


default search action
Communications of the ACM, Volume 55
Volume 55, Number 1, January 2012 (EE)
- Moshe Y. Vardi:

Artificial intelligence: past and future. 5
- Software engineering is engineering. 6-7

- Alain Chesnais:

ACM president's letter. 8 - Alain Chesnais:

ACM's annual report. 9-13
- Mark Guzdial

, Bertrand Meyer
:
Understanding CS1 students; defective software. 14-15
- Scott E. Delman

:
eBooks will abound in the ACM Digital Library. 16
- Neil Savage

:
Better medicine through machine learning. 17-19 - Gary Anthes:

Revamping storage performance. 20-22 - Samuel Greengard:

Law and disorder. 23-25 - Sarah Underwood:

Celebration time. 26 - Alex Wright:

Analyzing Apple products. 27 - Paul Hyman:

John McCarthy, 1927-2011. 28-29
- Randal C. Picker:

The yin and yang of copyright and technology. 30-32
- Phillip G. Armour:

The difference engine. 33-34
- Thomas Haigh

:
The IBM PC: from beige box to industry standard. 35-37
- Kai A. Olsen, Alessio Malizia

:
Interfaces for the ordinary user: can we hide too much? 38-40
- Philip L. Frana:

An interview with Stephen A. Cook. 41-46
- Matthew Flatt:

Creating languages in Racket. 48-56 - Jim Gettys, Kathleen M. Nichols:

Bufferbloat: dark buffers in the internet. 57-65 - Carl A. Waldspurger

, Mendel Rosenblum:
I/O virtualization. 66-73
- Jason I. Hong

:
The state of phishing attacks. 74-81 - Geoff Coulson, Barry Porter

, Ioannis Chatzigiannakis
, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun
, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner:
Flexible experimentation in wireless sensor networks. 82-90 - Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu:

Long-term confidentiality of PKI. 91-95
- Roberto Manduchi, James M. Coughlan:

(Computer) vision without sight. 96-104
- Frédo Durand:

Where do people draw lines?: technical perspective. 106 - Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas A. Funkhouser, Szymon Rusinkiewicz

:
Where do people draw lines? 107-115 - Jim Kurose:

Content-centric networking: technical perspective. 116 - Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nick Briggs, Rebecca Braynard:

Networking named content. 117-124
- Daniel H. Wilson:

Future tense. 136-
Volume 55, Number 2, February 2012 (EE)
- Fabrizio Gagliardi:

Revisiting ACM Europe. 5
- Credit non-anonymous reviewers with a name. 6-7

- Michael Stonebraker, Jason I. Hong:

Researchers' big data crisis; understanding design and functionality. 10-11
- Gregory Goth:

The science of better science. 13-15 - Samuel Greengard:

The war against botnets. 16-18 - Alex Wright:

The social life of robots. 19-21 - ACM Fellows inducted. 23

- Gregory L. Rosston

:
Incentive auctions. 24-26
- Beth Simon, Quintin I. Cutts:

Peer instruction: a teaching method to foster deep understanding. 27-29
- Donald A. Norman

:
Yet another technology cusp: confusion, vendor wars, and opportunities. 30-32
- George V. Neville-Neil

:
Wanton acts of debuggery. 33-34
- Rose McDermott

:
Emotion and security. 35-37
- Marvin V. Zelkowitz:

What have we learned about software engineering? 38-39
- BufferBloat: what's wrong with the internet? 40-47

- Hans-Juergen Boehm, Sarita V. Adve:

You don't know jack about shared variables or memory models. 48-54 - Adam J. Oliner, Archana Ganapathi, Wei Xu:

Advances and challenges in log analysis. 55-61
- Nicholas E. Evangelopoulos

, Lucian L. Visinescu:
Text-mining the voice of the people. 62-69 - Holger H. Hoos

:
Programming by optimization. 70-80 - Bryce Allen, John Bresnahan, Lisa Childers, Ian T. Foster, Gopi Kandaswamy, Rajkumar Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke

:
Software as a service for data scientists. 81-88
- Miad Faezipour

, Mehrdad Nourani, Adnan Saeed, Sateesh Addepalli:
Progress and challenges in intelligent vehicle area networks. 90-100
- Rastislav Bodík:

Compiling what to how: technical perspective. 102 - Viktor Kuncak

, Mikaël Mayer, Ruzica Piskac
, Philippe Suter:
Software synthesis procedures. 103-111 - Santosh S. Vempala:

Modeling high-dimensional data: technical perspective. 112 - Adam Tauman Kalai, Ankur Moitra, Gregory Valiant:

Disentangling Gaussians. 113-120
- Peter Winkler

:
Puzzled. 128
Volume 55, Number 3, March 2012 (EE)
- Moshe Y. Vardi:

What is an algorithm? 5
- From syntax to semantics for AI. 6-7

- Bertrand Meyer:

Knowledgeable beginners. 10-11
- Neil Savage

:
Gaining wisdom from crowds. 13-15 - Gary Anthes:

Computing with magnets. 16-18 - Samuel Greengard:

Policing the future. 19-21 - Paul Hyman:

Stanford schooling - gratis! 22 - Jack Rosenberger:

Computer science awards. 23
- Patrick Lin

, Fritz Allhoff, Neil C. Rowe:
War 2.0: cyberweapons and ethics. 24-26
- Pamela Samuelson:

Do software copyrights protect what programs do? 27-29
- Peter J. Denning:

The idea idea. 30-32
- Vassilis Kostakos

:
Training users vs. training soldiers: experiences from the battlefield. 33-35 - Alessio Malizia

, Andrea Bellucci
:
The artificiality of natural user interfaces. 36-38
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:

SAGE: whitebox fuzzing for security testing. 40-44 - Luigi Rizzo

:
Revisiting network I/O APIs: the netmap framework. 45-51 - Poul-Henning Kamp:

The hyperdimensional tar pit. 52-53
- Youngki Lee, S. S. Iyengar

, Chulhong Min, Younghyun Ju, Seungwoo Kang
, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song:
MobiCon: a mobile context-monitoring platform. 54-65 - Seung-Hyun Kim

, Qiu-Hong Wang
, Johannes Ullrich:
A comparative study of cyberattacks. 66-73
- S. Barry Cooper:

Turing's Titanic machine? 74-83 - J. Y. Huang, C. H. Tsai, Shing-Tsaan Huang:

The next generation of GPS navigation systems. 84-93
- Steven D. Gribble

:
The benefits of capability-based protection: technical perspective. 96 - Robert N. M. Watson, Jonathan Anderson

, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. 97-104 - Michael L. Littman:

A new way to search game trees: technical perspective. 105 - Sylvain Gelly, Levente Kocsis, Marc Schoenauer

, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud:
The grand challenge of computer Go: Monte Carlo tree search and extensions. 106-113
- Peter Winkler

:
Puzzled. 118 - Leah Hoffmann:

Q&A. 120-
Volume 55, Number 4, April 2012 (EE)
- Yunhao Liu, Vincent Y. Shen:

ACM China Council. 5
- The beauty of simplicity. 6-7

- Daniel Reed, Mark Guzdial

:
The power of computing; design guidelines in CS education. 8-9
- Gregory Goth:

Preserving digital data. 11-13 - Tom Geller:

Talking to machines. 14-16 - Leah Hoffmann:

Open for business. 17-19
- Michael A. Cusumano:

Can services and platform thinking help the U.S. Postal Service? 21-23
- Richard Heeks

:
Information technology and gross national happiness. 24-26
- George V. Neville-Neil

:
The network protocol battle. 27-28
- Jill Ross, Elizabeth Litzler

, Joanne McGrath Cohoon, Lucy Sanders:
Improving gender composition in computing. 29-31
- Selma Tekir

:
Reading CS classics. 32-34 - Daniel S. Soper:

Is human mobility tracking a good idea? 35-37
- Brian Beckman:

Why LINQ matters: cloud composability guaranteed. 38-44 - Jeffrey Heer, Ben Shneiderman:

Interactive dynamics for visual analysis. 45-54 - Andrew Danowitz

, Kyle Kelley, James Mao, John P. Stevenson, Mark Horowitz:
CPU DB: recording microprocessor history. 55-63
- Martin Schmettow:

Sample size in usability studies. 64-70 - Laurie A. Williams:

What agile teams think of agile principles. 71-76
- David M. Blei:

Probabilistic topic models. 77-84 - Sarvapali D. Ramchurn, Perukrishnen Vytelingum, Alex Rogers, Nicholas R. Jennings

:
Putting the 'smarts' into the smart grid: a grand challenge for artificial intelligence. 86-97
- Dinesh Manocha

:
Building robust dynamical simulation systems: technical perspective. 101 - David Harmon, Etienne Vouga, Breannan Smith, Rasmus Tamstorf

, Eitan Grinspun:
Asynchronous contact mechanics. 102-109 - Ed H. Chi:

Who knows?: searching for expertise on the social web: technical perspective. 110 - Damon Horowitz, Sepandar D. Kamvar:

Searching the village: models and methods for social search. 111-118
- Brian Clegg:

Future tense. 120-
Volume 55, Number 5, May 2012 (EE)
- Moshe Y. Vardi:

Fair access. 5
- Judy Robertson

:
Likert-type scales, statistical methods, and effect sizes. 6-7
- Neil Savage

:
Automating scientific discovery. 9-11 - Alex Wright:

Robots like us. 12-13 - Samuel Greengard:

Digitally possessed. 14-16 - Paul Hyman:

A workshop revival. 17
- Gerald Segal:

ACM's 2012 general election. 19-29
- Peter S. Menell:

Design for symbiosis. 30-32
- David Anderson:

The future of the past. 33-34
- Joel Waldfogel

:
Digitization and copyright: some recent evidence from music. 35-37
- Alexander Repenning

:
Programming goes back to school. 38-40
- Abraham Bernstein

, Mark Klein, Thomas W. Malone:
Programming the global brain. 41-43 - Armando Fox, David A. Patterson:

Crossing the software education chasm. 44-49
- Eric Allman:

Managing technical debt. 50-55 - Pat Helland:

Idempotence is not a medical condition. 56-65 - Erik Meijer:

Your mouse is a database. 66-73
- Alok N. Choudhary, William Hendrix, Kathy Lee, Diana Palsetia, Wei-keng Liao

:
Social media evolution of the Egyptian revolution. 74-80 - Daniel S. Soper, Ofir Turel

:
An n-gram analysis of Communications 2000-2010. 81-87
- Nir Atias, Roded Sharan:

Comparative analysis of protein networks: hard problems, practical solutions. 88-97
- William Gropp

:
Best algorithms + best computers = powerful match. 100 - Ilya Lashuk, Aparna Chandramowlishwaran

, Harper Langston, Tuan-Anh Nguyen, Rahul S. Sampath, Aashay Shringarpure, Richard W. Vuduc
, Lexing Ying, Denis Zorin, George Biros:
A massively parallel adaptive fast multipole method on heterogeneous architectures. 101-109 - Steven Hand:

An experiment in determinism. 110 - Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford

:
Efficient system-enforced deterministic parallelism. 111-119
- Peter Winkler:

Puzzled. 120
Volume 55, Number 6, June 2012 (EE)
- Eugene H. Spafford

:
USACM and U.S. legislation. 5
- The halting problem in the clear light of probability. 6-7

- Jason I. Hong

, Greg Linden:
Protecting against data breaches; living with mistakes. 10-11
- Scott E. Delman

:
Don't throw the baby out with the bathwater. 12
- Gregory Goth:

Analyzing medical data. 13-15 - Gary Anthes:

Smarter photography. 16-18 - Leah Hoffmann:

Data mining meets city hall. 19-21 - Neil Savage

:
Game changer. 22-23 - Paul Hyman:

An influential theoretician. 24
- Phillip G. Armour:

A measure of control. 26-28
- Simson L. Garfinkel

:
The cybersecurity risk. 29-32
- George V. Neville-Neil

:
Scale failure. 33-34
- Chris Hall:

Security of the internet and the known unknowns. 35-37
- Peter J. Denning, Nicholas Dew:

The myth of the elevator pitch. 38-40
- Herbert Lin:

Why computer scientists should care about cyber conflict and U.S. national security policy. 41-43
- Dennis Abts, Bob Felderman:

A guided tour of data-center networking. 44-51 - David J. Crandall

, Noah Snavely:
Modeling people and places with internet photo collections. 52-60 - Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov:

Real-time computer vision with OpenCV. 61-69
- Benjamin Doerr, Mahmoud Fouz, Tobias Friedrich:

Why rumors spread so quickly in social networks. 70-75 - Bryan Parno:

Trust extension for commodity computers. 76-85
- Michael J. Carey, Nicola Onose, Michalis Petropoulos:

Data services. 86-97 - Ketan Mulmuley:

The GCT program toward the P vs. NP problem. 98-107
- Pablo A. Parrilo

:
Reconstructing the unknown, balancing structure and uncertainty: technical perspective. 110 - Emmanuel J. Candès, Benjamin Recht:

Exact matrix completion via convex optimization. 111-119 - Peter Lee:

The fox and the hedgehog: technical perspective. 120 - Tiark Rompf, Martin Odersky:

Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs. 121-130
- Peter Winkler

:
Puzzled. 133 - Leah Hoffmann:

Q&A. 136-
Volume 55, Number 7, July 2012 (EE)
- Moshe Y. Vardi:

Predatory scholarly publishing. 5
- An integral number and its consequences. 7-8

- Mark Guzdial

, Judy Robertson
:
CS and popular culture; learning from console games. 10-11
- Gregory Goth:

Degrees of separation. 13-15 - Gary Anthes:

HTML5 leads a web revolution. 16-17 - Marina Krakovsky:

Patently inadequate. 18-20 - Paul Hyman:

Lost and found. 21
- Mari Sako:

Business models for strategy and innovation. 22-24
- Pamela Samuelson:

Can online piracy be stopped by laws? 25-27
- Richard T. Watson, Jacqueline Corbett

, Marie-Claude Boudreau
, Jane Webster:
An information strategy for environmental sustainability. 28-30
- Martin Campbell-Kelly:

Alan Turing's other universal machine. 31-33
- Alfred Z. Spector, Peter Norvig, Slav Petrov:

Google's hybrid approach to research. 34-37 - Sarah Spiekermann:

The challenges of privacy by design. 38-40
- Kathleen M. Nichols, Van Jacobson:

Controlling queue delay. 42-50 - Poul-Henning Kamp:

My compiler does not understand me. 51-53 - Eric Bouwers, Joost Visser

, Arie van Deursen
:
Getting what you measure. 54-59
- James Abello, Peter Broadwell

, Timothy R. Tangherlini
:
Computational folkloristics. 60-70 - Ian Sommerville, Dave Cliff

, Radu Calinescu
, Justin Keen, Tim Kelly, Marta Z. Kwiatkowska, John A. McDermid
, Richard F. Paige:
Large-scale complex IT systems. 71-77 - Milo M. K. Martin, Mark D. Hill, Daniel J. Sorin:

Why on-chip cache coherence is here to stay. 78-89
- David Harel, Assaf Marron, Gera Weiss

:
Behavioral programming. 90-100
- David A. Patterson:

For better or worse, benchmarks shape a field: technical perspective. 104 - Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn

, Kathryn S. McKinley:
Looking back and looking forward: power, performance, and upheaval. 105-114 - Amos Fiat:

Why study the price of anarchy?: technical perspective. 115 - Tim Roughgarden:

Intrinsic robustness of the price of anarchy. 116-123
- Ken MacLeod:

Future Tense. 128-
- Matthew Swinarski, Diane H. Parente, Rajiv Kishore:

Do small IT firms benefit from higher process capability? 129-134
Volume 55, Number 8, August 2012 (EE)
- Bill Poucher:

Giving students the competitive edge. 5
- Composable trees for configurable behavior. 7

- John Langford, Ruben Ortega:

Machine learning and algorithms; agile development. 10-11
- Jeff Kanipe:

Cosmic simulations. 13-15 - Tom Geller:

DARPA Shredder challenge solved. 16-17 - Samuel Greengard:

Advertising gets personal. 18-20 - Karen A. Frenkel:

Broader horizons. 21
- Paul Tjia:

Inside the hermit kingdom: IT and outsourcing in North Korea. 22-25
- Fred G. Martin

:
Will massive open online courses change how we teach? 26-28
- danah boyd

:
The politics of "real names". 29-31
- George V. Neville-Neil

:
A system is not a product. 32-33
- Chris Forman, Avi Goldfarb

, Shane Greenstein:
The internet is everywhere, but the payoff is not. 34-35
- Kai A. Olsen, Hans Fredrik Nordhaug:

Internet elections: unsafe in any home? 36-38 - Neil McBride:

The ethics of software engineering should be an ethics for the client. 39-41
- Thomas A. Limoncelli:

OpenFlow: a radical new idea in networking. 42-47 - Rafael Vanoni Polanczyk:

Extending the semantics of scheduling priorities. 48-52 - Manuel Serrano, Gérard Berry:

Multitier programming in Hop. 53-59
- Stephen B. Wicker:

The loss of location privacy in the cellular age. 60-68 - Bjorn De Sutter, Aäron van den Oord:

To be or not to be cited in computer science. 69-75 - Wil M. P. van der Aalst

:
Process mining. 76-83
- Scott Aaronson, Edward Farhi, David Gosset, Avinatan Hassidim, Jonathan A. Kelner, Andrew Lutomirski:

Quantum money. 84-92
- Martin C. Rinard:

Example-driven program synthesis for end-user programming: technical perspective. 96 - Sumit Gulwani, William R. Harris, Rishabh Singh:

Spreadsheet data manipulation using examples. 97-105 - Andreas Zeller

:
Proving programs continuous: technical perspective. 106 - Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman:

Continuity and robustness of programs. 107-115
- Peter Winkler:

Puzzled. 120
Volume 55, Number 9, September 2012 (EE)
- Moshe Y. Vardi:

Why ACM? 5
- Operationalizing privacy by design. 7

- Bertrand Meyer:

Incremental research vs. paradigm-shift mania. 8-9
- Gregory Goth:

Atomic-level computing. 11-13 - Gary Anthes:

Chips go upscale. 14-16 - Marina Krakovsky:

Garbage in, info out. 17-19 - Paul Hyman:

In honor of Alan Turing. 20-23
- Thomas Haigh

:
Seven lessons from bad history. 26-29
- Peter J. Denning:

Don't feel bad if you can't predict the future. 30-32
- Tal Z. Zarsky:

Automated prediction: perception, law, and policy. 33-35
- Richard E. Ladner

, Elizabeth Litzler
:
The need to balance innovation and implementation in broadening participation. 36-38
- Esperanza Marcos

, Juan Manuel Vara
, Valeria de Castro
:
Author order: what science can learn from the arts. 39-41 - Christos H. Papadimitriou:

Alan and I. 42-43
- David Chisnall

:
A new Objective-C runtime: from research to production. 44-47 - Emery D. Berger

:
Software needs seatbelts and airbags. 48-53 - Erik Meijer:

All your database are belong to us. 54-60
- Gary Garrison, Sanghyun Kim, Robin L. Wakefield:

Success factors for deploying cloud computing. 62-68 - Radu Calinescu

, Carlo Ghezzi, Marta Z. Kwiatkowska, Raffaela Mirandola
:
Self-adaptive software needs quantitative verification at runtime. 69-77
- Doug A. Bowman

, Ryan P. McMahan
, Eric D. Ragan:
Questioning naturalism in 3D user interfaces. 78-88
- William Buxton:

Innovative interaction: from concept to the wild: technical perspective. 90 - Shumin Zhai, Per Ola Kristensson:

The word-gesture keyboard: reimagining keyboard interaction. 91-101 - Dan Suciu

:
SQL on an encrypted database: technical perspective. 102 - Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:

CryptDB: processing queries on an encrypted database. 103-111
- Peter Winkler

:
Puzzled. 117 - Leah Hoffmann:

Q&A. 120-
Volume 55, Number 10, October 2012 (EE)
- Vinton G. Cerf:

Where is the science in computer science? 5
- When harm to conference reputation is self-inflicted. 6-7

- Daniel Reed, Ed H. Chi:

Online privacy; replicating research results. 8-9
- Neil Savage

:
Digging for drug facts. 11-13 - Gregory Mone:

Redesigning the data center. 14-16 - Leah Hoffmann:

Computer science and the three Rs. 17-19
- Michael A. Cusumano:

Reflecting on the Facebook IPO. 20-23
- Phillip G. Armour:

The Goldilocks estimate. 24-25
- Peter G. Neumann:

The foresight saga, redux. 26-29
- George V. Neville-Neil

:
A nice piece of code. 30-31
- Jean-François Blanchette:

Computing as if infrastructure mattered. 32-34 - Ivan E. Sutherland:

The tyranny of the clock. 35-36
- Rick Ratzel, Rodney Greenstreet:

Toward higher precision. 38-47 - John Allspaw

:
Fault injection in production. 48-52 - Poul-Henning Kamp:

A generation lost in the bazaar. 53-55
- Michael J. Kearns:

Experiments in social computation. 56-67 - Barbara Simons, Douglas W. Jones:

Internet voting in the U.S. 68-77
- Pedro M. Domingos:

A few useful things to know about machine learning. 78-87
- Rocco A. Servedio

:
A high-dimensional surprise: technical perspective. 89 - Guy Kindler, Anup Rao, Ryan O'Donnell, Avi Wigderson:

Spherical cubes: optimal foams from computational hardness amplification. 90-97 - Bruce Hendrickson:

Graph embeddings and linear equations: technical perspective. 98 - Ioannis Koutis, Gary L. Miller, Richard Peng

:
A fast solver for a class of linear systems. 99-107
- Geoffrey A. Landis:

Future tense. 112
Volume 55, Number 11, November 2012 (EE)
- Moshe Y. Vardi:

Will MOOCs destroy academia? 5 - Vinton G. Cerf:

Why is accessibility so hard? 7
- When predicting, start with humility. 8-9

- Michael Stonebraker:

New opportunities for New SQL. 10-11 - Bernard Rous

:
Major update to ACM's Computing Classification System. 12
- Gregory Goth:

Software on Mars. 13-15 - Tom Geller:

Control without controllers. 16-18 - Samuel Greengard:

On the digital trail. 19-21
- David A. Basin, Srdjan Capkun:

The research value of publishing attacks. 22-24
- Pamela Samuelson:

Oracle v. Google: are APIs copyrightable? 25-27
- Kristina McElheran

:
Decentralization versus centralization in IT governance. 28-30
- Aman Yadav

, John T. Korb
:
Learning to teach computer science: the need for a methods course. 31-33
- Timothy Kostyk, Joseph Herkert

:
Societal implications of the emerging smart grid. 34-36
- Richard A. DeMillo:

Keeping technology promises. 37-39
- Jesse Robbins, Kripa Krishnan, John Allspaw

, Tom Limoncelli:
Resilience engineering: learning to embrace failure. 40-47 - Kripa Krishnan:

Weathering the unexpected. 48-52 - Marshall K. McKusick:

Disks from the perspective of a file system. 53-55
- Dan Boneh, Amit Sahai, Brent Waters:

Functional encryption: a new vision for public-key cryptography. 56-64 - Jörg K. Wegner

, Aaron D. Sterling, Rajarshi Guha, Andreas Bender
, Jean-Loup Faulon, Janna Hastings
, Noel M. O'Boyle
, John P. Overington
, Herman van Vlijmen, Egon L. Willighagen
:
Cheminformatics. 65-75
- Rolf Pfeifer, Max Lungarella, Fumiya Iida

:
The challenges ahead for bio-inspired 'soft' robotics. 76-87
- Richard Szeliski:

Open platforms for computational photography: technical perspective. 89 - Andrew Adams, David E. Jacobs, Jennifer Dolson, Marius Tico, Kari Pulli, Eino-Ville Talvala, Boris Ajdin, Daniel A. Vaquero, Hendrik P. A. Lensch, Mark Horowitz, Sung Hee Park, Natasha Gelfand, Jongmin Baek, Wojciech Matusik, Marc Levoy:

The Frankencamera: an experimental platform for computational photography. 90-98 - Henning Schulzinne:

The realities of home broadband: technical perspective. 99 - Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè:

Measuring home broadband performance. 100-109
- Peter Winkler:

Puzzled. 120
Volume 55, Number 12, December 2012 (EE)
- Mary W. Hall

:
Understanding ACM's past. 5
- Vinton G. Cerf:

Computer science revisited. 7
- Why open access? 8-9

- Mark Guzdial

, Judy Robertson:
Levels of abstraction: pre-teens and career choices. 12-13
- Gregory Goth:

Quantum quests. 15-17 - Gary Anthes:

Zoom in, zoom out. 18-19 - Paul Hyman:

In the year of disruptive education. 20-22
- Richard Heeks

:
IT innovation for the bottom of the pyramid. 24-27
- David Anderson:

Saving private Gromit. 28-30
- George V. Neville-Neil

:
Can more code mean fewer bugs? 31-32
- Peter J. Denning:

Moods. 33-35
- Teresa A. Dahlberg:

Why we need an ACM Special Interest Group for broadening participation. 36-38
- William Newman:

Alan Turing remembered. 39-40
- Ivar Jacobson, Pan Wei Ng, Paul McMahon, Ian Spence, Svante Lidman:

The essence of software engineering: the SEMAT kernel. 42-49 - Aiman Erbad

, Charles Krasic:
Sender-side buffers and the case for multimedia adaptation. 50-58 - Michael Cornwell:

Anatomy of a solid-state drive. 59-63
- Bryce Thomas, Raja Jurdak

, Ian Atkinson
:
SPDYing up the web. 64-73 - Robert M. French:

Moving beyond the Turing test. 74-77
- David Doty

:
Theory of algorithmic self-assembly. 78-88
- Yannis Smaragdakis:

High-level data structures: technical perspective. 90 - Peter Hawkins, Martin C. Rinard, Alex Aiken

, Mooly Sagiv, Kathleen Fisher:
An introduction to data representation synthesis. 91-99 - Ali Jadbabaie

:
Natural algorithms in a networked world: technical perspective. 100 - Bernard Chazelle:

Natural algorithms and influence systems. 101-110
- Peter Winkler

:
Puzzled. 126 - Leah Hoffmann:

Q&A. 128-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














