Volume 57, Number 2, February 2014
Puzzled: Lowest Number Wins.

Peter Winkler

Communication costs of Strassen's matrix multiplication.

Grey Ballard James Demmel Olga Holtz Oded Schwartz

A new spin on an old algorithm: technical perspective.

Michael W. Mahoney

Computation takes time, but how much?

Reinhard Wilhelm Daniel Grund

Cryptography miracles, secure auctions, matching problem verification.

Silvio Micali Michael O. Rabin

Automatic exploit generation.

Thanassis Avgerinos Sang Kil Cha Alexandre Rebert Edward J. Schwartz Maverick Woo David Brumley

Mars code.

Gerard J. Holzmann

Provenance in sensor data management.

Zachary Hensley Jibonananda Sanyal Joshua R. New

Center wheel for success.

Poul-Henning Kamp

Node at LinkedIn: the pursuit of thinner, lighter, faster.

Kiran Prasad Kelly Norton Terry Coatta

Ready technology.

Stephen J. Andriole

Digital platforms: when is participation valuable?

Marco Ceccagnoli Chris Forman Peng Huang D. J. Wu

Bugs and bragging rights.

George V. Neville-Neil

An integrated approach to safety and security based on systems theory.

William Young Nancy G. Leveson

Establishing a nationwide CS curriculum in New Zealand high schools.

Tim Bell

Would cybersecurity professionalization help address the cybersecurity crisis?

Diana L. Burley Jon Eisenberg Seymour E. Goodman

ACM fellows inducted.

Computational photography comes into focus.

Samuel Greengard

Should everybody learn to code?

Esther Shein

A new type of mathematics?

Don Monroe

Clarifying human-computer interaction.

Philip J. Guo

Contribute more than algorithmic speculation.

Cognitive implants.

Vinton G. Cerf

Education, always.

Andrew D. McGettrick