


Остановите войну!
for scientists:


default search action
Communications of the ACM, Volume 60
Volume 60, Number 1, January 2017
- Moshe Y. Vardi:
Technology for the most effective use of mankind. 5 - Vicki L. Hanson:
The ACM future of computing academy. 7 - Vinton G. Cerf:
Information and misinformation on the internet. 9
- Valerie Barr:
How we teach CS2All. 10-11 - Michael Stonebraker, Raul Castro Fernandez, Dong Deng, Michael L. Brodie:
What to do about database decay. 11
- Don Monroe:
Pure randomness extracted from two poor sources. 13-15 - Alex Wright:
Mapping the internet of things. 16-18 - Gregory Mone:
Bias in technology. 19-20
- Michael A. Cusumano:
Is Google's alphabet a good bet? 22-25
- Michael Geist:
Why less is more when it comes to internet jurisdiction. 26-28
- Thomas Haigh:
Colossal genius: Tutte, Flowers, and a bad imitation of Turing. 29-35
- Jerry Kaplan:
Artificial intelligence: think again. 36-38 - Jeremy Straub
:
Effects of international trafficking in arms regulations changes. 39-41
- Kate Matsudaira:
Resolving conflict. 42-44 - Josh Bailey, Stephen Stuart:
Faucet: deploying SDN in the enterprise. 45-49 - Peter Bailis, Jean Yang, Vijay Janapa Reddi, Yuhao Zhu:
Research for practice: web security and mobile web computing. 50-53
- Peter J. Denning, Ted G. Lewis:
Exponential laws of computing growth. 54-65 - Cecil Eng Huang Chua
, Veda C. Storey:
Bottom-up enterprise information systems: rethinking the roles of central IT departments. 66-72
- Bülent Yener:
Cell-graphs: image-driven modeling of structure-function relationship. 74-84
- Richard Szeliski:
Magnifying motions the right way: technical perspective. 86 - Neal Wadhwa, Hao-Yu Wu, Abe Davis, Michael Rubinstein, Eugene Shih, Gautham J. Mysore, Justin G. Chen, Oral Büyüköztürk, John V. Guttag, William T. Freeman, Frédo Durand:
Eulerian video magnification and analysis. 87-95 - Valentina Salapura:
Technical Perspective: Mapping the universe. 96 - Salman Habib, Vitali A. Morozov, Nicholas Frontiere, Hal Finkel, Adrian Pope, Katrin Heitmann, Kalyan Kumaran, Venkatram Vishwanath, Tom Peterka, Joseph A. Insley, David Daniel, Patricia K. Fasel, Zarija Lukic:
HACC: extreme scaling and performance across diverse architectures. 97-104
- Dennis E. Shasha:
Open field tic-tac-toe. 112
Volume 60, Number 2, February 2017
- Vicki L. Hanson:
Celebrating 50 years of the Turing award. 5 - Francine Berman, Vinton G. Cerf:
Social and ethical behavior in the internet of things. 6-7
- Use the scientific method in computer science. 8-9
- Artificial intelligence. 10-11
- Janet Davis:
Liberal arts academia wants YOU! 12-13
- Chris Edwards:
Secure quantum communications. 15-17 - Samuel Greengard:
Are computer chips the new security threat? 18-19 - Keith Kirkpatrick:
It's not the algorithm, it's the data. 21-23
- Ulf Lindqvist, Peter G. Neumann:
The future of the internet of things. 26-30
- Aman Yadav
, Steve Cooper:
Fostering creativity through computing. 31-33
- George V. Neville-Neil:
The unholy trinity of software development. 34-36
- Azer Bestavros
, Andrei Lapets
, Mayank Varia:
User-centric distributed solutions for privacy-preserving analytics. 37-39
- Alan Bundy:
Smart machines are not a threat to humanity. 40-42 - Devdatt P. Dubhashi, Shalom Lappin:
AI dangers: imagined and real. 43-45
- Pat Helland:
Life beyond distributed transactions. 46-54 - Thomas A. Limoncelli:
Are you load balancing wrong? 55-57 - Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson:
BBR: congestion-based congestion control. 58-66
- Brett Danaher, Michael D. Smith
, Rahul Telang
:
Copyright enforcement in the digital age: empirical evidence and policy implications. 68-75 - Herbert E. Bruderer
:
Computing history beyond the U.K. and U.S.: selected landmarks from continental Europe. 76-84
- Frits W. Vaandrager:
Model learning. 86-95
- Eric Rescorla:
Technical Perspective: Cleaning up flaws in TLS implementations. 98 - Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A messy state of the union: taming the composite state machines of TLS. 99-107 - Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. 108-115
- William Sims Bainbridge:
Fatal guidance. 120-
Volume 60, Number 3, March 2017
- Moshe Y. Vardi:
ACM's open-conference principle and political reality. 5 - Vicki L. Hanson:
ACM's commitment to accessibility. 7 - Vinton G. Cerf:
Grumpy old cells. 9
- Address the consequences of AI in advance. 10-11
- Mark Guzdial
, Robin K. Hill:
The slow evolution of CS for all, the beauty of programs. 12-13
- Neil Savage:
Thinking deeply to make better speech. 15-17 - Samuel Greengard:
The future of semiconductors. 18-20 - Keith Kirkpatrick:
Financing the dark web. 21-22 - ACM recognizes new fellows. 23
- Pamela Samuelson:
Supreme Court on design patent damages in Samsung v. Apple. 26-28
- Elizabeth Varki:
Where review goes wrong. 29-30
- Peter J. Denning, Matti Tedre, Pat Yongpradit:
Misconceptions about computer science. 31-33
- Thomas M. Philip:
Learning with mobile technologies. 34-36
- Theo Schlossnagle:
Time, but faster. 38-41 - Mohamed Zahran
:
Heterogeneous computing: here to stay. 42-45 - Peter Bailis, Irene Zhang, Fadel Adib:
Research for practice: distributed transactions and networks as physical sensors. 46-49
- Jonathan Lazar, Elizabeth F. Churchill, Tovi Grossman, Gerrit C. van der Veer, Philippe A. Palanque, John Morris, Jennifer Mankoff:
Making the field of computing more inclusive. 50-59 - Daniel J. Mazzola, Robert D. St. Louis, Mohan R. Tanniru
:
The path to the top: insights from career histories of top CIOs. 60-68
- Simon Price
, Peter A. Flach
:
Computational support for academic peer review: a perspective from artificial intelligence. 70-79
- Srinivasan Keshav
:
Technical Perspective: The power of wi-fi to deliver power. 82 - Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Joshua R. Smith, Shyamnath Gollakota:
Powering the next Billion devices with wi-fi. 83-91 - Leonid Libkin
:
Technical Perspective: Data distribution for fast joins. 92 - Tom J. Ameloot, Gaetano Geck
, Bas Ketsman
, Frank Neven
, Thomas Schwentick:
Reasoning on data partitioning for single-round multi-join evaluation in massively parallel systems. 93-100
- Leah Hoffmann:
Out of bounds. 104-
Volume 60, Number 4, April 2017
- Valerie Barr:
Gender diversity in computing: are we making any progress? 5 - Vinton G. Cerf:
A genetic theory of the Silicon Valley phenomenon. 7
- Consider indirect threats of AI, too. 8-9
- John Arquilla, Mark Guzdial
:
Crafting a national cyberdefense, and preparing to support computational literacy. 10-11
- Gregory Mone:
Sensors on the brain. 12-14 - Chris Edwards:
Digitizing the world. 15-16 - Esther Shein:
Computing the arts. 17-19 - Cybersecurity. 20-21
- Ineke Buskens:
Online social networks and global women's empowerment. 22-23
- George V. Neville-Neil:
The chess player who couldn't pass the salt. 24-25
- William Regli:
Wanted: toolsmiths. 26-28 - Yancey Strickler:
What it means to be an entrepreneur today. 29-31
- Meng-Day (Mandel) Yu, Srinivas Devadas:
Pervasive, dynamic authentication of physical items. 32-39 - Robert C. Seacord:
Uninitialized reads. 40-44 - Kate Matsudaira:
Does anybody listen to you? 45-46
- Luiz André Barroso, Mike Marty, David A. Patterson, Parthasarathy Ranganathan:
Attack of the killer microseconds. 48-54 - Aman Yadav
, Chris Stephenson, Hai Hong:
Computational thinking for teacher education. 55-62
- Athman Bouguettaya
, Munindar P. Singh
, Michael N. Huhns, Quan Z. Sheng
, Hai Dong
, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry
, Boualem Benatallah
, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos
, Liang Chen, Surya Nepal
, Zaki Malik
, Abdelkarim Erradi, Yan Wang
, M. Brian Blake, Schahram Dustdar
, Frank Leymann, Michael P. Papazoglou
:
A service computing manifesto: the next 10 years. 64-72
- Gernot Heiser:
Technical Perspective: Proving file systems meet expectations. 74 - Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler:
Certifying a file system using crash hoare logic: correctness in the presence of crashes. 75-84 - Jonathan R. Ullman:
Technical Perspective: Building a safety net for data reuse. 85 - Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth:
Guilt-free data reuse. 86-93
- Dennis E. Shasha:
Stacking the deck. 96
Volume 60, Number 5, May 2017
- Moshe Y. Vardi:
Cyber insecurity and cyber libertarianism. 5 - Vinton G. Cerf:
Can liberty survive the digital age? 7
- Bertrand Meyer:
Ending null pointer crashes. 8-9
- Esther Shein:
Combating cancer with data. 10-12 - Samuel Greengard:
Making chips smarter. 13-15 - Keith Kirkpatrick:
Bionics in competition. 16-17 - The internet of things. 18-19
- Woodrow Hartzog
:
The anonymization debate should be about risk, not perfection. 22-24
- Leo Porter
, Cynthia Bailey Lee, Beth Simon, Mark Guzdial
:
Preparing tomorrow's faculty to address challenges in teaching computer science. 25-27
- Wendell Wallach:
Toward a ban on lethal autonomous weapons: surmounting the obstacles. 28-34
- Erik Meijer:
Making money using math. 36-42 - Robert Guo:
MongoDB's JavaScript fuzzer. 43-47 - Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning. 48-51
- Catherine C. Marshall, Frank M. Shipman III:
Who owns the social web? 52-61 - Marina Jirotka, Barbara Grimpe, Bernd Carsten Stahl, Grace Eden
, Mark Hartswood:
Responsible research and innovation in the digital age. 62-68
- Milan Vojnovic:
Contest theory. 70-80
- Guy E. Blelloch:
Technical Perspective: Functional compilers. 82 - Geoffrey Mainland, Roman Leshchinskiy, Simon Peyton Jones:
Exploiting vector instructions with generalized stream fusion. 83-91 - Alon Y. Halevy:
Technical Perspective: Building knowledge bases from messy data. 92 - Ce Zhang, Christopher Ré, Michael J. Cafarella, Jaeho Shin, Feiran Wang, Sen Wu:
DeepDive: declarative knowledge base construction. 93-102
- David Allen Batchelor:
Beyond 'Star Trek'. 104-
- Bo Brinkman, Catherine Flick
, Don Gotterbarn, Keith W. Miller
, Marty J. Wolf:
Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. 105-111
Volume 60, Number 6, June 2017
- Moshe Y. Vardi:
Ten years at the helm of communications of the ACM. 5
- Vinton G. Cerf:
Open access to academic research. 7
- Technologies do have ethics. 8-9
- Mark Guzdial
:
Balancing teaching CS efficiently with motivating students. 10-11
- Don Monroe:
Deep learning takes on translation. 12-14 - Chris Edwards:
Optimization search finds a heart of glass. 15-16 - Sarah Underwood:
Potential and peril. 17-19 - Neil Savage:
Weaving the web. 20-22 - Big data. 24-25
- Peter G. Neumann:
Trustworthiness and truthfulness are essential. 26-28
- Leslie Goodyear, Gary Silverstein, Linda P. Thurston:
The influence and promise of alliances. 29-30
- George V. Neville-Neil:
Forced exception handling. 31-32
- Peter J. Denning:
Remaining trouble spots with computational thinking. 33-39
- Devon H. O'Dell:
The debugging mind-set. 40-45 - Pat Helland, Simon Weaver, Ed Harris:
Too big NOT to fail. 46-50 - Kate Matsudaira, Erik Meijer:
Conversations with technology leaders: Erik Meijer. 51-54