorithm-be-racist-our-analysis-is-more-cautious-
and that existing ethical frameworks critics’ opportunities to work with data than-propublicas/
may not deliver clear answers to data scientists to meaningfully address 5. Feldman, M. et al. Certifying and removing disparate
impact. In Proceedings of the 21st ACM SIGKDD
science challenges. some of the most urgent problems. International Conference on Knowledge Discovery and
Of course, even if data scientists Data Mining, (2015), 259–268.
6. Hess, D.J. Editor’s Introduction, Studying Those Who
Toward a Constructive take care in their work and seek to Study Us: An Anthropologist in the World of Artificial
Collaboration engage critics, they may not be well Intelligence. Stanford University Press, 2001.
7. Kleinberg, J., Mullainathan, S. and Raghavan, S.
The critical writing on data science has prepared to consider the full range of Inherent Trade-Offs in the Fair Determination
taken the paradoxical position of in- of Risk Scores. Arxiv.org. 2016; https://arxiv.org/
ethical issues that such work raises. In abs/1609.05807
sisting that normative issues pervade truth, few people are. Our research sug- 8. O’Neil, C. Weapons of Math Destruction: How Big Data
Increases Inequality and Threatens Democracy.
all work with data while leaving unad- gests the informal networks that data Crown, 2016.
dressed the issue of data scientists’ scientists rely on are fallible, incom- 9. Žliobaite', I. and Custers, B. Using sensitive personal
data may be necessary for avoiding discrimination in
ethical agency. Critics need to consid- plete, and insufficient, and that this data-driven decision models. Artificial Intelligence and
er how data scientists learn to think is often frustrating for data scientists Law 24, 2 (Feb. 2016), 183–201.
about and handle these trade-offs, themselves.
while practicing data scientists need Solon Barocas (sbarocas@cornell.edu) is an Assistant
In order to bridge the socio-techni- Professor of Information Science at Cornell University.
to be more forthcoming about all of cal gap that Ackerman warned about
danah boyd (danah@datasociety.net) is a Principal
the small choices that shape their deci- 20 years ago, data scientists and critics Researcher at Microsoft Research and the Founder/
sions and systems. need to learn to appreciate each oth- President of Data & Society.
Technical actors are often far more er’s knowledge, practices, and limits.
sophisticated than critics at under- Unfortunately, there are few places in Copyright held by authors.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 25
V
viewpoints
Education
Keeping the Machinery in
Computing Education
Incorporating intellectual and developmental
frameworks into a Scottish school curriculum.
W
think there
E D O N OT
can be “computer sci-
ence” without a com-
puter. Some efforts at
deep thinking about
computing education seem to sidestep
the fact that there is technology at the
core of this subject, and an important
technology at that. Computer science
practitioners are concerned with mak-
ing and using these powerful, gener-
al-purpose engines. To achieve this,
computational thinking is essential,
however, so is a deep understanding
of machines and languages, and how
these are used to create artifacts. In
our opinion, efforts to make computer
science entirely about “computational
thinking” in the absence of “comput-
ers” are mistaken.
As academics, we were invited to
help develop a new curriculum for
computer science in Scottish schools
covering ages 3–15. We proposed a
single coherent discipline of com-
puter science running from this early curriculum for the average five-year man worlds. Hence, we wanted a cur-
start through to tertiary education old, as we have not taught them CS be- riculum that properly grounds their
and beyond, similar to disciplines fore, but we are unconvinced of the co- understanding of that non-human
such as mathematics. Pupils take herence of many current curricula: an world and gives every child the oppor-
time to develop deep principles in underlying intellectual and develop- tunity, should they wish, of a future
those disciplines, and with appro- mental framework seems to be miss- career in our area. Our school systems
priate support the majority of pupils ing, and such a framework is our prin- have these aspirations in teaching
make good progress. From our back- cipal offering to the curriculum. about the natural world—why not the
ground in CS education research, we We understand both the desperate digital world also?
IMAGE COURTESY OF OZOBOT
saw an opportunity for all children to calls from industry to meet the labor In March 2017, the new curriculum
learn valuable foundations in com- market demands of the digital econ- was formally adopted at government
puting as well, no matter how far they omy, and the extraordinary environ- level, and its delivery has started. A
progressed ultimately. ment that will be our children’s, with teachers’ guide is here—http://www.
Nobody knows exactly the right CS ever more blurring of digital and hu- teachcs.scot—and we encourage inter-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 27
viewpoints
pects. Here we outline how they are could make lists, tables, family trees,
presented to non-computer scien- Venn diagrams, and data models to
tists—see the detail at http://www. Although solutions capture key information from the
teachcs.scot. The vocabulary and con- can be created problems they are working on.
cepts used are accessible to those who Learners will use their skills in lan-
need to read them; the difficulty of in many ways, guage to create descriptions of pro-
this should not be underestimated, it it is expected cesses that can be used by other peo-
is hard for an academic computer sci- ple. For example, a computer program
entist to communicate with a teacher that all learners is a great way to describe a process.
of early years computing. will experience Learners will understand how to
Each of our three main aspects per- read, write, and translate between
sists through the five defined levels of creating solutions different representations such as be-
the curriculum, from ages 3–15; the on computers. tween English statements, planning
text here is mostly aimed at teachers of representations, and actual computer
the lower levels. code. For example, developing skills
Understanding the world through in writing code could be scaffolded
computational thinking. The first as- by studying worked examples or by
pect looks at the underlying theory in giving learners jumbled lines of code
the academic discipline of Comput- and asking them to put the lines into
ing Science. Theoretical concepts of an appropriate order.
Computing Science include the char- cal and textual, used to represent pro- Although solutions can be cre-
acteristics of information processes, cesses and information. Some of these ated in many ways, it is expected that
identifying information, classifying representations are used by people and all learners will experience creating
and seeing patterns. others by machines, for example, a ver- solutions on computers. This shows
This aspect is about understand- bal description, a sequence of blocks learners that computers implement
ing the nature and characteristics of in a visual programming language exactly what they—the learners—have
processes and information. These can such as Scratch, or as a series of 1s and written, which is often not what they
be taught through Unplugged activi- 0s in binary. intended, as well as giving them prac-
ties (fun active learning tasks related In this aspect, learners will learn tice in debugging.
to computing science topics but car- how to ‘read’ program code (before
ried out without a computer) and with writing it in the next aspect) and de- Reflections
structured discussions with learners. scribe its behavior in terms of the We have presented a curriculum that
There is a focus on recognizing compu- processes they have learned about in explicitly connects computational
tational thinking when it is applied in the first aspect, processes that will thinking with the more mechanical
the real world such as in school rules, be carried out by the underlying ma- aspects of computing, with particular
finding the shortest or fastest route chinery when the program runs. For concentration on the explicit modeling
between school and home, or the way example, learners could read a section of computational domains by com-
objects are stored in collections. of code and predict what will happen putational mechanism. Not everyone
Learners will be able to identify steps when it runs or if lines of code change needs to become a software engineer
and patterns in a process, for example order. Learners will learn and explore or computer scientist; the curriculum
seeing repeated steps in a dance or different representations of informa- provides valuable learning at all lev-
lines of a song. In later stages, learners tion and how these are stored and els, including the essential founda-
will begin to reason about properties manipulated in the computing system tions for those who wish to study the
of processes, for example considering under study. subject further. While our curriculum
whether tasks could be carried out at Designing, building, and testing is informed by previous educational
the same time, whether the output of a computing solutions. The third as- computing research, we emphasize
process is predictable, and how to com- pect is about taking the concepts and quite different learning outcomes via
pare the efficiency of two processes. understanding from the first two as- our three-point framework.
Learners will identify information, pects and applying them. Learners
classify it, and see patterns. For exam- will create solutions, perhaps by de- Richard Connor (Richard.Connor@strath.ac.uk) is a
ple, learners might classify and group signing, building, and testing solu- Professor of Computer Science at the University of
Strathclyde, Scotland.
objects where there is a clear distinction tions on a computer or by writing a
between types or where objects might computational process down on pa- Quintin Cutts (Quintin.Cutts@glasgow.ac.uk) is a
belong to more than one category. per. In doing so, they will learn about Professor of Computer Science Education and Director
of the Centre for Computing Science Education at the
Understanding and analyzing com- modeling process and information University of Glasgow, Scotland.
puting technology. This aspect aims to from the real world in programs, and
give learners insight into the hidden what makes a good model to represent Judy Robertson (Judy.Robertson@ed.ac.uk) is a
mechanisms of computers and the or solve a particular problem. Professor of Digital Learning at the University of
Edinburgh, Scotland.
programs that run on them. It explores Learners will create representations
the different kinds of language, graphi- of information. For example, learners Copyright held by authors.
Viewpoint
Pay What You Want as
a Pricing Model for
Open Access Publishing?
Analyzing the “Pay What You Want” business model for open access publishing.
T
H E O P EN ACCE SS publishing
movement has received
strong support from scien-
tists, lawmakers, and fund-
ing institutions. Many pub-
lishers are reacting to this demand by
offering open access journals.7 Howev-
er, there is an ongoing debate on how
open access publishing models should
be financed.2,4 Most open access jour-
nals that rely on the so-called “gold
open access model”8—which makes
the research output immediately avail-
able from the publisher—let authors of
accepted papers pay article processing
charges (APCs) of several hundred to
several thousand U.S. dollars.1 Howev-
er, APCs are often criticized for poten-
tially excluding researchers with limit-
ed funds.3
As one potential solution to this
problem and also to gain a better un-
derstanding of the role of APCs in the
scientific community, some publishers
are starting to use Pay What You Want
(PWYW) as a pricing model for gold
open access publishing. PWYW is a
pricing model where sellers delegate Sciences, and Thieme Publishers have covering the fields of surgery and engi-
the full pricing power to buyers. So far, started to experiment with the PWYW neering, and The Surgery Journal
PWYW has mainly been applied in ser- model for APCs of open access jour- (Thieme Publishers), an open access
IMAGE BY RT IMAG ES/ SH UTT ERSTOCK
vice industries (for example, restau- nals. More specifically, Cogent OA em- journal for surgeons and trainee sur-
rants, theaters), but also for the sale of powers authors to decide how much geons of all disciplines, have started to
digital products like software (such as they want to pay for their open access delegate pricing power to their contrib-
http://humblebundle.com). More re- publication in 15 broad journals cover- uting authors.
cently, several publishers of open ac- ing different domains of academic re- Although neoclassical economic
cess journals like Cogent OA (belong- search. Likewise, SICOT-J (edp scienc- theory predicts that buyers (that is, au-
ing to the Taylor & Francis Group), edp es), a multidisciplinary journal thors in OA publishing) pay nothing if
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 29
viewpoints
$2,000
Outlier
$1,500
Payment in US$
$1,000
$500
Advertise with ACM!
Reach the innovators
$0
and thought leaders The box indicates the lower and upper quartile and the line within depicts the median
of the payments. The whiskers extend to include all data points within the 1.5 interquartile
working at the range (IQR) of the upper/lower quartile and stop at the largest/smallest such value.
cutting edge
they are not forced to do so, empirical cluded from publishing because they
of computing research on PWYW consistently finds can adjust their PWYW payments to
and information that many buyers pay positive prices, of- their available means.
ten exceeding the marginal costs of the For publishers, PWYW achieves en-
technology through product (for example, Gneezy et al5). In dogenous price discrimination and
ACM’s magazines, the case of open access publishing, au- higher market penetration because no
thors may be willing to voluntarily pay author is excluded by APCs that he can-
websites APCs for reasons of fairness and reci- not afford. This can be especially im-
and newsletters. procity—because they want to com- portant for the introduction of a new
pensate the publisher for his costs or to scientific journal. Furthermore, PWYW
reciprocate his generosity, as well as can initiate a debate about funding
◊◆◊◆◊ for strategic considerations, that is, be- and affordability of APCs and might in-
cause authors understand the journal crease the acceptance of open access
will not be sustainable if the produc- APCs in the scientific community. The
Request a media kit tion costs are not covered.9 Further- obvious risk, however, is free riding of
with specifications more, with their payment authors may authors who do have the funds to pay
signal to others (and potentially to for APCs but choose to pay nothing or
and pricing: themselves) the value they attach to only very little. A more specific concern
their publication.6 At the same time, in the context of open access is that
Ilia Rodriguez authors with limited funds are not ex- some authors may be fundamentally
convinced that research articles should
+1 212-626-0686 be “free” to both readers and authors
acmmediasales@acm.org With their payment instead of just “open” and for this rea-
son refuse a voluntary payment.
authors may Some insights on the performance
signal to others of PWYW for open access APCs at the
individual level are provided by initial
(and potentially data from the peer-reviewed journal
to themselves) The Surgery Journal launched by
Thieme Publishers in June of 2015 that
the value they attach exclusively uses PWYW pricing. At this
to their publication. peer-reviewed journal, authors are
prompted after acceptance of their arti-
cle to state the APCs.
After an article is accepted authors
are directed randomly to one of two
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 31
V
viewpoints
Viewpoint
Social Agents:
Bridging Simulation
and Engineering
Seeking better integration of two research communities.
T
HE USE OF the agent para-
digm to understand and
design complex systems oc-
cupies an important and
growing role in different ar-
eas of social and natural sciences and
technology. Application areas where the
agent paradigm delivers appropriate
solutions include online trading,16 di-
saster management,10 and policy mak-
ing.11 However, the two main agent ap-
proaches, Multi-Agent Systems (MAS)
and Agent-Based Modeling (ABM) dif-
fer considerably in methodology, appli-
cations, and aims. MAS focus on solv-
ing specific complex problems using
autonomous heterogeneous agents,
while ABM is used to capture the dy-
namics of a (social or technical) system
for analytical purposes. ABM is a form
of computational modeling whereby a
population of individual agents is given
simple rules to govern their behavior agents at the macro level, whereas MAS setting, indirectly affects the environ-
such that global properties of the whole are operational systems, acting and af- ment. And, the design of MAS is often
can be analyzed.9 The terminology of fecting its (physical) environment, with geared to analytic insights and simu-
ABM tends to be used more often in the a focus on solving specific practical or lations toward the understanding of
social sciences, whereas MAS is more engineering problems, and emphasiz- how configurations of agents behave
used in engineering and technology. ing agent architectures with sophisti- in different circumstances. Currently,
Although there is considerable overlap cated reasoning and decision process- applications of MAS are broader than
between the two approaches, histori- es. This has lead to the development of pure distribution problems, including
cally the differences between ABM and two research communities proceeding interactive virtual characters, where
IMAGE BY PHA NU D. P ONGVA NIT
MAS are often more salient than their on nearly independent tracks. the focus is on the cognitive, affective,
similarities. For example, it is often re- However, this division is not as and emotional characteristics of the
marked that a main difference between black and white as it may seem. In fact, system, and game-theoretic models,
ABM and MAS is that ABM models are much ABM work goes beyond descrip- focusing on the design of incentive
descriptive aiming at explanatory in- tive simulations of a situation, and, as mechanisms that guarantee a given
sight into the collective behavior of input for decision making and policy strategic behavior.
Social abilities are central both in tions, and the ability to create, structure
ABM, where agents represent humans and ‘rationalize’ the environment to fit
and their interactions, and in MAS, Unfortunately, ones expectations and abilities (lead-
that enable game-theoretic analyses of from a modeling ing, for example, to the design of orga-
decision strategies, or provide interac- nizations, institutions, and norms).
tive virtual agents in varied situations. perspective, Following an increasing number of
It is precisely in this area where the real human behavior researchers in both ABM and MAS that
need for integration of ABM and MAS in recent years have come to similar
is undoubtedly the most necessary. In is neither simple conclusions,7,13,18,19 we claim that new
social simulation, the benefits of com- nor rational. models of preference and belief forma-
bining MAS and ABM have been advo- tion are needed that show how behavior
cated for many years, and are the focus derives from identities, emotions, moti-
of the long-lasting workshop series on vation, values, and practices.6
Multi-Agent Based Simulation (MABS).2 The endeavor required to construct
ABM has increasingly and successfully such agent models that are socially real-
been used for social simulations,3 but whereas MAS focuses on solving specif- istic requires the effort and the capabil-
it is in the MAS area that fundamental ic problems using independent agents, ities of both the MAS and ABM commu-
research on agent architectures imple- through the formalization of the com- nities, bringing together formalization
menting psychological traits and social plex goal-oriented processes, such as and computational efficiency, and
concepts such as norms, commitments, the Beliefs-Desires and Intentions (BDI) planning techniques as in MAS, with
emotions, identity, and social order, has model proposed by Bratman20 or game- the ABM expertise on empirical valida-
been most prominent.4,5 Bridging these theoretic approaches. tion and on adapting and integrating
somewhat parallel tracks requires a new The main advantages of such ra- social sciences theories into a unified
grounding for agent architectures. tionality assumptions are their parsi- set of assumptions,1 furthering the
mony and applicability to a very broad fundamental understanding of social
Questioning Rationality range of situations and environments, deliberation processes, and develop-
Traditionally, one of the most salient and their ability to generate falsifiable, ing techniques to make these acces-
aspects shared by both ABM and MAS and sometimes empirically confirmed, sible for simulation platforms. This
approaches is the premise of rational- hypotheses about actions in these en- Viewpoint is therefore an appeal to join
ity. This is derived from the traditional vironments. This gives conventional the strengths of both communities to-
definition of agents as autonomous, rational choice approaches a combina- ward sociality-based agents.
proactive, and interactive entities where tion of generality and predictive power Without claiming a readily available
each agent has bounded (incomplete) not found in other approaches. In fact, solution, we propose the concept of
resources to solve a given problem; rationality approaches are the basis of sociality as the leading principle of
there is no global system control; data most theoretical models in the social agency, as an alternative for rational-
is decentralized; and computation is sciences, including economics, politi- ity. Following the aforementioned
asynchronous.21 Agent rationality can cal science, or social choice theories. description of rational behavior, the
be summarized as follows: Unfortunately, from a modeling per- main characteristics of sociality-
˲˲ Agents hold consistent beliefs; spective, real human behavior is neither based reasoning are:
˲˲ Agents have preferences, or priori- simple nor rational, but derives from a ˲˲ Ability to hold and deal with incon-
ties, on outcomes of actions; and complex mix of mental, physical, emo- sistent beliefs for the sake of coherence
˲˲ Agents optimize actions based on tional, and social aspects. Realistic appli- with identity and cultural background.
those preferences and beliefs. cations must consider situations in That is, beliefs originate from other
This view on rationally entails that which not all alternatives, consequenc- sources than observation, including
agents are expected, and designed, es, and event probabilities can be fore- ideology or culture.
to act rationally in the sense that they seen. This renders rational choice ap- ˲˲ Ability to fulfill several roles, and
choose the best means available to proaches unable to accurately model and pursue seemingly incompatible
achieve a given end, and maintain con- predict a wide range of human behaviors. goals concurrently, for example, si-
sistency between what is wanted and multaneously aiming for comfort
what is chosen.14 Even though mul- Toward Social Agents and environmental friendliness, or
tiple alternatives have been proposed, Human sociability refers to the nature, for riches and philanthropy.
in both the ABM and MAS approaches, quantity, and quality of interactions ˲˲ Preferences are not only a cause
individual agents are still typically char- with others, including both pro-social, for action but also a result of action.
acterized as bounded rational, acting or cooperative, behaviors, and conflict, Moreover, preferences change signifi-
toward their own perceived interests. competitive, or dominating behaviors. cantly over time and their ordering is
The main difference is that agent be- Sociability is also the ability to influence influenced by the different roles being
haviors in ABM are used to capture the others, by changing their behaviors, fulfilled simultaneously, which requires
dynamics of a system for analytical pur- goals, and beliefs, the emotional reac- the need to deal with misalignment and
poses, grounded whenever possible on tion to others and to the environment, incompatible orderings.
existing data about system outcomes, and how actions are affected by emo- ˲˲ Action decisions are not only geared
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 33
viewpoints
to the optimization of own wealth, but search path linking theory, model, and
often motivated by altruism, fairness, implementation, and suggested possi-
justice, or by an attempt to prevent re- Sociality-based ble theories and techniques to develop
gret at a later stage.
˲˲ Understand when there is no need
agents are also sociality-based agents. These incorpo-
rate expertise from both ABM and MAS
to further maximize utility beyond some fundamental to the and require integration of both areas in
reasonably achievable threshold.
˲˲ Understand how identity, cul-
new generations of order to succeed. We welcome the dis-
cussion of these issues toward a novel
ture, and values influence action, and intelligent devices. area of research on social agents, which
use this knowledge to decide about take sociability as the basis for agent de-
reputation and trust about who and liberation and enable interaction.
how to interact.
The first step toward sociality-based References
1. Chai, S. Choosing an Identity: A General Model
agents is a thorough understanding of of Preference and Belief Formation. University of
these principles, and open discussion social practices as a kind of shortcuts Michigan Press, 2001.
2. Conte, R., Gilbert, N., and Sichman, J. MAS and social
across disciplines on the grounds and for deliberation.15,17 Where it concerns simulation: A suitable commitment. In J. Sichman,
R. Conte, and N. Gilbert, Eds, Multi-Agent Systems
requirements for sociality from differ- utility, satisficing can be more suitable and Agent-Based Simulation, volume 1534 of
ent perspectives. This discussion will approach than maximizing.12 This also Lecture Notes in Computer Science,. Springer Berlin
Heidelberg, 1998, 1–9
be fundamental to the development of allows us to integrate agents of varied 3. Davidsson, P. Agent based social simulation: A
formal models and agent architectures richness levels, for example, using computer science view. Journal of Artificial Societies
and Social Simulation 5, 1 (2002).
that make sociality-based behavior pos- rich cognitive models to zoom-in the 4. Dias, J., S. Mascarenhas, and A. Paiva. Fatima
sible and verifiable. behavior of salient agents in a simula- modular: Towards an agent architecture with a
generic appraisal framework. In Proceedings of the
Moreover, it is necessary to iden- tion, whereas other agents just follow International Workshop on Standards for Emotion
tify and formalize which mechanisms, simple rules. This approach can coun- Modeling, 2011.
5. Dignum, F., Dignum, V., and Jonker, C.M. Towards
other than imitation, can describe ter the obvious criticism that sociality- agents for policy making. In MABS IX, Springer, 2009,
how agents can adapt to pressures based agents will become too complex 141–153.
6. Dignum, F. et al. A conceptual architecture for social
in the environment to behave in a so- for use in computational simulations. deliberation in multi-agent organizations. Multiagent
cially acceptable, resource-sustainable Sociality-based agents are also fun- and Grid Systems 11, 3 (2015), 147–166.
7. Dignum, F., Prada, R., and Hofstede, G.J. From autistic
fashion. Resulting models support the damental to the new generations of in- to social agents. In AAMAS 2014, May 2014.
understanding or predicting human telligent devices, and interactive char- 8. Dignum, V. Mind as a service: Building socially
intelligent agents. In V. Dignum, P. Noriega, M. Sensoy,
behavior, including rich models of acters in smart environments. These and J. Sichman, Eds, COIN XI: Revised Selected Papers,
Springer International Publishing, 2016, 19–133.
emotions, identities, culture, values, artifacts not only must build (partial) 9. Epstein, J.M. and Axtell, R. Growing Artificial Societies:
norms, and many other socio-cogni- social models about the humans they Social Science from the Bottom Up. The Brookings
Institution, Washington, D.C., 1996.
tive characteristics. Such models of interact with, but also need to take so- 10. Fiedrich, F. and Burghardt, P. Agent-based systems
social reality are also needed to study cial roles in a mixed human/digital real- for disaster management. Commun. ACM 50, 3 (Mar.
2007), 41–42.
the complex influences on behavior ity. An interesting challenge would be to 11. Ghorbani, A. Enhancing abm into an inevitable tool
of different socio-cognitive character- use the same technologies in real time for policy analysis. Policy and Complex Systems 1, 1
(2014).
istics and their relationships. The in- mixed human/artificial interactions, 12. Gigerenzer, G. Moral satisficing: Rethinking moral
tegration of psychological models of and criticisms could also be on the fea- behavior as bounded rationality. Topics in Cognitive
Science 2, 3 (2010), 528–554.
motivation and cognition, sociological sibility to use these architectures (or 13. Kaminka, G. Curing robot autism: A challenge. In
theories of value and identity forma- controlled reductions/simplifications) Proceedings of the AAMAS 2013, May 2013), 801–804.
14. Lindenberg, S. Social rationality versus rational
tion, and philosophical theories of co- in real time or near real time. egoism. In Handbook of Sociological Theory, Springer,
herence and higher-order rationality, 2001, 635–668.
15. Reckwitz, A. Toward a theory of social practices.
together with different formal meth- Moving Forward European Journal of Social Theory, 5, 2 (2002), 243–263.
ods, quickly yields intractable models. The intent of this Viewpoint has been 16. Rogers, A. et al. The effects of proxy bidding and
minimum bid increments within ebay auctions. ACM
However, it is important to identify to appeal for a collaborative research Trans. Web 1, 2 (Aug. 2007).
17. Shove, E., Pantzar, M., and Watson, M. The Dynamics of
what is the model being developed for. effort toward fundamental formal theo- Social Practice. Sage, 2012.
In fact, richer models are not always ries and models that increase our un- 18. Silverman, B. et al. Rich socio-cognitive agents for
immersive training environments: The case of nonkin
the most appropriate ones. derstanding of the principles behind village. Journal of Autonomous Agents and Multi-
Once these characteristics are well human deliberation (such as the ones Agent Systems 24, 2 (Mar. 2012); 312–343.
19. Vercouter, L. et al. An experience on reputation models
understood, then simplified mod- listed discussed here), before deciding interoperability based on a functional ontology.
els can be developed to suit different on which modeling techniques we need In Proceedings of IJ-CAI’07, Morgan Kaufmann
Publishers Inc., San Francisco, CA, 2007, 617–622.
needs. That is, implementing sociality- to implement them. Even though, sev- 20. Wooldridge, M. Reasoning about Rational Agents. MIT
based agents will require other tech- eral approaches to model social aspects Press, 2000.
21. Wooldridge, M. An Introduction to Multiagent
niques than those currently used in in agent behavior are available, there is Systems. Wiley, New York, 2009.
either MAS or ABM,8 including the use not sufficient consensus on which char-
Virginia Dignum (m.v.dignum@tudelft.nl) is an associate
of simpler, context-specific decision acteristics are needed for what, nor on professor with the Faculty of Technology, Policy and
rules, mimicking how people them- how to specify and integrate them. We Management, Delft University of Technology, Delft,
The Netherlands.
selves are able to deal with complex have identified an initial set of charac-
decision making, for example, using teristics for sociability, proposed a re- Copyright held by author.
Hootsuite:
tions to user mobile devices when-
ever something relevant happened on
Twitter. By the time we started having
some concerns about how we were
In Pursuit
handling that, we were already servic-
ing several hundreds of thousands of
users, each with individual subscrip-
tions tailored to their own specific
of Reactive
interests. What was needed was some-
thing that could stay connected to
Twitter’s streaming endpoints.
COATTA: I gather that at about the
same time you were making this move,
Systems
you also took steps to move from PHP
to Scala. What drove that?
STEEL: Initially, it had a lot to do with
learning about all the success some
other organizations had experienced
with Scala. This was after Twitter had
decided to go with Scala, for example,
and that obviously lent a lot of legiti-
macy to it. Also, the first team here to
BASED IN VANCOUVER, Canada, Hootsuite is the most work with Scala came from quite a var-
ied background. We had some people
widely used SaaS (software as a service) platform for who were lobbying for a more strongly
managing social media. Since its humble beginnings in typed functional language—some-
thing on the order of Haskell—and
2008, Hootsuite has grown into a billion-dollar company then there were some others with Clo-
with more than 15 million users around the globe. jure and Java experience. In taking all
As Hootsuite evolved over the years, so did the that into account, I guess Scala just
seemed to check most of the boxes.
technology stack. A key change was moving from LAMP JONAS BONÉR: What would you say
(Linux, Apache, MySQL, PHP) to microservices. A shift was the principal benefit you saw with
Scala? Was it the functional nature of
to microservices didn’t come without its challenges, the language itself? Or did it have more
however. In this roundtable chat, we discuss how Scala to do with the libraries available within
and Lightbend (which offers a reactive application that ecosystem?
STEEL: The language itself was the
development platform) were an essential part of a biggest part of it. The main advocate
successful transition. The exchange includes Jonas here for Scala was working on a Black-
berry client at the time, so he had a lot
Bonér, CTO of Lightbend; Terry Coatta, CTO of Marine of JVM (Java virtual machine) knowl-
Learning Systems; Edward Steel, senior Scala developer edge and yet also had become frus-
at Hootsuite; Yanik Berube, lead software developer at trated with Java itself. I guess he was
just looking for a better way. Another
Hootsuite; and Ken Britton, senior director of software aspect of our thinking had to do with
development at Hootsuite. building a distributed system that
STEEL: Microservices were always in that they are both message based and Erlang actor system, beyond the in-
the back of our minds. We already had highly resilient—which is to say that dependence you have already men-
some batch processes written in PHP even when they crash, they can typi- tioned, is that it’s quite fine-grained.
that were starting to run jobs at that cally be brought back in a useful way. So I wonder, given your focus on no-
point. That sort of worked, but it was This probably explains why Erlang has tifications to user mobile devices,
far from an ideal way of doing things. so often been used to develop resilient whether you might actually require an
So I think we had already started to de- telecommunications systems. When- actor per user just to deal with that?
velop an appetite for a system on which ever you are talking about distributed STEEL: In our case, no. But symp-
we could build a few services, with the systems or some system where you ex- toms of that definitely showed up as we
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 37
practice
JONAS BONÉR
Something I find
very interesting
is that Akka and
Erlang appear to be
the only platforms
or libraries that
put an emphasis
on embracing and
managing failure—
which is to say were first building our system. When
we were starting out, we learned more
sentially glue business logic onto the
data part of the logic. But in terms of
they are basically about how we should be building the the size of these things, I’d say we’re
designed for system, as well as about how actors re-
ally ought to work. At first, we definitely
still trying to figure that out, and we
haven’t come up with any hard and fast
resilience. fell into the trap of putting too much rules so far.
logic into single actors—for example, BONÉR: I’m guessing each of your mi-
by putting recovery logic into each ac- croservices owns its own data store. If
tor instead of relying on the supervi- so—with these things being stateful—
sion hierarchy, which would have al- how are you then able to ensure resil-
lowed us to code less defensively. It ience across outages?
turns out it’s best just to embrace the STEEL: Each of these services abso-
“let it crash” philosophy, since that ac- lutely owns its own data. When it comes
tually offers a lot of robustness. to replacing parts of the monolithic sys-
We also learned the model really tem, it generally comes down to dealing
shines whenever you separate con- with a table or a couple of related tables
cerns into single-purpose actors. Be- from the LAMP MySQL database. Gen-
sides helping to clarify the design, erally speaking, the space is pretty min-
it opens up a lot of opportunities in imal in terms of the services that need
terms of scalability and configuration to be accounted for. It’s basically just a
flexibility at the point of deployment. matter of retrieving and creating data.
BONÉR: This applies to microservices BERUBE: I would say we make fairly
as well. That is, there are plenty of heterogeneous use of various technol-
opinions about what even defines a mi- ogies for data storage. And, yes, we do
croservice. What does that term mean come from a LAMP stack, so there is
to you? And how does that map concep- still a heavy reliance on MySQL, but we
tually to how you view actors? also make use of MongoDB and other
BERUBE: Internally, we are still try- data-storage technologies.
ing to define what a microservice is The services typically each encap-
and what the scale of that ought to be. sulate some area of the data. In theory,
Today, most of our services focus on at least, they are each supposed to own
accomplishing just one set of highly re- their data and rely on data storage dedi-
lated tasks. Our goal is to have each of cated only to them. So, we have recently
these services own some part of our do- started looking into storing a bit more
main model. Data services, for exam- data within the services themselves for
ple, would each control their own data, reasons of efficiency and performance.
and nothing else would have access to COATTA: To be clear, then, there’s
that. To get to that data, you would have some separate data-access layer
to go through the data service itself. from which the services are able to
Then we would also have functional pull in whatever information they
services, which are the services that es- need to manipulate?
TERRY COATTA
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 39
practice
EDWARD STEEL
Because of our
ability to change
the characteristics
of actors by how
we configure them,
we have been able
to adapt this core
framework to all
types of payloads
and traffic profiles supported by the Lightbend stack sur-
faced almost immediately as the Hoot-
COATTA: So far, we have talked only
about general issues. Now I would like
for the various suite engineering team started discov- to hear about some of your more spe-
services. ering opportunities for scaling down
on the underlying physical and virtual
cific engineering challenges.
BONÉR: One thing I would like to
infrastructure they had run previously know is whether you’re mostly doing
on their LAMP stack (where there had reactive scaling, predictive scaling, or
been a process for each request). Ac- some combination of the two to opti-
cordingly, it soon became apparent mize for your hardware.
that operations under the reactive mi- BERUBE: For now at least, our loads
croservices model were going to put don’t really change a lot. Or perhaps
much less strain on their resources. what I should say is that they change
In fact, if anything, the engineers throughout the day, but predictably so
at Hootsuite quickly learned that by from one day to the next. And the way
continuing to employ some of the prac- we have designed our services to run
tices that had made sense with a LAMP behind brokers means we are able just
stack, they would actually be denying to spin off more workers as necessary.
themselves many of the benefits avail- In combination with some great tool-
able by relying to a greater degree on ing from AWS (Amazon Web Services),
the Lightbend stack. For example, they we are able to adapt quickly to chang-
found there was a real advantage to ing workloads.
making greater use of the model class- STEEL: One thing we did decide to
es supported by the Lightbend stack, do was to build a framework using Ze-
since those classes come equipped roMQ to enable process communica-
with data-layer knowledge that can tion between our various PHP systems.
prove to be quite useful in a dynamic But then we saw later that we could have
web-oriented system. just as easily pulled all that into Akka.
Similarly, they learned that by us- COATTA: And I’m assuming, with
ing individual actors to run substan- Akka, it would have been easier for you
tial portions of their system instead of to achieve your goal of adhering to the
decomposing those components into actor paradigm, while also taking ad-
groups of actors, they had been unwit- vantage of better recovery mechanisms
tingly depriving themselves of some and finer-grained control.
of the features Akka offers for tuning STEEL: Yes, but I think the key is that
parts of the system separately, parallel- because of our ability to change the
izing them, and then distributing work characteristics of actors by how we
efficiently among a number of differ- configure them, we have been able to
ent actors capable of sharing the load. adapt this core framework to all types
And then there were also a few other of payloads and traffic profiles for the
things they learned ... various services. We can say, “This ser-
vice is using a blocking database,” at
YANIK BERUBE
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 41
practice
KEN BRITTON
It has become
apparent how
critical frameworks
and standards are
for development
teams when using
microservices.
hierarchies, one possibility is that you some failures. They are just going to
will end up deciding the problem isn’t happen. This means we should not be
really the original actor’s responsibil- banking on some external service re-
ity but instead should be handled by sponding in a short amount of time.
that actor’s supervisor. That’s because We want to explicitly set timeouts.
the logic behind the creation of these Then if we see that the service is start-
hierarchies determines not only where ing to fail very quickly or with some
the processing is to be done, but also high frequency, we will know it’s
where the failures are to be handled— time to trip a circuit breaker to ease
which is not only a natural way to orga- the pressure on that service and not
nize code, but also an approach that have those failures echo across all
very clearly separates concerns. services. I have to say that came as a
BONÉR: I think that really hits the bonus benefit I certainly was not ex-
nail on the head. It comes down to pecting when we first started working
distinguishing between what we call with Akka.
errors—which are things that the user
is responsible for dealing with—and Providing for greater efficiency in the
failures. Validation errors then natu- utilization of system resources by re-
rally go back to the user while less sorting to a distributed microservices
severe errors go to the component architecture is one thing. But to what
that created the service. This creates degree is that liable to end up shifting
a model that is easier to reason about, additional burdens to your program-
rather than littering your code with mers? After all, coding for asynchro-
try/catch statements wherever fail- nous distributed systems has long
ures might happen—since failures been considered ground that only the
can, and will, happen anywhere in a most highly trained Jedi should dare
distributed system. to tread.
BERUBE: One of the fantastic les- What can be done to ease the tran-
sons that has come out of all this is sition to a reactive microservices en-
it has allowed me to start thinking vironment for programmers more
about how the system actually works accustomed to working within the
in terms of handling failures and confines of synchronous environ-
dealing with the external agents we ments? Won’t all the assumptions
communicate with via messages. Ba- they typically make regarding the
sically, I started to think about how state of resources be regularly vio-
we should handle the communica- lated? And how to get a large team of
tion between services around the coders up the concurrency learning
way we handle failures. So now that’s curve in reasonably short order?
something we always think about. Here’s what the Hootsuite team
The reality is that any time we talk learned ...
to external services, we should expect
COATTA: Let’s talk a little about the BONÉR: That matches my experi- to operate in that environment, as
impact the move to microservices ence as well. Actors are very object well as to train people to work in it.
has had on your developers. In par- oriented, and they encapsulate state Whereas before maybe it was suffi-
ticular, I would think this means you and behavior—all of which I think of cient just to find some new hires that
are throwing a lot more asynchrony as mapping well to a traditional ap- were proficient in PHP, now you have
at them than most developers are ac- proach. Futures, on the other hand, ZeroMQ and actors and Futures and
customed to. I imagine they probably lend themselves to functional think- any number of other things for them
also have a lot more data consistency ing—with all these small, stateless, to wrap their heads around. Without
issues to worry about now. one-off things you can compose eas- question, your environment has be-
BERUBE: Although the asynchrony ily. But have you found you can actu- come more complex. But is it now in
problem hasn’t been fully addressed, ally make these things derived from some respects also actually an easier
Scala Futures (data structures used to two very different universes work well place in which to operate?
retrieve the results of concurrent oper- together? Do you blend them or keep BERUBE: I think the act of dividing
ations) actually make it really easy to them separate? the logic into a lot of different self-con-
work with asynchronous computation. BERUBE: We have used them togeth- tained services has made it easier at
I mean, it still takes some time to ad- er in parallel, and I think they work some level to reason about how the sys-
just to the fact that anything and every- well that way. Ken mentioned this tem works. But we are not finished yet.
thing can and will fail. But, with Scala idea of generating Futures and then There is still plenty of work to do and
Futures, it’s actually quite easy for rela- piping them either to yourself as an lots of challenging areas to continue
tively uninitiated programmers to actor or to some other actors. I think reasoning about.
learn how to express themselves in an that pattern works quite well. It’s And, yes, of course, the environ-
asynchronous world. both simple and elegant. ment has become a bit more complex.
STEEL: If you are coming at this from STEEL: I have to admit I stumbled I have to agree with that. But the ben-
the perspective of thread-based con- over that mental shift a bit early on. efits outweigh the drawbacks of roll-
currency, it’s going to seem much scar- But, yes, I’d say we have been able to ing in all this technology, since we now
ier for a lot of use cases than if you’re blend actors and Futures successfully have more layers of abstraction to take
coming at it from a Futures point of for the most part. advantage of. We have teams that are
view. Also, when you’re working direct- BONÉR: Do you feel that certain types generally aware of the big picture but
ly inside actors, even though messages of problems lend themselves better to are mostly focused on just a few mi-
are flying around asynchronously and one or the other? croservices they understand really well.
the system is doing a thousand things STEEL: In our simpler services, the That’s an approach that will have huge
at the same time, you are insulated routing of a request to the code is all ac- benefits for our operations as we scale
from what it takes to synchronize any tor based, and then the actual business them moving forward.
state modifications, since an actor will logic is generally written as calls to other BRITTON: It has become apparent
process only one message at a time. things that produce Futures. I suppose how critical frameworks and stan-
KEN BRITTON: I have noticed when that when you’re thinking about infra- dards are for development teams
developers first start writing Scala, structure and piping things around, it’s when using microservices. People of-
they end up with these deeply nested, very natural to think of that in terms ten mistake the flexibility microser-
control-flow-style programs. You see a lot of actors. Business logic, on the other vices provide with a requirement to
of that in imperative languages, but there hand, perhaps maps a little more readily use different technologies for each
is no penalty for it. In a strongly typed to the functional point of view. service. Like all development teams,
functional language, however, it is much BRITTON: We are also finding that a we still need to keep the number of
more difficult to line up your types rich object-oriented model is helpful in technologies we use to a minimum so
through a complex hierarchy. Developers our messaging. For example, we have we can easily train new people, main-
learn quickly that they are better served started defining richer success and tain our code, support moves between
by writing small function blocks and failure messages containing enough teams, and the like.
then composing programs out of those. detail to let an actor know exactly how We have also seen a trend toward
Akka takes this one step further by to respond. So, now our message hi- smaller services. Our initial microser-
encouraging you to break up your logic erarchy has expanded to encapsulate vices were actually more like loosely
with messages. I’ve observed a com- a lot of information, which we think coupled macroservices. Over time,
mon evolution pattern where develop- nicely aligns object-oriented concepts though, we have pushed more of the
ers will start off with these very bulky, with the actor model. deployment, runtime, and so forth into
complex actors, only to discover later COATTA: One thing that occurred to shared libraries, tooling, and the like.
that they could have instead piped a me as you talked about your environ- This ensures the services are focused on
Future to their own actor or any other ment is that it seems you have moved logic rather than plumbing, while also
actor. In fact, I’ve witnessed a number not only from a monolithic architec- sticking to team standards.
of aha moments where developers hit ture, but also, in some sense, from
upon the realization that these tools a monolithic technology to a much
actually encourage them to build wider array of technologies. So I won- Copyright held by authors/owners.
smaller composable units of software. der if you now find it more difficult Publication rights licensed to ACM. $15.00.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 43
practice
DOI:10.1145/ 3132267
people to know, and he responded
Article development led by
queue.acm.org
that it didn’t matter—a good software
engineer can work on anything.
This has been the thinking at many
We all wear many hats, but make sure large software companies in the past,
you have one that fits well. and there are definitely merits to
it—especially when you are hiring in-
BY KATE MATSUDAIRA experienced candidates straight out
of school. As I have worked longer in
Breadth
the industry, however, I have started
changing my thinking.
I would argue that it is important
to go deep in at least one area, and it
is almost always better to hire people
who have a solid depth of experience
in the tools and technology they are
and
using.
Why do you need to have deep
knowledge?
Really good software engineers for
a particular language or technology
will exhibit qualities such as these:
Depth
˲˲ They are productive. They pro-
duce an amount of work that is above
average, and they are able to get things
done. This means they know how to
use the tools of their trade well and
aren’t slowed down by not under-
standing something. They use their
brainpower for harder problems, not
learning how to do the basics.
˲˲ They make smart trade-offs.
They are able to understand the risks
of their decisions. They have failed
I am often asked for career advice. One of the things before and so can avoid mistakes.
software engineers always want to know is if they If there is a library or prebuilt code
should learn some new tool or language. In fact, I somewhere, they are probably aware
of it—they may even have contributed
cannot think of a performance review I have read for a to it or used it in past projects.
software developer that didn’t include something about ˲˲ They help others. Teammates go
to them with questions because they
growing their skills around a particular technology. have done this before and know how
That is the nature of our work: it is constantly to do it right. This expertise makes
changing. You have to keep learning, or you will them natural leaders or mentors.
˲˲ They hit their deadlines. Their esti-
become obsolete. mates are almost always accurate. They
But for your career, is it better to go wide and learn know how long something should take
them because they have experience
a lot of different things, or is it better to go deep and working on similar projects.
learn a few things really well? ˲˲ They are still growing person-
Making the case for going deep. Recently, I was ally and professionally. Since they
are comfortable with the technology
talking to another engineering leader about hiring and stack, they can use their time on learn-
staffing. I asked which technologies he wanted ing skills in other areas such as lead-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 45
practice
DOI:10.1145/ 3106637
such as Scrum and SAFe (Scaled Agile
Article development led by
queue.acm.org
Framework) may be part of the future,
but you will also need many new meth-
ods and practices—some of which are
Essence can keep software development not even known today. Extending a
for the IoT from becoming unwieldy. single method to incorporate all that
is required would result in something
BY IVAR JACOBSON, IAN SPENCE, AND PAN-WEI NG that is way too big and unwieldy. In-
stead, the new Object Management
Is There
Group (OMG) standard Essence can
be used to describe modular prac-
tices that can be composed together
to form a multitude of methods, not
a Single
only to provide for all of today’s needs,
but also to be prepared for whatever
the future may bring.
The software world is continu-
Method for
ously innovating and opening up new
areas of opportunity and challenge.
A decade ago developers were busy
with trends such as service-oriented
the Internet
architecture and product-line archi-
tecture—still very much around, but
now a commoditized part of a larger
system-of-systems landscape, and also
extended to cloud computing with big
of Things?
data and mobile applications. New
software development approaches
have accompanied these new trends,
most of them being agile in different
flavors and size: Scrum, Kanban, DAD
(Disciplined Agile Delivery), SAFe,
LeSS (Large-scale Scrum), and SPS
(Scaled Professional Scrum) being
among these approaches.
These trends have impacted the
The Industrial Internet Consortium predicts the Internet software industry in many different
ways—producing more pervasive and
of Things (IoT) will become the third technological powerful technology-based products,
revolution after the Industrial Revolution and the for example. None of them, however,
has had a truly transformational or
Internet Revolution. Its impact across all industries radically disruptive impact.
and businesses can hardly be imagined. Existing The Industrial Revolution in the
software (business, telecom, aerospace, defense, 19th century moved us from essentially
building things as a craft to manufac-
among others) will likely be modified or redesigned, and turing. The Internet Revolution at the
a huge amount of new software, solving new problems, end of the 20th century was another such
transformation of the world or, as Bill
will be developed. As a consequence, the software Gates said in 1999, “A fundamental new
industry should welcome new and better methods. rule for business is that the Internet
This article makes the case that to be a major player changes everything.” The Internet has
driven the need for faster turnaround
in this space you will need a multitude of methods, not time with less precise requirements—
just a single one. Existing popular approaches hence, sparking the trend toward light-
dards that lead to transformational government and industry. Basically, while maintaining appropriate levels of
business outcomes.” every industry will be affected, includ- engineering discipline, particularly for
The IoT touches everything. What ing banking, insurance, telecoms, air- the cloud-based services upon which
is it then about the IoT that will dra- lines, and defense. the distributed devices will depend.
matically change the business model As voiced by Alex Sinclair, CTO of Moreover, the space to be addressed
for all industries? Here is an exam- the GSMA: “We believe that with the covers all levels of complexity—from
ple: Traditionally, a company sells a right standards and regulation in very simple software running on basic
product and, as long as all goes well, place it will have a fundamental im- sensors and other simple devices to
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 47
practice
the high-performance, highly reliable, The Ignite IoT Methodology. Ig- (AIA). The intention is that the PD
highly governed, secure, resilient, scal- nite is an enterprise methodology for practice should be used to conduct
able systems needed to process, ana- a major player in the IoT. It is a “big project self-assessments, compare
lyze, and respond to the vast amounts method” covering all aspects of de- different IoT options, and select the
of data they produce, and everything veloping for the IoT. It has two major solution architecture and technolo-
in between. Not only that, the rate of practice areas. (In this article, practice gies to be used in a project. The AIA
change and the need for innovation is defined as a repeatable approach practice is then used to identify the
will never have been higher. to doing something with a specific devices, gateways, and services, and
purpose in mind.9 Practices are the their responsibilities for an enter-
The IoT Needs Everything things that practitioners actually do.) prise solution. Ignite provides a set
The IoT does not lack methods. Re- These areas are strategy execution and of technology patterns (such as ma-
searching the space shows clearly, solution delivery. Strategy execution is chine-to-machine connectivity, and
and not surprisingly, that there is about agreeing what to build (that is, sensor networks, among other).
not a one-size-fits-all approach. In- the solution) and involves the prac- The benefit of Ignite is that it is
stead, methods for waterfall and Ag- tices of opportunity identification, based on real-world experience, captur-
ile, methods for small applications opportunity management, and initia- ing this experience and best practice in
(apps) and for complex systems of tion. Solution delivery is about deliv- a well-thought-out and comprehen-
systems, and methods for systems ering the solution to users, and it has sive methodology. Naturally, the first
engineering (that is, for systems with a life cycle consisting of planning, thought of the authors of the method-
hardware and software integrated) building, and running (that is, oper- ology was not so much about the mod-
are all still needed. What is really ating the solution). Planning involves ularity of the practices described but
new is that a larger vendor needs all project initiation, whereas building about the completeness and relevance
this at the same time and with com- and running are carried out through of the method as a whole.
pressed time scales, which increases parallel project workstreams. The IoT Methodology. In compari-
complexity significantly. Thus, for Project initiation is a set of prac- son, the IoT Methodology2 is a light-
larger vendors a multitude of meth- tices that results in a number of dif- weight method highly inspired by lean
ods are needed. A smaller vendor ferent artifacts, including solution startup12 and design thinking.1 It in-
needs a more specific and focused sketches, a milestone plan, user inter- volves the following iterative steps:
approach, but one that can grow as face mockups, and software architec- 1. Co-create. Communicate with end
new products evolve and new prob- ture. Project workstreams consist of a users and stakeholders to identify pain
lems emerge. Thus, methods such as complementary set of practices (called problem areas in a nontechnical way.
Rational Unified Process (RUP) and workstreams): project management, 2. Ideate. Simplify discussions to com-
SAFe, and practices such as Scrum, cross-cutting, solution infrastructure municate requirements to designers,
user stories, and use cases are all be- and operations, back-end services, implementers, and project managers.
ing applied. As always with any new communication services, on-asset 3. Question and answer. Trans-
trend, new branded methods are components, and asset preparation. late soft concepts into hard require-
born. Literature regarding methods At a high level, these might seem to ments, analyze solutions, and brain-
for the IoT is extremely sparse at the all be very general practices, but em- storm options.
time of this writing. We have found bedded within are two domain-specif- 4. Map IoT OSI (Open Systems Inter-
two methods within the domain: Ig- ic practices: project dimensions (PD) connection). Map requirements to
nite13 and the IoT Methodology.2 and asset-integration architecture a valid architecture, infrastructure,
and business frameworks, similar to
Figure 1. An abundance of practices. the layered approach used in the ISO/
OSI model.
5. Prototype. Use standardized tool-
Unified Use-Cases Model- Comp’s Comp’s kits to build prototypes and iterate to-
Process Scrum-of Driven for for
-Scrums for Service ••• ward minimal viable products.
Lifecycle Def’n Arch Re-Use .Net
6. Deploy continuously to close the
feedback loop and improve the products.
Iterative Scrum Use-Case User Architecture Component Test-Driven Like Ignite, this seems to be a very
Essentials Essentials Essentials Stories Essentials Essentials ••• Develop’t
generic method at the high level.
What’s so special about IoT Method-
QA Process Agile Team Measurem’t ology is its use of an IoT Canvas and
Essentials Essentials PSP Modeling Essentials ••• Essentials an IoT OSI reference architecture.
The IoT Canvas is an adaptation of
Org the business model/lean canvas used
Practice Essential Distributed Virtual
Harvesting
Process
UML Team Team ••• in brainstorming sessions to validate
Imp
minimal viable product requirements
for IoT projects. The IoT OSI refer-
ence model is an adaptation of the
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 49
practice
number of proven practices while con- standard Essence,9 which provides a Composing practices into methods.
tinuing to innovate and rise to the new foundation that allows teams to share In the past, different methods have pri-
challenges that they face every day? and free the practices from the shack- marily been described as isolated, con-
These are issues that particularly affect les of monolithic methods. ceptual islands. Every method is basi-
companies moving into the IoT, as they Essence provides the following: cally a unique phenomenon, described
will need a variety of methods. ˲˲ A kernel of elements that estab- in its own language and vocabulary and
What is needed is some concrete lishes a common ground for carrying not standing on any widely accepted
common ground that the practices out software engineering endeavors common ground. Any method, howev-
can share, providing both a shared vo- and assembling methods er, may be considered to be composed
cabulary for practice definition and a ˲˲ A simple, easy-to-understand, vi- from a number of practices.
framework for the assembly and anal- sual, intuitive language for describ- For example, the agile method
ysis of methods. ing practices that can be used both to of extreme programming (XP) is
This will allow organizations to represent the kernel and to describe described as having 12 practices,
prepare a library of practices suitable practices and methods in terms of including pair programming, test-
for their industry/domain—practices the kernel driven development, and continu-
that teams can easily share, adapt, By combining these capabilities, Es- ous integration. Scrum, on the other
and plug and play to create the inno- sence provides a common framework hand, introduces practices such as
vative ways of working that they need for describing all practices and then maintaining a backlog, daily scrums,
to excel and improve. composing them into many methods. and sprints. Scrum is not really a com-
This common ground has already The power of Essence in address- plete method, though; it is a compos-
been prepared in the form of the Es- ing the method complexity inherent in ite practice built from a number of
sence kernel, part of the new OMG developing software for the IoT comes other practices designed to work to-
from its ability to enable the composi- gether. Scrum can itself be composed
Figure 2. The essence practice architecture. tion of practices into methods; help with other practices from, say, XP,
clearly define life cycles and check- to form the method used by an agile
Domain-Specific Practices points, enabling practice-independent team. This composition is typically
governance; and support the creation done tacitly, as Scrum and XP are not
Generic Practices of practice libraries from which prac- provided in a format that allows them
tices can be selected to be composed to be explicitly composed.
Essence Kernel: Method Agnostic into methods. As discussed previously, Essence
Let’s now look at each of these in provides a framework and language for
more detail. describing and composing practices.
This framework provides a practice ar-
Figure 3. Three teams sharing a simple practice library. chitecture where, as shown in Figure
2, both generic and domain-specific
Shared Practice Library
practices are described and assembled
on top of the Essence kernel.
Use Case Component Scrum Kanban Now individual practices can be de-
scribed using Essence. A practice can
be expressed by extending the kernel
with practice-specific elements, by
describing the activities used to prog-
TDD ress the work and the work products
produced, and by describing the spe-
Kernel Architecture Iterative Test Driven User Story cific competencies needed to carry out
Development these activities.
Liberating practices in this way is
Team A Team B Team C
very powerful. Once practices are codi-
Use Use Case Kanban
fied in Essence, teams can take owner-
Case Architecture Kernel Kernel Component ship of their way of working and start to
assemble their own methods. This can
start with even a simple library of prac-
tices, as shown in Figure 3.
TDD This capturing and sharing of prac-
tices, both generic and domain-specif-
Test Driven Kernel ic, in a way that lets them be applied
Component Iterative Development User Scrum alongside popular management prac-
Story
tices (agile or otherwise), provides the
raw materials that teams need to com-
pose their own ways of working.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 51
practice
isting practices to meet your needs and plications, with their high distribution
local standards, add your own prac- and ubiquity, require serious attention
tices, define practice-independent life to architecture.
cycles, and build your own frameworks At the kernel layer, Essence provides
and methods.
This allows you to leverage not just The IoT will guidelines for working with the soft-
ware system. IJI’s generic library has a
the industry best practice captured in
the IJI practices, but also your own best
eventually reach practice for working with architecture,
including guidelines for creating a
practices, be they technical, financial, all areas where sound architecture description (a work
motivational, or managerial. humans are product) in an agile and lightweight
manner. The Ignite method recom-
Building a Practice providing products mends using AIA as a way to describe
Library for the IoT
Examining the practices found in Ignite
or services, architecture, and IoT Methodology
recommends using its IoT OSI model.
helps illustrate how to add domain-spe- both today and An application that uses EPC and REST
cific practices to a practice library.
Ignite describes a number of IoT- in the future. would have technology specifics about
how to name products and connec-
specific practices, including the AIA tions and so on.
practice discussed earlier. Today, the Let’s dive into the practices identi-
generic practices in Ignite are not de- fied in Figure 4. The Essence language
scribed in any detail, a gap that can specifies a number of constructs. For
easily be addressed by reusing the brevity, this article illustrates only al-
generic practices available in the IJI phas and work product. An alpha is “an
practice library. essential element that is relevant to an
Essentializing Ignite in this way assessment of the progress and health
helps distinguish the IoT-specific prac- of a software engineering endeavor.”9
tices in a way that allows them to be ad- The alphas provide descriptions of the
opted separately and applied alongside kinds of things that a team will man-
whatever generic practices the team or age, produce, and use in the process of
commissioning organization deems to developing, maintaining, and support-
be the most appropriate. ing software and, as such, are relevant
New domain-specific practices. By to assessing the progress and health of
their very nature, the practices in the a software endeavor. “A work product is
IJI practice library are very generic an artifact of value and relevance for a
and applicable to many software-de- software engineering endeavor. A work
velopment domains. These generic product may be a document or a piece
practices are useful for many kinds of of software.”3 Practices are a kind of
software, including for the Internet package consisting of these elements.
of Things. The Essence kernel, which stands
The specific practices from Ignite at the bottom of Figure 4, is made up
and IoT Methodology are useful do- of a number of elements. The figure
main-specific practices that help ad- specifically shows the Software Sys-
dress specific challenges for IoT ap- tem alpha. The Essence kernel does
plications. In addition, practitioners not have an explicit notion of archi-
would have to work with specific tech- tecture because in simple develop-
nologies such as EPC (Electronic Prod- ment, this is left for teams to define.
uct Code) to identify smart objects over For more sophisticated development,
an RFID network communicating with the architecture practice fills the gap
REST (representational state transfer) by providing explicit guidance on cre-
interfaces.5 Thus, there would be other ating an intentional architecture. The
domain-specific practices to use EPC architecture practice introduces an
and REST correctly. Architecture alpha that is described
Let’s take a peek at how domain-spe- by an architecture description work
cific practices are added to the practice product. The Architecture alpha pro-
architecture. A method has many as- vides guidance on how to determine
pects, such as team collaboration, how architecture goals and how to identify
to manage requirements, architecture, and validate architecture scenarios.
and so on. In the discussion to follow, The two domain-specific practic-
as shown in Figure 4, the focus is on es—namely, AIA practice and IoT OSI
architecture aspects because IoT ap- practice—provide specializations on
Figure 4. Architecture practices in Ignite and IoT Methodology. to adopt. Instead, the focus should be
on essentialized practices that provide
Work an incremental and safe path for teams
Layer Practices Alphas Products
and organizations to evolve and grow
(IoT) Domain EPC/
their ways of working.
Specific Practices EPC/REST REST By using Essence as the foundation
based IoT Pattern for a new practice library, we can lib-
(extends) (extends) (extends) erate the practices and provide devel-
opment teams with the guidance they
Asset-Integration- IoT OSI AIA IoT OSI need to innovate, improvise, and excel.
Architecture (AIA) Model Pattern Pattern
We can avoid the traps of the past and
enable software-engineering methods
(extends) (extends) (extends) to evolve at Internet speeds while build-
Generic
ing on established, proven practices.
Practices Architecture 1
Practice References
(Architecture Views) 1. Brown, T. Design thinking. Harvard Business Review
Architecture 86, 6 (2008), 84.
1
Description 2. Collins, T. A methodology for building the Internet of
Architecture Things; http://www.iotmethodology.com/
3. Evans, P.C., Annunziata, M. Industrial Internet:
Essence Pushing the boundaries of minds and machines.
Kernel GE, 2012; www.ge.com/docs/chapters/Industrial_
Kernel Software System Internet.pdf.
4. Fontoura, M., Pree, W., Rumpe, B. The UML Profile for
Framework Architectures. Addison-Wesley Longman
Publishing, 2000.
5. Guinard, D., Mueller, M., Pasquier-Rocha, J. Giving
RFID a REST: Building a Web-enabled EPCIS.
how an IoT application architecture is learn a domain quickly. This practice Internet of Things. IEEE, 2010, 1–8.
6. Jacobson, I., Ng, P.-W., McMahon, P. E., Spence, I.,
described. The way teams work on an separation is in contrast to monolithic Lidman, S. The Essence of software engineering: The
IoT architecture is similar to the way methods where salient aspects of such SEMAT kernel. Commun. ACM 55, 12 (Dec. 2012);
and acmqueue 10, 10; http://queue.acm.org/detail.
they work on other kinds of architec- methods often drown in the sea of ge- cfm?id=2389616.
tures. Thus, they do not introduce a neric information. It also helps prac- 7. Jacobson, I., Ng, P.-W., McMahon, P. E., Spence, I.,
Lidman, S. The Essence of Software Engineering:
new Architecture alpha but reuse the titioners differentiate methods—for Applying the SEMAT Kernel. Addison-Wesley, 2013.
Architecture alpha and description example, Ignite and IoT Methodol- 8. Jacobson, I., Ng, P.-W., Spence, I. The Essential
Unified Process. Dr. Dobb’s Journal (Aug. 2006); http://
from the generic architecture prac- ogy—from the way they work with ar- www.drdobbs.com/architecture-and-design/the-
tice. There are specific considerations chitecture and to understand if they essential-unified-process/191601687.
9. Object Management Group. Essence—Kernel and
peculiar to IoT applications, however. are truly different. Practice separation language for software engineering methods, 2014;
http://www.omg.org/spec/Essence/.
Hence, each of these domain-specific also helps practitioners pick the best 10. Page, V., Stimson, R. Essentializing the DSDM Agile
practices introduces a pattern for de- parts from different methods, pro- Project Framework. Agile Methods Conference,
London, 2016. Ivar Jacobson International; https://
scribing an IoT application. A pattern vided they have been decomposed, www.ivarjacobson.com/sites/default/files/field_iji_file/
provides domain/technology-specific as shown in Figure 4. This mix-and- article/essentializingdsdm_1.pdf.
11. Perkens-Golomb, B., Folkjaer, P., Rauch, F., Spence,
stereotypes to model the IoT applica- match approach helps teams become I. Ending method wars: The successful utilization of
tion. In Unified Modeling Language innovative with methods, as well as Essence at Munich Re. Ivar Jacobson International,
2015; https://www.ivarjacobson.com/sites/default/
(UML) speak, this corresponds to a the solutions they produce. files/field_iji_file/article/essence_munichre_0.pdf.
UML profile.4 UML profiles are a com- Thus, architecture is one area that 12. Ries, E. The Lean Startup: How Today’s Entrepreneurs
Use Continuous Innovation to Create Radically
mon approach to describe domain- needs special attention when building Successful Businesses. Random House, 2011.
specific architectures, and IoT is one IoT applications. Security and privacy 13. Slama, D., Puhlmann, F., Morrish, J., Bhatnagar, R.
Enterprise IoT: Strategies and Best Practices for
such domain. The AIA practice intro- also need special consideration. The Connected Products and Services. O’Reilly, 2015.
duces an AIA pattern for the architec- IoT opens the world to new ideas and
ture description, whereas the IoT OSI use cases, and, as such, product idea Ivar Jacobson, chair of Ivar Jacobson International, is
practice introduces an IoT OSI pattern. generation and formulation also need a father of components and component architecture, use
cases, the Unified Modeling Language, and the Rational
At the very top is a technology-specific special considerations. Each of these Unified Process. He has contributed to modern business
modeling and aspect-oriented software development.
architecture practice for EPC/REST- areas require generic practices and
Ian Spence is CTO at Ivar Jacobson International and
based IoT applications. This contains a domain-specific practices. the team leader for the development of the SEMAT kernel.
specific pattern for EPC/REST.5 An experienced coach, he has introduced hundreds of
projects to iterative and agile practices.
The layering of practices helps Welcome to the Future
Pan-Wei Ng coaches large-scale systems development
practitioners understand what is The IoT promises a new dawn for all involving many millions of lines of code and hundreds
truly different when working with sorts of industries, fundamentally of people per release, helping them transition to a lean
and agile way of working, not forgetting to improve their
IoT-based applications, as opposed changing the basics of everyday life. code and architecture and to test through use cases
to a more general application. Under- Let’s make sure our software-engi- and aspects.
standing this difference helps practi- neering practices do not get left be-
tioners quickly pinpoint the specifics hind. Let’s stop producing inflexible, Copyright held by ownes/authors.
they need to be aware of and, hence, monolithic methods that are not easy Publication rights licensed to ACM. $15.00.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 53
contributed articles
DOI:10.1145/ 3139453
in 2015, can be controlled via Wi-Fi and
Multiple computational cameras Bluetooth.8 And at the high-perfor-
mance end of the camera market, RED
can be assembled from a common set offers a modular camera with inter-
of imaging components. changeable parts, including lenses, bat-
tery packs, and broadcast modules.10
BY MAKOTO ODAMAKI AND SHREE K. NAYAR Although they provide some level of flex-
ibility, such cameras are limited in the
Cambits:
types and quality of images they are ac-
tually able to produce.
In the realm of research, Adams et
al.1 proposed a computational pho-
A Reconfigurable
tography platform called Franken-
camera, including API, sensor inter-
face, and image-processing unit. That
Camera System
system can be used to implement var-
ious computational-imaging meth-
ods. However, its hardware is relative-
ly rigid, limiting the extent to which it
can be reconfigured. Manakov et al.5
proposed a camera system that can
accommodate different optical add-
ons, including kaleidoscope-like im-
aging to make optical copies of the
captured image. Different filters are
T H E CAM ERAS IN our phones and tablets have turned then used to produce high dynamic
range (HDR), multispectral, polariza-
us all into avid photographers, regularly using them to tion, and light-field images. The sys-
capture special moments and document our lives. One tem provides some reconfigurability
notable feature of camera phones is they are compact but is bulky and difficult to scale in
terms of functionality. Finally, recon-
and fully automatic, enabling us to point and shoot figurability is a well-explored topic in
without having to adjust any settings. However, when the field of science education;16 for in-
stance, Schweikardt and Gross14 de-
we need to capture photos of high aesthetic quality, we veloped a related robot kit, including
resort to more sophisticated DSLR cameras in which a blocks with multiple functionalities
variety of lenses and flashes can be used they call Cublets. And littleBits Elec-
tronics Inc. developed a modular
interchangeably. This flexibility is important for electronic system for experiential
spanning the entire range of real-world imaging
scenarios, while enabling us to be more creative. key insights
Many developers have sought to make these cameras ˽˽ Cambits includes a set of physical blocks
for building computational cameras with
even more flexible through both hardware and multiple functionalities, including high
dynamic range, wide angle, panoramic,
software. For example, Ricoh’s GXR camera has collage, kaleidoscopic, post-focus,
interchangeable lens units, each with a different type light field, stereo imaging, and even a
microscope.
of sensor.12 Some manufacturers make their cameras ˽˽ Blocks include sensors, actuators,
IMAGES BY ALEXA ND ER BERG
more flexible through application program interfaces lenses, optical attachments, and light
sources attached through magnets
(APIs) developers then use to control various camera without screws or cables.
parameters and create new image-processing tools. For ˽˽ The configuration of the blocks can be
changed without rebooting any of the
example, Olympus’s Open Platform Camera, released related hardware or software.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 55
contributed articles
tem’s hardware and software architec- nals are passed from component to
ture makes it inherently scalable so new component in bucket-brigade fashion.
blocks and computational photography Each block is able to communicate
algorithms are added readily to the ex- through control signals with only the
isting set. blocks that are connected to it. When a
Figure 1. Cambits overview: (a) Cambits components; (b) a Cambits configuration, with host computer displaying a 3D visualization of the
current configuration and a menu of functionalities it can perform; and (c) Cambits blocks and their specifications.
(Q)
block is attached to the system, it scans blocks have the same address, as is pos- unit (MCU) (Texas Instruments
the components downstream. If it de- sible when using the I2C interface. MSP430F5510) with two serial ports for
tects any blocks, it reads the configura- When the host device seeks to con- the bucket brigade. The controller
tion data of the blocks that are down- trol a specific block in the tree structure, board has an upstream interface and a
stream, adds its own identity and it sends its command and the address downstream interface (see Figure 4).
address to the data, and then sends the of the block to the base block. The base When a block with the controller is
information upstream. As a result, the block and subsequent blocks pass the attached to the system, it turns on auto-
host device is able to detect the com- command downstream in bucket-bri- matically, thus triggering the firmware
plete order of the configuration. If we gade fashion. The addressed block ulti- on its MCU to start scanning down-
had instead used a conventional electri- mately receives the command and exe- stream for approximately 100msec to
cal bus for the control signals, the sys- cutes it. communicate with its adjacent blocks.
tem would not have been able to detect Controller board. A key aspect of the When the block is removed from the
the order of the blocks. Moreover, a con- design is the controller board inside the system, it loses power, and the firmware
ventional bus would not be able to de- base, actuator, spacer, and sensor stops.
tect configurations in which multiple blocks. It includes a microcontroller Each block has a power circuit to pre-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 57
contributed articles
Figure 2. Cambits detachable connector: (a) mechanical assembly and alignment of blocks vent inrush current and voltage drop
using magnets; and (b) electrical connection between blocks using spring-loaded pins that when attached, thus maintaining a
carry power, data, and control signals. steady input voltage. Due to the circuit,
the system can be reconfigured without
requiring a reboot of the hardware
(blocks) or the software running on the
host computer.
VCC Power The controller board can also control
D+
Data signal other devices (such as the servo motor
D-
in the actuator block and the LED con-
SCL
Control signal troller in the flash block) through the
SDA
GND Power I2C bus, pulse-width modulation
(PWM), and general-purpose input out-
puts (GPIO) based on commands it re-
ceives from the host device. For exam-
(a) (b)
ple, when an actuator block receives the
command for rotation, the MCU gener-
ates the pulse signal needed to drive its
Figure 3. Tree architecture used to implement Cambits; power flows downstream, data servo motor.
flows upstream, and control signals are communicated in bucket-brigade fashion.
The I2C interface is also useful in
terms of scalability because it is widely
Base Spacer Actuator Sensor Lens Optical Attachment
used in the field of embedded systems,
allowing us to add various extra devices
Hub Sensor
Host (such as a light sensor, acoustic sensor,
MCU MCU MCU MCU ID
Servo
IR sensor, GPS, IMU, and multispectral
light source) to the Cambits set.
Power MCU
LEDs Lens blocks and optical attachments.
Upstream Data signal Downstream
Flash
The lens block includes an identifica-
Control signal
tion board with I2C expander device
that can detect the identification num-
ber of the lens type itself and an addi-
Figure 4. The base, actuator, spacer, and sensor blocks include a controller board that
allows a block to communicate with its adjacent blocks. tional optical attachment connected to
the lens (such as soft focus filter, lens
array, and “teleidoscope,” or lens for
Sensor Block Controller Board
creating kaleidoscope-like images). The
Microcontroller unit Downstream interface (6 pins) optical attachment includes no electri-
Power circuit cal parts but does have up to three
PWM bumps that push against mechanical
Upstream interface (6 pins) Downstream interface (4 pins) switches on the lens block to generate a
three-bit code the lens block can use to
identify the attachment. The lens block
GPIOs
then sends this information upstream.
Sensor Board Debug I/F
Sensor block. The sensor block in-
cludes a Point Grey camera board
(BFLY-U3-13S2C-CS) that can produce
1.3-megapixel video in various formats
Figure 5. Cambits software architecture.
(such as YUV411 and RGB8) and send
the video upstream as a USB 2.0 data
signal. In designing Cambits, we aimed
User Interface
to minimize the length of the data sig-
Computational Photography Processing
nal line and the number of connectors
so as to enable high-frequency
Cambits API (480Mbps) transmission needed to pre-
Cinder serve the integrity of the video.15 Users
are able to control various imaging pa-
Serial Port Driver Point Grey SDK Open CV rameters of the sensor board (such as
exposure time and gain) from the host
device.
Windows 8
Mechanical design. As mentioned,
the Cambits blocks attach to each oth-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 59
contributed articles
(b) Collage
cal filters like diffusion and polariza- “bright field” illuminate the sample. References
tion, as well as more complex ones The user controls the LED in terms of 1. Adams, A. et al. The Frankencamera: An experimental
platform for computational photography. ACM
(such as a lens array and a teleidoscope). brightness through the host computer. Transactions on Graphics 29, 4 (July 2010), article 29.
The Cambits lens-array attachment in- Alternatively, ambient illumination in 2. Debevec, P.E. and Malik. J. Recovering high-dynamic-
range radiance maps from photographs. In Proceedings
cludes seven acrylic ball lenses to pro- the environment can be used to back- of the ACM SIGGRAPH Conference (Los Angeles, CA,
duce a 4D light-field image of the scene.3 light the sample. Aug. 11–15). ACM Press, New York, 2008, 31.
3. Georgiev, T. et al. Spatio-angular resolution trade-offs
The teleidoscope attachment produces in integral photography. In Proceedings of the 17th
a kaleidoscope image. An acrylic ball Conclusion Eurographics conference on Rendering Techniques
(Nicosia, Cyprus, June 26–28). Eurographics
lens in front of the attachment captures Cambits is a versatile modular imaging Association, Aire-la-Ville, Switzerland, 2006, 263–272.
the scene image, and a set of first-sur- system that lets users create a range of 4. littleBits Electronics Inc., New York; http://littlebits.cc/
5. Manakov, A. et al. A reconfigurable camera add-on for
face planar mirrors between the ball computational cameras. The current high dynamic range, multispectral, polarization, and
light-field imaging. ACM Transactions on Graphics 32,
lens and the lens block creates multiple prototype is a proof of concept we use to 4 (July 2013), article 47.
rotated copies of the image. demonstrate key aspects of Cambits: 6. Ng, R. et al. Light-field photography with a hand-held
plenoptic camera. Computer Science Technical Report
The focal stack lens block includes a ease of assembly, self-identification, CSTR 2, 11 (Apr. 2005), 1–11.
linear actuator that physically sweeps and diverse functionality. We have thus 7. Nomura, Y., Zhang, Li, and Nayar, S.K. Scene collages
and flexible camera arrays. In Proceedings of the 18th
the lens to capture a set of images cor- shown Cambits can be a powerful plat- Eurographics Conference on Rendering Techniques
responding to different focus settings. form for computational photography, (Grenoble, France, June 25–27). Eurographics
Association, Aire-la-Ville, Switzerland, 2007, 127–138.
The linear actuator moves the lens in enabling users to express their creativity 8. Olympus Corporation, Tokyo, Japan; https://opc.
steps of 0.05mm, with a total travel dis- along several dimensions. An impor- olympus-imaging.com/en_sdkdocs/index.html
9. Peleg, S. and Ben-Ezra, M. Stereo panorama with a
tance up to 2.0mm, using a piezoelec- tant aspect of Cambits is that it is de- single camera. In Proceedings of the Conference on
tric linear actuator to move the lens pre- signed to be an open platform that is Computer Vision and Pattern Recognition (Fort Collins,
CO, June 23–25). IEEE Computer Society, Los
cisely. The captured stack of images scalable. That design allows users to Alamitos, CA, 1999.
helps compute an index map that repre- add multiple hardware blocks, includ- 10. RED Digital Cinema Camera Company, Lake Forest,
CA; http://www.red.com/products
sents the image in which each pixel is ing structured light sources, multispec- 11. Reinhard, E. Parameter estimation for photographic
focused. The focal stack lens block then tral sources, telescopic optical attach- tone reproduction. Journal of Graphics Tools 7, 1 (Nov.
2002), 45–51.
generates an interactive image that lets ments, and even non-imaging sensors 12. Ricoh Company, Ltd., Tokyo, Japan; https://www.ricoh.
com/r_dc/gxr/
users click on any part of the image to for measuring acceleration, orienta- 13. Schneider, D., Schwalbe, E., and Maas, H.G. Validation
bring it into focus.6,17 tion, sound, temperature, and pressure. of geometric models for fisheye lenses. Journal of
Photogrammetry and Remote Sensing 64, 3 (May
We designed Cambits so it would be We anticipate developing algorithms 2009), 259–266.
possible to insert a rotary actuator be- that use such a diverse set of sensors to 14. Schweikardt, E. and Gross, M.D. roBlocks: A robotic
construction kit for mathematics and science
tween the base and the sensor to scan a trigger/control various image-capture- education. In Proceedings of the Eighth International
panorama of a scene. If the camera is and-processing strategies. To encour- Conference on Multimodal Interfaces (Banff, Alberta,
Canada, Nov. 2–4). ACM Press, New York, 2006, 72–75.
rotated off-axis—with an offset between age others to modify or build on the cur- 15. USB Implementers Forum, Inc. High Speed USB
the rotation axis and the center of pro- rent system, we have made the details of Platform Design Guidelines Rev. 1.0; http://www.usb.
org/developers/docs/hs_usb_pdg_r1_0.pdf
jection of the camera—users would be its hardware and software design avail- 16. Yim, M. et al. Modular self-reconfigurable robot
able to take left and right image strips able at http://www.cs.columbia.edu/ systems: Grand challenges of robotics. IEEE Robotics
&Automation Magazine 14, 1 (Apr. 2007), 43–52.
from the captured sequence of images CAVE/projects/cambits/databases/ 17. Zhou, C., Miau, D., and Nayar, S.K. Focal Sweep Camera
to generate a stereo panorama for creat- cambits_supporting_database.zip. for Space-Time Refocusing. Technical Report.
Department of Computer Science, Columbia
ing virtual reality.9 In the example in Fig- University, New York, 2012; https://academiccommons.
ure 6g, 120 images were taken while the Acknowledgments columbia.edu/catalog/ac:154873
actuator rotated 120 degrees and the We did this research at the Computer
Makoto Odamaki (makoto.odamaki@nts.ricoh.co.jp) is an
offset between the rotation axis and the Vision Laboratory of Columbia Uni- engineer of digital camera systems at Ricoh Company,
center of projection of the camera lens versity in New York while Makoto Oda- Ltd., Tokyo, Japan.
was 70mm. maki was a Visiting Scientist from Shree K. Nayar (nayar@cs.columbia.edu) is the T.C.
Chang Professor of Computer Science at Columbia
A second rotary actuator can be add- Ricoh Company, Ltd.; for the design University in New York where he also heads the Columbia
ed to the system to configure a pan/tilt data covered here, see http://www. Vision Laboratory.
camera system. cs.columbia.edu/CAVE/projects/cam- Copyright held by the authors.
Cambits is not limited to a single im- bits. We thank William Miller for de- Publication rights licensed to ACM. $15.00.
age sensor. Its second base can be used signing and 3D printing the chassis of
with two sensor blocks and lenses to the Cambits blocks, Wentao Jiang for
create a stereo camera system with a his contribution to the user interface,
baseline of 44mm. Cambits processes and Daniel Sims for editing the dem-
the left and right video streams from onstration video and formatting the
this system in real time to produce a project webpage. Divyansh Agarwal,
gray-coded-depth video of the scene. Ethan Benjamin, Jihan Li, Shengyi
Cambits can also be used to assem- Lin, and Avinash Nair implemented
ble a microscope that includes an objec- several of the computational-photog- Watch the authors discuss
tive lens, a mechanism to adjust the raphy algorithms. The authors also their work in this exclusive
Communications video.
height of the sample slide to bring the thank Anne Fleming for proofreading https://cacm.acm.org/videos/
sample into focus, and an LED light to an early draft of the article. cambits
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 61
contributed articles
DOI:10.1145/ 3141771
(such as by Fu et al.,5 Galvis Carreño and
The varying review dynamics seen in Winbladh,6 and Google Analytics7) and
commercial efforts (such as Applause
different app stores can help guide Analytics3) have proposed solutions to
future app development strategies. help developers cope with large num-
bers of reviews.
BY STUART MCILROY, WEIYI SHANG, A 2013 study of reviews of iOS apps
NASIR ALI, AND AHMED E. HASSAN by Pagano and Maalej20 found that on
average a free app receives 37 reviews
User Reviews
per day, while paid apps receive approx-
imately seven reviews per day,20 and an-
other study of iOS apps found that 50%
of studied free apps receive only 50 re-
of Top Mobile
views in their first year.11 Yet no prior
research examined the reviews in the
Google Play store, considering, say, “Is
the data normally distributed or highly
Apps in Apple
skewed, with only a small number of
apps receiving a substantial number of
reviews on a daily basis?”
Here, we explore the question of how
pervasive are the frequently reviewed
and Google
apps in the Google Play store. In partic-
ular, we empirically cover app reviews
from the perspective of the developers
of the top apps there. Through an analy-
App Stores
sis of reviews for the top 10,713 apps
in the Google Play store over a period
of two months—January 1 to March 2,
2014—we found:
More than 500 reviews daily. Only
0.19% of the studied apps received more
than 500 reviews per day;
Majority of studied apps. Almost 88%
of the studied apps received only a small
number (20 or fewer) reviews per day;
ONE OF THE unique aspects of app stores is the and
Correlates with reviews. The number
convenience of providing user feedback.13 Users can of downloads and releases correlated
effortlessly leave a review and a rating for an app, with the number of received reviews,
while the app category did not play a
providing quick feedback for developers. Developers major role.
are then better able to update their apps. This feedback Some of our observations differ from
mechanism contrasts with traditional feedback other studies of user reviews of iOS
mechanisms like bug-reporting systems (such as key insights
Bugzilla), which are negative in nature, as they
˽˽ The characteristics of user reviews
include only bugs, unlike reviews, which can be differ depending on app store.
positive. Moreover, reviews can even serve as a means ˽˽ Few mobile apps in the Google Play store
attract large numbers of user reviews.
for deriving additional app requirements.7 ˽˽ More app downloads and releases
Developers of top apps might be overwhelmed by correlate with more reviews in
the Google Play store, whereas app
the large number of received reviews. Several papers category plays only a minor role.
feedback. performance, and reliability. tains a feature request. Chandy and Gu3
A number of app-analytics compa- Other studies have highlighted the identified spam reviews in the Apple
nies, including App Annie,1 specialize effect of reviews of mobile apps on an (iOS) App Store, using a technique that
in tools designed to help developers app’s success.9,15,19 Harman et al.9 found achieved high accuracy with both la-
understand how users interact with a strong correlation between app rat- beled and unlabeled datasets. Carreño
their apps, how developers can help ings and an app’s total download num- and Winbladh6 used opinion-mining
generate revenue (such as through bers. User reviews include information techniques and topic modeling to suc-
in-app purchases, e-commerce, and that could help developers improve the cessfully extract requirements changes
direct buy), and how to leverage user quality of their apps and increase their from user reviews. Fu et al.5 introduced
demographics of the apps. These revenue. Kim et al.15 interviewed app an approach for discovering inconsis-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 63
contributed articles
tencies in apps, analyzing the negative terms of findings, methodologies, and We collected review information
reviews of apps through topic analy- context, or Android vs. iOS (see Table 2). from 12,000 free-to-download apps
sis to identify reasons for users liking from the Google Play store. From among
or disliking a given app. Khalid et al.14 Studied Apps 30 different categories, including pho-
manually analyzed and categorized one- Martin et al.17 noted that not all stores tography, sports, and education, we se-
and two-star reviews, identifying the is- provide access to all their reviews, lead- lected the top apps in each category in
sues (such as the hidden cost of using ing to biased findings when studying re- the U.S. based on app-analytic company
an app) about which users complained. views. To avoid such bias, we collected Distimo’s (acquired by App Annie) rank-
Chen et al.4 proposed the most exten- all reviews on a daily basis, ensuring we ing of apps for a total of 12,000; Distimo
sive summarization approach to date, would include all available reviewers. ranked the top 400 apps for each of the
removing uninformative reviews and However, the Google Play Store provides 30 categories. We used Distimo’s Spring
prioritizing the most informative re- access to only the 500 latest reviews for 2013 list of top apps. Of the 12,000 top
views before presenting a visualization an app. If more than 500 reviews are re- apps, 1,287 were not accessible during
of the content of reviews. Guzman and ceived in the 24-hour period between our two-month crawl because some of
Maalej8 performed natural language daily runs of our crawler, then the them might have been removed from
processing techniques to identify app crawler does not collect those reviews. the store. We thus collected data from
features in the reviews and leveraged This limitation means we thus offer a 10,713 top apps, with a total of 11,047
sentiment analysis to identify whether conservative estimate of the number of different releases during the studied
users like such features. Our own work reviews for apps that receive more than time period.
differs from these studies, as it aims to 500 reviews per 24-hour time period. Our own selection of top apps might
provide context about when the other We based our Google Play store crawler have biased our results, possibly gener-
techniques would be needed. on an open source crawler called the alizing to only the top, stable, free apps
Pagano and Maalej20 and Hoon et Akdeniz Google Play crawler (https:// in the Google Play store. Nevertheless,
al. analyzed the content of reviews of
11
github.com/Akdeniz/google-playcrawl- we studied successful apps we felt were
both free and paid apps in the Apple er) to extract app information (such as more likely to have a large user base and
App Store, answering a similar research app name, user ratings, and reviews). receive a large number of reviews, rath-
question as ours about the number of Running it meant we were simulating er than blindly study all apps. We chose
received reviews, but there are major a mobile device over approximately two apps that had been popular one year be-
differences between them and us in months—January 1 to March 2, 2014. fore we began our study because we were
Table 1. Our observations on Google Play apps compared to the Pagano and Maalej20 and Hoon et al.11 observations on the Apple (iOS) App Store.
interested in stable, mature apps that Maalej20 and greater than Hoon et al.;11 We found fewer average reviews per
had not been released within the past Finding 2. The number of user re- day than Pagano and Maalej20 possibly
few months to avoid the expected burst views were skewed; similar findings due to any of several factors. The first
of reviews following an app’s initial re- were reported by Pagano and Maalej;20 is we collected reviews from stable top
lease.20 We focused on free-to-download and apps that had been released for at least
apps, since recent work showed that Implication. Most top apps might one year, whereas Pagano and Maalej20
free apps receive five times as many re- not benefit much from automated ap- may have collected new apps and not
views as paid apps.20 Moreover, over 90% proaches to analyzing reviews that le- focused on top apps. The second was
of downloaded apps were, at the time, verage sophisticated techniques (such that our estimates for the frequently re-
of the free-to-download variety, accord- as topic modeling) given the small num- viewed apps were conservative; we did
ing to Gartner. Such apps use other rev- ber of received user reviews and their not count more than 500 reviews in a
enue models (such as freemium, in-app limited length. day. For instance, Pagano and Maalej re-
purchases, and ads). The developers of We plotted the number of reviews per ported that Facebook received 4,275 re-
such apps are thus concerned about the day, as well as total number of received views in a day, with such large numbers
effect of reviews on their revenue.9 reviews, using a beanplot combining increasing the overall reported average
a boxplot with a kernel-density-esti- number of received reviews on a daily
Findings mation function. Figure 1a reports the basis. We separated the apps into two
Here, we present our findings, as in Ta- median number of reviews per day was groups: 100 most-reviewed apps and
ble 2, concerning the reviews from the 0. We found 20, or 0.19%, of the 10,713 all other apps. Figure 1b reports there
Google Play store while comparing our studied apps received 500 or more re- was a large gap in the total number of
results with prior studies. views; as mentioned earlier, 500 would reviews among the 100 most-reviewed
Number of received reviews. On be a conservative estimate, whereas 88% apps. The total number of reviews of the
the number of received reviews in the of the apps in our 10,713-app dataset re- 100 most-reviewed apps ranged from
Google Play Store ceived fewer than 20 reviews per day. Ad- 43,000 to 6,000 in the two-month study
Finding 1. Most apps (88% of those ditionally, the median total number of period. The reviews themselves were
of the 10,713 we studied) received few reviews was 0 during the study period. short, much shorter (approximately
reviews during our studied time period. We also calculated the number of words 40%) than the reviews in the Apple App
The average and median number of in each of the received reviews, with me- Store. We also observed a notable skew
reviews were fewer than Pagano’s and dian number of words per review at 46. in the length of reviews in both stores.
Influence of app category and down-
Table 2. Datasets of prior work mining reviews of mobile apps. loads on number of reviews. In the
Google Play Store
Finding 3. The number of downloads
Paper App Store Apps Reviews
and releases correlated with the num-
Iacob and Harrison12 Google Play Store 161 3,279
ber of received reviews, whereas an
Galvis and Carreno7 Google Play Store 2 710
app’s category did not play a major role
Fu et al.6 Google Play Store 171,493 13,286,706
during the study period. On the other
Chen et al.5 Google Play Store 4 169,097
hand, Pagano and Maalej20 and Hoon
Pagano and Maalej21 Apple App Store 1,100 1,126,453
et al.11 both reported a relation between
Hoon et al.11 Apple App Store 17,000 8,700,000
an app’s category and the number of re-
ceived reviews; and
Implication. The relationship be-
Figure 1. Beanplots showing number of reviews per day and in total. tween number of received reviews and
an app’s category should be explored
further, especially in light of the dis-
crepancy between the two app stores.
Total Number of Reviews
40,000
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 65
contributed articles
Figure 2. Plots of the total number of reviews (logged) on the y-axis and three separate the same so we could see how each fac-
graphs of app categories, number of downloads, and number of releases on the x-axis; tor affects the total number of reviews.10
the graphs reflect the relation between the three factors and the total number of reviews. The gray bands around the plotted lines
are bootstrap confidence intervals for
categories downloads versions
our estimates.
We generated a nomogram (see Fig-
10 ure 3) to visualize the results of our re-
gression model,10 helping us examine
the effect of each factor while control-
8
Log(Total Reviews)
4 ●
●
●
●
●
●
●
●
● ●
●
●
●
●
total number of reviews, we can draw a
●●
4e+08
3e+08
5e+08
2e+08
1e+08
dence of a spike in reviews following a N. Why people hate your app: Making sense of user
feedback in a mobile app store. In Proceedings of
release; and the 19th ACM SIGKDD International Conference on
Implication. Greater effort examining Knowledge Discovery and Data Mining (Chicago, IL,
Aug. 11–14). ACM Press, New York, 2013, 1276–1284.
user reviews should follow a release in 6. Galvis Carreño, L.V. and Winbladh, K. Analysis of user
order to improve app quality.
Frequent releases
comments: An approach for software requirements
evolution. In Proceedings of the 2013 International
Pagano and Maalej20 reported that Conference on Software Engineering (San Francisco,
the number of received reviews de-
creased over time after a release, sug-
ensure an app’s CA, May 18–26). IEEE Press, Piscataway, NJ, 2013,
582–591.
gesting releases contribute to new re- user base is 7. Google Analytics; http://www.google.ca/analytics/mobile/
8. Guzman, E. and Maalej, W. How do users like this
feature? A fine-grained sentiment analysis of app
views. We observed the same kind of
correlation for the Google Play store.
more engaged reviews. In Proceedings of the 22nd International
Requirements Engineering Conference (Karlskrona,
Figure 4 outlines a boxplot of the medi- as it begins Sweden, Aug. 25–29). IEEE Press, Piscataway, NJ,
2014, 153–162.
providing feedback.
9. Harman, M., Jia, Y., and Zhang, Y. App store mining
an number of reviews for each studied and analysis: MSR for app stores. In Proceedings of
app across each of its releases, showing the Ninth Working Conference on Mining Software
Repositories (Zurich, Switzerland, June 2–3).
a spike in reviews directly on and after Piscataway, NJ, 2012.
an app’s release day. 10. Harrell, F.E. Regression Modeling Strategies: With
Applications to Linear Models, Logistic Regression, and
However, still not clear is if these Survival Analysis. Springer, New York, 2001.
spikes were due to an app attracting 11. Hoon, L., Vasa, R., Schneider, J.-G., Grundy, J. et al. An
Analysis of the Mobile App Review Landscape: Trends and
new users following its release or to cur- Implications. Technical Report. Swinburne University of
rent users becoming more inclined to Technology, Faculty of Information and Communication
Technologies, Melbourne, Australia, 2013.
review the app. Looking closer at our 12. Iacob, C. and Harrison, R. Retrieving and analyzing
nomogram, we note that many releases mobile apps feature requests from online reviews. In
Proceedings of the 10th International Workshop on
(more than 20) for an app has as much Mining Software Repositories (San Francisco, CA, May
of an effect as an app with 10 million 18–19). IEEE Press, Piscataway, NJ, 2013, 41–44.
13. Johns, T. Replying to User Reviews on Google Play.
downloads. Frequent releases thus en- Android Developers Blog, June 21, 2012; http://
android-developers.blogspot.ca/2012/06/replying-to-
sure an app’s user base is more engaged user-reviews-on-google-play.html
as it begins providing feedback. 14. Khalid, H., Shihab, E., Nagappan, M., and Hassan, A.
What do mobile app users complain about? IEEE
Software 32, 3 (May-June 2015), 70–77.
Conclusion 15. Kim, H.-W., Lee, H.L., and Son, J.E. An exploratory
study on the determinants of smartphone app
A very small percentage of the top apps purchase. In Proceedings of the 11th International
we studied (0.19% of 10,713) have ever DSI Decision Sciences Institute and 16th APDSI Asia
Pacific Region of Decision Sciences Institute Joint
received more than 500 reviews per day, Meeting (Taipei, Taiwan, July 12–16, 2011).
yet most studied apps received only a 16. Lim, S.L., Bentley, P.J., Kanakam, N., Ishikawa, F.,
and Honiden, S. Investigating country differences
few reviews per day. The number of re- in mobile app user behavior and challenges for
ceived reviews for the studied apps did software engineering. IEEE Transactions on Software
Engineering 41, 1 (Jan. 2015), 40–64.
not vary due to the category to which the 17. Martin, W., Harman, M., Jia, Y., Sarro, F., and Zhang, Y.
app belonged, varying instead based The app-sampling problem for app store mining. In
Proceedings of the 12th Working Conference on Mining
on number of downloads and releases. Software Repositories (Florence, Italy, May 16–17).
Some of our results highlight differenc- IEEE Press, Piscataway, NJ, 2015.
18. Mudambi, S.M. and Schu, D. What makes a helpful
es between the Google Play store and online review? A study of customer reviews on
Amazon.com. MIS Quarterly 34, 1 (2010), 185–200.
the Apple App Store. 19. Pagano, D. and Bruegge, B. User involvement
Additional studies are needed to in software evolution practice: A case study. In
Proceedings of the 2013 International Conference
better understand the review dynamics on Software Engineering (San Francisco, May 18–26).
across both stores. Researchers should IEEE Press, Piscataway, NJ, 2013, 953–962.
20. Pagano, D. and Maalej, W. User feedback in the App
thus examine whether other empiri- Store: An empirical study. In Proceedings of the
cal findings hold across them. In par- 21st IEEE International Requirements Engineering
Conference (Rio de Janeiro, Brazil, July 15–19). IEEE,
ticular, techniques designed to assist Piscataway, NJ, 2013.
mobile-app developers should be opti-
mized for each store. Stuart Mcilroy (mcilroy@cs.queensu.ca) is a Ph.D.
student at Dalhousie University, Halifax, Canada.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 67
review articles
DOI:10.1145/3127874
There have been many recent excit-
Healthcare robotics can provide health and ing examples of robotics technology,
such as autonomous vehicles, package
wellness support to billions of people. delivery drones, and robots that work
side-by-side with skilled human work-
BY LAUREL D. RIEK ers in factories. One of the most excit-
ing areas where robotics has a tremen-
Healthcare
dous potential to make an impact in
our daily lives is in healthcare.
An estimated 20% of the world’s
population experience difficulties
Robotics
with physical, cognitive, or sensory
functioning, mental health, or be-
havioral health. These experiences
may be temporary or permanent,
acute or chronic, and may change
throughout one’s lifespan. Of
these individuals, 190 million ex-
perience severe difficulties with ac-
tivities of daily living tasks (ADL). a
These include physical tasks (basic
ADLs), such as grooming, feeding,
and mobility, to cognitive func-
tioning tasks (instrumental ADLs),
T H E USE OF robots in healthcare represents an exciting which include goal-directed tasks
opportunity to help a large number of people. Robots such as problem solving, finance
management, and housekeep-
can be used to enable people with cognitive, sensory, ing. 14 The world also has a rapidly
and motor impairments, help people who are ill aging population, who will only
or injured, support caregivers, and aid the clinical add to this large number of people
who may need ADL help. Of all of
workforce. This article highlights several recent these individuals, few want to live
advancements on these fronts, and discusses their in a long-term care facility. Instead,
impact on stakeholders. It also outlines several key a World Bank; http://documents.worldbank.
technological, logistical, and design challenges faced org/curated/en/2011/01/14440066/world-re-
port-disability
in healthcare robot adoption, and suggests possible
avenues for overcoming them. key insights
Robots are “physically embodied systems capable ˽˽ Over 20% of the world’s population
of enacting physical change in the world.” They experience physical, cognitive, or sensory
impairments. Robots can fill care gaps
enact this change with effectors, which can move the and support independence.
robot (locomotion), or objects in the environment ˽˽ Robots can help caregivers and the
clinical workforce, who are overloaded
(manipulation). Robots typically use sensor data and experience high rates of injury
themselves.
to make decisions. They can vary in their degree
PHOTO BY L AURA LEZZA/G ET T Y IMAGES
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 69
review articles
Figure 1. The main stakeholders for healthcare robotics, and exemplar contextualizations of their relationship to the technology.
Secondary Stakeholders:
Robot Makers (RM): A RM may work with DRU, CL, CG, PM, and ESW ˲˲ A company builds a hospital discharge robot
Individuals who design, build, program, to perform their work. ˲˲ A student writes sensing algorithms for a robot to lift
instrument, or research robotics technology. people out of a wheelchair
˲˲ A Maker club adapts toys to be accessible by children
with motor impairments
Environmental Service Workers (ESW): An ESW may use robotics technology to ensure ˲˲ An ESW teleoperates a disinfecting robot which emits
Persons who provide secondary care to DRUs care environments are safe and sanitary to help UV light to kill superbugs in a hospital room
by helping prevent the spread of infection prevent the spread of infection. Their use of ˲˲ An ESW uses a waste removal robot to safely
through cleaning services. These can include robotics directly affects DRU’s quality of care, transport medical waste
environmental service workers in hospitals, and CL’s workplace safety.
housekeeping staff in nursing homes, and so on.
Health Administrators (HA): An HA may purchase robots to support staff, ˲˲ A chief medical officer reviews clinical effectiveness
Individuals who provide leadership to a patients, or visitors, or set policy on their usage. data of a rehabilitation robot
care setting by planning, coordinating, and ˲˲ A HA preforms a cost effectiveness study of acquiring
directing care delivery. robots for their institution
Tertiary Stakeholders:
Policy Makers (PM): A PM may work with DRU, CL, CG, ESW, RM, and ˲˲ A Federal Food and Drug Administration (FDA) worker
People who work for or with federal, state, AG to understand how to best craft policy for the establishes new policy for Home Use Devices
and local governments to design policy use of robots. ˲˲ A Federal Trade Commission (FTC) worker sets
regarding: how robots will be used, which privacy policies for robot sensors
robots will be used, and how their costs will
be managed.
Insurers (IC): ICs may work with PM, AG, HA, RM, and CL to ˲˲ An IC worker explores the robotic exoskeletons
Public or private organizations who makes establish guidelines for reimbursable robot- evidencee base to establish reimbursement policy
decisions about benefits to DRU and CG, related services. ˲˲ An IC worker consults with a company to understand
including service payments to CL and RM. a robot’s control system
Advocacy Groups (AG): AGs may work with with DRU, CL, CG, RM, PM, ˲˲ An muscular dystrophy AG supports new research on
Organizations who work on behalf of DRU and others to ensure robots are employed in exoskeletons
populations ways that are of the best interest of their DRU ˲˲ An MS advocacy group lobbies congress to fund new
population. robotic therapies
many people would prefer to live and $30,000 and $85,000 per year in pro- people who need care than healthcare
age gracefully in their homes for as vider wages alone.b workers available to provide it.33 While
long as possible, independently and Second, there is a substantial health- family members and friends attempt
with dignity.22 However, for people care labor shortage—there are far more to fill these care gaps, they too have full-
requiring help with ADL tasks, this time jobs and other familial obligations,
goal is challenging to meet for a few b U.S. Department of Health and Human Servic-
and thus cannot meet the need. Health-
reasons. First, this level of care is quite es; http://longtermcare.gov/costs-how-to-pay/ care workers are not only overburdened
expensive; in the U.S. it costs between costs-of-care/ by this labor shortage, but face increas-
ingly hazardous work environments, use robots to provide assistance with cians, and caregivers, all of whom are
and are themselves at great risk of de- daily living or wellness activities likely to use robotics technology on a
bilitating injury and disability. Accord- (direct robot users (DRU)), health regular basis; Secondary beneficiaries:
ing to the National Institute for Occu- professionals who use robots to health administrators, robot makers,
pational Health and Safety (NIOSH), provide care (clinicians (CL)), non- and environmental service workers,
health care workers have the most haz- CL individuals who support DRUs all of whom are involved in the use of
ardous industrial jobs in America, with (care givers (CG)), technologists and robotics technology in healthcare set-
the greatest number of nonfatal occu- researchers (robot makers (RM)), tings but do not directly use the robots
pational injuries and illness.c health administrators (HAs), policy- to use robots to support the health
Thus, there is an incredible opportu- makers (PMs), advocacy groups (AGs), and wellness of DRUs; and tertiary
nity for robotics technology to help fill and insurers (IC). Figure 1 introduces beneficiaries: policymakers and advo-
care gaps and help aid healthcare work- these stakeholders. cacy groups, who have interest in the
ers. In both the research and commer- These stakeholders can be grouped use of robots to provide care to their
cial space, robotics technology has been into three beneficiary groups: Primary constituents, but are unlikely to use
used for physical and cognitive rehabili- beneficiaries: direct robot users, clini- them directly.
tation, surgery, telemedicine, drug de-
livery, and patient management. Robots Selected care settings where robots may be used.
have been used across a range of envi-
ronments, including hospitals, clinics, Care Setting Definition
homes, schools, and nursing homes; Longer-Term
and in both urban and rural areas. Assistive Living Facility “Congregate residential facility with self-contained living units
Before discussing these applica- providing assessment of each resident’s needs and on-site support 24
tions, it is important to first contextual- hours a day, 7 days a week, with the capacity to deliver or arrange for
services including some health care and other services.”
ize the use of robots within healthcare.
Group Home “A residence, with shared living areas, where clients receive
This article begins by identifying who
supervision and other services such as social and/or behavioral
will be providing, receiving, and sup- services, custodial service, and minimal services (e.g., medication
porting care, where this care will take administration).
place, and key tasks for robots within Custodial Care Facility “A facility which provides room, board and other personal assistance
these settings. Examples of new tech- services, generally on a long- term basis, and which does not include a
medical component”
nologies aimed at supporting these
Nursing Facility “A facility which primarily provides to residents skilled nursing care
stakeholders will be introduced, and and related services for the rehabilitation of injured, disabled, or sick
key challenges and opportunities to persons, or, on a regular basis, health-related care services above
realizing the potential use of robots in the level of custodial care to other than [people with intellectual
healthcare that research and industry disabilities]”
are encouraged to consider, will be ad- Home Care “Location, other than a hospital or other facility, where [a person]
receives care in a private residence.”
dressed. These adoption issues include
a robot’s capability and function (Does
Shorter-Term
a robot have the required capabilities
Inpatient Hospital “A facility, other than psychiatric, which primarily provides diagnostic,
to perform its function?), cost effective- therapeutic (both surgical and nonsurgical), and rehabilitation services
ness (What is the robot’s value to stake- by, or under, the supervision of physicians to patients admitted for a
holders relative to its cost?), clinical ef- variety of medical conditions.”
fectiveness (Has the robot been shown On/Off Campus “A portion of a… hospital provider based department which provides
Outpatient Hospital diagnostic, therapeutic (both surgical and nonsurgical), and
to have a benefit to stakeholders?), us- rehabilitation services to sick or injured persons who do not require
ability and acceptability (How easy is hospitalization or institutionalization.”
the robot to use, modify, and maintain? Urgent Care Facility “Location, distinct from a hospital emergency room, an office, or
Is the robot’s form and function accept- a clinic, whose purpose is to diagnose and treat illness or injury
able?), and safety and reliability (How for unscheduled, ambulatory patients seeking immediate medical
attention.”
safe and reliable is the robot?)
Inpatient Psychiatric “A facility that provides inpatient psychiatric services for the diagnosis
Facility and treatment of mental [health disorders] on a 24-hour basis, by or
Stakeholders, Care Settings, under the supervision of a physician.”
and Robot Tasks Hospice “A facility, other than a patient’s home, in which palliative and
Stakeholders. For this article, stake- supportive care for terminally ill patients and their families are
provided.”
holders are defined as people who have
Substance Abuse “A location which provides treatment for substance (alcohol and drug)
a vested interest in the use of robot-
Treatment Facility abuse on an ambulatory basis. Services include individual and group
ics technology in healthcare. Stake- therapy and counseling, family counseling, laboratory tests, drugs and
holders can be: people who directly supplies, and psychological testing.” Residential facilities also provide
room and board.
Source: http://www.cms.gov/Medicare/Coding/ place-of-service-codes/Place_of_Service_Code_Set.html
c National Institute for Occupational Safety
and Health, http://www.cdc.gov/niosh/topics/
healthcare/
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 71
review articles
This article will focus on primary these tradeoffs in how they design and example, in surgical procedures, ro-
beneficiaries; however, it is impor- test their systems. bots may provide clinicians with the
tant to note that all other stakeholder Care tasks. Robots may be helpful ability to perform less invasive proce-
groups are critical to the successful for many health tasks. Robots can pro- dures to areas of the body inaccessible
end-deployment of robotics in health- vide both physical and cognitive task with existing instrumentation due to
care, and should be included when support for both DRUs and clinicians/ issue or distance constraints. These
possible in decision-making. caregivers, and may be effective and can include types of neurological, gas-
Care settings. Another critical di- helping reduce cognitive load. Task tric, and fetal surgical procedures.41
mension to contextualizing the use of assistance is particularly critical as Direct robot users. When designing
robotics in healthcare is to consider the the demand for healthcare services robots for DRUs, there is great value
location of use. This can significant- is far outpacing available resources, in designing straightforward solutions
ly impact on how suitable different which places great strain on clinicians to problems. At a recent workshop dis-
technologies are for a given setting,12 and caregivers.33 cussing healthcare robotics, people
and can affect the design of a robot Physical tasks. Clinicians. Tasks in- with Amyotrophic Lateral Sclerosis
and its required capabilities. For ex- volving the “3Ds” of robotics—dirty, (ALS) and other conditions reported
ample, while a 400-lb, 5’4” dual-arm dangerous, and dull—can be of partic- that most of all they just wanted “a ro-
mobile manipulator may work well in ular value for clinical staff. Clinicians bot to change the oil.”30 In other words:
a lab, it is ill-suited to an 80-sq. ft. room spend an inordinate amount of time help is most needed with basic, physi-
in an assisted living facility. While it on “non-value added” tasks, for exam- cal ADL tasks, such as dressing, eating,
is understandable robot makers may ple, time away from treating patients. ambulating, toileting, and housework.
immediately be more concerned with The overburden of these tasks creates a Robots that can help people avoid fall-
achieving platform functionality than climate for error; so robots, which can ing could also be incredibly beneficial,
the particulars of care settings, to suc- help clinicians effectively, surmount as falls cause thousands of fatal and
cessfully deploy healthcare robots, set- these challenges would be a boon. debilitating injuries per year.
ting must be considered. Some of these non-value added tasks Currently, standalone robots that
The accompanying table defines include: Transportation, such as mov- can successfully perform the majority
different kinds of care settings, and ing materials or people from one place of these key physical ADL tasks are a
includes longer-term care facilities in to another, Inventory, such as patients long way from reaching the consum-
the community, as well as shorter-term waiting to be discharged, Search Time, er market. There are several reasons
care facilities, such as hospitals. For such as looking for equipment or pa- for this. First, the majority of these
longer-term care in the U.S., the Fair perwork, Waiting, for patients, mate- tasks remain challenging for today’s
Housing Act, and Americans with Dis- rials, staff, medications, and Overbur- robots, as they require a high degree
abilities Act set some general guide- dening of Staff and Equipment, such as of manual dexterity, sensing capabil-
lines for living space accessibility; how- during peak surge times in hospitals.42 ity, prior task knowledge, and learn-
ever, the majority of space guidelines is Two of the best tasks for robots in ing capability. Furthermore, most
state-dependent, and can have a large this task space are material transporta- autonomous, proximate robots move
degree of variation. For example, an tion and scheduling, which robots can extremely slowly due to safety and
assisted living facility in Florida must be exceptionally skilled at given the computational purposes, which will
provide 35-sq. ft. per resident for liv- right parameters. For example, robots undoubtedly be frustrating for end
ing and dining, whereas in Utah it is that can fetch supplies, remove waste, users. Finally, even if robots could
100-sq. ft. An in-patient psychiatric fa- and clean rooms. Another task robots perform some of these more complex
cility in Kentucky must provide 30-sq. can do that will help greatly improve ADL tasks, their power budgets may
ft. per patient in social common areas, the workplace for clinicians is mov- make them impractical for deploy-
Oregon requires 120-sq. ft. in total and ing patients. This is a very hazardous ment in most care settings.
40-sq. ft. per patient. task—hospital workers, home health However, there have been substan-
Robots in healthcare can also affect workers, and ambulance workers ex- tial gains in recent years for other
the well-being, health, and safety of perience musculoskeletal injuries be- tasks. For example, robots that pro-
both direct robot users and clinicians. tween three and five times the national vide DRUs with additional physical
The field of evidence based health- average when moving patients accord- reach (for example, smart on-body
care design40 has produced hundreds ing to NIOSH. prostheses, wheelchair mounted ro-
of studies showing a relationship Robots can also help clinicians with bot arms) and robots which provide
between the built environment and other dangerous tasks, such as helping multi-setting mobility capability (for
health and wellness, in areas including treat patients with highly infectious example, exoskeletons, accessible
patient safety, patient outcomes, and diseases. Robot mediated treatment personal transportation devices).26
staff outcomes. When new technology has become particularly pertinent after These are likely to continue to be the
such as a robot becomes part of a care the recent Ebola outbreak, where clini- types of systems that reach end users
setting, it is now a possible disruptor to cians and caregivers can perform treat- first for the foreseeable future.
health. HAs must balance the risks and ment tasks via telepresence robots.17 Cognitive tasks. Clinicians. Any
benefits for adopting new technology, Finally, robots may help extend the technology that can effectively reduce
and robot makers should be aware of physical capabilities of clinicians. For clinical workload is likely to be warm-
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 73
review articles
Figure 2. Key examples of recent advances in healthcare robotics. Those inside and on the body are primarily intended for direct robot
users, and those outside the body for direct robot users, caregivers, and clinicians. These robots have the potential to be used across
a range of care settings and clinical foci, and can provide both physical and cognitive support. Image credits (clockwise from upper left):
B. Nelson, R. Alterovitz, Mobius, TED, Ekso Bionics, B. Smart, L. Riek, S. Sabanovic, C. Kemp.
[6, 78, 33, 34]. In the natural orifice embodiment, transnasal skull base [12] and
transoral throat [80] applications have been proposed, and it is likely that surgeries
In the body
through other natural orifices will be pursued in the future. In the percutaneous,
needle-like embodiment, applications that have been suggested include fetal umbil-
On the body
ical cord blood sampling [29], ultrasound guided liver targeting and vein cannula-
tion [74], vascular graft placement for hemodialysis [7], thermal ablation of cancer
[8, 13], prostate brachytherapy [79], retinal vein cannulation [87, 91, 88], epilepsy
treatments [19], and general soft tissue targeting procedures [45, 70, 35].
Of all these applications, the two that have been studied most extensively are the
cardiac applications of Dupont et al. and the endonasal applications of Webster et al.
This includes the first ever use of a concentric tube robot in a live animal by Gosline
et al. [26, 33]. It also includes the first insertion of a concentric tube robot into a
human cadaver by Burgner et al. [16, 12]. Many researchers have also explored the
Microrobots are micro-scale, Concentric tube robots (active Robotic prostheses and exoskeletons. People with forearm-to-shoulder
untethered robots that can cannulas) can be used as small, amputations can use wearable robot prostheses, which can provide fine-grained
move through the body and can teleoperated manipulators or as dexterity, reach, and strength. People with lower-limb amputations or lower-body
Fig. 1 A concentric tube robot next to a standard da Vinci laparoscopic tool.
per form targeted therapy, steerable needles, and enable muscle weakness can use powered-knee and ankle prostheses to do everything
material
rting: Effects of removal, structural
Teleoperator Visibility procedures in areas inaccessible from running marathons to dancing. Exoskeletons have helped people with
control, and sensing. with traditional instruments. muscle weakness, movement disorders, or paralysis locomote.
bot-Mediated Health Care
Kory Kraft, William D. Smart
Outside the body
d to provide medical
ks, alleviating work-
s longer than abso-
ns to this technology
ses related to patients’
n a simulated Ebola
nts trust the robot
h highly infectious
he risk of becoming
significant when the
or extremely lethal. Mobile manipulators. Patient simulators. Over Mental and Behavioral Physical task support.
Fig. 1: The robot moves an IV fluid pole during a study
session.
Clinicians can safely 180,000 clinicians annually Healthcare. Robots can Robots can support people
tele-operate mobile robots to train on high fidelity robotic support people with cognitive with motor impairments,
treat patients with highly patient simulators, which can impairments, facilitate movement disorders, and
infectious diseases such as simulate physiological cues, neurorehabilitation, support brain injuries to provide external
Ebola Virus Disease. and sense and respond to wellness, or provide manipulation capabilities.
learners. companionship.
ple, biopsy, ablation), structural con- for intuitive physical and cognitive in- ple with lower-limb amputations or
trol (for example, stent placement), teraction between the user and robot, lower-body muscle weakness can use
and sensing (for example, determin- new methods for managing uncertain- powered-knee and ankle prostheses to
ing oxygen concentrations, sensing the ty, and providing 3D registration in real engage in a range of activities, includ-
presence of cancer).25 Recent advances time while traversing both deformable ing everyday locomotion to running
in the field have enabled actuating, and non-deformable tissue.1 marathons and dancing. Exoskele-
powering, and controlling these robots On the body. In terms of wearable tons have helped people with muscle
(see Nelson et al.25 for a review.) robots for DRUs, there have been re- weakness, movement disorders, and
In surgical and interventional ro- cent advances in the areas of actu- paralysis locomote.
botics, a range of advances have been ated robot prostheses, orthoses, and Several advances have been made
made that enable clinicians to have exoskeletons. A prothesis supplants recently in how people interface with
improved dexterity and visualization a person’s missing limb, and acts in these robots. For example, some ro-
inside the body and reduce the degree series with a residual limb. An ortho- bot prostheses offer neural integra-
of movement during operations.1 Fur- sis is a device that helps someone who tion to provide tactile feedback and
thermore, promising advances have has an intact limb but an impairment, increasingly more intuitive control of
been made in concentric tube (active and an exoskeleton provides either a the limb.1 Other advances include an
cannula) robots. These robots are com- person with intact limbs (DRU or oth- increase in the workspace and range of
prised of precurved, concentrically erwise) assistance or enhancement of motion of wearable robots, as well as
nested tubes that can bend and twist existing physical capability. Orthoses improvements in user comfort.
throughout the body. The robots can be and exoskeletons act in parallel to an Outside the body. Robots outside the
used as small, teleoperated manipula- existing limb.39 body are being used across many clini-
tors or as steerable needles. The robots All of these robots can be used to cal application spaces. For clinicians,
can enter the body directly, such as enable DRUs to perform tasks. For ex- mobile manipulators are being used
through the skin or via a body opening, ample, people with forearm-to-shoul- to help treat patients with highly infec-
or could be used via an endoscope.11 der amputations can use wearable tious diseases,17 aid in remote surgical
Some future research directions for robot prostheses, which can provide procedures,26 and help provide physi-
in-the-body robots include new means dexterity, reach, and strength. Peo- cal assistance to CLs when moving pa-
tients.24 They are also used extensively as 75% of hand rehabilitation robots avoid using anything which further
in clinical training, as discussed earlier. were never actually tested with end us- advertises their differences, even if it
Robots are also being explored in men- ers, rendering them completely unus- provides a health benefit.27,32,33
tal and behavioral healthcare applica- able in practice and abandoned.2 Shinohara and Wobbrock argue that
tions. Robots are being used to support One the major challenges is that in addition to designers considering
people with autism spectrum disorder clinicians, even those who are well-ed- the functional accessibility of system,
and cognitive impairments, to encourage ucated and accomplished in their dis- they also consider its social accessi-
wellness, and to provide companionship. ciplines, often have low technology lit- bility, and employ a “Design for Social
(See Riek29 for a detailed review of eracy levels.19 Thus, if they themselves Acceptance” (DSA) approach.35 This
these applications). find a robot unusable, the likelihood of means going beyond purely functional
For physical task support, robots them successfully training a direct ro- designs, which may be “awkward and
can provide external manipulation and bot user or caregiver to use the robot is clunky.”34 Robot makers are usually
sensing capabilities to DRUs. For exam- greatly diminished. primarily concerned about a robot’s
ple, wheelchair mounted robot arms Another challenge is that DRUs are functional capabilities; for example,
can provide reach, smart wheelchairs often excluded from the robot design can the robot perform its task safely
can help facilitate safe navigation and process, which leads to unusable and and reliably given workspace, envi-
control, and telepresence robot sur- unsuitable technology. Robots with ronmental, and platform constraints.
rogates can enable people with severe multiple degrees of freedom, such as However, the aforementioned litera-
motor impairments the ability to fly, wearable prostheses or wheelchair- ture suggests that there may be great
give TED talks, and make coffee.6,7,38 mounted arms, require a high level of value in also considering a robot’s ap-
There are other examples of external cognitive function to control.38 How- pearance and behavior to help enable
robots that are outside the scope of this ever, many people needing such robots technology adoption.
paper, but could prove highly pertinent often have co-morbidities (that is, oth- Safety and reliability. When robots
in healthcare. For example, autonomous er conditions), which can make control and people are proximately located,
vehicles may provide new opportunities a further exhausting process. safety and reliability are incredibly
for DRUs to locomote, or may enable There are several ways to address important. This is even more critical
EMTs to focus on treating patients rather this issue. One approach is for robot for DRUs who may rely extensively on
than driving ambulances. Telepresence makers to reduce robot complexity. robots to help them accomplish physi-
may also have unforeseen applications Balasubramanian et al.2 argue for func- cal or cognitive tasks, and who may not
in healthcare, such as through aerial tional simplicity in therapeutic robot have the same ability to recover from
manipulation, drone delivery of medi- design, which will lead to robots that robot failures as easily as non-DRUs.
cal supplies, among others. are easier for all primary stakehold- There has been a fair bit of work
ers to use, control, and maintain. This on safe physical human-robot inter-
Healthcare Robotics Adoption: concept is echoed in much of the reli- action, particularly with regard to im-
Challenges and Opportunities ability and fault tolerance literature; proving collision avoidance, passive
While there are exciting advances in lower-complexity robots are more like- compliance control methods, and new
healthcare robotics, it is important to ly to be longitudinally reliable and fault advances in soft robotics to facilitate
carefully consider some of the chal- tolerant. gentle interaction.37 There also have
lenges inherent in healthcare robotics, Forlizzi and Zimmerman propose been recent advances on algorithmic
and discuss ways to overcome them. the idea of a service-centered design verifiability for robots operating in par-
Robots have the ability to enact physi- process, wherein rather than only tially unknown workspaces,18 which
cal change in the world, but in health- think about a single user and a sys- may prove fruitful in the future.
care that world is inherently safety tem, designers consider including However, there has been little work
critical, populated by people who may the broader ecosystem surrounding to date on safe cognitive human-robot
be particularly vulnerable to harm due a technology.10 This is a particularly interaction. People with cognitive dis-
to their disability, disorder, injury, or beneficial idea in healthcare robotics. abilities and children are particularly
illness. Stakeholders face five major Rarely will there be one DRU and one prone to being deceived by robots.29
considerations when considering de- robot; rather, there is a complex so- This is an important and under-ex-
ploying robots in healthcare: Usability cial structure surrounding caregiving plored question in the robotics com-
and acceptability, safety and reliabil- that should be considered carefully in munity, though a few efforts have been
ity, capability and function, clinical robot design. made recently with regard to encourag-
effectiveness, and cost effectiveness. Another important barrier to health- ing robot makers to employ value-cen-
Each is explored here. care robot adoption is its acceptability. tered design principles. For example,
Usability and acceptability. Robots The morphology, behavior, and func- ensuring the appearance of the robot
that are difficult for primary stakehold- tionality of a robot play a major role in is well-aligned with its function (for ex-
ers to use have a high likelihood of be- its adoption and use. When a DRU uses ample, avoiding false-advertising), en-
ing abandoned. This phenomenon has a robot in public, they are immediately abling transparency into how a robot
been well documented in the Assistive calling attention to their disability, dis- makes decisions, and maintaining the
Technology Community.5,9,20 For exam- order, or illness. DRUs already face sig- privacy and dignity of DRUs.15,31
ple, a 2010 study reported that as many nificant societal stigma, so frequently Another way to help bridge the
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 75
review articles
safety gap is for robot makers to em- approaches, which help enable more
ploy in-depth testing and training robust algorithms. Furthermore, life-
regimens that enable direct robot long learning and longitudinal experi-
users, care givers, and clinicians mental approaches have also enabled
to fully explore the capabilities of
a platform. This can help prevent Robotic patient researchers to surmount some of these
perceptual challenges. Modeling situ-
people from either over-relying or
under-relying on the robot, and help
simulators are ational context and object and environ-
mental affordances within them can
facilitate trust. life-sized, humanoid also be a useful tool in surmounting
Capability and function. The field
of robotics has seen amazing capa-
robots that can these issues.1,28
Learning, too, is a challenge. It is
bility gains in recent years, some of breathe, bleed, critical that primary stakeholders,
which have been instrumental in
healthcare. However, despite these
speak, expel fluids, who have a wide range of physical
abilities, cognitive abilities, and tech-
advances, robotics is still an excep- and respond to nology literacy levels, are able to eas-
tionally difficult problem. For exam-
ple, many demonstrations in robotics medications. ily repurpose or reprogram a robot
without a RM present. This level of
technology remain demos, and fail adaptability and accessibility presents
outside of highly constrained situa- robot makers with a complex techni-
tions.8 This is particularly problem- cal and socio-technical challenge. As
atic when designing technology for mentioned previously, simple is un-
healthcare: most problems are open- doubtedly better; it helps constrains
ended, and there is no “one-size-fits- the problem space and lowers the
all” solution.12,28 Every person, task, complexity of the system. Another ma-
and care setting are different, and jor aid will be the research community
require robots to be able to robustly continuing to develop new datasets,
learn and adapt on the fly. evaluation metrics, and common plat-
As discussed previously, care set- forms;8 these have shown to be useful
tings differ substantially. Even the in other computing domains, so are
same type of care setting, such as an likely to be helpful here.
emergency department or assisted Cost effectiveness. When robots
living facility, have substantial differ- are being acquired in healthcare, it is
ences in their environment, practices, important that their cost effectiveness
and culture. In our prior work design- is considered beyond the purchase,
ing health information technology, we maintenance, and training costs for
have demonstrated that these differ- the system. For example, when elec-
ences can be surmounted by conduct- tronic health records (EHRs) were first
ing multi-institutional trials, and by employed in hospitals, they were tout-
building solutions that are adaptable ed as a means to save clinicians and
to different care settings.13 The same patients’ time. However, because EHR
approach can be taken in robotics. systems were so poorly designed, diffi-
Real-world, real-time, robust per- cult to use, and poorly integrated into
ception in human environments is a existing they ended up creating sub-
another major challenge in robotics. stantially more non-value added work.
While the field of computer vision has This resulted in “unintended conse-
seen advances in solving still-image, quences,” including increasing costs
fixed-camera recognition problems, and patient harm.16 It is critical these
those same algorithms perform poorly same pitfalls are avoided for robots.
when both the cameras and people The Agency for Healthcare Research
are moving, data is lost, sensors are and Quality (AHRQ) created a guide
occluded, and there is clutter in the for reducing these unintended conse-
environment. However, these situa- quences for EHRs;16 the same method-
tions are highly likely in human social ological approach can be employed for
settings, and it is an open challenge to robots. For example, when assessing
sense, respond to, and learn from end the acquisition and deployment of a
users in these settings.28 There have robot in a first place:
been some recent advances, however: ˲˲ Are you ready for a robot (and is a
the fields of social signal processing robot ready for you)? HAs must care-
and human-robot interaction have fully consider their institution’s
moved toward multimodal sensing robot readiness. Robots may solve
some problems, but may make others ˲˲ Detailed deployment plans are cal studies on effectiveness, or can
worse. For example, suppose a supply- provided but are not overly complicated; synthesize the existing literature in a
fetching robot that is purchased help ˲˲ There are multiple ways to col- systematic review.
nurses save time. However, it has dif- lect, analyze, and act on feedback from All consumer in-the-body robots
ficulties functioning at high volume users; and many on-the-body robots must
times of day due to sensor occlusion, ˲˲ Success metrics should be deter- undergo regulatory approval before
so supply deliveries end up being de- mined in advance and evaluated con- they can be marketed and sold. In the
layed. This causes a cascade effect, tinually; and, United States, this approval is through
increasing the workload of nurses. ˲˲ Quality improvement should be the FDA, which typically requires a
Situations like these can be remedied supported on an ongoing basis. strong level of evidence showing the
through a careful exploration of exist- Recently, the IEEE released a docu- effectiveness and safety of a medical
ing workflow in a unit, and by fully un- ment on “Ethically Aligned Design” device. Outside-the-body robots typi-
derstanding a robot’s existing capa- which contains detailed suggestions cally do not need to undergo a device
bilities and limitations. See Gonzales for how to engage in this value-cen- review process provided they fall with-
et al.12,13 for examples on engaging in tered practice in engineering, which in existing classifications; for exam-
this process with clinicians in safety could be helpful for all stakeholders ple, Paro the robot seal (see Figure 2,
critical settings. moving forward.e bottom right) is classified by the FDA
˲˲ Why do you want a robot? It is im- Clinical effectiveness. Clinical ef- a neurological therapeutic device, and
portant stakeholders define exactly fectiveness answers the question: thus is exempt from premarket review.
why a robot is necessary for a given task “Does it work?” In particular, does a Shimshaw et al.36 argue this lack of
in the first place. What are the goals of given intervention provide benefit to regulation of healthcare robots may
the stakeholders? What is the plan for a primary stakeholder? This question be harmful to stakeholders both phys-
deploying the robot, and how will suc- is answered by conducting thorough, ically and informationally, and should
cess be measured? These questions evidence-based science. For robots be subject to premarket review on di-
can also be explored through design directly affecting DRUs, this evidence mensions including privacy, safety,
activities while assessing workflow and comes from comparative effectiveness reliability, and usability.
institutional readiness. research (CER), which is “generated In the meanwhile, while the policy
˲˲ How do you select a robot? As men- from research studies that compare community races to catch up with
tioned previously, functionality is only drugs, medical devices, tests, surger- technology, the robotics community
one aspect to a robot; there is also: us- ies, or ways to deliver healthcare.”f can and should engage in research
ability, acceptability, safety, reliabil- CER can include both new clini- that tests the clinical effectiveness of
ity, and clinical effectiveness. While robots across care settings. Begum et
there are not yet definitive guidelines al.4 suggest robot makers follow exist-
to aid HAs in this process, science pol- e http://standards.ieee.org/develop/indconn/ ing clinical effectiveness benchmarks
ec/ead_v1.pdf
icy is starting to be shaped within this f Agency for Health and Research Quality, ef-
within their intended care space and
space. The CCC recently held an event fectivehealthcare.ahrq.gov/index.cfm/what-is- adopt them for use with robots. Fur-
entitled “Discovery and Innovation in comparative-effectiveness-research1/ thermore, Riek29 suggests that when
Smart and Pervasive Health,”d which
brought together over 60 researchers Figure 3. Factors that will affect the widespread adoption of robotics in healthcare.
from across academia, industry, and
government, many of whom are ro-
boticists who work in health. These
efforts will hopefully begin to provide
guidelines in the future.
˲˲ What are the recommended prac-
tices for avoiding unintended conse-
quences of robot deployment? Suc-
cessfully deploying robots is a difficult
process that may result in a disruptive
care setting, and upset key stakehold-
ers. To avoid unintended consequenc-
es, it is important that:
˲˲ The robot’s scope is well-defined
with clear goals;
˲˲ Key stakeholders are included
and engaged in the deployment from
the onset;
d http://cra.org/ccc/events/discovery-innovation-
smart-health/
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 77
review articles
conducting CER with robots, particu- real world, and will remain so for the ACM/IEEE International Conference on Human-Robot
Interaction, 32–41.
larly in cognitive support settings, it foreseeable future; however, they still 23. Moosaei, M., Gonzales, M.J., and Riek L.D. Naturalistic
is not sufficient to simply test robot have the potential to be a remarkable pain synthesis for virtual patients. International
Conference on Intelligent Virtual Agents, 2014.
vs.no-robot, as the morphology can game changer in health. 24. Mukai, T., Hirano, S., Nakashima, H., Kato,Y., Sakaida,
affect outcomes, but to instead to test Y., et al. Development of a nursing-care assistant
robot RIBA that can lift a human in its arms. IEEE
actuated vs. non-actuated. Acknowledgments Intelligent Robots and Systems, 2010.
Some research reported in this ar- 25. Nelson, B.J., Kaliakatsos, I.K., and Abbott, J.J.
Microrobots for minimally invasive medicine. Annual
Discussion ticle is based upon work supported by Rreview of Biomedical Engineering 12 (2010), 55–85.
Healthcare robotics is an exciting, the National Science Foundation un- 26. Okamura, A.M., Mataric, M.J., and Christensen, H.I.
Medical and health-care robotics. Robotics and
emerging area that can benefit all der Grant Nos. IIS-1253935 and SES- Automation 17, 3 (2010), 26–27.
27. Parette, P. and Scherer, M. Assistive technology use
stakeholders across a range of set- 1457307, and the Luce Foundation. and stigma. Education and Training in Developmental
tings. There have been a number of Disabilities, 2004, 217–226.
28. Riek, L.D. The social co-robotics problem space: Six
exciting advances in robotics in recent References key challenges. Robotics challenges and vision. In
1. A roadmap for US robotics: From Internet to robotics
years, which point to a fruitful future. (Nov. 2016); http:// jacobsschool.ucsd.edu/
Proceedings of the Workshop at Robotics: Science and
Systems, 2013.
How these robots ultimately will be in- contextualrobotics/docs/rm3-final-rs.pdf, November 2016. 29. Riek, L.D. Robotics technology in mental health care.
2. Balasubramanian, S., Klein, J., and Burdet, E. Robot-
tegrated into the lives of primary ben- assisted rehabilitation of hand function. Curr Opin
Artificial Intelligence in Behavioral and Mental Health
Care. D. Luxton, (ed). Academic Press, 2015.
eficiaries remains unknown, but there Neurol, 2010. 30. Riek, L.D, Hartzog, W., Howard, D.A., Moon, A., and
3. Bastawrous, M. Caregiver burden-a critical discussion.
is no doubt that robots will be a major Int’l J of Nursing Studies 50, 3 (2013), 431–441.
Calo, R. The emerging policy and ethics of human
robot interaction. HRI (Extended Abstracts), 2015.
enabler (and disruptor) to health. 4. Begum, M., Serna, R.W., and Yanco, H.A. Are robots 31. Riek, L.D and Howard, D. A code of ethics for the
ready to deliver autism interventions? A comprehensive
It is critical that both the research review. International J. Social Robotics 8, 2 (2016).
human-robot interaction profession. In Proceedings of
We Robot, 2014.
and industrial communities work to- 5. Brose, S.W., Weber, D.J., Salatin, B.A., Grindle, G.G., 32. Riek, L.D and Robinson, P. Using robots to help people
Wang, H., et al. The role of assistive robotics in the habituate to visible disabilities. In IEEE International
gether to establish a strong evidence- lives of persons with disability. Am J Phys Med, 2010. Conference on Rehabilitation Robotics, 2011.
base for healthcare robotics. As we 6. Carlson, T. and Demiris, Y. Collaborative control for 33. Shi, L. and Singh, D. A. Delivering health care in
a robotic wheelchair: evaluation of performance, America. Jones & Bartlett Learning, 2014.
have learned from the large-scale de- attention, and workload. IEEE Trans. Systems, Man, and 34. Shinohara, K. A new approach for the design of
ployment of EHRs, technology devel- Cybernetics, Part B (Cybernetics) 42, 3 (2012), 876–888. assistive technologies: Design for social acceptance.
7. Chen, T.L. et al. Robots for humanity: using assistive ACM SIGACCESS Accessibility and Computing, 2012.
opment and deployment cannot hap- robotics to empower people with disabilities. IEEE 35. Shinohara, K. and Wobbrock, J.O. In the shadow
pen in a vacuum, or it is likely to cause Robotics & Automation 20, 1 (2013), 30–39. of misperception: Assistive technology use and
8. Christensen, H.I., Okamura, A., Mataric, M., Kumar, social interactions. In Proceedings of the SIGCHI
grave harm to DRUs, overwhelming V., Hager, G., and Choset, H. Next generation robotics Conference on Human Factors in Computing Systems,
(2016); arXiv preprint arXiv:1606.09205.
stress to clinicians, and astronomical 9. Dawe, M. Desperately seeking simplicity: how young
2011.
36. Simshaw, D., Terry, N., Hauser, K., and Cummings,
unseen costs. It is wise for all stake- adults with cognitive disabilities and their families M. Regulating healthcare robots: Maximizing
adopt assistive technologies. In Proceedings of
holders to proceed cautiously and de- the Conference on Human Factors in Computing
opportunities while minimizing risks. Richmond J. of
Law & Tech, 2016.
liberately, and consider the full con- Systems, 2006. 37. Trivedi, D., Rahn C.D., Kier, W.M., and Walker, I.D. Soft
10. Forlizzi, J. and Zimmerman, J. Promoting service
text of care as much as possible. design as a core practice in interaction design. In
robotics: Biological inspiration, state of the art, and
future research. Applied Bionics and Biomechanics,
It is also critical that direct robot Proceedings of the 5th IASDR World Conference on 2008.
Design Research, 2013.
users remain directly involved in the 11. Gilbert, H.B., Rucker, D.C., and Webster III, R.J.
38. Tsui, K.M., Kim, D.J., Behal, A., Kontal, D., and Yanco,
H. A. ‘I want that:’ Human-in-the-loop control of a
research, development, and deploy- Concentric tube robots: The state of the art and wheelchair-mounted robotic arm. Applied Bionics and
future directions. Robotics Research. Springer, 2016, Biomechanics 8, 1 (2011), 127–147.
ment of future robots in health and 253–269. 39. Tucker, M.R. et al. Control strategies for active lower
wellness across the entire lifecycle of 12. Gonzales, M.J., Cheung, V.C., and Riek, L.D. Designing extremity prosthetics and orthotics: a review. J. of
collaborative healthcare technology for the acute care Neuroengineering and Rehabilitation, 2015.
a project, as ultimately they are the workflow. In Proceedings of the 9th Int’l Conference on 40. Ulrich R.S. et al. A review of the research literature
ones who will be using these robots. Pervasive Computing Technologies for Healthcare, 2015. on evidence-based healthcare design. Health
13. Gonzales, M.J., Henry, J.M., Calhoun, A.W., and Riek, Environments Research & Design J., 2008.
As discussed earlier, ignoring DRU L.D. Visual task: A collaborative cognitive aid for acute 41. Webster R.J., Okamura, A.M., and Cowan, N.J. Toward
input leads to unusable, unsuitable, care resuscitation. In Proceedings of the 10th Int’l active cannulas: Miniature snake-like surgical robots.
Conference on Pervasive Computing Technologies for IEEE/RSJ Intelligent Robots and Systems. IEEE,
and abandoned robots, which ben- Healthcare, 2016. 2006.
14. Graf, C. The Lawton instrumental activities of daily
efits no one. Secondary and Tertiary living scale. The American J. Nursing 108, 4 (2008).
42. Wellman, J., Jeffries, H., and Hagan, P. Leading the
Lean Healthcare Journey: Driving Culture Change to
stakeholders should look to the Pa- 15. Hartzog, W. Unfair and deceptive robots. Maryland Increase Value. CRC Press, 2016.
Law Review 74, 785 (2015).
tient Centered Outcomes Research In- 16. Jones, S.S et. al. Guide to reducing unintended
stitute (PCORI)g as a highly successful consequences of electronic health records. Agency for
Laurel D. Riek (lriek@ucsd.edu) is an associate professor
Healthcare Research and Quality, 2011.
model for how-to engage with primary 17. Kraft, K. and Smart, W.D. Seeing is comforting: effects
of computer science and engineering at the University of
California, San Diego. She directs the Healthcare Robotics
stakeholders in clinical research and of teleoperator visibility in robot-mediated health care.
lab and builds autonomous robots that can sense,
The Proceedings of the 11th ACM/IEEE International
development. Conference on Human Robot Interaction, 2016, 11–18.
understand, and learn from real people in the real world.
Finally, it is important that ro- 18. Lahijanian, M., Maly, M.R., Fried, D., Kavraki L.E., Kress-
Gazit, H., and Vardi, M.Y. Iterative temporal planning
bot makers work with DRUs to help in uncertain environments with partial satisfaction © 2017 ACM 0001-0782/17/11 $15.00
bridge technology literacy gaps and guarantees. IEEE Trans. Robotics, 2016.
19. Lluch, M. Healthcare professionals’ organizational
appropriately set expectations. Most barriers to health information technologies—A literature
people’s experience with robotics review. International J. Medical Informatics, 2011.
20. Lu, E.C. et al. Development of a robotic device for
comes from movies or media, which upper limb stroke rehabilitation: A user-centered
rarely reflects the true state of af- design approach. Paladyn 2, 4 (2011), 176–184.
21. Milligan, C. There’s no place like home: Place and care Watch the author discuss
fairs. Robots are quite fallible in the in an ageing society. Ashgate Publishing Ltd., 2012. her work in this exclusive
22. Moosaei, M., Das, S.K., Popa, D.O., and Riek, L.D. Communications video.
Using facially expressive robots to calibrate https://cacm.acm.org/videos/
g http://pcori.org clinical pain perception. In Proceedings of the 2017 healthcare-robotics
P. 89 P. 90
Technical
Perspective The Heat Method for
Exploring Distance Computation
a Kingdom by By Keenan Crane, Clarisse Weischedel, and Max Wardetzky
Geodesic Measures
By Marc Alexa
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 79
research highlights
DOI:10.1145/ 31 3 1 2 8 6
Technical Perspective
To view the accompanying paper,
visit doi.acm.org/10.1145/3131284 rh
Solving Imperfect
Information Games
By David Silver
is as old as com-
T HE ST U D Y O F G A M E S ta) both defeating human profession-
puter science itself. Babbage, Turing, als using variants of CFR—although a
and Shannon devised algorithms and The methods used near-perfect solution remains out of
hardware to play the game of chess. to solve poker reach. The final challenge would be
Game theory began with questions the variant most widely played by hu-
regarding optimal strategies in card are quite general, mans: multiplayer no-limit poker.
games and chess, later developed into and therefore The methods used to solve poker
a formal system by von Neumann. are quite general, and therefore have
Chess subsequently became the dro- have potential potential applications far beyond this
sophila—or common fruitfly, the most applications far one game. Many other imperfect in-
studied organism in genetics—of ar- formation games played by humans,
tificial intelligence research. Early beyond this including a wide variety of card games,
successes in chess and other games one game. board games, and video games, are
shaped the emerging field of AI: many tractable to these methods. Further-
planning algorithms first used in more, there are many real-world ap-
games became pillars of subsequent plications, such as auctions, nego-
research; reinforcement learning was tiations, and security, in which agents
first developed for a checkers play- factual regret minimization (CFR), for receive different information, and
ing program; and the performance of approximating a Nash equilibrium. must make a sequence of decisions to
game-playing programs has frequent- Several years ago, a program called Po- maximize a final pay-off—and there-
ly been used to measure progress in laris—created by many of the authors fore belong to the same class of im-
AI. of the following paper—defeated for perfect information games as HULHE.
Most of this research focused on the first time a human professional Solving a problem attains perfec-
perfect information games, in which poker player in HULHE. tion in one domain. The frontier of
all events are observed by all players, However, Polaris was still far from solved domains is an incontrovertible
culminating in programs that beat perfect; indeed, it turns out in retro- measure of current computer capa-
human world champions in check- spect that it was exploitable, due to bilities. That frontier has now been
ers, chess, Othello, backgammon, and the approximations it made, by a very extended by one significant step, to
most recently, Go. However, many large margin. The obvious remaining include for the first time a challenging
applications in the real world have question was whether a “near- per- imperfect information game.
imperfect information: each agent fect” solution could be found—a strat-
observes different events. This leads egy so close to a Nash equilibrium David Silver leads the reinforcement learning research
group at Google DeepMind, London, and is lead researcher
to the possibility of deception and a that it cannot be differentiated in a on AlphaGo.
wealth of social strategies. Imperfect lifetime of play.
information games provide a micro- The following paper takes the CFR
cosm of these social interactions, methods used in previous work to the
while abstracting away the messiness next level. Using a number of innova-
of the real world. tions—and several hundred machine-
Among imperfect information years of computation—they were
games, Poker is the most widely stud- able to find a near-perfect solution to
ied—the latest drosophila—due to HULHE. Their solution also provides
its enormous popularity and strate- insights into the game itself, showing
gic depth. The smallest competitively the dealer holds a significant advan-
played variant by humans, and the tage, and that seemingly poor hands
most widely played by computers, is should be played surprisingly often.
the two-player game known as Heads- For the game of poker, the next
Up Limit Hold’Em (HULHE), in which step beyond HULHE is no-limit poker,
each player holds two private cards in which has a much larger action space.
addition to five public cards. Two de- This too has recently been cracked,
cades of research in this game has led with the programs Libratus (from
to powerful methods, such as counter- CMU) and DeepStack (also from Alber- Copyright held by author.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 81
research highlights
of high-stakes games chronicled in the book The Professor, In this paper, we announce that heads-up limit Texas
the Banker, and the Suicide King.16 It is also the smallest hold’em poker is essentially weakly solved. Furthermore, we
variant of poker played competitively by humans. HULHE bound the game-theoretic value of the game, proving that
has 3.16 × 1017 possible states the game can reach mak- the game is a winning game for the dealer.
ing it larger than Connect Four and smaller than check-
ers. However, as an imperfect information game, many of 2. SOLVING IMPERFECT INFORMATION GAMES
these states cannot be distinguished by the acting player The classical representation for an imperfect information
as they involve information about unseen past events (i.e., setting is the extensive-form game. Here the word “game”
private cards dealt to the opponent). As a result, the game refers to a formal model of interaction between self-
has 3.19 × 1014 decision points where a player is required interested agents and applies to both recreational games
to make a decision. and serious endeavors such as auctions, negotiation, and
While smaller than checkers, the imperfect infor- security. See Figure 1 for a graphical depiction of a por-
mation nature of HULHE makes it a far more challeng- tion of a simple poker game in extensive-form. The core of
ing game for computers to play or solve. It was 17 years an extensive-form game is a game tree specifying branches of
after Chinook won its first game against world champion possible events, namely player actions or chance outcomes.
Marion Tinsley in checkers that the computer program The branches of the tree split at game states and each
Polaris won the first meaningful match against profes- is associated with one of the players (or chance) who is
sional poker players.34 While Schaeffer et al. solved check- responsible for determining the result of that event. The
ers in 2007,39 heads-up limit Texas hold’em poker, until leaves of the tree signify the end of the game, and have
now, was unsolved. This slow progress is not for lack of an associated utility for each player. The states associated
effort. Poker has been a challenge problem for artificial with a player are partitioned into information sets, which
intelligence, operations research, and psychology with are sets of states which the acting player cannot distin-
work going back over 40 years.6 17 years ago, Koller and guish between (e.g., corresponding to states where the
Pfeffer28 declared, “we are nowhere close to being able opponent was dealt different private cards). The branches
to solve huge games such as full-scale poker, and it is from states within an information set are the player’s
unlikely that we will ever be able to do so.” The focus on available actions. A strategy for a player specifies for
HULHE as one example of “full-scale poker” began in ear- each information set a probability distribution over the
nest over ten years ago,5 and became the focus of dozens
of research groups and hobbyists after 2006 when it
became the inaugural event in the Annual Computer Figure 1. Portion of the extensive-form game representation of
three-card Kuhn poker29 where player 1 is dealt a queen (Q) and
Poker Competition,53 held in conjunction with the main
the opponent is given either the Jack (J) or King (K). Game states
conference of the Association for the Advancement of are circles labeled by the player acting at each state (“c” refers
Artificial Intelligence (AAAI). This paper is the culmina- to chance, which randomly chooses the initial deal). The arrows
tion of this sustained research effort toward solving a show the events the acting player can choose from, labeled with
“full-scale” poker game.10 their in-game meaning. The leaves are square vertices labeled with
the associated utility for player 1 (player 2’s utility is the negation
Allis3 gives three different definitions for solving a game.
of player 1’s). The states connected by thick gray lines are part
A game is said to be ultra-weakly solved if for the initial of the same information set, that is, player 1 cannot distinguish
position(s), the game-theoretic value has been determined; between the states in each pair since they represent a different
weakly solved if for the initial position(s), a strategy has been unobserved card being dealt to the opponent. Player 2’s states are
determined to obtain at least the game-theoretic value, also in information sets, containing other states not pictured in this
diagram.
for both players, under reasonable resources; and strongly
solved if for all legal positions, a strategy has been deter- 1:K 2:J c 1:J 2:K
mined to obtain the game-theoretic value of the position, for 1:Q
2:J 2:K
1:K 2
pa
t
t
ss
ss
call
fold
fold
call
bet
bet
call
fold
1013
1012
d
Another notable algorithm to emerge from the Annual Computer Poker
1011 Competition is an application of Nesterov’s excessive gap technique33
1010 to solving extensive form games.18 The technique has some desirable
109 properties, including better asymptotic time complexity that what is known
Rhode
108 Island for CFR. However, it has not seen widespread use among competition
107 Hold’em
106
participants due to its lack of flexibility in incorporating sampling schemes
105 and its inability to be used with powerful (but unsound) abstractions that
SFLP CFR CFR+ employ imperfect recall. Recently, Waugh and Bagnell49 have shown that
104
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 CFR and the excessive gap technique are more alike than different, suggesting
Year that the individual advantages of each approach may be attainable in
the other.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 83
research highlights
2007, CFR has been used to solve increasingly complex sim- empirically observed CFR+ to require considerably less com-
plifications of HULHE, reaching as many as 3.8 × 1010 infor- putation than state-of-the-art sampling CFR,22 while also
mation sets in 2012.20 being highly suitable for massive parallelization.
3. SOLVING HEADS-UP LIMIT HOLD’EM Theorem 1.e Given a set of actions A, and any sequence of T
The full game of HULHE has 3.19 × 1014 information sets. value functions vt: A ℜ with a bound L such that |vt(a) − vt(b)|
Even after removing game symmetries it has 1.38 × 1013, that ≤ L for all t and a, b ∈ A, an agent acting according to the regret-
is, three orders of magnitude larger than previously solved matching+ algorithm will have regret of at most .
games. There are two challenges for established CFR vari-
ants to handle games at this scale: memory and computa- Like CFR, CFR+ is an iterative algorithm that computes suc-
tion. During computation CFR must store the resulting cessive approximations to a Nash equilibrium solution. The
solution and the accumulated regret values for each infor- quality of the approximation can be measured by its exploit-
mation set. Even with single-precision (four byte) floating ability: the amount less than the game value that the strategy
point numbers, this requires 262TB of storage. Furthermore, achieves against the worst-case opponent strategy in expec-
past experience has shown that a three order of magnitude tation.10 Computing the exploitability of a strategy involves
increase in the number of information sets requires at least computing this worst-case value, traditionally requiring a
three orders of magnitude more computation. In order to traversal of the entire game tree. This was long thought to
tackle these two challenges we employ two ideas recently be intractable for games the size of HULHE. Recently it was
proposed by Tammelin, a co-author of this paper.44 shown that this calculation could be dramatically acceler-
To address the memory challenge we store the approxi- ated by exploiting the imperfect information structure of the
mate solution strategy and accumulated regrets using com- game and regularities in the utilities.23 This is the technique
pression. For the solution and regrets we use fixed-point we use to confirm the approximation quality of our resulting
arithmetic by first multiplying all values by a scaling factor strategy. The technique and implementation has been veri-
and truncating them to integers. The resulting integers are fied on small games and against independent calculations
then ordered to maximize compression efficiency, with com- of the exploitability of simple strategies in HULHE.
pression ratios around 13-to-1. Overall, we require under A strategy can be exploitable in expectation and yet,
11TB of storage during the computation, which is distrib- due to chance elements in the game and randomization
uted across a cluster of computation nodes. This amount in the strategy, its worst-case opponent still is not guaran-
is in-feasible to store in main memory, and so we store the teed to be winning after any finite number of hands. We
compressed strategy and regret values on each node’s local define a game to be essentially solved if a lifetime of play
disk. Each node is responsible for a set of subgames, that is unable to statistically differentiate it from being solved
is, portions of the game tree partitioned based on publicly at 95% confidence. Imagine someone playing 200 hands
observed actions and cards so that each information set is of poker an hour for 12hrs a day without missing a day for
associated with one subgame. The regrets and strategy for a 70 years. Furthermore imagine them employing the worst-
subgame are loaded from disk, updated, and saved back to case, maximally exploitive, opponent strategy, and never
disk, using a streaming compression technique that decom- making a mistake. Their total winnings, as a sum of many
presses and recompresses portions of the subgame as millions of independent outcomes, would be normally
needed. By making the subgames large enough, the update- distributed. Hence, the observed winnings in this life-
time dominates the total time to process a subgame. With time of poker would be 1.64 standard deviations or more
disk pre-caching, the inefficiency incurred by disk storage is below its expected value (i.e., the strategy’s exploitability)
approximately 5% of the total time. at least 1 time out of 20. Using the standard deviation of
To address the computation challenge we use a variant of a single hand of HULHE, which has been reported to be
CFR called CFR+.10, 44 CFR implementations typically sample around 5bb/g (big-blinds per game, where the big-blind is
only portions of the game tree to update on each iteration. the unit of stakes in HULHE),11 we arrive at a threshold of
They also employ regret-matching at each information set, . So, an approximate
which maintains regrets for each action and chooses among solution with an exploitability under 1mbb/g (milli-big-
actions with positive regret with probability proportional blinds per game) cannot be distinguished with high con-
to that regret. Instead, CFR + does exhaustive iterations over fidence from an exact solution, and indeed has a 1-in-20
the entire game tree, and uses regret-matching +, a vari- chance of winning against its worst-case adversary even
ant of regret-matching where regrets are constrained to be after a human lifetime of games. Hence, 1mbb/g is the
non-negative. Actions that have appeared poor (with less threshold for declaring HULHE essentially solved.
than zero regret for not having been played) will be chosen
again immediately after proving useful (rather than waiting 4. THE SOLUTION
many iterations for the regret to become positive). Finally, Our CFR+ implementation was executed on a cluster of 200
in contrast with CFR, we have observed empirically that the computation nodes each with 24 2.1GHz AMD cores, 32GB
exploitability of the players’ strategies during the computa-
tion regularly converges to zero. Therefore, we skip the step e
Theorem 1 and others providing the theoretical support for CFR+ did
of computing and storing the average strategy, instead using not appear in the original version of this article, and were published in a
the players’ current strategies as the CFR+ solution. We have subsequent paper.45
103 J J
T T
Unsuited
Unsuited
9 9
102 8 8
7 7
6 6
101 5 5
4 4
3 3
100 2 2
10–1 100 101 102 103
(a) First action as the (b) First action as the
Computation time (CPU-years) dealer non-dealer after a dealer raise
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 85
research highlights
Figure 5 presents the exploitability of our historical strategy. However, even though many of these strategies were
agents and their average loss in games played against highly exploitable, the rate at which they lose to Cepheus is
Cepheus. To reduce the impact of luck, a duplicate poker quite low. This loss is difficult to measure with statistical
format was used where each game is played twice, using confidence: a 100,000 game (non-duplicate) match would
the same cards, but with the players in opposite positions. have a 95% confidence interval of 31mbb/g, larger than the
PsOpti4 was the first game theoretic strategy produced for performance difference between Cepheus and every agent
HULHE, and was also the University of Alberta entry to but PsOpti4. Further, Hyperborean 2009 did improve over
the 2006 ACPC.5, h The University of Alberta entries to the its predecessors in terms of in-game performance against
ACPC were named Hyperborean, and from 2007 onwards, Cepheus, and regressed in exploitability due to its use of
all were created using variants of CFR.i The Polaris 2007 “Strategy Grafting,” an unsound solving technique that
and 2008 agents were created by the University of Alberta solves an abstraction as a series of fragments.50 This tech-
for its two Man-vs.-Machine Poker Championship matches, nique allows for a much larger and finer grained abstraction
in which Polaris narrowly lost in 2007 and narrowly won in than would otherwise be feasible, resulting in improved in-
2008; an analysis of these matches is available in24 [Chapter game performance, but without theoretical guarantees on
8]. Finally, the CFR-BR agent was our closest equilibrium exploitability. Together, these results illustrate the difficulty
approximation prior to this work.21 It used the same abstract in evaluating a strategy only through its competition perfor-
game as Hyperborean 2011, but used an algorithm that mance, instead of calculating its exploitability.
solved for the abstract strategy with the lowest real game We can also measure Cepheus’ performance against
exploitability. human adversaries. After this article was first published in
These results show that, with the exception of Hyper January 2015, our website allowed visitors to play against
borean 2009, each new generation of strategies improved in Cepheus and inspect its strategy.8 Each visitor chose a user-
both exploitability and in loss against an essentially optimal name and played any number of short 100-game matches
against Cepheus. Over the last two years, 39,564 unique
usernames have played 98,040 matches, with 3,564,094 total
h
PsOpti4 acts too slowly for an exploitability calculation to be practical,
games played.j Over this set of games, Cepheus is winning
or for a long match against Cepheus.
i
In the inaugural 2006 ACPC, PsOpti4 was the core component of at a rate of 169.9 ± 5.2mbb/g with 95% confidence. However,
Hyperborean 2006. most of the players did not finish a single 100-game match
(only 7,878 players did so, with 20,374 completed matches in
total), and so this winrate is likely not reflective of Cepheus’
Figure 5. Exploitability and performance against Cepheus for earlier
performance against strong opponents.
computer strategies. Results are in mbb/g, and indicate the expected
winnings by the strategy’s opponent (a best response or Cepheus, Determining which of these players are strong is non-
respectively). The Cepheus matches involved 1mn games of trivial because of both variance in their matches, and the
duplicate poker (2mn games total), except for PsOpti4 which played unequal amount of games played by each player. While both
20,000 duplicate games (40,000 games total). luck and skill contribute to a player’s performance, the high-
500 est-scoring players are more likely to be the luckiest rather
than the strongest. Additionally, bias may be introduced if
400
In-game loss (mbb/g)
players keep playing while ahead, but quit if they are losing.
vs best response In order to limit the impact of bias and evaluate Cepheus’
300
performance against different tiers of humans, we used
200 the following method. First, we eliminated usernames with
insufficient data that had played fewer than 500 games, leav-
100 ing 821 usernames playing 33,752 matches with 1,765,656
vs cepheus
0
games. Next, we divided each username’s games into two
sets, called Rank and Test.k Each username’s Rank games
-03
Pola er-07
Hyp -07
Pola er-08
Hyp -08
9
-12
s-14
er-1
er-0
er-1
ris
heu
Hyp
Hyp
Hyp
CFR
Cep
Name Year Exploitability Cepheus their skill and luck. The players were then divided equally
into five tiers: the bottom 20% of usernames, 21–40% etc.
PsOpti4 2003 – 74.9 ± 23.7
Within each tier, the Test game results were averaged to pro-
Hyperborean 2007 2007 298.106 27.4 ± 2.9
duce a winrate for the tier, independent from the luck that
Polaris 2007 2007 275.880 26.2 ± 3.0
affected the Rank games.
Hyperborean 2008 2008 266.797 22.5 ± 2.7
These results are shown in Figure 6. Cepheus’ esti-
Polaris 2008 2008 235.294 22.2 ± 2.6
mated winrate varies from 225 to 87mbb/g as we advance
Hyperborean 2009 2009 440.823 18.9 ± 2.6
through the tiers, decreasing as the quality of the human
Hyperborean 2010 2010 135.427 10.8 ± 2.5
Hyperborean 2011 2011 106.035 8.0 ± 2.4
CFR-BR 2012 37.113 9.2 ± 2.6
Cepheus 2014 0.986 0 Many players quit before finishing the 100-game match.
j
k
In each block of four sequential games, one pair (played in each position)
was assigned to each set.
50
225 195 119 106 87
References
0 1. Poker: A big deal. The Economist, 20. Jackson, E. Slumbot: An
0–19% 20–39% 40–59% 60–79% 80–100% Economist Newspaper Ltd., London, implementation of counterfactual
December 22, 31–38, 2007. regret minimization on commodity
Tier of humans
2. Allis, V.L. A Knowledge-Based hardware. In Proceedings of the 2012
Approach to Connect-Four. The Game Computer Poker Symposium. (2012).
is Solved: White Wins. Master’s thesis, 21. Johanson, M., Bard, N. Burch, N.,
Vrije Universiteit, Amsterdam, The Bowling, M. Finding optimal abstract
Netherlands, 1988. strategies in extensive form games.
players improves. Even against the top 20% tier of play- 3. Allis, V.L. Searching for Solutions in AAAI, (2012), 1371–1379.
ers in this experiment, Cepheus’ winrate of 87mbb/g Games and Artificial Intelligence. PhD 22. Johanson, M., Bard, N., Lanctot, M.,
thesis, Vrije Universiteit Amsterdam, Gibson, R., Bowling, M. Efficient Nash
is higher than against any of our historical agents. It The Netherlands, 1994. equilibrium approximation through
even exceeds 50mbb/g, a commonly cited benchmark 4. Babbage, C. Passages from the Life Monte Carlo counterfactual regret
of a Philosopher. Longman, Green, minimization. AAMAS (2012).
for what a professional poker player seeks to win from a Longman, Roberts, and Green, 23. Johanson, M., Waugh, K., Bowling, M.,
weaker opponent. London, 1864. Chapter 34. Zinkevich, M. Accelerating best
5. Billings, D., Burch, N., Davidson, A., response calculation in large extensive
Holte, R.C., Schaeffer, J., Schauenberg, T., games. IJCAI (2011), 258–265.
6. CONCLUSION Szafron, D. Approximating game- 24. Johanson, M.B. Robust Strategies
theoretic optimal strategies for full- and Counter-Strategies: From
In this paper, we announced that heads-up limit Texas scale poker. IJCAI, (2003), 661–668. Superhuman to Optimal Play.
6. Billings, D., Davidson, A., Schaeffer, J., PhD thesis, University of Alberta,
hold’em poker is essentially weakly solved. This is the first Szafron, D. The challenge of poker. Edmonton, Alberta, Canada, 2016.
nontrivial imperfect information game played competi- Artificial Intelligence 134, 1–2 (2002), 25. Karmarkar, N. A new polynomial-
201–240. time algorithm for linear
tively by humans to be solved. Even still, the reader may 7. Borel, E., Ville, J. Applications de la programming. In Proceedings of the
ask what is the ultimate significance of solving poker? The théorie des probabilités aux jeux de Sixteenth Annual ACM Symposium
hasard. Gauthier-Villars, 1938. on Theory of Computing (1984),
breakthroughs behind this result are general algorithmic 8. Bowling, M., Burch, N., Johanson, M., ACM, New York, NY, 302–311.
advances that make game-theoretic reasoning in large-scale Tammelin, O. The cepheus website, 26. Koller, D., Megiddo, N. The complexity
2015. http://poker.srv.ualberta.ca. of two-person zero-sum games in
models of any sort more tractable. And, while seemingly 9. Bowling, M., Burch, N., Johanson, M., extensive form. Games Econ. Behav 4,
playful, game theory has always been envisioned to have Tammelin, O. Heads-up limit hold’em 4 (1992), 528–552.
poker is solved. Science 347, 6218 27. Koller, D., Megiddo, N., von Stengel, B.
serious implications, for example, its early impact on cold (Jan. 2015), 145–149. Efficient computation of equilibria for
war politics.31 More recently, there has been a surge in game- 10. Bowling, M., Burch, N., Johanson, M., extensive two-person games. Games
Tammelin, O. Heads-up limit hold’em Econ. Behav 14, 2 (1996).
theoretic applications involving security, including systems poker is solved: Supplementary online 28. Koller, D., Pfeffer, A. Representations
being deployed for airport checkpoints, air marshall sched- material, January 2015. and solutions for game-theoretic
11. Bowling, M., Johanson, M., Burch, N., problems. Artificial Intelligence 94,
uling, and coast guard patrolling.43 CFR algorithms, based Szafron, D. Strategy evaluation in (1997), 167–215.
on those described in this paper, have been used for robust extensive games with importance 29. Kuhn, H. Simplified two-person
sampling. ICML, (2008), 72–79. poker. In Contributions to the Theory
decision-making in settings where there is no apparent 12. Bronowski, J. Ascent of man. of Games, volume 1 of Annals of
Documentary, 1973. Episode 13. mathematics studies. H. Kuhn and A.
adversary, with potential application to medical decision 13. Buro, M. Solving the oshi-zumo game. Tucker, eds. Princeton University Press,
support.15 With real life decision-making settings almost Adv. in Comp. Games 135, (2004) Princeton, New Jersey, 1950, 97–103.
361–366. 30. Mirowski, P. What were von
always involving uncertainty and missing information, algo- 14. Campbell, M., Hoane, A.J. Jr., Hsu, F. neumann and morgenstern trying
rithmic advances, such as those needed to solve poker, are Deep blue. Artificial Intelligence 134, to accomplish? In Toward a
(Jan. 2002), 57–83. History of Game Theory. Weintraub,
needed to drive future applications. However, we also echo 15. Chen, k., Bowling, M. Tractable ed. Duke University Press, 1992,
a response attributed to Alan Turing in defense of his own objectives for robust policy 113–147. Mirowski cites Turing as
optimization. Adv. Neural Inf. Process. author of the paragraph containing
work in games, “It would be disingenuous of us to disguise Syst. (NIPS) 25, (2012), 2078–2086. this remark. The paragraph
the fact that the principal motive which prompted the work 16. Craig, M. The Professor, the Banker, appeared in [46], in a chapter
and the Suicide King: Inside the with Turing listed as one of three
was the sheer fun of the thing.”30 Richest Poker Game of All Time. contributors. Which parts of the
Grand Central Publishing, New York, chapter are the work of which
NY, 2006. contributor, particularly the
Acknowledgments 17. Ferrucci, D. Introduction to “this is introductory material containing
The author order is alphabetical reflecting equal contribu- watson.” IBM J. Res. Dev 56, 3.4 (May this quote, is not made explicit.
2012) 1:1–1:15. 31. Morgenstern, O. The cold war is cold
tion by the authors. The idea of CFR+ and compressing the 18. Gilpin, A., Hoda, S., Peña, J., Sandholm, T. poker. N. Y. Times Mag. (Feb. 5 1961)
regrets and strategy originated with Oskari Tammelin.44 Gradient-based algorithms for finding pages 21–22.
nash equilibria in extensive form 32. Nash, J.F., Shapley, L.S. A simple
This research was supported by Natural Sciences and games. WINE, (2007), 57–69. 3-person poker game. In Contributions
19. Gilpin, A., Sandholm, T. Lossless to the Theory of Games I. Princeton
Engineering Research Council (NSERC), Alberta Innovates abstraction of imperfect information University Press, Princeton, New
Technology Futures (AITF) through the Alberta Innovates games. J. ACM 54, 5 (2007). Jersey, 1950, 105–116.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 87
research highlights
33. Nesterov, Y. Excessive gap technique Comp. Games, (2000), 333–345. on Computer Poker and Imperfect Congress Mathematics. Cambridge
in nonsmooth convex minimization. 42. Southey, F., Bowling, M., Larson, B., Information, 2015. University Press, Cambridge,
SIAM Journal on Optimization 16, 1 Piccione, C., Burch, N., Billings, D., 50. Waugh, K., Bard, N., Bowling, M. 1913, 501–504.
(2005), 233–249. Rayner, D.C. Bayes’ bluff: Opponent Strategy grafting in extensive games. 52. Zinkevich, M., Johanson, M., Bowling, M.,
34. Rehmeyer, J., Fox, N., Rico, R. Ante modelling in poker. UAI, (2005) In Advances in Neural Information Piccione, C. Regret minimization in
up, human: The adventures of polaris 550–558. Processing Systems 22 (NIPS-09), games with incomplete information.
the poker-playing robot. Wired 16, 12 43. Tambe, M. Security and Game Theory: 2009. http://webdocs.cs.ualberta. NIPS (2008), 905–912.
(Dec. 2008), 186–191. Algorithms, Deployed Systems, ca/~games/poker/publications/ 3. Zinkevich, M., Littman, M. The AAAI
5
35. Romanovskii, I.V. Reduction of a game Lessons Learned. Cambridge University NIPS09-graft.pdf. computer poker competition. J. Inter.
with complete memory to a matrix Press, Cambridge, England, 2011. 51. Zermelo, E. Über eine Anwendung Comp. Games Association 29, (2006),
game. Soviet Mathematics 3, (1962), 44. Tammelin, O. Cfr+. CoRR, der Mengenlehre auf die Theorie News item.
678–681. abs/1407.5042, 2014. des Schachspiels. In Proceedings
36. Rubin, J., Watson, I. Computer 45. Tammelin, O., Burch, N., Johanson, M., of the Fifth International
poker: a review. Artificial Intelligence Bowling, M. Solving heads-up limit
175,(2011), 958–987. texas hold’em. In Proceedings of the
37. Sandholm, T. The state of solving 24th International Joint Conference
large incomplete-information games, on Artificial Intelligence, 2015,
and application to poker. AI Mag. 31, 645–652.
4 (2010), 13–32. 46. Turing, A. Digital computers applied Michael Bowling (bowling@cs.ualberta.ca), Oskari Tammelin ({ot@iki.fi} {http://
38. Schaeffer, J., Lake, R., Lu, P., Bryant, M. to games. In Faster Than Thought. Department of Computing, Science, jeskola.net}).
Chinook the world man-machine B.V. Bowden, ed. Chapter 25. Pitman, University of Alberta, Edmonton, Alberta,
checkers champion. AI Mag. 17, 1 1976. Canada.
(1996), 21–29. 47. von Neumann, J. Zur theorie der
39. Schaeffer, J., Neil Burch, Y.B., gesellschaftsspiele. Mathematische
Neil Burch and Michael Johanson
Kishimoto, A., Müller, M., Lake, R., Annalen 100, 1 (1928), 295–320.
({nburch, johanson}@ualberta.ca),
Lu, P. Sutphen, S. Checkers is solved. 48. von Neumann, J., Morgenstern, O.
Department of Computing, Science,
Science 317, 5844 (2007), 1518–1522. Theory of Games and Economic
University of Alberta, Edmonton, Alberta,
40. Shannon, C.E. Programming Behavior. Princeton University
Canada.
a computer for playing chess. Press, Princeton, Second Edition,
Philosophical Magazine, Series 7, 41, 1947.
314 (Mar. 1950), 256–275. 49. Waugh, K., Bagnell, J.A. A unified view
41. Shi, J., Littman, M.L. Abstraction of large-scale zero-sum equilibrium
methods for game theoretic poker. In computation. In AAAI Workshop © 2017 ACM 0001-0782/17/11 $15.00
Foolproof, and
Other Mathematical
Meditations
Brian Hayes
A non-mathematician explores
mathematical terrain, reporting
accessibly and engagingly on
topics from Sudoku to probability.
Robot Sex
Social and Ethical Implications
edited by John Danaher
and Neil McArthur
Perspectives from philosophy,
psychology, religious studies,
economics, and law on the
possible future of robot-human
sexual relationships.
mitpress.mit.edu/acm
Technical Perspective
To view the accompanying paper,
visit doi.acm.org/10.1145/3131280 rh
Exploring a Kingdom
by Geodesic Measures
By Marc Alexa
ON C E U P O N A time, there was a particu- of finding a path, traveling only along fewer stones will result in the desired
larly generous king. He decided to give the edges of the triangles will not geodesic path. Or, in more recent lan-
all of his people a share of his land. yield the shortest possible path. A bet- guage, the gradient of the probability
Any family owning a house would have ter option is tracking how a wavefront density function of a random walk is
to mark the center of their land with a emanates from a source vertex, the parallel to geodesics.
stone. Then the ruling said that every so-called fast marching method. Now, why is this observation useful
point they could reach within 1,000 Unfortunately, this method may fail for computation? The density of ran-
steps from the mark stone would be- to provide shortest paths for certain dom walks is related to heat diffusion,
long to them. surfaces and shapes of triangles. It and heat diffusion is governed by a
Initially, the king was praised for turns out the problem of shortest paths first-order partial differential equa-
the simplicity and clarity of his rul- along a piecewise linear surface has a tion, which can be well approximated
ing. Yet, as most new landowners de- superquadratic worst-case complex- by solving a sparse linear system. The
cided to build a fence around their ity, and algorithms establishing this important insight from the authors
property they soon realized that deter- complexity are surprisingly compli- is that a wide range of linear opera-
mining the location of the fence was cated. The most recent algorithms of tors can be used to compute functions
frustratingly difficult. Any point that this kind have much better asymptotic with the desired gradient directions
was reached after walking 1,000 steps complexity in common practical cas- (yet different gradient lengths)
was part of the property, sure; but es, yet they are still significantly more Given any such function, distances
how would one have to walk to reach complex than a simple graph traversal can be computed by simply normaliz-
a point that was as far away from the such as Dijkstra’s. ing the gradients and then integrat-
stone as possible? The approach by Crane, Weisch- ing them. Integration amounts to
Luckier landowners lived in flat re- edel, and Wardetzky in the follow- solving another sparse linear system.
gions, where walking along a straight ing paper may be related to what the Together this means geodesic dis-
line (for example, walking toward any landowners could have observed and tances can be computed by solving
landmark further away than 1,000 exploited: assume one would start two (related) sparse linear systems,
steps) would always reach a point from the mark stone, walk 1,000 ran- plus computing the gradients of the
on the boundary of the land. Land- dom steps, and mark the endpoint of intermediate function and normaliz-
owners in hilly regions had a prob- this walk with a pebble. Over many ing them. Note how the non-linearity
lem. They needed to find a path that repetitions of this exercise a distribu- of the problem is pushed into the
was the equivalent of a straight line. tion of pebbles on the land emerges: trivial step of normalizing a set of vec-
Such paths are now known as geode- closer to the mark stone the pat- tors, while all global computations
sics—the name indeed relating to the tern is denser, and fewer and fewer are linear.
problem of measuring the earth. In pebbles are found further away. As it And lastly, turning the problem of
today’s language, the land assigned turns out, starting at the mark stone computing geodesic paths to the solu-
to each family is a geodesic disk. And and always walking in the direction of tion of a sparse linear system has an-
it should come as no surprise that other very desirable feature: the most
the distance between two points in time-consuming part lies in the step
curved domains is a fundamental How would we of factorizing the system matrix. This
problem with numerous applications factorization can be reused for arbi-
in science and engineering. solve the problem trary distance computations on the
So, how would we solve the prob- of computing domain. So all the king would have
lem of computing geodesic paths, needed were the triangular factors of
distances, and circles on a digital geodesic paths, a linear system, and then each geode-
computer? Let’s assume the smooth distances, and sic circle could have been computed
terrain is approximated as a triangu- almost instantaneously.
lation. The shortest path from a ver- circles on a
tex of this triangulation to all other digital computer? Marc Alexa is a professor in the Faculty of
Electrical Engineering and Computer Science at
vertices along the edges of the triangu- the Technical University of Berlin, and heads
lation can be computed using Dijks- the Computer Graphics group.
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 89
research highlights
DOI:10.1145/ 31 3 1 2 8 0
2. RELATED WORK
The prevailing approach to distance computation is to solve
the eikonal equation
(2)
which says that the distance φ between any pair of points x, y subject to boundary conditions φ|γ = 0 over some subset γ
on a curved domain can be recovered via a simple pointwise of the domain (like a point or a curve). Intuitively, this equa-
transformation of the heat kernel: tion says something very simple: as we move away from the
source, the distance function φ must change at a rate of “one
(1) meter per meter.” Computationally, however, this formula-
tion is nonlinear and hyperbolic, making it difficult to solve
The intuition behind this behavior stems from the fact that directly. Typically one applies an iterative relaxation scheme
heat diffusion can be modeled as a large collection of hot such as Gauss-Seidel—special update orders are known as
particles taking random walks starting at x: any particle that fast marching and fast sweeping, which are some of the most
reaches a distant point y after a small time t has had little popular algorithms for distance computation on regular
time to deviate from the shortest possible path. Previously, grids37 and triangulated surfaces.19 These algorithms can also
however, this relationship had not been exploited by numer- be used on implicit surfaces,25 point clouds,26 and polygon
ical algorithms that compute distance. soup,7 but only indirectly: distance is computed on a simplicial
Why had Varadhan’s formula been overlooked in this con- mesh or regular grid that approximates the original domain.
text? The main reason, perhaps, is that it requires a precise Implementation of fast marching on simplicial grids is chal-
numerical reconstruction of the heat kernel, which is diffi- lenging due to the need for nonobtuse triangulations (which
cult to obtain—applying the formula to a mere approxima- are notoriously difficult to obtain) or else an iterative unfold-
tion of kt,x does not yield the correct result, as illustrated in ing procedure that preserves monotonicity of the solution;
Figures 2 and 8. The heat method circumvents this issue by moreover these issues are not well-studied in dimensions
working with a broader class of inputs, namely any function greater than two. Fast marching and fast sweeping have
whose gradient is parallel to the gradient of the true distance asymptotic complexity of O(n log n) and O(n), respectively,
function. We can then separate computation into two stages:
first find the gradient, then recover the distance itself.
Relative to existing algorithms, the heat method offers
two major advantages. First, it can be applied to virtually any Figure 4. Convergence of distance approximations on the unit sphere
with respect to mean edge length; as a baseline for comparison,
we use the analytical solution φ (x, y) = cos−1(x • y). Notice that even
with a nice tessellation, the exact distance along the polyhedron
Figure 3. The heat method computes the shortest distance to a converges only quadratically to the true distance along the sphere
subset γ of a given domain. Gray curves indicate isolines of the it approximates. (Linear and quadratic convergence are plotted as
distance function. dashed lines for reference.)
Fast marching
0.010
Exact polyhedral
0.005
γ
0.001
–4
5x10
–4
1x10
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 91
research highlights
but sweeping is often slower due to the large number of Figure 5. The heat method has been applied to a diverse range of tasks
sweeps required to obtain accurate results.16 that demand repeated geodesic distance queries. Here, geodesic
One drawback of these methods is that they do not reuse distance drives a differential growth model (left) that is used for
information: the distance to different source sets γ must be computational design (right). Images courtesy Nervous System/Jesse
computed entirely from scratch each time. Also note that Louis-Rosenberg.
I u u II X III φ
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 93
research highlights
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 95
research highlights
Figure 15. Meshes used in Table 1. Left to right: Bunny, Isis, Horse, Bimba, Aphrodite, Lion, Ramses.
implementation; Potential is the time taken to compute the Figure 16. Visual comparison of accuracy. Left: exact polyhedral
right hand side in step III. distance. Using default parameters, the heat method (middle) and
In practice, a number of factors affect the run time of fast marching (right) both produce results of comparable accuracy,
the heat method including the choice of spatial discreti- here within less than 1% of the polyhedral distance—see Table 1 for a
zation, discrete Laplacian, and geometric data structures. more detailed comparison.
4.2. Accuracy
We examined errors in the heat method, fast marching,19
and the polyhedral distance,27 relative to mean edge length
h on triangulated surfaces. Both fast marching and the
heat method appear to exhibit linear convergence; it is
interesting to note that even the exact polyhedral distance Figure 17. Medial axis of the hiragana letter “a” extracted by
thresholding second derivatives of the distance to the boundary. Left:
provides only quadratic convergence. Keeping this fact in
fast marching. Right: heat method.
mind, Table 1 uses the polyhedral distance as a baseline
for comparison on more complicated geometries—Max is
the maximum error as a percentage of mesh diameter and
Mean is the mean relative error at each vertex. Note that
fast marching tends to achieve a smaller maximum error,
whereas the heat method does better on average. Figure 16
gives a visual comparison of accuracy; the only notable dis-
crepancy is a slight smoothing at sharp cusps, which may
explain the larger maximum error. Figure 17 indicates that
smoothing does not interfere with the extraction of the
cut locus—here we visualize values of |∆φ| above a fixed
threshold. Overall, the heat method exhibits errors of the
same order and magnitude as fast marching (at lower com- More recent implementations of the heat method improve
putational cost) and is therefore suitable in applications accuracy by using a different spatial discretization,29 or
where fast marching is presently used; see Crane et al.11 for by iteratively updating the solution.3 The accuracy of fast
more extensive comparisons. marching schemes is determined by the choice of update
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 97
research highlights
Figure 18. Smoothed geodesic distance on an extremely poor Figure 20. In any method based on a finite element approximation,
triangulation with significant noise—note that small holes are mesh quality will affect the quality of the solution. However, because
essentially ignored. Also note good approximation of distance even the heat method is based on solving low-order elliptic equations
along thin slivers in the nose. (rather than high-order or hyperbolic equations), it often produces
fewer numerical artifacts. Here, for instance, we highlight spurious
extrema in the distance function (i.e., local maxima and minima)
produced by the fast marching method (left), biharmonic distance
(middle), and the heat method (right) on an acute Delaunay mesh
(top) and a badly degenerate mesh (bottom). Inset figures show
closeup view of isolines for the bottom figure.
4.3. Robustness
Two factors contribute to the robustness of the heat method,
namely (1) the use of an unconditionally stable time discret-
ization and (2) an elliptic rather than hyperbolic formula-
tion (i.e., relatively stable local averaging vs. more sensitive
global wavefront propagation). Figure 19 verifies that the
heat method continues to work well even on meshes that
are poorly discretized or corrupted by a large amount of
noise (here modeled as uniform Gaussian noise applied
to the vertex coordinates). In this case we use a moderately
large value of t to investigate the behavior of our smoothed
distance; similar behavior is observed for small t values.
rule—a number of highly accurate rules have been devel- Figure 18 illustrates the robustness of the method on a sur-
oped for regular grids (e.g., HJ WENO18), but fewer options face with many small holes as well as long sliver triangles.
are available on irregular domains such as triangle meshes,
the predominant choice being the first-order update of 5. CONCLUSION
Kimmel and Sethian.19 Finally, the approximate algorithm The heat method is a simple, general method that can be eas-
of Surazhsky et al.40 provides an interesting comparison ily incorporated into a broad class of algorithms. However, a
N OV E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 1 | C OM M U N IC AT ION S OF T HE ACM 99
CAREERS
Auburn University Baylor University several years, and will seek to fill faculty positions
Department of Computer Science and Software Chairperson, Department of Computer Science at all levels. We invite applications for a full-time,
Engineering (CSSE) non-tenure-track faculty position, beginning in
Multiple Faculty Positions in Cybersecurity The School of Engineering and Computer Sci- the 2018-2019 academic year. Candidates should
ence invites nominations and applications for be committed to excellence in undergraduate
CSSE invites applications for multiple tenure-track the position of Chair of the Department of Com- education, and should be able to both teach a
faculty positions to begin in Fall 2018 or later. puter Science. The successful candidate must broad variety of undergraduate computer science
Candidates at the Assistant Professor level will be have an earned Ph.D. in Computer Science or a courses, and to participate in the development of
given preference, however outstanding candidates related field, leadership experience, a commit- new courses that reflect the evolving landscape of
at senior levels will also be considered. A Ph.D. de- ment to undergraduate and graduate education, the discipline.
gree in computer science, software engineering or a strong research record that includes significant Minimum requirements for the title of As-
a closely related field must be completed by the external funding, and effective communication sistant Professor of the Practice include a Ph.D.
start of appointment. Excellent communication and organization skills. in Computer Science or closely related disci-
skills are required. We are interested in candidates The Department: Computer Science is one of pline. Candidates who have only attained a
specializing in all areas related to security, such as three departments in the School of Engineering Master’s degree would be eligible for the title
AI/machine learning applications to security, block- and Computer Science. It offers an ABET- of Lecturer.
chain, cryptocurrency, cyberidentity, cyberinfrastruc- accredited B.S. in Computer Science degree, a B.A. Application review beings October 1, 2017.
ture and critical infrastructure protection, digital degree with a major in Computer Science, a B.S. See www.cs.bc.edu for more information.
forensics, reverse engineering, secure cloud, mobile in Informatics with a major in Bioinformatics, To apply go to http://apply.interfolio.com/44984.
systems, networks and operating systems, secure soft- B.S. in Computing with a major in Computer
ware engineering, and securing the Internet of Things. Science Fellows, and M.S. and Ph.D. degrees in
CSSE is home to the Auburn Cyber Research Computer Science. The Department has 15 full- Boston College
Center (http://cyber.auburn.edu), and is affiliated time faculty, over 370 undergraduate majors and Associate or Full Professor of Computer
with the McCrary Institute for Critical Infrastructure 20 graduate students. The Department’s greatest Science
Protection and Cyber Systems (http://mccrary.au- strength is its dedication to the success of the
burn.edu). The department has 21 full-time tenure- students and each other. Interested candidates The Computer Science Department of Boston
track faculty members and supports strong M.S. and may contact any faculty member to ask questions College aims to grow substantially over the next
Ph.D. programs (with a new M.S. in Cybersecurity and/or visit the departmental web site at http:// several years, and will seek to fill faculty posi-
Engineering projected to start in Fall 2018). Faculty www.ecs.baylor.edu/computerscience. tions at all levels. We invite applications for a
research areas include artificial intelligence, archi- The University: Baylor University is a private senior-level (Associate or Full Professor) position,
tecture, computational biology, computer science Christian university and a nationally-ranked re- starting in the 2018-2019 academic year. The suc-
education, data science, energy-efficient systems, search institution, consistently listed with highest cessful candidate is expected to play a leadership
human-computer interaction, Internet of Things, honors among The Chronicle of Higher Educa- role in the creation of a Data Science program in
learning science, machine learning, modeling and tion’s “Great Colleges to Work For.” The university conjunction with the new interdisciplinary Insti-
simulation, multi-agent systems, networks, security, is recruiting new faculty with a deep commitment tute for Integrated Science and Society, recently
software engineering and wireless engineering. to excellence in teaching, research and scholar- announced at Boston College, and will also par-
Auburn University is one of the nation’s pre- ship. Baylor seeks faculty who share in our aspira- ticipate in shaping the future of our growing de-
mier public land-grant institutions. It is ranked tion to become a tier-one research institution while partment.
46th among public universities in the U.S. News and strengthening our distinctive Christian mission Applicants must have a Ph.D. in Computer
World Report 2018 Rankings. It is nationally recog- as described in our strategic vision, Pro Futuris Science or closely related discipline, a record of
nized for its commitment to academic excellence, (https://www.baylor.edu/profuturis). As the world’s strong research accomplishment and external
a positive work environment, student engagement, largest Baptist University, Baylor offers over 40 doc- funding, and a commitment to quality in under-
and its beautiful campus. Auburn residents enjoy a toral programs and has over 17,000 students from graduate and graduate education. Preference will
thriving community, recognized as one of the “best all 50 states and more than 80 countries. be given to candidates whose research is in the ar-
small towns in America.” The city is located on the Appointment Date: Fall 2018. eas of high-performance data mining / machine
rapidly developing I-85 corridor between Atlanta, Application Procedure: Applications, includ- learning or data visualization, particularly those
GA, and Montgomery, AL. The Auburn City school ing detailed curriculum vitae, a statement dem- with a history of interdisciplinary collaboration,
system is ranked as one of the top school systems onstrating an active Christian faith, and contact but outstanding candidates in all research areas
in the nation and the state. A nationally recognized information for three references should be either will be considered.
hospital, East Alabama Medical Center, is located emailed to CSSearch@Baylor.edu or mailed to Application review begins October 1, 2017.
close by in Opelika. The Auburn-Opelika metropol- Chair Search Committee, Department of Com- See www.cs.bc.edu for more information.
itan area has a population of over 150,000. puter Science, Baylor University, One Bear Place To apply go to http://apply.interfolio.com/44982.
Applicants should submit a cover letter, cur- #97141, Waco, TX 76798-7141.
riculum vita, research vision, teaching philoso- For full consideration, applications should
phy, and the names of references through the be received by January 1, 2018. However, applica- Boston College
faculty hiring link on the department home page tions will be accepted until the position is filled. Tenure Track Assistant Professor in Computer
http://www.eng.auburn.edu/csse. There is no ap- Science
plication deadline. Application review will begin
in November. Selected candidates must be able Boston College The Computer Science Department of Boston
to meet eligibility requirements to work legally in Assistant Professor of the Practice or Lecturer College aims to grow substantially over the next
the United States at the time of appointment for several years and will seek to fill faculty positions
the proposed term of employment. Auburn Uni- The Computer Science Department of Boston at all levels. We invite applications for one or
versity is an EEO/Vet/Disability Employer. College aims to grow substantially over the next more tenure-track faculty positions at the rank of
demic credentials. Candidates for tenure track Human-Computer Interaction Institute: electrical and computer engineering, as well
appointments should also have a strong interest https://hcii.cmu.edu/careers/list as interdisciplinary areas such as robotics and
in graduate and undergraduate education. Institute for Software Research: http://www. cyber-physical systems, bio-ECE, microsystems,
We are also seeking teaching track faculty isri.cmu.edu/jobs/index.html machine learning, applied mathematics, and
candidates. You should have a Ph.D. in Computer Language Technologies Institute: http://lti. energy. See our website, https://www.ece.cornell.
Science or a related computing discipline, a back- cs.cmu.edu/news/lti-hiring edu/academics, for additional information on
ground of demonstrated excellence and dedica- Machine Learning Department: http://www. our programs.
tion to teaching, the ability to collaborate with oth- ml.cmu.edu/Faculty_Hiring.html Applicants must hold a doctorate in an
er faculty in a fast-paced environment, and must Robotics Institute: http://ri.cmu.edu/about/ appropriate field by the time their Faculty
be prepared to teach in a wide variety of settings, hiring-faculty-positions/ appointment would begin, must have
including large undergraduate lecture courses and demonstrated an ability to conduct outstanding
classes delivered in non-traditional formats. Please send email to faculty-search@cs.cmu. research, and must show promise for excellence in
Candidates with a commitment toward build- edu with any questions. teaching. Although we anticipate filling positions
ing an equitable and diverse scholarly commu- Carnegie Mellon University shall abide by the at the assistant professor level, applications
nity are particularly encouraged to apply. We are requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) at all levels will be considered; salary and rank
very interested in applications from candidates and 60-741.5(a). These regulations prohibit dis- will be commensurate with qualifications and
who have a demonstrated track record in men- crimination against qualified individuals based experience.
toring and nurturing women and students from on their status as protected veterans or individu- Applicants should submit a curriculum vita,
groups traditionally underrepresented in com- als with disabilities, and prohibit discrimination a research statement, a teaching statement,
puter science. against all individuals based on their race, color, three recent publications, and complete con-
To ensure full consideration of your applica- religion, sex, or national origin. Moreover, these tact information for at least three references.
tion, please submit all materials no later than regulations require that covered prime contrac- Applications must be submitted on-line at https://
December 15, 2017. In your cover letter, please in- tors and subcontractors take affirmative action to academicjobsonline.org/ajo/jobs/9871. Review of
dicate clearly the department(s) you are applying employ and advance in employment individuals applications will begin immediately. Applica-
to. You can learn more about our hiring plans and without regard to race, color, religion, sex, nation- tions received by December 4, 2017, will receive
application instructions by visiting http://www. al origin, protected veteran status or disability. full consideration.
cs.cmu.edu/employment-scs. The School of Electrical and Computer
For more information about the hiring priori- Engineering is especially interested in qualified
ties in a particular department, please visit a de- Cornell University candidates who can contribute, through their
partment site below:
Multiple Tenure-Track Faculty Positions research, teaching, and/or service, to the diversity
Computational Biology Department: http:// of the academic community and to creating
www.cbd.cmu.edu/tenure-track-faculty- The SCHOOL OF ELECTRICAL AND COMPUTER a climate that attracts students of all races,
positions/ ENGINEERING at CORNELL UNIVERSITY, genders and nationalities. We strongly encourage
Computer Science Department: https://www. Ithaca, New York, invites applications for multiple underrepresented minority and women
csd.cs.cmu.edu/careers/faculty-hiring tenure-track Faculty positions in all areas of candidates to apply. Cornell University actively
→ The successful candidate is expected to develop a strong and visible research program in the area of embedded information
systems. He or she has a strong background in areas such as embedded software, edge computing, embedded operating systems,
real-time systems, biomedical embedded systems, security of embedded systems, as well as corresponding theoretical concepts.
Candidates should hold a PhD and have an excellent record of accomplishments. In addition, commitment to teaching and the ability
to lead a research group are expected. Generally, at ETH Zurich undergraduate level courses are taught in German or English and
graduate level courses are taught in English.
→ Assistant professorships have been established to promote the careers of younger scientists. ETH Zurich implements a tenure
track system equivalent to other top international universities. The level of the appointment will depend on the successful candidate’s
qualifications.
→ Applications should include a curriculum vitae, a list of publications, a statement of future research and teaching interests, and a
description of the three most important achievements. The letter of application should be addressed to the President of ETH Zurich,
Prof. Dr. Lino Guzzella. The closing date for applications is 15 December 2017. ETH Zurich is an equal opportunity and family
friendly employer and is responsive to the needs of dual career couples. We specifically encourage women to apply.
and Engineering of the College of Computing at en and under-represented minorities are strongly cessful candidate will be to develop and teach
the Georgia Institute of Technology seeks tenure- encouraged. courses that support the Information & System
track faculty at all levels. Our school seeks candi- For more information about Georgia Tech’s Security concentration, as well as collaborating
dates who may specialize in a broad range of ap- School of Computational Science and Engineer- with faculty in computer science, political sci-
plication areas including biomedical and health; ing please visit: http://www.cse.gatech.edu/. ence, criminology, and sociology on introductory
urban systems and smart cities; social good and courses that explain the connections between
sustainable development; materials and manu- these disciplines.
facturing; and national security. Applicants must Le Moyne College Le Moyne College strives for academic
have an outstanding record of research, a sincere Assistant Professor / Professor of Practice – excellence through its comprehensive programs
commitment to teaching, and interest in engag- Cybersecurity rooted in the liberal arts and sciences. The
ing in substantive interdisciplinary research with College supports a quality undergraduate learning
collaborators in other disciplines. The College of Arts and Sciences at Le Moyne Col- experience with small class sizes, and faculty that
Georgia Tech is located in the heart of metro lege invites applications for a full-time faculty are approachable and attentive to student advising.
Atlanta, a home to more than 5.5 million people position in its new interdisciplinary cybersecurity For more information and how to apply visit
and nearly 150,000 businesses, a world-class program to begin in August, 2018. The College is our website at www.lemoyne.edu/employment.
airport, lush parks and green spaces, competi- seeking a candidate with a Ph.D. in cybersecurity Preference given to applications received by
tive schools and numerous amenities for enter- or cognate field, to fill a tenure-track Assistant December 8, 2017. Review will continue until
tainment, sports and restaurants that all offer a Professor position (other ranks will be consid- position is filled. Le Moyne College is an equal
top-tier quality of life. From its diverse economy, ered). Candidates with significant industry ex- opportunity employer and encourages women,
global access, abundant talent and low costs of perience in cybersecurity are also encouraged to persons of color, and Jesuits to apply for
business and lifestyle, metro Atlanta is a great apply as a Professor of Practice. employment.
place to call “home.” Residents have easy access The College’s new cybersecurity program
to arts, culture, sports and nightlife, and can ex- presents a holistic approach to thinking about cy-
perience all four seasons, with mild winters that bersecurity issues. It is designed to give students Marist College
rarely require a snow shovel. foundational knowledge regarding the varied Assistant/Associate Professor, Computing
Applications should be submitted online cybersecurity challenges that individuals and or- Technology
through https://academicjobsonline.org/ajo/ ganizations face on a daily basis. It will prepare
jobs/9687. For best consideration, applications students for graduate programs and careers that The Marist College Department of Computing
are due by December 15, 2017. The application include international relations, legal studies, Technology currently seeks applications for ten-
material should include a full academic CV, a per- government (federal, state and local), criminol- ure-track positions in Computer Science and In-
sonal narrative on teaching and research, a list of ogy, military, security compliance, and cybersecu- formation Technology & Systems.
at least three references and up to three sample rity technology specialist. This new cybersecurity We welcome candidates who have the follow-
publications. program includes three concentrations: Crime, ing teaching and research interests: software de-
Georgia Tech is an Affirmative Action/Equal Society & Culture; Information & System Security; velopment and systems analysis/design, data and
Opportunity Employer. Applications from wom- and, Policy & Law. The responsibilities of the suc- information security, cloud computing and net-
works, or data science and analytics. Applicants
with the ability to teach in multiple areas across
several disciplines will receive preference. Appli-
cants must be willing to teach undergraduate and
graduate courses in both traditional on-ground
and on-line environments. Required duties out-
side the classroom include scholarly activities
that result in peer-reviewed publications as well
as engagement in college and professional servic-
es such as advising/mentoring students, serving
on department, school, or college committees.
Candidates must have a doctoral degree in
ADVERTISING IN CAREER OPPORTUNITIES Computer Science, Information Systems, or a
closely related field. We will consider ABDs in an
How to Submit a Classified Line Ad: Send an e-mail to appropriate field who will complete their disser-
tation within one year of hire. Evidence of excel-
acmmediasales@acm.org. Please include text, and indicate the issue/or
lence in teaching and scholarly work is required.
issues where the ad will appear, and a contact name and number. Excellent written and oral communication skills
Estimates: An insertion order will then be e-mailed back to you. The ad are required. Industry and/or consulting experi-
ence is highly desirable. As our programs host a
will by typeset according to CACM guidelines. NO PROOFS can be sent.
diverse population, the proven ability to work ef-
Classified line ads are NOT commissionable.
fectively in a multicultural environment is highly
Deadlines: 20th of the month/2 months prior to issue date. For latest regarded.
deadline info, please contact: Marist College is an independent and com-
prehensive liberal arts institution located in New
acmmediasales@acm.org
York’s historic Hudson River Valley. Situated on
Career Opportunities Online: Classified and recruitment display ads 210 acres overlooking the Hudson River, it en-
receive a free duplicate listing on our website at: rolls 4,962 traditional undergraduate, 953 full
and part-time graduate and 412 continuing edu-
http://jobs.acm.org
cation students. Marist has a branch campus in
Florence, Italy, and extension sites throughout
Ads are listed for a period of 30 days.
New York. Marist is recognized for excellence by
For More Information Contact: U.S. News & World Report, TIME Magazine, The
ACM Media Sales Princeton Review’s The Best 376 Colleges, and
at 212-626-0686 or Barron’s Best Buys in College Education and is
noted for being a pioneer in the area of on-line
acmmediasales@acm.org
degree programs.
To learn more or to apply, please visit http://
Application Procedures: All materials are due be instrumental in the continuing development Applications for both positions will continue
by Friday, December 15, 2017. For full consider- of a world-renowned interdisciplinary research to be accepted after these dates until the posi-
ation upload a letter of application, curriculum program synergistic with the ongoing research tions are filled.
vitae, statement of teaching interests/philosophy, in the Department and the Lyle School of Engi- The Computer Science Department currently
description of research plans, and at least three neering. He/she will possess strong administra- has eight tenure-track faculty and four visiting
letters of reference with contact information at tive skills and will be an outstanding communi- faculty. Faculty teach introductory courses as well
apply.interfolio.com/44419. cator representing the Computer Science and as advanced courses in their research areas. We
Please include Job Opening ID (JOID) on all Engineering Department and the Lyle School have grown significantly in both faculty and stu-
communications. on- and off-campus. The anticipated starting dents in the last five years. Presently, we are one
Search Committee Chair, date is on or before August 1, 2018. Candidates of the most popular majors at the College and
Department of Computer Science must have a Ph.D. degree in Computer Science expect to have over 70 Computer Science majors
San José State University or a closely related field and must be qualified graduating this year.
One Washington Square for a tenured appointment at the full Professor
San José, CA 95192-0249 level. Candidates may apply for both positions.
The Computer Science and Engineering QUALIFICATIONS: Applicants must have teach-
San José State University is California’s oldest (CSE) department resides within the Lyle School ing experience and should be comfortable teach-
institution of public higher learning. The campus of Engineering and is located in the Caruth Hall ing a wide range of courses at the introductory
is located on the southern end of San Francisco Engineering Building, a LEED Gold designed and intermediate level. Candidates should ad-
Bay in downtown San José (Pop. 967,000), hub of facility. The CSE department offers BS, MS, and ditionally have a strong commitment to involv-
the world famous Silicon Valley high-technology Ph.D. degrees in Computer Science and in Com- ing undergraduates in their research. A Ph.D. in
research and development center. SJSU is an puter Engineering, BA in Computer Science, MS Computer Science at or near the time of appoint-
Equal Opportunity/Affirmative Action Employer in Software Engineering, MS in Security Engi- ment is required. The strongest candidates will
committed to the core values of inclusion, civility, neering, and D.Eng in Software Engineering. To be expected to demonstrate a commitment to
and respect for each individual. learn more about the rich cultural environment creative teaching and an active research program
For further details, please visit www.cs.sjsu.edu. of SMU, please see: http://smu.edu. that speaks to and motivates undergraduates
While applications and nominations will from diverse backgrounds.
be accepted until a new Chair and Professor of APPLICATION INSTRUCTIONS: Applications
Santa Clara University Computer Science and Engineering is selected, should include a cover letter, vita, teaching state-
Two Tenure-Track Assistant Professors in interested parties are encouraged to submit ment, research statement, and three letters of
Computer Science their application by November 30, 2017 elec- reference, at least one (preferably two) of which
tronically to CSEChair@smu.edu. Applications should speak to the candidate’s teaching ability.
The Department of Mathematics and Computer should include a cover letter, curriculum vitae, In your cover letter, please briefly describe your
Science at Santa Clara University invites appli- list of five references and a statement of interest current research agenda; what would be attractive
cations for two tenure-track assistant professor and capabilities related to academic leadership, to you about teaching diverse students in a liberal
positions in computer science. Our highest pref- education and research. The anticipated start arts college environment; and what background,
erence is in candidates with research interests in date for this position is on or before August 1, experience, or interests are likely to make you a
an area related to cybersecurity for the first posi- 2018. Hiring is contingent upon the satisfactory strong teacher of Swarthmore College students.
tion and an area related to algorithms for the sec- completion of a background check. SMU will not This institution is using Interfolio’s Faculty
ond position. Strong candidates with research discriminate in any employment practice, educa- Search to conduct this search. Applicants to this
interests in artificial intelligence and software tion program, or educational activity on the basis position receive a free Dossier account and can
aspect of data science will be considered as well. of race, color, religion, national origin, sex, age, send all application materials, including confi-
The successful candidates will demonstrate not disability, genetic information, or veteran sta- dential letters of recommendation, free of charge.
only potential for excellent undergraduate teach- tus. SMU will not discriminate in any program To apply, visit https://apply.interfolio.com/45234
ing, but also promise in sustained research with or activity on the basis of race, color, religion, Swarthmore College actively seeks and wel-
opportunities to involve undergraduates, men- national origin, sex, age, disability, genetic in- comes applications from candidates with ex-
toring or recruiting underrepresented groups formation, veteran status, sexual orientation, or ceptional qualifications, particularly those with
in computer science, and service to the depart- gender identity and expression. The Executive demonstrable commitments to a more inclusive
ment, College or University. Positions available Director for Access and Equity/Title IX Coordina- society and world. Swarthmore College is an
starting in September 2018. Ph.D. or equivalent tor is designated to handle inquiries regarding Equal Opportunity Employer. Women and mi-
required by September 2018. nondiscrimination policies and may be reached norities are encouraged to apply.
The closing date for applications is Decem- at the Perkins Administration Building, Room
ber 1, 2017 at 3 pm Pacific time. Undergraduate 204, 6425 Boaz Lane, Dallas, TX 75205, 214-768-
teaching only. 3601, accessequity@smu.edu. University of Alabama
Santa Clara University, located in California’s Computer Science Faculty Position
Silicon Valley, is a comprehensive, Jesuit, Catho-
lic university, and an AA/EEO employer. Swarthmore College The Department of Computer Science at the
For more information or to apply, visit https:// Tenure-Track and Visiting Faculty Positions in University of Alabama invites applications for a
jobs.scu.edu/postings/6211. Computer Science tenure-track faculty position at the Assistant or
Associate level to begin either January or August
The Computer Science Department invites ap- 2018. Candidates will be expected to engage with
Southern Methodist University plications for one tenure-track position and mul- faculty and researchers in the Alabama Water
Chair and Professor, Computer Science and tiple visiting positions at the rank of Assistant Institute (http://awi.ua.edu/). Research areas of
Engineering Professor to begin Fall semester 2018. interest include, but are not limited to, manage-
For the tenure-track position, we are inter- ment and manipulation of large sensor data sets,
Southern Methodist University (SMU) invites ested in applicants whose areas fit broadly into real-time (and near real-time) data processing,
nominations and applications for the position systems (including but not limited to operating resource constrained data collection and analy-
of Chair and Professor, Computer Science and systems, security, or high-performance comput- sis, high performance computing, big data, and
Engineering (Position No: 5781). It is expected ing) or programming languages. Priority will be robotics command-and-control.
that the appointment will be at the tenured Full given to complete applications received by No- Located in Tuscaloosa, Alabama, the Univer-
Professor level. The Chair will be the intellectual vember 17, 2017. For the visiting position, strong sity of Alabama enrolls over 37,000 students and
leader of the Computer Science and Engineering applicants in any area will be considered. Priority is the capstone of higher education in the State.
Department with strong interest in educational will be given to complete applications received by Housed in the College of Engineering, the Com-
programs at the BS, MS, and PhD levels, and will February 2, 2018. puter Science Department has 24 faculty mem-
a cover letter, curriculum vitae, teaching state- will be requested for candidates invited for on- Applications received by December 15, 2017
ment, research statement, and contact informa- campus interview. For more information, contact: will be given priority consideration.
tion for three professional references. Dr. Songlin Tian, Search Committee Chair The University of Chicago has the highest
NOTE: Please have all documents ready when School of Computer Science and standards for scholarship and faculty quality, is
applying so they can be attached at that time. Mathematics dedicated to fundamental research, and encour-
Once the online submission process is finalized, University of Central Missouri ages collaboration across disciplines. We encour-
the system does not allow applicants to submit Warrensburg, MO 64093 age connections with researchers across campus
additional documents at a later date. (660) 543-4930 in such areas as bioinformatics, mathematics,
For questions regarding this opportunity, tian@ucmo.edu molecular engineering, natural language pro-
please contact the department via email at cs- cessing, statistics, public policy, and social sci-
search@cs.ucf.edu. Initial screening of applications begins No- ence to mention just a few.
Applicants must have a Ph.D. from an ac- vember 15, 2017, and continues until position is The Department of Computer Science (cs.
credited institution in an area appropriate to the filled. uchicago.edu) is the hub of a large, diverse com-
department, including Computer Science, Com- AA/EEO/ADA. Women and minorities are en- puting community of two hundred researchers
puter Engineering, or Mathematics by the time of couraged to apply. focused on advancing foundations of computing
the appointment. UCM is located in Warrensburg, MO, which is and driving its most advanced applications. The
In order to obtain tenure, the selected candi- 35 miles southeast of the Kansas City metropoli- larger computing and data science community
date must have a demonstrated record of teach- tan area. It is a public comprehensive university at the University of Chicago includes the Depart-
ing, research and service commensurate with with about 13,000 students. The School of Com- ment of Statistics, the Computation Institute, the
rank in the tenure department. puter Science and Mathematics offers undergrad- Toyota Technological Institute at Chicago (TTIC),
uate and graduate programs in both Computer the Polsky Center for Entrepreneurship and Inno-
Science and Cybersecurity. vation, the Mansueto Institute for Urban Innova-
University of Central Missouri tion and the Argonne National Laboratory.
Assistant Professor of Computer Science - The Chicago metropolitan area provides a di-
Tenure Track University of Chicago verse and exciting environment. The local econ-
Assistant Professor/Associate Professor/ omy is vigorous, with international stature in
The School of Computer Science and Mathemat- Professor, Computer Science banking, trade, commerce, manufacturing, and
ics at the University of Central Missouri is accept- transportation, while the cultural scene includes
ing applications for one tenure-track position in The Department of Computer Science at the diverse cultures, vibrant theater, world-renowned
Computer Science at the rank of Assistant Profes- University of Chicago invites applications from symphony, opera, jazz, and blues. The University
sor. The appointment will begin August 2018. We qualified candidates for faculty positions at the is located in Hyde Park, a Chicago neighborhood
are looking for faculty excited by the prospect of ranks of Assistant Professor, Associate Professor, on the Lake Michigan shore just a few minutes
shaping our school’s future and contributing to and Professor. The University of Chicago has em- from downtown.
its sustained excellence. barked on an ambitious, multi-year effort to sig- The University of Chicago is an Affirmative Ac-
The Position: Duties will include teaching un- nificantly expand its computing and data science tion/Equal Opportunity/Disabled/Veterans Em-
dergraduate and graduate courses in computer activities. Candidates with research interests in ployer and does not discriminate on the basis of
science and cybersecurity and developing new all areas of computer science will be considered. race, color, religion, sex, sexual orientation, gen-
courses depending upon the expertise of the ap- However, applications are especially encouraged der identity, national or ethnic origin, age, status
plicant and school needs, conducting research in the areas of AI and Machine Learning, Robot- as an individual with a disability, protected veter-
which leads toward peer-reviewed publications ics, Data Analytics, Human-Computer Interac- an status, genetic information, or other protected
and/or externally funded grants, and program ac- tion, and Visual Computing. classes under the law. For additional information
creditation/assessment. Faculty are expected to Candidates must have demonstrated excel- please see the University’s Notice of Nondiscrimi-
assist with school and university committee work lence in research and a strong commitment to nation at http://www.uchicago.edu/about/non_
and service activities, and advising majors. teaching. Completion of all requirements for a discrimination_statement/. Job seekers in need
Required Qualifications: Ph.D. in Computer Science or a related field is of a reasonable accommodation to complete the
˲˲ Ph.D. in Computer Science by August 2018 required at the time of appointment. Candidates application process should call 773-702-0287 or
˲˲ Research expertise and/or industrial experi- for Associate Professor and Professor positions email ACOppAdministrator@uchicago.edu with
ences in Cybersecurity must have demonstrated leadership in their field, their request.
˲˲ Demonstrated ability to teach existing courses have established an outstanding independent re-
at the undergraduate and graduate levels search program and have a record of excellence in
˲˲ Ability to develop a quality research program teaching and student mentorship. University of Illinois at Urbana-
and secure external funding Applications must be submitted through the Champaign
˲˲ Supporting the school’s plans to establish a University’s Academic Jobs website. Positions in Computing
National Security Agency designated Center for To apply for Assistant Professor, go to http://
Academic Excellence in Information Assurance/ tinyurl.com/ya46ybql The Department of Electrical and Computer En-
Cyber Defense To apply for Associate Professor, go to http:// gineering (ECE ILLINOIS) at the University of Il-
˲˲ Commitment to engage in curricular devel- tinyurl.com/ydgx33eu linois at Urbana-Champaign invites applications
opment/assessment at the undergraduate and To apply for Professor, go to http://tinyurl. for faculty positions at all areas and levels in com-
graduate levels com/yaqpar49 puting, broadly defined, with particular empha-
˲˲ A strong commitment to excellence in teach- sis on cybersecurity and reliability; embedded
ing, research, and continued professional growth To be considered as an applicant, the follow- systems, cyber-physical systems, and the internet
˲˲ Excellent verbal and written communication ing materials are required: of things; networked and distributed comput-
skills ˲˲ cover letter ing; data-centric computing systems and stor-
˲˲ curriculum vitae including a list of publications age; quantum computing; robotics and machine
The Application Process: To apply online, go ˲˲ statement describing past and current research vision; machine learning and AI; and bio com-
to https://jobs.ucmo.edu. Apply to position accomplishments and outlining future research putation, and health, among other areas. Appli-
#997374. The following items should be plans cations are encouraged from candidates whose
attached: a letter of interest, a curriculum vitae, ˲˲ description of teaching philosophy and experi- research programs specialize in core as well as
a teaching and research statement, copies of ence interdisciplinary areas of electrical and computer
transcripts, and a list of at least three professional ˲˲ the names of at least three references engineering. From the transistor and the first
references including their names, addresses, computer implementation based on von Neu-
telephone numbers and email addresses. Official Reference letter submission information will mann’s architecture to the Blue Waters petascale
transcripts and three letters of recommendation be provided during the application process. computer (the fastest computer on any university
Power Systems, with preference for a focus on versity of Toronto invites applications for up to committees or human resources staff. Results
power systems protection; 3. Systems Control, four tenure-stream faculty appointments at the will be aggregated for institutional planning pur-
with preference for a focus on robotics. rank of Associate Professor. The appointments poses. For more information, please see http://
Applicants are expected to have a Ph.D. in will commence on July 1, 2018. uoft.me/UP.
Electrical and Computer Engineering, or a relat- Within the general field of electrical and com- All qualified candidates are encouraged to
ed field, at the time of appointment or soon after. puter engineering, we seek applications from apply; however, Canadians and permanent resi-
Successful candidates will be expected to ini- candidates with expertise in one or more of the dents will be given priority.
tiate and lead an independent research program following strategic research areas: 1. Computer
of international calibre, and to teach at both the or Communications Engineering, with prefer-
undergraduate and graduate levels. Candidates ence for a focus on machine learning, computer US Air Force Academy
should have demonstrated excellence in research security and privacy, or data science; 2. Electrical Assistant Professor of Computer Science
and teaching. Excellence in research is evidenced Power Systems, with preference for a focus on
primarily by publications in leading journals or power systems protection; 3. Systems Control, The Department of Computer Science at the US
conferences in the field, presentations at signifi- with preference for a focus on robotics. Air Force Academy seeks to fill a full-time faculty
cant conferences and strong endorsements by Applicants are expected to have a Ph.D. in position at the Assistant Professor level. The de-
referees of high international standing. Evidence Electrical and Computer Engineering, or a relat- partment is particularly interested in candidates
of excellence in teaching will be demonstrated ed field, and have at least five years of academic or with backgrounds in artificial intelligence, com-
by strong communication skills, a compelling relevant industrial experience. puter and network security, operations research,
statement of teaching submitted as part of the Successful candidates will be expected to or unmanned aerial systems, but all candidates
application highlighting areas of interest and initiate and lead an independent, competi- with a passion for undergraduate computer sci-
accomplishments, as well as strong letters of rec- tive and innovative research program of inter- ence teaching are encouraged to apply.
ommendation. national calibre, and to teach at both the un- The Academy is a national service institu-
Eligibility and willingness to register as a Pro- dergraduate and graduate levels. Candidates tion, charged with producing lieutenants for
fessional Engineer in Ontario is highly desirable. should have demonstrated excellence in re- the US Air Force. Faculty members are expected
The Edward S. Rogers Sr. Department of Elec- search and teaching. Excellence in research is to exemplify the highest ideals of professional-
trical and Computer Engineering at the Univer- evidenced primarily by publications in leading ism and character. USAFA is located in Colo-
sity of Toronto ranks among the best in North journals or conferences in the field, presenta- rado Springs, an area known for its exceptional
America. It attracts outstanding students, has ex- tions at significant conferences and a high pro- natural beauty and quality of life. The United
cellent facilities, and is ideally located in the mid- file in the field with strong endorsements by ref- States Air Force Academy values the benefits of
dle of a vibrant, artistic, diverse and cosmopoli- erees of high international standing. Evidence diversity among the faculty to include a variety
tan city. Additional information may be found at of excellence in teaching will be demonstrated of educational backgrounds, professional and
http://www.ece.utoronto.ca. by strong communication skills, a compelling life experiences.
Review of applications will begin after Oc- statement of teaching submitted as part of the For information on how to apply, go to
tober 3, 2017, however, the position will remain application highlighting areas of interest and usajobs.gov and search with the keyword
open until December 11, 2017. You must submit accomplishments, as well as strong letters of 478670300.
your application online, by following the submis- recommendation.
sion guidelines given at http://uoft.me/how-to- Eligibility and willingness to register as a Pro-
apply. Applications submitted in any other way fessional Engineer in Ontario is highly desirable. York University
will not be considered. The Edward S. Rogers Sr. Department of Elec- Assistant Professor
As part of your online application, please in- trical and Computer Engineering at the Univer-
clude a curriculum vitae, a summary of your previ- sity of Toronto ranks among the best in North The Department of Electrical Engineering and
ous research and future research plans, as well as America. It attracts outstanding students, has ex- Computer Science, York University, is seeking an
a statement of teaching experience and interests. cellent facilities, and is ideally located in the mid- outstanding candidate at the rank of Assistant
Applicants must arrange for three letters of refer- dle of a vibrant, artistic, diverse and cosmopoli- Professor in the area of Computer Systems al-
ence to be sent directly by the referees (on letter- tan city. Additional information may be found at though exceptional applicants from other areas
head, signed and scanned), by email to the ECE http://www.ece.utoronto.ca. in Computer Science may also be considered. The
department at search2017@ece.utoronto.ca. Review of applications will begin after Oc- successful candidate will have a PhD in Computer
The University of Toronto is strongly com- tober 3, 2017, however, the position will remain Science, or a closely related field, and a research
mitted to diversity within its community and es- open until December 11, 2017. You must submit record commensurate with rank. The appoint-
pecially welcomes applications from racialized your application online, by following the submis- ment will commence on July 1, 2018, subject to
persons / persons of colour, women, Indigenous / sion guidelines given at http://uoft.me/how-to- budgetary approval. For full position details, see
Aboriginal People of North America, persons with apply. Applications submitted in any other way http://www.yorku.ca/acadjobs.
disabilities, LGBTQ persons, and others who may will not be considered. Applicants should complete the on-line pro-
contribute to the further diversification of ideas. As part of your online application, please in- cess at http://lassonde.yorku.ca/new-faculty/. A
As part of your application, you will be asked clude a curriculum vitae, a summary of your previ- complete application includes a cover letter indi-
to complete a brief Diversity Survey. This survey is ous research and future research plans, as well as cating the rank for which the candidate wishes to
voluntary. Any information directly related to you a statement of teaching experience and interests. be considered, a detailed CV, statement of contri-
is confidential and cannot be accessed by search Applicants must arrange for three letters of refer- bution to research, teaching and curriculum de-
committees or human resources staff. Results ence to be sent directly by the referees (on letter- velopment, three sample research publications
will be aggregated for institutional planning pur- head, signed and scanned), by email to the ECE and contact information for three referees. Com-
poses. For more information, please see http:// department at search2017@ece.utoronto.ca. plete applications must be received by November
uoft.me/UP. The University of Toronto is strongly com- 30, 2017.
All qualified candidates are encouraged to mitted to diversity within its community and es- York University is an Affirmative Action em-
apply; however, Canadians and permanent resi- pecially welcomes applications from racialized ployer and strongly values diversity, including
dents will be given priority. persons / persons of colour, women, Indigenous gender and sexual diversity, within its communi-
/ Aboriginal People of North America, persons ty. The Affirmative Action Program, which applies
with disabilities, LGBTQ persons, and others to women, Aboriginal people, visible minorities
University of Toronto who may contribute to the further diversifica- and people with disabilities, can be found at
Associate Professor - Electrical and Computer tion of ideas. http://acadjobs.info.yorku.ca/affirmative-action/
Engineering As part of your application, you will be asked or by calling the AA office at 416.736.5713. All
to complete a brief Diversity Survey. This survey is qualified candidates are encouraged to apply;
The Edward S. Rogers Sr. Department of Electri- voluntary. Any information directly related to you however, Canadian Citizens and Permanent Resi-
cal and Computer Engineering (ECE) at the Uni- is confidential and cannot be accessed by search dents will be given priority.
Future Tense
Butterfly Effect
But, like the weather, what can anyone do about it?
or disproved within hours. It was like mother of all spreadsheets. tem that was chaotic and close to equi-
being a day trader, but without the risk. It was Eliot’s job to feed this vast librium. A small change could have big
Eliot followed his meteorological in- anthill of numbers into the models sev- consequences. The butterfly effect.
terests through grad school, but by the eral times a day and bring to bear the The idea that a butterfly could
late 2030s technology was rendering his compute power available in the Extend- precipitate a storm was a popular idea,
skills obsolete. Weather forecasts were ed Cloud. Yes, he had to understand recognized centuries ago. Eliot had
increasingly the province of computer what he was doing, and, yes, he had thought about it in school but reck-
models, massive calculations that spit to be careful. But it wasn’t traditional oned the flapping wings of a single
out accurate predictions for any place weather forecasting, and definitely not insect really couldn’t do much. And
on the planet, down to an acre or less. weather manipulation. predicting [C O NTINUED O N P. 111]
Keynotes
Prof. Magdalena Balazinska, University of Washington
Jean Loup Baer Professor of Computer Science & Engineering
Performance SLAs for Cloud Data Analytics
Tutorials
• High Performance Network Middleware with Intel DPDK and OpenNetVM
• Istio Service mesh for more robust, secure and easy to manage microservices
• SMACK stack 101: Building Fast Data stacks
• Trusted Execution of Software using Intel SGX
Workshops
• Active: International Workshop on Active Middleware on Modern Hardware
• ARM: Adaptive and Reflective Middleware
• DIDL: Workshop on Distributed Infrastructures for Deep Learning
• M4IoT: Middleware and Applications for the Internet of Things
• MECC: Middleware for Edge Clouds & Cloudlets
• SERIAL: ScalablE and Resilient InfrAstructures for distributed Ledgers
• WoSC: Workshop on Serverless Computing
2017.middleware-conference.org @middleware2017