Communications of the ACM, Volume 57
Volume 57, Number 1, January 2014
From the president
Letters to the Editor
BLOG@CACM
News
Gary Anthes:
French team invents faster code-breaking algorithm. 21-23 Tom Geller:
How do you feel?: your computer knows. 24-26 Paul Hyman:
'Peace technologies' enable eyewitness reporting when disasters strike. 27-29
Technology strategy and management
Law and technology
Historical reflections
Thomas Haigh:
Actually, Turing did not invent the computer. 36-41
The business of software
Viewpoint
Practice
Contributed articles
Kenton O'Hara,
Gerardo Gonzalez,
Abigail Sellen,
Graeme P. Penney,
Andreas Varnavas,
Helena M. Mentis,
Antonio Criminisi,
Robert Corish,
Mark Rouncefield,
Neville Dastur,
Tom Carrell:
Touchless interaction in surgery. 70-77
Review articles
Research highlights
Last byte
Volume 57, Number 2, February 2014
Letter from Chair of Education Board
Letter from the President
Letters to the Editor
BLOG@CACM
News
ACM fellows inducted. 22
Privacy and security
Education
Tim Bell:
Establishing a nationwide CS curriculum in New Zealand high schools. 28-30
Inside risks
Kode vicious
Economic and business dimensions
Viewpoint
Practice
Contributed articles
Review articles
Research highlights
Last byte
Volume 57, Number 3, March 2014
Letter from the President
Letters to the Editor
BLOG@CACM
News
Legally speaking
Computing ethics
The profession of IT
Broadening participation
Richard E. Ladner:
The impact of the United Nations convention on the rights of persons with disabilities. 30-32
Viewpoint
Practice
Andi Kleen:
Scaling existing lock-based applications with lock elision. 52-56
Contributed articles
Review articles
Research highlights
Dan S. Wallach:
Smartphone security 'taint' what it used to be: technical perspective. 98
Last byte
Volume 57, Number 4, April 2014
From the President
Letters to the Editor
Code that missed Mars. 9
BLOG@CACM
News
Chris Edwards:
Using patient data for personalized cancer treatments. 13-15 Paul Hyman:
Speech-to-speech translations stutter, but researchers see mellifluous future. 16-19 Gregory Mone:
New models in cosmetics replacing animal testing. 20-21
Technology strategy and management
Global computing
Kode Vicious
Viewpoint
Uzi Vishkin:
Is multicore hardware for general-purpose parallel processing broken? 35-39
Practice
Contributed articles
Review articles
Research highlights
Joe Warren:
A 'reasonable' solution to deformation methods: technical perspective. 98
Last byte
Volume 57, Number 5, May 2014
From the president
Letters to the Editor
BLOG@CACM
Judy Robertson:
Rethinking how to teach programming to newcomers. 18-19
News
Economic and business dimensions
Law and technology
Historical reflections
Education
Viewpoint
Practice
Bob Toxen:
The NSA and Snowden: securing the all-seeing eye. 44-51
Contributed articles
Review articles
Research highlights
Last byte
Volume 57, Number 6, June 2014
Letter from the President
Letters to the Editor
BLOG@CACM
News
Inside risks
The business of software
Privacy and security
The profession of IT
Kode Vicious
Viewpoint
Practice
Andy Gill:
Domain-specific languages and code synthesis using Haskell. 42-49
Contributed articles
Review articles
Research highlights
Last byte
Volume 57, Number 7, July 2014
Letters to the Editor
BLOG@CACM
News