Volume 61, Number 12, December 2018
Promoting common sense, reality, dependable engineering.

Leah Hoffmann

Bringing the web up to speed with WebAssembly.

Andreas Rossberg Ben L. Titzer Andreas Haas Derek L. Schuff Dan Gohman Luke Wagner Alon Zakai J. F. Bastien Michael Holman

Technical perspective: WebAssembly: a quiet revolution of the web.

Anders Møller

How to implement any concurrent data structure.

Irina Calciu Siddhartha Sen Mahesh Balakrishnan Marcos K. Aguilera

Technical perspective: Node replication divides to conquer.

Tim Harris

Search-based program synthesis.

Rajeev Alur Rishabh Singh Dana Fisman Armando Solar-Lezama

Designing emotionally sentient agents.

Daniel J. McDuff Mary Czerwinski

A century-long commitment to assessing artificial intelligence and its impact on society.

Barbara J. Grosz Peter Stone

Uncertainty in current and future health wearables.

Bran Knowles Alison Smith-Renner Forough Poursabzi-Sangdeh Di Lu Halimat Alabi

What motivates a citizen to take the initiative in e-participation?: the case of a South Korean parliamentary hearing.

Junyeong Lee Jaylyn Jeonghyun Oh

How to get things done when you don't feel like it.

Kate Matsudaira

Why SRE documents matter.

Shylaja Nukala Vivek Rau

How to live in a post-meltdown and -spectre world.

Rich Bennett Craig Callahan Stacy Jones Matt Levine Merrill Miller Andy Ozment

Opportunities and challenges in search interaction.

Ryen W. White

Counterpoint: Regulators should allow the greatest space for AI innovation.

Andrea O&aposSullivan Adam Thierer

Point: Should AI technology be regulated?: yes, and here's how.

Oren Etzioni

A chance gardener.

George V. Neville-Neil

Learning machine learning.

Ted G. Lewis Peter J. Denning

AI judges and juries.

Logan Kugler

Technology for the deaf.

Keith Kirkpatrick

Learning to see.

Chris Edwards

Securing agent 111, and the job of software architect.

John Arquilla Yegor Bugayenko

Reclaim internet greatness.

CACM Staff

Self-authenticating identifiers.

Vinton G. Cerf

Volume 61, Number 11, November 2018
Between the abbey and the edge of time.

Brian Clegg

LIBS: a bioelectrical sensing system from human ears for staging whole-night sleep study.

Anh Nguyen Raghda Alqurashi Zohreh Raghebi Farnoush Banaei Kashani Ann C. Halbower Tam Vu

Technical perspective: Making sleep tracking more user friendly.

Tanzeem Choudhury

Where did I leave my keys?: lessons from the Juniper Dual EC incident.

Stephen Checkoway Jacob Maskiewicz Christina Garman Joshua Fried Shaanan Cohney Matthew Green Nadia Heninger Ralf-Philipp Weinmann Eric Rescorla Hovav Shacham

Technical perspective: Backdoor engineering.

Markus G. Kuhn

Software challenges for the changing storage landscape.

Daniel G. Waddington Jim Harris

Modern debugging: the art of finding a needle in a haystack.

Diomidis Spinellis

A look at the design of Lua.

Roberto Ierusalimschy Luiz Henrique de Figueiredo Waldemar Celes Filho

Skill discovery in virtual assistants.

Ryen W. White

Tracking and controlling microservice dependencies.

Silvia Esparrachiari Tanya Reilly Ashleigh Rentz

Research for practice: knowledge base construction in the machine-learning era.

Alexander Ratner Christopher Ré Peter Bailis

Corp to cloud: Google's virtual desktops.

Matt Fata Philippe-Joseph Arida Patrick Hahn Betsy Beyer

Will supercomputers be super-data and super-AI machines?

Yutong Lu Depei Qian Haohuan Fu Wenguang Chen

Video consumption, social networking, and influence.

Yue Zhuge

Is last-mile delivery a 'killer app' for self-driving vehicles?

Huaxia Xia Haiming Yang

Fintech: AI powers financial services to improve people's lives.

Yuan Qi Jing Xiao

Cloud bursting for the world's largest consumer market.

Hai Jin Haibo Chen Hong Gao Xiang-Yang Li Song Wu

People logistics in smart cities.

Wanli Min Liang Yu Lei Yu Shubo He

Exploiting psychology and social behavior for game stickiness.

Luyi Xu

Can China lead the development of data trading and sharing markets?

Xiang-Yang Li Jianwei Qian Xiaoyang Wang

Regional computing culture and personalities.

San Zhang

Consumers, corporations, and government: computing in China.

Peter Guy

The future of artificial intelligence in China.

Jun Zhu Tiejun Huang Wenguang Chen Wen Gao

Quantum communication at 7, 600km and beyond.

Chao-Yang Lu Cheng-Zhi Peng Jian-Wei Pan

China's computing ambitions.

Elliott Zaagman

Welcome to the China region special section.

Wenguang Chen Xiang-Yang Li

Introducing Communications' regional special sections.

Andrew A. Chien

Crude and rude?

Janne Lahtiranta Sami Hyrynsalmi

Using any surface to realize a new paradigm for wireless communications.

Christos Liaskos Ageliki Tsioliaridou Andreas Pitsillides Sotiris Ioannidis Ian F. Akyildiz

How machine learning impacts the undergraduate computing curriculum.

R. Benjamin Shapiro Rebecca Fiebrink Peter Norvig

The big picture.

Steven M. Bellovin Peter G. Neumann

The EU's controversial digital single market directive.

Pamela Samuelson

Weighing the impact of GDPR.

Samuel Greengard

A new movement in seismology.

Neil Savage

AI, explain yourself.

Don Monroe

The gap in CS, mulling irrational exuberance.

Carl Hewitt Vijay Kumar

Self-reference and section 230.

Moshe Y. Vardi

The upper layers of the internet.

Vinton G. Cerf

Volume 61, Number 10, October 2018
Reaping the benefits of a diverse background.

Leah Hoffmann

Enabling highly scalable remote memory access programming with MPI-3 one sided.

Robert Gerstenberger Maciej Besta Torsten Hoefler

Technical perspective: The future of MPI.

Marc Snir

Fundamental concepts of reactive control for autonomous drones.

Luca Mottola Kamin Whitehouse

Technical perspective: A control theorist's view on reactive control for autonomous drones.

John Baillieul

Computing within limits.

Bonnie A. Nardi Bill Tomlinson Donald J. Patterson Jay Chen Daniel Pargman Barath Raghavan Birgit Penzenstadler

The productivity paradox in health information technology.

Quang Sean Hansen Manlu Liu Qiang Tu

Formally verified software in the real world.

Gerwin Klein June Andronick Matthew Fernandez Ihor Kuz Toby C. Murray Gernot Heiser

Human-level intelligence or animal-like abilities?

Adnan Darwiche

Mind your state for your state of mind.

Pat Helland

The secret formula for choosing the right next role.

Kate Matsudaira

The mythos of model interpretability.

Zachary C. Lipton

Are CS conferences (too) closed communities?

Jordi Cabot Javier Luis Cánovas Izquierdo Valerio Cosentino

Building the universal archive of source code.

Jean-François Abramatic Roberto Di Cosmo Stefano Zacchiroli

The obscene coupling known as spaghetti code.

George V. Neville-Neil

A pedagogic cybersecurity framework.

Peter P. Swire

The business of quantum computing.

Michael A. Cusumano

The dangers of automating social programs.

Esther Shein

Transient electronics take shape.

Samuel Greengard

Floating voxels provide new hope for 3D displays.

Chris Edwards

Can we use AI for global good?

Amir Banifatemi

Hennessy and Patterson on the roots of RISC.

CACM Staff

The internet in the 21st century.

Vinton G. Cerf

Volume 61, Number 9, September 2018
Bounce blockchain.

Dennis E. Shasha

Emotion recognition using wireless signals.

Mingmin Zhao Fadel Adib Dina Katabi

Technical perspective: Is your WiFi a sensor?

Romit Roy Choudhury

An overview of deterministic database systems.

Daniel J. Abadi Jose M. Faleiro

Peer assessment of CS doctoral programs shows strong correlation with faculty citations.

Slobodan Vucetic Ashis Kumar Chanda Shanshan Zhang Tian Bai Aniruddha Maiti

Can beyond-CMOS devices illuminate dark silicon?

Robert Perricone Xiaobo Sharon Hu Joseph Nahas Michael T. Niemier

A domain-specific architecture for deep neural networks.

Norman P. Jouppi Cliff Young Nishant Patil David A. Patterson

Research for practice: FPGAs in datacenters.

Gustavo Alonso Peter Bailis

Workload frequency scaling law: derivation and verification.

Noor Mubeen

GitOps: a path to more self-service IT.

Thomas A. Limoncelli

Is software the result of top-down intelligent design or evolution?

Edward A. Lee

An academic's observations from a sabbatical at Google.

Adam Barker

Navigating with accelerating technology change.

Peter J. Denning

When machine learning is facially invalid.

Frank Pasquale

Overtrust in the robotic age.

Alan R. Wagner Jason Borenstein Ayanna Howard

Borders in the cloud.

Keith Kirkpatrick

Robotic implants.

Gregory Mone

AI holds the better hand.

Don Monroe

Discovering bugs, or ensuring success?

Yegor Bugayenko

Hippie values really did build the internet.

CACM Staff

Move fast and break things.

Moshe Y. Vardi

The peace of westphalia.

Vinton G. Cerf

Computer architecture: disruption from above.

Andrew A. Chien

Volume 61, Number 8, August 2018

William Sims Bainbridge

Accelerating GPU betweenness centrality.

Adam McLaughlin David A. Bader

Technical perspective: Graphs, betweenness centrality, and the GPU.

John D. Owens

Multiparty privacy in social media.

Jose M. Such Natalia Criado

Amdahl's law for tail latency.

Christina Delimitrou Christos Kozyrakis

How to teach computer ethics through science fiction.

Emanuelle Burton Judy Goldsmith Nicholas Mattei

Consistently eventual.

Pat Helland

Research for practice: prediction-serving systems.

Daniel Crankshaw Joseph Gonzalez Peter Bailis

Algorithms behind modern storage systems.

Alex Petrov

Counterpoint: e-democracy won't save democracy. democracy will save democracy.

Douglas Schuler

Point: foundations of e-democracy.

Ehud Shapiro

Every silver lining has a cloud.

George V. Neville-Neil

Providing equitable access to computing education.

Mark Guzdial Amy Bruckman

Designing sustainable rural infrastructure through the lens of OpenCellular.

Kashif Ali Kurtis Heimerl

Session details: Global computing.

Michael L. Best

Broadening the path for women in STEM.

Esther Shein

Electronics are leaving the plane.

Don Monroe

Animals teach robots to find their way.

Chris Edwards

Assessing responsibility for program output.

Robin K. Hill

Encourage ACM to address U.S. election integrity.

CACM Staff


Vinton G. Cerf

Regulating automated decision making.

James R. Larus Chris Hankin

Volume 61, Number 7, July 2018
String wars.

Dennis E. Shasha

Majority is not enough: bitcoin mining is vulnerable.

Ittay Eyal Emin Gün Sirer

Technical perspective: The rewards of selfish mining.

Sharon Goldberg Ethan Heilman

The ABCs of effectiveness in the digital society.

Carlo Gabriel Porto Bellini

Always measure one level deeper.

John K. Ousterhout

Digital nudging: guiding online user choices through interface design.

Christoph Schneider Markus Weinmann Jan vom Brocke

Making machine learning robust against adversarial inputs.

Ian J. Goodfellow Patrick D. McDaniel Nicolas Papernot

Research for practice: toward a network of connected things.

Deepak Vasisht Peter Bailis

How to come up with great ideas.

Kate Matsudaira

C is not a low-level language.

David Chisnall

The case for disappearing cyber security.

Josiah Dykstra Eugene H. Spafford

A new perspective on computational thinking.

Osman Yasar

Beyond diversity.

Alex Ahmed

Session details: Broadening participation.

Richard E. Ladner

Blockchain revolution without the blockchain?

Hanna Halaburda

Session details: Economic and business dimensions.

Marshall W. van Alstyne

Copyright blocks a news-monitoring technology.

Pamela Samuelson

Bringing the internet to the (developing) world.

Keith Kirkpatrick

You've got mail!

Gary Anthes

Why cryptocurrencies use so much energy: and what to do about it.

Logan Kugler

We are done with 'hacking'.

Yegor Bugayenko

Teach the law (and the AI) 'foreseeability'.

CACM Staff

How the hippies destroyed the internet.

Moshe Y. Vardi

On neural networks.

Vinton G. Cerf

Reflections on my two years.

Vicki L. Hanson

Volume 61, Number 6, June 2018
RISC management.

Leah Hoffmann

Coz: finding code that counts with causal profiling.

Charlie Curtsinger Emery D. Berger

Technical perspective: Measuring optimization potential with Coz.

Landon P. Cox

Privacy in decentralized cryptocurrencies.

Daniel Genkin Dimitrios Papadopoulos Charalampos Papamanthou

Identifying patterns in medical records through latent semantic analysis.

David Gefen Jake Miller Johnathon Kyle Armstrong Frances H. Cornelius Noreen Robertson Aaron Smith-McLallen Jennifer A. Taylor

Ability-based design.

Jacob O. Wobbrock Krzysztof Z. Gajos Shaun K. Kane Gregg C. Vanderheiden

Bias on the web.

Ricardo Baeza-Yates

Documentation is automation.

Thomas A. Limoncelli

Thou shalt not depend on me.

Tobias Lauinger Abdelberi Chaabane Christo Wilson

Designing cluster schedulers for internet-scale services.

Diptanu Gon Choudhury Timothy Perrett

Effectiveness of anonymization in double-blind review.

Claire Le Goues Yuriy Brun Sven Apel Emery D. Berger Sarfraz Khurshid Yannis Smaragdakis

Watchdogs vs. snowflakes.

George V. Neville-Neil

An interview with Dave Parnas.

Peter J. Denning

Risks of cryptocurrencies.

Nicholas Weaver

Getting hooked on tech.

Logan Kugler

3D sensors provide security, better games.

Keith Kirkpatrick

Deep learning hunts for signals among the noise.

Chris Edwards

Rewarded for RISC.

Neil Savage

Programming programming languages, and analyzing Facebook's failure.

Mark Guzdial Susan Landau

When to hold 'em.

CACM Staff

Celebrating excellence.

Vinton G. Cerf

Volume 61, Number 5, May 2018
Free press.

Ken MacLeod

Never-ending learning.

Tom M. Mitchell William W. Cohen Estevam R. Hruschka Jr. Partha P. Talukdar Bo Yang Justin Betteridge Andrew Carlson Bhavana Dalvi Mishra Matt Gardner Bryan Kisiel Jayant Krishnamurthy Ni Lao Kathryn Mazaitis Thahir Mohamed Ndapandula Nakashole Emmanouil A. Platanios Alan Ritter Mehdi Samadi Burr Settles Richard C. Wang Derry Wijaya Abhinav Gupta Xinlei Chen Abulhair Saparov Malcolm Greaves Joel Welling

Technical perspective: Breaking the mold of machine learning.

Oren Etzioni

Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends.

Björn W. Schuller

Data acquisition in vehicular ad hoc networks.

Xiaonan Wang

Internet freedom in West Africa: technical support for journalists and democracy advocates.

Richard R. Brooks Lu Yu Yu Fu Oluwakemi Hambolu John Gaynard Julie Owono Archippe Yepmou Felix Blanc

More than the code: learning rules of rejection in writing programs.

Josh Tenenberg Wolff-Michael Roth Donald Chinn Alfredo Jornet David Socha Skip Walter

How is your week going so far?

Kate Matsudaira

Canary analysis service.

Stepán Davidovic Betsy Beyer

Research for practice: cluster scheduling for datacenters.

Malte Schwarzkopf Peter Bailis

Science, policy, and service.

Margaret Martonosi

The march into the black hole of complexity.

Scale or fail.

Alexander Repenning

Putting trust in security engineering.

Fred B. Schneider

Is the law ready for driverless cars?

Ryan Calo

Finding a healthier approach to managing medical data.

Samuel Greengard

Using functions for easier programming.

Neil Savage

Shrinking machines, cellular computers.

Gregory Mone

Commenting on code, considering data's bottleneck.

Edwin Torres Walid S. Saba

ACM's 2018 general election: please take this opportunity to vote.

CACM Staff

Get ACM (and Communications) out of politics.

CACM Staff

How we lost the women in computing.

Moshe Y. Vardi

Toward sustainable access: where are we now?

Jack W. Davidson Joseph A. Konstan Andrew A. Chien Scott Delman

Turing test 2.

Vinton G. Cerf

Volume 61, Number 4, April 2018
Finding October.

Dennis E. Shasha

Learning topic models - provably and efficiently.

Sanjeev Arora Rong Ge Yoni Halpern David M. Mimno Ankur Moitra David A. Sontag Yichen Wu Michael Zhu

Technical perspective: Expressive probabilistic models and scalable method of moments.

David M. Blei

Bridgeware: the air-gap malware.

Mordechai Guri Yuval Elovici

Realizing the potential of data science.

Francine Berman Rob A. Rutenbar Brent Hailpern Henrik Christensen Susan Davidson Deborah Estrin Michael J. Franklin Margaret Martonosi Padma Raghavan Victoria Stodden Alexander S. Szalay

Lessons from building static analysis tools at Google.

Caitlin Sadowski Edward Aftandilian Alex Eagle Liam Miller-Cushon Ciera Jaspan

Building a smart city: lessons from Barcelona.

Mila Gascó-Hernández

DevOps metrics.

Nicole Forsgren Mik Kersten

Containers will not fix your broken culture (and other hard truths).

Bridget Kromhout

Continuous delivery sounds great, but will it work here?

Jez Humble

DevOps delivers.

Nicole Forsgren

Smartphones, contents of the mind, and the fifth amendment.

Stephen B. Wicker

Push versus pull.

Sheldon H. Jacobson

Popping kernels.

George V. Neville-Neil

Business ecosystems: how do they matter for innovation?

Mari Sako

Artificial (emotional) intelligence.

Marina Krakovsky

Chips for artificial intelligence.

Don Monroe

Always out of balance.

Neil Savage

Fostering inclusion, keeping the net neutral.

Jodi Tims Daniel A. Reed

Predicting failure of the university.

CACM Staff

Open access and ACM.

Moshe Y. Vardi

The sound of programming.

Vinton G. Cerf

Go big!

Andrew A. Chien

Volume 61, Number 3, March 2018
Q&A: The network effect.

Leah Hoffmann

Analysis of SSL certificate reissues and revocations in the wake of heartbleed.

Liang Zhang David R. Choffnes Tudor Dumitras Dave Levin Alan Mislove Aaron Schulman Christo Wilson

Technical perspective: On heartbleed: a hard beginnyng makth a good endyng.

Kenny Paterson

Time-inconsistent planning: a computational problem in behavioral economics.

Jon M. Kleinberg Sigal Oren

Technical perspective: A graph-theoretic framework traces task planning.

Nicole Immorlica

How can we trust a robot?

Benjamin Kuipers

Evolution toward soft(er) products.

Tony Gorschek

The wisdom of older technology (non)users.

Bran Knowles Vicki L. Hanson

A programmable programming language.

Matthias Felleisen Robert Bruce Findler Matthew Flatt Shriram Krishnamurthi Eli Barzilay Jay A. McCarthy Sam Tobin-Hochstadt

Monitoring in a DevOps world.

Theo Schlossnagle

Operational excellence in April Fools' pranks.

Thomas A. Limoncelli

Bitcoin's underlying incentives.

Yonatan Sompolinsky Aviv Zohar

Computational social science ≠ computer science + social data.

Hanna M. Wallach

Responsible research with crowds: pay crowdworkers at least minimum wage.

M. Six Silberman Bill Tomlinson R. LaPlante Joel Ross Lilly Irani Andrew Zaldivar

Impediments with policy interventions to foster cybersecurity.

Fred B. Schneider

The computing profession.

Peter J. Denning

Ethics omission increases gases emission.

Simon Rogerson

Will the Supreme Court nix reviews of bad patents?

Pamela Samuelson

Making security sustainable.

Ross Anderson

The state of fakery.

Esther Shein

The construction industry in the 21st century.

Keith Kirkpatrick

In pursuit of virtual life.

Samuel Greengard

The costs and pleasures of a computer science teacher.

Mark Guzdial Bertrand Meyer

Keep the ACM code of ethics as it is.

A declaration of the dependence of cyberspace.

Moshe Y. Vardi

Unintended consequences.

Vinton G. Cerf

Here comes everybody...to Communications.

Andrew A. Chien

Volume 61, Number 2, February 2018
Welcome to the singularity.

David Allen Batchelor

Which is the fairest (rent division) of them all?

Kobi Gal Ariel D. Procaccia Moshe Mash Yair Zick

Technical perspective: Designing algorithms and the fairness criteria they should satisfy.

Vincent Conitzer

Practical verification of peephole optimizations with Alive.

Nuno P. Lopes David Menendez Santosh Nagarakatte John Regehr

Technical perspective: Building bug-free compilers.

Steve Zdancewic

Elements of the theory of dynamic networks.

Othon Michail Paul G. Spirakis

A large-scale comparative study of beta testers and regular users.

Vlasta Stavova Lenka Dedkova Martin Ukrop Vashek Matyas

The next phase in the digital revolution: intelligent tools, platforms, growth, employment.

John Zysman Martin Kenney

Views from the top.

Kate Matsudaira

Research for practice: private online communication; highlights in systems verification.

Albert Kwon James R. Wilcox Peter Bailis

Titus: introducing containers to the Netflix cloud.

Andrew Leung Andrew Spyker Tim Bozarth

Innovation from the edges.

Shane Greenstein

Teaching artificial intelligence and humanity.

Jennifer Keating Illah R. Nourbakhsh

Reducing the attack surface.

George V. Neville-Neil

The inclusive and accessible workplace.

Sarah Wille Daphne Sajous-Brady

Risks of trusting the physics of sensors.

Kevin Fu Wenyuan Xu

The war over the value of personal data.

Logan Kugler

Going serverless.

Neil Savage

Quantum technology forgoes unconditional security to extend its reach.

Chris Edwards

Protecting the power grid, and finding bias in student evaluations.

John Arquilla Mark Guzdial

Toward an equation that anticipates AI risks.

A comprehensive self-driving car test.

Vinton G. Cerf

Achieving gender equity: ACM-W can't do it alone.

Jodi L. Tims

Volume 61, Number 1, January 2018
ACM code of ethics: a guide for positive action.

Don Gotterbarn Amy Bruckman Catherine Flick Keith W. Miller Marty J. Wolf

Polychromatic choreography.

Dennis E. Shasha

Halide: decoupling algorithms from schedules for high-performance image processing.

Jonathan Ragan-Kelley Andrew Adams Dillon Sharlet Connelly Barnes Sylvain Paris Marc Levoy Saman P. Amarasinghe Frédo Durand

Technical perspective: Can high performance be portable?

Manuel Chakravarty

Deep optimization for spectrum repacking.

Neil Newman Alexandre Fréchette Kevin Leyton-Brown

Technical perspective: Moving spectrum.

David C. Parkes

Information hiding: Challenges for forensic experts.

Wojciech Mazurczyk Steffen Wendzel

Decentralized blockchain-based electronic marketplaces.

Hemang Subramanian

Popularity spikes hurt future chances for viral propagation of protomemes.

Michele Coscia

Cache me if you can.

Jacob Loveless

Abstracting the geniuses away from failure testing.

Peter Alvaro Severine Tymon

Network applications are interactive.

Antony Alappatt

Ask not what your postdoc can do for you ...

Chitta Baral Shih-Fu Chang Brian Curless Partha Dasgupta Julia Hirschberg Anita Jones

Technology and the failure of the university.

Henry C. Lucas Jr.

Defining American greatness: IBM from Watson to Trump.

Thomas Haigh

How law and computer science can work together to improve the information society.

Chris Marsden

The sharing economy meets reality.

Michael A. Cusumano

The new jobs.

Marina Krakovsky

Smartphone science.

Alex Wright

Feeling sounds, hearing sights.

Gregory Mone

The big IDEA and the PD pipeline.

Mark R. Nelson

A leap from artificial to intelligence.

Computer professionals for social responsibility.

Moshe Y. Vardi

The role of archives in digital preservation.

Vinton G. Cerf