Volume 63, Number 12, December 2020
Walden Three.

William Sims Bainbridge

SATURN: an introduction to the internet of materials.

Nivedita Arora Thad Starner Gregory D. Abowd

Technical perspective: The future of large-scale embedded sensing.

Joseph A. Paradiso

Enabling AI at the edge with XNOR-networks.

Mohammad Rastegari Vicente Ordonez Joseph Redmon Ali Farhadi

Technical perspective: XNOR-networks-powerful but tricky.

David Alexander Forsyth

Measuring internet speed: current challenges and future recommendations.

Nick Feamster Jason Livingood

The dark triad and insider threats in cyber security.

Michele Maasberg Craig Van Slyke Selwyn Ellis Nicole Beebe

Green AI.

Roy Schwartz Jesse Dodge Noah A. Smith Oren Etzioni

Security analysis of SMS as a second factor of authentication.

Roger Piqueras Jover

The life of a data byte.

Jessie Frazelle

Federated learning for privacy-preserving AI.

Yong Cheng Yang Liu Tianjian Chen Qiang Yang

Silicon politics.

Margaret O'Mara

Removing kode.

George V. Neville-Neil

Navigating in real-time environments.

Peter J. Denning

U.S. states must broaden participation while expanding access to computer science education.

W. Richards Adrion Sarah T. Dunton Barbara Ericson Renee Fall Carol L. Fletcher Mark Guzdial

Operationalizing AI ethics principles.

Cansu Canca

Technologies for the visually impaired.

Logan Kugler

Softening up robots.

Esther Shein

Tracking COVID, discreetly.

Neil Savage

Pitting computers against each other ... in chess.

Monroe M. Newborn

Repairability redux.

Vinton G. Cerf

Volume 63, Number 11, November 2020
Tackling the challenges of CS education.

Leah Hoffmann

BLeak: automatically debugging memory leaks in web applications.

John Vilk Emery D. Berger

Technical perspective: BLeak: semantics-aware leak detection in the web.

Harry Xu

Generative adversarial networks.

Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron C. Courville Yoshua Bengio

Technical perspective: When the adversary is your friend.

Alexei A. Efros Aaron Hertzmann

The graph isomorphism problem.

Martin Grohe Pascal Schweitzer

Coding at a crossroads.

Mitchel Resnick Natalie Rusk

Data on the outside versus data on the inside.

Pat Helland

Five nonobvious remote work techniques.

Thomas A. Limoncelli

A perspective on theoretical computer science in Latin America.

Marcos Kiwi Yoshiharu Kohayakawa Sergio Rajsbaum Francisco Rodríguez-Henríquez Jayme Luiz Szwarcfiter Alfredo Viola

A tour of dependable computing research in Latin America.

Elias P. Duarte Raimundo J. A. Macêdo Eliane Martins Sergio Rajsbaum

Imaging sciences R&D laboratories in Argentina.

Claudio Delrieux Virginia Ballarín Cristian García Bauza Mario A. López

A panorama of computing in central America and the Caribbean.

Gerardo Torres Zelaya

Chile's new interdisciplinary institute for foundational research on data.

Marcelo Arenas Pablo Barceló

Digital healthcare in Latin America: the case of Brazil and Mexico.

Monica Tentori Artur Ziviani Débora C. Muchaluat-Saade Jesús Favela

The Latin American supercomputing ecosystem for science.

Isidoro Gitler Antônio Tadeu A. Gomes Sergio Nesmachnow

Three success stories about compact data structures.

Diego Arroyuelo José Fuentes-Sepúlveda Diego Seco

Minding the AI gap in LATAM.

Barbara Poblete Jorge Pérez

Understanding salsa: how computing is defining latin music.

Carlos A. Arce-Lopera Gerardo M. Sarria M.

Contextualized interpretable machine learning for medical diagnosis.

Wagner Meira Jr. Antonio Luiz P. Ribeiro Derick M. de Oliveira Antônio H. Ribeiro

A technological and innovative approach to COVID-19 in Uruguay.

Gastón Milano Diego Vallespir Alfredo Viola

Toward smart and sustainable cities.

Fabio Kon Kelly Rosa Braghetto Eduardo Felipe Zambom Santana Roberto Speicys Cardoso Jorge Guerra Guerra

Why me?: shedding light on random processes via randomness beacons.

Alejandro Hevia Camilo Gómez

Estimating Amazon carbon stock using AI-based remote sensing.

Rosiane De Freitas João M. B. Cavalcanti Sergio Cleger Niro Higuchi Carlos Henrique Souza Celes Adriano Jose Nogueira Lima


Virgílio A. F. Almeida Gonzalo Navarro Sergio Rajsbaum

Reason-checking fake news.

Jacky Visser John Lawrence Chris Reed

Where should your IT constraint be?: The case of the financial services industry.

Boaz Ronen Alex Coman

It is time for more critical CS education.

Amy J. Ko Alannah Oleson Neil Ryan Yim Register Benjamin Xie Mina Tari Matthew J. Davidson Stefania Druga Dastyni Loksa

Using data and respecting users.

Marshall W. Van Alstyne Alisa Lenart

Copyright's online service providers safe harbors under siege.

Pamela Samuelson

Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic.

Lorrie Faith Cranor

Terahertz networks move closer to reality.

Samuel Greengard

Natural language misunderstanding.

Keith Kirkpatrick

Seeking artificial common sense.

Don Monroe

Bringing industry back to conferences, and paying for results.

David Patterson Yegor Bugayenko

Weighing grad school payback.

CACM Staff

A career unfolds in phases.

Celeste M. Rohlfing

What should be done about social media?

Moshe Y. Vardi

Volume 63, Number 10, October 2020
Privacy-preserving polling.

Dennis E. Shasha

Lower bounds for external memory integer sorting via network coding.

Alireza Farhadi Mohammad Taghi Hajiaghayi Kasper Green Larsen Elaine Shi

Technical perspective: Two for the price of one.

Paul Beame

MadMax: analyzing the out-of-gas world of smart contracts.

Neville Grech Michael Kong Anton Jurisevic Lexi Brent Bernhard Scholz Yannis Smaragdakis

Technical perspective: Analyzing smart contracts with MadMax.

Benjamin Livshits

A decade of social bot detection.

Stefano Cresci

Responsible vulnerability disclosure in cryptocurrencies.

Rainer Böhme Lisa Eckey Tyler Moore Neha Narula Tim Ruffing Aviv Zohar

Real time spent on real time.

Reinhard Wilhelm

What do agile, lean, and ITIL mean to DevOps?

Stuart D. Galup Ronald Dattero Jing Quan

Debugging incidents in Google's distributed systems.

Charisma Chan Beth Cooper

The history, status, and future of FPGAs.

Oskar Mencer Dennis Allison Elad Blatt Mark Cummings Michael J. Flynn Jerry Harris Carl Hewitt Quinn Jacobson Maysam Lavasani Mohsen Moazami Hal Murray Masoud Nikravesh Andreas Nowatzyk Mark Shand Shahram Shirazi

Using computer programs and search problems for teaching theory of computation.

John MacCormick

We need to automate the declaration of conflicts of interest.

Richard T. Snodgrass Marianne Winslett

Sanity vs. invisible markings.

George V. Neville-Neil

A holistic view of future risks.

Peter G. Neumann

Self-driving vehicle technology: progress and promises.

Michael A. Cusumano

Fran Allen: 1932-2020.

Simson L. Garfinkel Eugene H. Spafford

Who has access to your smartphone data?

Keith Kirkpatrick

Thwarting side-channel attacks.

Chris Edwards

Bouncing balls and quantum computing.

Don Monroe

Protecting computers and people from viruses.

Robin K. Hill

On digital diplomacy.

Vinton G. Cerf

Volume 63, Number 9, September 2020
Little green message: a different kind of first-contact scenario.

Brian Clegg

Flood-risk analysis on terrains.

Aaron Lowe Pankaj K. Agarwal Mathias Rav

Technical perspective: Progress in spatial computing for flood prediction.

Shashi Shekhar

Computing value of spatiotemporal information.

Heba Aly John Krumm Gireeja Ranade Eric Horvitz

Technical perspective: Computing the value of location data.

Cyrus Shahabi

Keeping CALM: when distributed consistency is easy.

Joseph M. Hellerstein Peter Alvaro

Improving social alignment during digital transformation.

Andrew Burton-Jones Alicia Kate Gilchrist Peter Green Michael Draheim

Becoming an 'adaptive' expert.

Quinn K. Burke Cinamon Sunrise Bailey

Is persistent memory persistent?

Terence Kelly

Dark patterns: past, present, and future.

Arvind Narayanan Arunesh Mathur Marshini Chetty Mihir Kshirsagar

'Have you thought about...': talking about ethical implications of research.

Amy S. Bruckman

Integrating management science into the HPC research ecosystem.

Guido Schryen

Avalanches make us all innovators.

Peter J. Denning

Autonomous vehicle safety: lessons from aviation.

Jaynarayan H. Lala Carl E. Landwehr John F. Meyer

A recent renaissance in privacy law.

Margot E. Kaminski

Virtual collaboration in the age of the coronavirus.

Paul Marks

AI on edge.

Samuel Greengard

It's alive!

Gregory Mone

Teaching CS undergrads online to work with others effectively.

Orit Hazzan

Lost in translation.

CACM Staff

Where have all the domestic graduate students gone?

Moshe Y. Vardi

Volume 63, Number 8, August 2020
Seeing light at the end of the cybersecurity tunnel.

Leah Hoffmann

Scalable linear algebra on a relational database system.

Shangyu Luo Zekai J. Gao Michael N. Gubanov Luis Leopoldo Perez Dimitrije Jankov Christopher M. Jermaine

Technical perspective: Supporting linear algebra operations in SQL.

Yannis Papakonstantinou

Magellan: toward building ecosystems of entity matching solutions.

AnHai Doan Pradap Konda Paul Suganthan G. C. Yash Govind Derek Paulsen Kaushik Chandrasekhar Philip Martinkus Matthew Christie

Technical perspective: Entity matching with Magellan.

Wang-Chiew Tan

Threats of a replication crisis in empirical computer science.

Andy Cockburn Pierre Dragicevic Lonni Besançon Carl Gutwin

Examining undergraduate computer science participation in North Carolina.

Fay Cobb Payton Alexa Busch

Why computing belongs within the social sciences.

Randy Connolly

Digital creativity support for original journalism.

Neil A. M. Maiden Konstantinos Zachos Amanda Brown Dimitris Apostolou Balder Holm Lars Nyre Aleksander Nygård Tonheim Arend van den Beld

Power to the people.

Jessie Frazelle

To catch a failure: the record-and-replay approach to debugging.

CACM Staff

Thorny problems in data (-intensive) science.

Michael Scroggins Irene V. Pasquetto R. Stuart Geiger Bernadette M. Boscoe Peter T. Darch Charlotte Cabasse-Mazel Cheryl Thompson Milena S. Golshan Christine L. Borgman

OMSCS: the revolution will be digitized.

Zvi Galil

Data-centricity: a challenge and opportunity for computing education.

Shriram Krishnamurthi Kathi Fisler

Broken hearts and coffee mugs.

George V. Neville-Neil

TECHNOLOchicas: a critical intersectional approach shaping the color of our future.

Jannie Fernandez JeffriAnne Wilder

Are we addicted to technology?

Logan Kugler

Digital humans on the big screen.

Don Monroe

Neuromorphic chips take shape.

Samuel Greengard

How WWII was won, and why CS students feel unappreciated.

John Arquilla Jeremy Roschelle

On the internet of medical things.

Vinton G. Cerf

Volume 63, Number 7, July 2020
Strategic paddling.

Dennis E. Shasha

ASIC clouds: specializing the datacenter for planet-scale applications.

Michael Bedford Taylor Luis Vega Moein Khazraee Ikuo Magaki Scott Davidson Dustin Richmond

Technical perspective: ASIC clouds: specializing the datacenter.

Parthasarathy Ranganathan

Spectre attacks: exploiting speculative execution.

Paul Kocher Jann Horn Anders Fogh Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz Yuval Yarom

Technical perspective: Why 'correct' computers can leak your information.

Mark D. Hill

Some simple economics of the blockchain.

Christian Catalini Joshua S. Gans

A domain-specific supercomputer for training deep neural networks.

Norman P. Jouppi Doe Hyun Yoon George Kurian Sheng Li Nishant Patil James Laudon Cliff Young David A. Patterson

The data science life cycle: a disciplined approach to advancing data science as a science.

Victoria Stodden

Domain-specific hardware accelerators.

William J. Dally Yatish Turakhia Song Han

Demystifying stablecoins.

Jeremy Clark Didem Demirag Seyedehmahsa Moosavi

The best place to build a subway.

Pat Helland

Call for a wake standard for artificial intelligence.

Brian Subirana

Consumers vs. citizens in democracy's public sphere.

Allison Stanger

For impactful community engagement: check your role.

Kathleen H. Pine Margaret M. Hinrichs Jieshu Wang Dana Lewis Erik Johnston

Proposal: a market for truth to address false ads on social media.

Marshall W. Van Alstyne

AI authorship?

Pamela Samuelson

Reducing and eliminating e-waste.

Keith Kirkpatrick

Your wish is my CMD.

Neil Savage

The quantum threat.

Gregory Mone

Transitioning to distance learning and virtual conferencing.

John Arquilla Mark Guzdial

Computing's role in climate warming.

CACM Staff

Challenge yourself by reaching for the highest bar.

Yosuke Ozawa

A computational lens on economics.

Moshe Y. Vardi

Volume 63, Number 6, June 2020
Attaining the third dimension.

Leah Hoffmann

Data-driven algorithm design.

Rishi Gupta Tim Roughgarden

Technical perspective: Algorithm selection as a learning problem.

Avrim Blum

Street lamps as a platform.

Max Mühlhäuser Christian Meurisch Michael Stein Jörg Daubert Julius von Willich Jan Riemann Lin Wang

Contextual word representations: putting words into computers.

Noah A. Smith

The 'invisible' materiality of information technology.

Alan Borning Batya Friedman Nick Logler

Meltdown: reading kernel memory from user space.

Moritz Lipp Michael Schwarz Daniel Gruss Thomas Prescher Werner Haas Jann Horn Stefan Mangard Paul Kocher Daniel Genkin Yuval Yarom Mike Hamburg Raoul Strackx

Communicate using the numbers 1, 2, 3, and more.

Thomas A. Limoncelli

Commit to memory.

Jessie Frazelle

AI and accessibility.

Meredith Ringel Morris

Studying programming in the neuroage: just a crazy idea?

Janet Siegmund Norman Peitek André Brechmann Chris Parnin Sven Apel

Technology adoption.

Peter J. Denning Ted G. Lewis

Kode vicious plays in traffic.

George V. Neville-Neil

How to curtail oversensing in the home.

Connor Bolton Kevin Fu Josiah D. Hester Jun Han

Hiring from the autism spectrum.

Esther Shein

Seeing through walls.

Neil Savage

Leveraging unlabeled data.

Chris Edwards

An animating spirit.

Neil Savage

Detecting/preventing infections, and moving instruction online.

Terrence DeFranco Jeremy Roschelle

Implications of the COVID-19 pandemic.

Vinton G. Cerf

Safety proposal points in same direction.

CACM Staff

What do DDT and computing have in common?

Andrew A. Chien

Volume 63, Number 5, May 2020
Optimal chimes.

Dennis E. Shasha

Measuring and mitigating OAuth access token abuse by collusion networks.

Shehroze Farooqi Fareed Zaffar Nektarios Leontiadis Zubair Shafiq

Technical perspective: Fake 'likes' and targeting collusion networks.

Geoffrey M. Voelker


Hagit Attiya Sergio Rajsbaum

A snapshot of the frontiers of fairness in machine learning.

Alexandra Chouldechova Aaron Roth

A bibliometric approach for detecting the gender gap in computer science.

Sandra Mattauch Katja Lohmann Frank Hannig Daniel Lohmann Jürgen Teich

Reading in the panopticon - : your kindle may be spying on you, but you can't be sure.

Stephen B. Wicker Dipayan P. Ghosh

Revealing the critical role of human performance in software.

David D. Woods John Allspaw

Beyond the 'fix-it' treadmill.

J. Paul Reed

ACM publications finances.

Jack W. Davidson Joseph A. Konstan Scott E. Delman

When technology goes awry.

Calvin C. Newport

Computers do not make art, people do.

Aaron Hertzmann

A vision of K - : 12 computer science education for 2030.

Mike Tissenbaum Anne T. Ottenbreit-Leftwich

Secure development tools and techniques need more research that will increase their impact and effectiveness in practice.

Adam Shostack Mary Ellen Zurko

What role for antitrust in regulating platforms?

C. Scott Hemphill

Deceiving the masses on social media.

Keith Kirkpatrick

Will RISC-V revolutionize computing?

Samuel Greengard

A proof from 'the book'.

Don Monroe

Teaching CS humbly, and watching the AI revolution.

Mark Guzdial Jiajie Zhang

Automating automation: CS at the heart of the manufacturing economy.

Arquimedes Canedo

Launching a new feature in Communications.

Andrew A. Chien

ACM's 2020 general election.

Gerald Segal

Efficiency vs. resilience: what COVID-19 teaches computing.

Moshe Y. Vardi

Partnerships can help drive gender equality.

Jodi Tims

How ACM is adapting in this period of global uncertainties.

Cherri M. Pancake

Volume 63, Number 4, April 2020
A bounded and envy-free cake cutting algorithm.

Haris Aziz Simon Mackenzie

An answer to fair division's most enigmatic question: technical perspective.

Ariel D. Procaccia

The Antikythera mechanism.

Herbert E. Bruderer

Cyber warranties: market fix or marketing trick?

Daniel W. Woods Tyler Moore

Cognitive work of hypothesis exploration during anomaly response.

Marisa R. Grayson

Managing the hidden costs of coordination.

Laura M. D. Maguire

Asia's surging interest in binary analysis.

Sang Kil Cha Zhenkai Liang

5G commercialization and trials in Korea.

Dong Ku Kim Hyeonwoo Lee Seong-Choon Lee Sunwoo Lee

Advances in security research in the Asiacrypt region.

Raphael C.-W. Phan Masayuki Abe Lynn Batten Jung Hee Cheon Ed Dawson Steven D. Galbraith Jian Guo Lucas C. K. Hui Kwangjo Kim Xuejia Lai Dong Hoon Lee Mitsuru Matsui Tsutomu Matsumoto Shiho Moriai Phong Q. Nguyen Dingyi Pei Duong Hieu Phan Josef Pieprzyk Huaxiong Wang Hank Wolfe Duncan S. Wong Tzong-Chen Wu Bo-Yin Yang Siu-Ming Yiu Yu Yu Jianying Zhou

seL4 in Australia: from research to real-world trustworthy systems.

Gernot Heiser Gerwin Klein June Andronick

Detecting fake news in social media: an Asia-Pacific perspective.

Meeyoung Cha Wei Gao Cheng-Te Li

Digital healthcare across Oceania.

Chris Bain Abraham Oshni Alvandi

Developing AI for law enforcement in Singapore and Australia.

Lam Kwok Yan Campbell Wilson

AI Singapore: empowering a smart nation.

Sintia Teddy-Ang Abigail Toh

Innovating services and digital economy in Singapore.

Thomas Ho Chee Tat George Loh Chee Ping

Singapore's cybersecurity ecosystem.

Karen Teh Vivy Suhendra Soon Chia Lim Abhik Roychoudhury

Cybersecurity in Pacific Island nations.

Carsten Rudolph Sadie Creese Sameer Sharma

Capturing cultural heritage in East Asia and Oceania.

Sally Jo Cunningham Fariz Darari Adila Krisnadhi Annika Hinze

The NII Shonan meeting in Japan.

Ken-ichi Kawarabayashi


Sue Moon Ann E. Nicholson Abhik Roychoudhury

A taxonomy of automated assistants.

Jerrold M. Grochow

Organizing family support services at ACM conferences.

Audrey Girouard Jon E. Froehlich Regan L. Mandryk Mark Hancock

Why is cybersecurity not a human-scale problem anymore?

Gaurav Banga

Master of tickets.

George V. Neville-Neil

Artificial intelligence and the future of professional work.

Mari Sako

The temptation of data-enabled surveillance.

Alan Rubel Kyle M. L. Jones

How universities deploy student data.

Esther Shein

Machine learning, meet whiskey.

Gregory Mone

Dead languages come to life.

Gary Anthes

Teaching teachers to offer STEM to undergrads.

Mark Guzdial

Adding more color to patch picture.

CACM Staff

Multisensory adventures.

Vinton G. Cerf

New ways to think about CS education.

Cherri M. Pancake

Reinventing virtual machines.

Leah Hoffmann

Volume 63, Number 3, March 2020
Stopping tyranny.

Dennis E. Shasha

Pivot tracing: dynamic causal monitoring for distributed systems.

Jonathan Mace Ryan Roelke Rodrigo Fonseca

Technical perspective: A perspective on pivot tracing.

Rebecca Isaacs

Toward model-driven sustainability evaluation.

Jörg Kienzle Gunter Mussbacher Benoît Combemale Lucy Bastin Nelly Bencomo Jean-Michel Bruel Christoph Becker Stefanie Betz Ruzanna Chitchyan Betty H. C. Cheng Sonja Klingert Richard F. Paige Birgit Penzenstadler Norbert Seyff Eugene Syriani Colin C. Venters

Editing self-image.

Ohad Fried Jennifer Jacobs Adam Finkelstein Maneesh Agrawala

The BBC micro: bit: from the U.K. to the world.

Jonny Austin Howard Baker Thomas Ball James Devine Joe Finney Peli de Halleux Steve Hodges Michal Moskal Gareth Stockdale

Spotify guilds.

Darja Smite Nils Brede Moe Marcin Floryan Georgiana Levinta Panagiota Chatzipetrou

Crowdsourcing moral machines.

Edmond Awad Sohan Dsouza Jean-François Bonnefon Azim Shariff Iyad Rahwan

Above the line, below the line.

Richard I. Cook

Securing the boot process.

Jessie Frazelle

Conferences in an era of expensive carbon.

Benjamin C. Pierce Michael Hicks Crista Lopes Jens Palsberg

Unsafe at any level.

Marc C. Canellas Rachel A. Haga

Four internets.

Kieron O&aposHara Wendy Hall

Through the lens of a passionate theoretician.

Omer Reingold

Dilemmas of artificial intelligence.

Peter J. Denning Dorothy E. Denning

Computing and community in formal education.

Michael Lachney Aman Yadav

Across the language barrier.

Keith Kirkpatrick

Algorithms to harvest the wind.

Don Monroe

Can nanosheet transistors keep Moore's law alive?

Samuel Greengard

Coding for voting.

Robin K. Hill

Conferences and carbon impact.

CACM Staff

Advancing computing as a science and profession: but to what end?

Moshe Y. Vardi

Volume 63, Number 2, February 2020
'Everything fails all the time'.

Leah Hoffmann

Automating visual privacy protection using a smart LED.

Shilin Zhu Chi Zhang Xinyu Zhang

Lighting the way to visual privacy: technical perspective.

Marco Gruteser

Fuzzing: hack, art, and science.

Patrice Godefroid

Directions for professional social matching systems.

Thomas Olsson Jukka Huhtamäki Hannu Kärkkäinen

Toward ML-centric cloud platforms.

Ricardo Bianchini Marcus Fontoura Eli Cortez Anand Bonde Alexandre Muzio Ana-Maria Constantin Thomas Moscibroda Gabriel Magalhães Girish Bablani Mark Russinovich

Optimizations in C++ compilers.

Matt Godbolt

Opening up the baseboard management controller.

Jessie Frazelle

Guiding students to develop essential skills.

Clif Kussmaul

When human-computer interaction meets community citizen science.

Yen-Chia Hsu Illah R. Nourbakhsh

Numbers are for computers, strings are for humans.

George V. Neville-Neil

Are you sure your software will not kill anyone?

Nancy Leveson

Are we losing momentum?

Carlos Iglesias Dhanaraj Thakur Michael L. Best

Tracking shoppers.

Keith Kirkpatrick

Dark web's doppelgängers aim to dupe antifraud systems.

Paul Marks

Learning to trust quantum computers.

Chris Edwards

Sizing the U.S. student cohort for computer science.

Mark Guzdial

On durability.

Vinton G. Cerf

Start small, then achieve big impact.

Cherri M. Pancake

Volume 63, Number 1, January 2020
Feedback for foxes.

Dennis E. Shasha

Evidence that computer science grades are not bimodal.

Elizabeth Patitsas Jesse Berlin Michelle Craig Steve Easterbrook

Technical perspective: Is there a geek gene?

Mark Guzdial

Mastering concurrent computing through sequential thinking.

Sergio Rajsbaum Michel Raynal

Techniques for interpretable machine learning.

Mengnan Du Ninghao Liu Xia Hu

Dependability in edge computing.

Saurabh Bagchi Muhammad-Bilal Siddiqui Paul Wood Heng Zhang

Space time discontinuum.

Pat Helland

Blockchain technology: what is it good for?

Scott Ruoti Ben Kaiser Arkady Yerukhimovich Jeremy Clark Robert K. Cunningham

The reliability of enterprise applications.

Sanjay Sha

A* search: what's in a name?

James W. Davis Jeff Hachtel

Ethics of technology needs more political philosophy.

Johannes Himmelreich

von Neumann thought Turing's universal machine was 'simple and neat.': but that didn't tell him how to design a computer.

Thomas Haigh Mark Priestley

'Platformizing' a bad business does not make it a good business.

Michael A. Cusumano

Increasing automation in policing.

Elizabeth E. Joh

Will deepfakes do deep damage?

Samuel Greengard

How the internet spans the globe.

Logan Kugler

Multiplication hits the speed limit.

Erica Klarreich

In search of the shortest possible schedule.

Bertrand Meyer

Publish and perish.

Moshe Y. Vardi

Cracks in open collaboration in universities.

Andrew A. Chien