Volume 62, Number 12, December 2019
RISCy beginnings.

Leah Hoffmann

OpenPiton: an open source hardware platform for your research.

Jonathan Balkind Michael McKeown Yaosheng Fu Tri Minh Nguyen Yanqi Zhou Alexey Lavrov Mohammad Shahrad Adi Fuchs Samuel Payne Xiaohua Liang Matthew Matl David Wentzlaff

Technical perspective: Bootstrapping a future of open source, specialized hardware.

Michael B. Taylor

Rethinking search engines and recommendation systems: a game theoretic perspective.

Moshe Tennenholtz Oren Kurland

Automated program repair.

Claire Le Goues Michael Pradel Abhik Roychoudhury

The rise of serverless computing.

Paul C. Castro Vatche Ishakian Vinod Muthusamy Aleksander Slominski

API practices if you hate your customers.

Thomas A. Limoncelli

Hack for hire.

Ariana Mirian

Public entrepreneurship and policy engineering.

Beth Simone Noveck

Uncertainty.

Peter J. Denning Ted G. Lewis

Koding academies.

George V. Neville-Neil

Should researchers use data from security breaches?

David M. Douglas

Regulating information technology.

Keith Kirkpatrick

Robots aim to boost astronaut efficiency.

Paul Marks

Malevolent machine learning.

Chris Edwards

Getting high school, college students interested in CS.

Mark Guzdial Robin K. Hill

Online voting still security pipedream.

CACM Staff

A hands-free ride.

Vinton G. Cerf

Engaging future generations of ACM leaders.

Cherri M. Pancake


Volume 62, Number 11, November 2019
Cantando con la Corrente (singing with current).

DeepXplore: automated whitebox testing of deep learning systems.

Kexin Pei Yinzhi Cao Junfeng Yang Suman Jana

Technical perspective: A whitebox solution for blackbox-like behaviors.

David G. Andersen

An elementary introduction to Kalman filtering.

Yan Pei Swarnendu Biswas Donald S. Fussell Keshav Pingali

The five-minute rule 30 years later and its impact on the storage hierarchy.

Raja Appuswamy Goetz Graefe Renata Borovica-Gajic Anastasia Ailamaki

The trade-offs between write and read.

Pat Helland

The effects of mixing machine learning and human judgment.

Michelle Vaccaro Jim Waldo

The internet of the orals.

Aditya Vashistha Umar Saif Agha Ali Raza

The positive and negative effects of social media in India.

Niloy Ganguly Ponnurangam Kumaraguru

Research in theoretical computer science.

Meena Mahajan Madhavan Mukund Nitin Saxena

Highlights of software R&D in India.

Supratik Chakraborty Vasudeva Varma

The rise of the Indian start-up ecosystem.

Charles Assisi Avinash Raghava N. S. Ramnath

Privacy concerns with Aadhaar.

Subhashis Banerjee Subodh Sharma

India stack - digital infrastructure as public good.

Vivek Raghavan Sanjay Jain Pramod Varma

Indic language computing.

Pushpak Bhattacharyya Hema A. Murthy Surangika Ranathunga Ranjiva Munasinghe

The growth and evolution of India's software industry.

Pankaj Jalote Pari Natarajan

Computing research at Tata Consultancy Services.

Gautam M. Shroff K. Ananth Krishnan

Skill evaluation.

Shashank Srikant Rohit Takhar Vishal Venugopal Varun Aggarwal

Technology interventions for road safety and beyond.

C. V. Jawahar Venkata N. Padmanabhan

Creative disruption in fintech from Sri Lanka.

Ajit Samaranayake Sampath Tilakumara Thayaparan Sripavan Rasika Withanawasam

CSpathshala: bringing computational thinking to schools.

Vipul Shah

Digital transformation in the Indian government.

Neeta Verma Savita Dawar

Turbocharging database query processing and testing.

Jayant R. Haritsa S. Sudarshan

Designing ICT interventions for women in Pakistan.

Maryam Mustafa Amna Batool Agha Ali Raza

Extreme classification.

Manik Varma

Welcome to the India region special section.

P. J. Narayanan Pankaj Jalote Anand Deshpande

Algorithms, platforms, and ethnic bias.

Selena Silva Martin Kenney

An interview with Leonard Kleinrock.

George Varghese

Computational thinking should just be good thinking.

Mark Guzdial Alan Kay Cathie Norris Elliot Soloway

Europe's controversial digital copyright directive finalized.

Pamela Samuelson

Real-world applications for drones.

Logan Kugler

When drones fly.

Samuel Greengard

Information is physics.

Don Monroe

The benefits of indolence.

Yegor Bugayenko

You can publish it!: (you have to).

CACM Staff

The winner-takes-all tech corporation.

Moshe Y. Vardi

Hazards of the information superhighway.

Vinton G. Cerf


Volume 62, Number 10, October 2019
Dust wars.

Dennis E. Shasha

Building certified concurrent OS kernels.

Ronghui Gu Zhong Shao Hao Chen Jieung Kim Jérémie Koenig Xiongnan (Newman) Wu Vilhelm Sjöberg David Costanzo

Technical Perspective: The scalability of CertiKOS.

Andrew W. Appel

Protein design by provable algorithms.

Mark A. Hallen Bruce Randall Donald

Consumer-grade fabrication and its potential to revolutionize accessibility.

Jennifer Mankoff Megan Hofmann Xiang &aposAnthony&apos Chen Scott E. Hudson Amy Hurst Jeeeun Kim

Sampling-based robot motion planning.

Oren Salzman

Unlocking data to improve public policy.

Justine S. Hastings Mark Howison Ted Lawless John Ucles Preston White

The evolution of management.

Kate Matsudaira

Demo data as code.

Thomas A. Limoncelli

Open source firmware.

Jessie Frazelle

Multi-device digital assistance.

Ryen W. White Adam Fourney Allen Herring Paul N. Bennett Nirupama Chandrasekaran Robert Sim Elnaz Nouri Mark J. Encarnación

What is a chief security officer good for?

George V. Neville-Neil

How might we increase system trustworthiness?

Peter G. Neumann

The cloud as an innovation platform for software development.

Michael A. Cusumano

The CS teacher shortage.

Esther Shein

Protecting industrial control systems.

Keith Kirkpatrick

Closing in on quantum error correction.

Don Monroe

Pinning down variables, and taking an agile approach.

Robin K. Hill Edwin Torres

AI is not an excuse!

Vinton G. Cerf

How ACM evolves in response to community needs.

Cherri M. Pancake


Volume 62, Number 9, September 2019
Inspired by the home of the future.

Leah Hoffmann

OpenFab: a programmable pipeline for multimaterial fabrication.

Kiril Vidimce Szu-Po Wang Jonathan Ragan-Kelley Wojciech Matusik

Technical perspective: From virtual worlds to digital fabrication.

Sylvain Lefebvre

Metadata-private communication for the 99%.

Yossi Gilad

EarSketch: engaging broad populations in computing through music.

Jason Freeman Brian Magerko Doug Edwards Tom McKlin Taneisha Lee Roxanne Moore

Alloy: a language and tool for exploring software designs.

Daniel Jackson

Computational sustainability: computing for a better world and a sustainable future.

Carla P. Gomes Thomas G. Dietterich Christopher Barrett Jon Conrad Bistra Dilkina Stefano Ermon Fei Fang Andrew Farnsworth Alan Fern Xiaoli Z. Fern Daniel Fink Douglas H. Fisher Alexander Flecker Daniel Freund Angela Fuller John M. Gregoire John E. Hopcroft Steve Kelling J. Zico Kolter Warren B. Powell Nicole D. Sintov John S. Selker Bart Selman Daniel Sheldon David B. Shmoys Milind Tambe Weng-Keen Wong Christopher Wood Xiaojian Wu Yexiang Xue Amulya Yadav Abdul-Aziz Yakubu Mary Lou Zeeman

DAML: the contract language of distributed ledgers.

Shaul Kfir Camille Fournier

Velocity in software engineering.

Tom Killalea

Surviving software dependencies.

Russ Cox

Bitwise: a life in code.

David Auerbach

An interview with Andrew Odlyzko on cyber security.

Peter J. Denning Andrew M. Odlyzko

Online voting: we can do it! (we have to).

Hilarie Orman

Internet immunity and the freedom to code.

Eric Goldman

Can you locate your location data?

Sarah Underwood

Augmented reality gets real.

Gary Anthes

An inability to reproduce.

Samuel Greengard

Why programmers should curb their enthusiasm, and thinking about computational thinking.

Yegor Bugayenko Mark Guzdial

On being 'random enough'.

CACM Staff

The long game of research.

Moshe Y. Vardi

Polyglot!

Vinton G. Cerf

Sustaining open collaboration in universities.

Andrew A. Chien


Volume 62, Number 8, August 2019
Fluid democracy.

William Sims Bainbridge

Heavy hitters via cluster-preserving clustering.

Kasper Green Larsen Jelani Nelson Huy L. Nguyen Mikkel Thorup

Technical perspective: The true cost of popularity.

Graham Cormode

The history of digital spam.

Emilio Ferrara

Activity-centric computing systems.

Jakob E. Bardram Steven Jeuris Paolo Tell Steven Houben Stephen Voida

Scaling static analyses at Facebook.

Dino Distefano Manuel Fähndrich Francesco Logozzo Peter W. O&aposHearn

Embedded EthiCS: integrating ethics across CS education.

Barbara J. Grosz David Gray Grant Kate Vredenburgh Jeff Behrends Lily Hu Alison Simmons Jim Waldo

Overly attached.

Kate Matsudaira

Research for practice: the DevOps phenomenon.

Anna Wiedemann Nicole Forsgren Manuel Wiesche Heiko Gewald Helmut Krcmar

Industry-scale knowledge graphs: lessons and challenges.

Natalya Fridman Noy Yuqing Gao Anshu Jain Anant Narayanan Alan Patterson Jamie Taylor

The success of the web: a triumph of the amateurs.

Marco Aiello

MUST and MUST NOT.

George V. Neville-Neil

A response to fake news as a response to Citizens United.

Marshall W. Van Alstyne

Block-based programming in computer science education.

David Weintrop

What makes a robot likable?

Gregory Mone

I don't understand my car.

Don Monroe

The algorithm that changed quantum machine learning.

Samuel Greengard

Cutting the wait for CS advice.

Mark Guzdial

A case against mission-critical applications of machine learning.

CACM Staff

Undo, redo, and regrets.

Vinton G. Cerf

Dispelling common myths about ACM awards and honors.

Cherri M. Pancake


Volume 62, Number 7, July 2019
Opioid games.

Dennis E. Shasha

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.

Arash Molavi Kakhki Samuel Jero David R. Choffnes Cristina Nita-Rotaru Alan Mislove

Do you know why your web pages load faster?: technical perspective.

Costin Raiciu

Unifying logical and statistical AI with Markov logic.

Pedro M. Domingos Daniel Lowd

Internet of things search engine.

Nguyen Khoi Tran Quan Z. Sheng Muhammad Ali Babar Lina Yao Wei Emma Zhang Schahram Dustdar

Ways of thinking in informatics.

Christopher Frauenberger Peter Purgathofer

On the hourglass model.

Micah Beck

Access controls and healthcare records: who owns the data?

The top 10 things executives should know about software.

Thomas A. Limoncelli

Extract, shoehorn, and load.

Pat Helland

GOTO rankings considered helpful.

Emery Berger Stephen M. Blackburn Carla E. Brodley H. V. Jagadish Kathryn S. McKinley Mario A. Nascimento Minjeong Shin Kuansan Wang Lexing Xie

A new labor market for people with 'coolabilities'.

David Nordfors Chally Grundwag V. R. Ferose

Who benefits?

Susan J. Winter

API copyrights revisited.

Pamela Samuelson

Protecting the 2020 census.

Logan Kugler

The edge of computational photography.

Keith Kirkpatrick

Good algorithms make good neighbors.

Erica Klarreich

Bringing more women, immigrants, to computer science.

Gloria Childress Townsend Sheldon Waite

To serve humanity.

Moshe Y. Vardi

Back to the future, part II.

Vinton G. Cerf

Halfway round!: growing the regional special sections.

Andrew A. Chien


Volume 62, Number 6, June 2019
Reaching new heights with artificial neural networks.

Leah Hoffmann

Heterogeneous Von Neumann/dataflow microprocessors.

Tony Nowatzki Vinay Gangadhar Karthikeyan Sankaralingam

Technical perspective: Back to the edge.

Rishiyur S. Nikhil

The challenge of crafting intelligible intelligence.

Daniel S. Weld Gagan Bansal

Engineering trustworthy systems: a principled approach to cybersecurity.

O. Sami Saydjari

Programmable solid-state storage in future cloud datacenters.

Jaeyoung Do Sudipta Sengupta Steven Swanson

Research for practice: troubling trends in machine-learning scholarship.

Zachary C. Lipton Jacob Steinhardt

How to create a great team culture (and why it matters).

Kate Matsudaira

Garbage collection as a joint venture.

Ulan Degenbaev Michael Lippautz Hannes Payer

Personal data and the internet of things.

Thomas F. J.-M. Pasquier David M. Eyers Jean Bacon

An interview with David Brin on resiliency.

Peter J. Denning David Brin

Through computer architecture, darkly.

A. Theodore Markettos Robert N. M. Watson Simon W. Moore Peter Sewell Peter G. Neumann

Global data justice.

Linnet Taylor

Ethics in technology jobs.

Keith Kirkpatrick

And then, there were three.

Don Monroe

Lifelong learning in artificial neural networks.

Gary Anthes

Neural net worth.

Neil Savage

Is CS really for all, and defending democracy in cyberspace.

Mark Guzdial John Arquilla

Back to the future.

Vinton G. Cerf

ACM awards honor CS contributions.

Cherri M. Pancake


Volume 62, Number 5, May 2019
Like old times.

Ken MacLeod

Compressed linear algebra for declarative large-scale machine learning.

Ahmed Elgohary Matthias Boehm Peter J. Haas Frederick R. Reiss Berthold Reinwald

Technical perspective: Compressing matrices for large-scale machine learning.

Zachary G. Ives

Algorithmic randomness.

Rod Downey Denis R. Hirschfeldt

The limit of blockchains: infeasibility of a smart Obama-Trump contract.

Yongge Wang Qutaibah M. Malluhi

Countering the negative image of women in computing.

Fay Payton Eleni Berki

Net neutrality: unexpected solution to blockchain scaling.

Aleksandar Kuzmanovic

Online event processing.

Martin Kleppmann Alastair R. Beresford Boerge Svingen

Achieving digital permanence.

Raymond Blum Betsy Beyer

Enterprise wi-fi: we need devices that are secure by default.

Alberto Bartoli Eric Medvet Andrea De Lorenzo Fabiano Tarlao

What does it mean for a computing curriculum to succeed?

Emmanuel Schanzer Shriram Krishnamurthi Kathi Fisler

Encryption and surveillance.

Joan Feigenbaum

Continuity and change in internet law.

James Grimmelmann

Deep insecurities: the internet of things shifts technology risk.

Samuel Greengard

Code talkers.

Neil Savage

Questioning quantum.

Chris Edwards

Implementing guidelines for governance, oversight of AI, and automation.

Ryan Carrier

Don't ignore the cost of 'embedded energy'.

Stefan Monnier Andrew A. Chien Robert L. Glass Charles H. Davis Thorkil Naur Thomas A. Limoncelli

Quantum hype and quantum skepticism.

Moshe Y. Vardi

APIs, standards, and enabling infrastructure.

Vinton G. Cerf


Volume 62, Number 4, April 2019
Fighting for lava.

Dennis E. Shasha

Fully device independent quantum key distribution.

Umesh V. Vazirani Thomas Vidick

Was Edgar Allan Poe wrong after all?: technical perspective.

Gilles Brassard

Cyber security in the quantum era.

Petros Wallden Elham Kashefi

Neural algorithms and computing beyond Moore's law.

James B. Aimone

Analytics for managerial work.

Vijay Khatri Binny M. Samuel

Research for practice: edge computing.

Nitesh Mor

Metrics that matter.

Benjamin Treynor Sloss Shylaja Nukala Vivek Rau

Identity by any other name.

Pat Helland

Web science in Europe: beyond boundaries.

Steffen Staab Susan Halford Wendy Hall

Toward a European exascale ecosystem: the EuroHPC joint undertaking.

Thomas Skordas

The European perspective on responsible computing.

Paola Inverardi

Informatics as a fundamental discipline for the 21st century.

Michael E. Caspersen Judith Gal-Ezer Andrew D. McGettrick Enrico Nardelli

Women are needed in STEM: European policies and incentives.

Panagiota Fatourou Yota Papageorgiou Vasiliki Petousi

Connected things connecting Europe.

Julie A. McCann Gian Pietro Picco Alexander Gluhak Karl Henrik Johansson Martin Törngren Laila Gide

ACM Europe Council's best paper awards.

Joaquim A. Jorge Mashhuda Glencross Aaron Quigley

HiPEAC: a European network built to last.

Koen De Bosschere Marc Duranton Madeleine Gray

Incorporating Europe's values in future research.

Jan Gulliksen

New European data privacy and cyber security laws: one year later.

Laurence Kalman

Europe's well-connected consumers.

David Pringle

Europe's ambitious ICT agenda.

David Pringle

Enterprises lead ICT innovation in Europe.

David Pringle

A demographic snapshot of the IT workforce in Europe.

Lisa Korrigane

Welcome to the Europe region special section.

Panagiota Fatourou Chris Hankin

The web is missing an essential part of infrastructure: an open web index.

Dirk Lewandowski

Know your algorithms.

George V. Neville-Neil

Free trade in a digital world.

Mari Sako

The fine line between coercion and care.

Sarah Underwood

The future of data storage.

Samuel Greengard

Soft robots look to new environments.

Chris Edwards

Pondering variables and direct instruction.

Robin K. Hill Mark Guzdial

In debt to the NSF.

Vinton G. Cerf


Volume 62, Number 3, March 2019
Guiding computers, robots to see and think.

Leah Hoffmann

A deterministic parallel algorithm for bipartite perfect matching.

Stephen A. Fenner Rohit Gurjar Thomas Thierauf

Technical perspective: Isolating a matching when your coins go missing.

Nisheeth K. Vishnoi

Predicting program properties from 'big code'.

Veselin Raychev Martin T. Vechev Andreas Krause

Technical perspective: Borrowing big code to automate programming activities.

Martin C. Rinard

Beyond worst-case analysis.

Tim Roughgarden

The compositional architecture of the internet.

Pamela Zave Jennifer Rexford

Blogging birds: telling informative stories about the lives of birds from telemetric data.

Advaith Siddharthan Kapila Ponnamperuma Chris Mellish Cheng Zeng Daniel Heptinstall Annie Robinson Stuart Benn René van der Wal

Metamorphic testing of driverless cars.

Zhi Quan Zhou Liqun Sun

The seven tools of causal inference, with reflections on machine learning.

Judea Pearl

Understanding database reconstruction attacks on public data.

Simson L. Garfinkel John M. Abowd Christian Martindale

Design patterns for managing up.

Kate Matsudaira

A hitchhiker's guide to the blockchain universe.

Jim Waldo

From computational thinking to computational action.

Mike Tissenbaum Josh Sheldon Hal Abelson

It's about power.

Sepehr Vakil Jennifer Higgs

An interview with William Hugh Murray.

Peter J. Denning

Potential 'dark sides' of leisure technology use in youth.

Ofir Turel

Questioning a new intellectual property right for press publishers.

Pamela Samuelson

Electronics need rare earths.

Keith Kirkpatrick

Exoskeletons today.

Esther Shein

Building a better battery.

Logan Kugler

Smoothing the path to computing: pondering uses for big data.

Mary W. Hall Richard E. Ladner Diane Levitt Manuel A. Pérez-Quiñones Saurabh Bagchi

Lost in math?

Moshe Y. Vardi

Ownership vs. stewardship.

Vinton G. Cerf

Owning computing's environmental impact.

Andrew A. Chien


Volume 62, Number 2, February 2019
Hawking's nightmare.

David Allen Batchelor

Scalable computation of high-order optimization queries.

Matteo Brucato Azza Abouzied Alexandra Meliou

To do or not to do: extending SQL with integer linear programming?: technical perspective.

Surajit Chaudhuri

Distributed strategies for computational sprints.

Songchun Fan Seyed Majid Zahedi Benjamin C. Lee

How economic theories can help computers beat the heat: technical perspective.

Thomas F. Wenisch

Separation logic.

Peter W. O&aposHearn

Blockchains from a distributed computing perspective.

Maurice Herlihy

SONYC: a system for monitoring, analyzing, and mitigating urban noise pollution.

Juan Pablo Bello Cláudio T. Silva Oded Nov R. Luke DuBois Anish Arora Justin Salamon Charles Mydlarz Harish Doraiswamy

Even central users do not always drive information diffusion.

Chao Gao Zhen Su Jiming Liu Jürgen Kurths

A new golden age for computer architecture.

John L. Hennessy David A. Patterson

The importance of a great finish.

Kate Matsudaira

CodeFlow: improving the code review process at Microsoft.

Do we really need computational thinking?

Enrico Nardelli

Tony's law.

Dror G. Feitelson

Writing a test plan.

George V. Neville-Neil

How computer science at CMU is attracting and retaining women.

Carol Frieze Jeria L. Quesenberry

2018: a big year for privacy.

Carl Landwher

Being recognized everywhere.

Logan Kugler

Technologizing agriculture.

Keith Kirkpatrick

A brave new world of genetic engineering.

Samuel Greengard

Seeking digital humanities, IT tech support.

Herbert E. Bruderer Robin K. Hill

Between the lines in the China region special section.

Libraries considered hazardous.

Vinton G. Cerf


Volume 62, Number 1, January 2019
Randomized anti-counterfeiting.

Dennis E. Shasha

Imperfect forward secrecy: how Diffie-Hellman fails in practice.

David Adrian Karthikeyan Bhargavan Zakir Durumeric Pierrick Gaudry Matthew Green J. Alex Halderman Nadia Heninger Drew Springall Emmanuel Thomé Luke Valenta Benjamin VanderSloot Eric Wustrow Santiago Zanella Béguelin Paul Zimmermann

Technical perspective: Attacking cryptographic key exchange with precomputation.

Dan Boneh

Face2Face: real-time face capture and reenactment of RGB videos.

Justus Thies Michael Zollhöfer Marc Stamminger Christian Theobalt Matthias Nießner

Technical perspective: Photorealistic facial digitization and manipulation.

Hao Li

Deception, identity, and security: the game theory of sybil attacks.

William Casey Ansgar Kellner Parisa Memarmoshrefi Jose Andre Morales Bud Mishra

Intelligent systems for geosciences: an essential research agenda.

Yolanda Gil Suzanne A. Pierce Hassan A. Babaie Arindam Banerjee Kirk D. Borne Gary Bust Michelle Cheatham Imme Ebert-Uphoff Carla Gomes Mary C. Hill John Horel Leslie Hsu Jim Kinter Craig A. Knoblock David M. Krum Vipin Kumar Pierre Lermusiaux Yan Liu Chris North Victor Pankratius Shanan Peters Beth Plale Allen Pope Sai Ravela Juan Restrepo Aaron J. Ridley Hanan Samet Shashi Shekhar

The Church-Turing thesis: logical limit or breachable barrier?

B. Jack Copeland Oron Shagrir

Framework for implementing a big data ecosystem in organizations.

Sergio Orenga-Roglá Ricardo Chalmeta

Autonomous tools and design: a triple-loop approach to human-machine learning.

Stefan Seidel Nicholas Berente Aron Lindberg Kalle Lyytinen Jeffrey V. Nickerson

SQL is no excuse to avoid DevOps.

Thomas A. Limoncelli

Research for practice: security for the modern age.

Jessie Frazelle

Using remote cache service for bazel.

Alpha Lam

Modeling in engineering and science.

Edward A. Lee

UCF's 30-year REU site in computer vision.

Niels da Vitoria Lobo Mubarak Shah

Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo.

Thomas Haigh

CRISPR: an emerging platform for gene editing.

Michael A. Cusumano

Illegal pricing algorithms.

Michal S. Gal

Who owns 3D scans of historic sites?

Esther Shein

Hidden messages fool AI.

Chris Edwards

Quantum leap.

Don Monroe

Answering children's questions about computers.

Judy Robertson

Are we having an ethical crisis in computing?

Moshe Y. Vardi

A people-centered economy.

Vinton G. Cerf

Open collaboration in an age of distrust.

Andrew A. Chien