Communications of the ACM, Volume 65 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 65, Number 1, January 2022
Editor's letter

Andrew A. Chien:
Is the global computing community irrevocably divided? 5
Departments

Moshe Y. Vardi:
Will AI destroy education? 7
Career paths in computing

Peter M. Small:
How computing empowered me to tackle big problems in medicine. 9
BLOG@CACM

Mark Guzdial:
Is higher education an engine of opportunity, or a perpetuator of privilege? 10-11
News

Chris Edwards:
Shrinking artificial intelligence. 12-14

Esther Shein:
Converting laws to programs. 15-16

Keith Kirkpatrick:
Monetizing your personal data. 17-19
Technology strategy and management

Michael A. Cusumano:
Epic versus Apple and the future of app stores. 22-24
Law and technology

Pauline T. Kim:
Addressing algorithmic discrimination. 25-27
Security

Brian A. LaMacchia:
The long road ahead to transition to post-quantum cryptography. 28-30
Viewpoint

Vincent J. Hellendoorn, Anand Ashok Sawant:
The growing cost of deep learning for source code. 31-33

Olga Fink
, Torbjørn H. Netland
, Stefan Feuerriegel:
Artificial intelligence across company borders. 34-36

Vashek Matyas, Kamil Malinka
, Lydia Kraus, Lenka Knapova, Agata Kruzikova:
Even if users do not read security directives, their behavior is not so catastrophic. 37-40
Practice

Piero Molino, Christopher Ré:
Declarative machine learning systems. 42-49

Patrick Thomson:
Static analysis. 50-54
Contributed articles

Philipp H. Kindt
, Trinad Chakraborty, Samarjit Chakraborty
:
How reliable is smartphone-based electronic contact tracing for COVID-19? 56-67

Gwanhoo Lee, Jaeho Kim:
Delivering a rapid digital response to the COVID-19 pandemic. 68-75

Lance Fortnow:
Fifty years of P vs. NP and the possibility of the impossible. 76-85
Review articles

Michael Pradel, Satish Chandra:
Neural software analysis. 86-96
Research highlights

Frank Dellaert:
Neural radiance fields explode on the scene: technical perspective. 98

Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, Ren Ng:
NeRF: representing scenes as neural radiance fields for view synthesis. 99-106

Tiago João Guerreiro
:
Eyelid gestures enhance mobile interaction: technical perspective. 107

Mingming Fan
, Zhen Li, Franklin Mingzhe Li:
Eyelid gestures for people with motor impairments. 108-115
Last byte

Dennis E. Shasha:
Orbit design.
Volume 65, Number 2, February 2022
From the ACM CEO

Vicki L. Hanson:
Ethics and values in the ACM awards program. 5
Cerf's up

Vinton G. Cerf:
How do I rely on thee, smartphone? 7
BLOG@CACM

Jason Hong:
The trouble with Facebook. 8-9
News

Marina Krakovsky:
Solving for why. 11-13

Neil Savage
:
Virtual duplicates. 14-16

Logan Kugler:
Artificial intelligence, machine learning, and the fight against world hunger. 17-19
Education

Tiffani L. Williams:
The lives of hidden figures matter in computer science education. 20-22
Kode Vicious

George V. Neville-Neil
:
I unplugged what? 23-24
Historical Reflections

Thomas Haigh:
Becoming universal. 25-30
Viewpoint

Tony Yu-Ju Tu
, Shari S. C. Shang, Junyi Wu:
Is your autonomous vehicle as smart as you expected? 31-34

Shlomi Hod, Karni Chagal-Feferkorn, Niva Elkin-Koren, Avigdor Gal:
Data science meets law. 35-39

Erich Prem
:
A brave new world of mediated online discourse. 40-42
Practice

Timothy Clem, Patrick Thomson:
Static analysis at GitHub. 44-51

Daniil Tiganov, Lisa Nguyen Quang Do, Karim Ali:
Designing UIs for static-analysis tools. 52-58
Contributed articles

Nenad Tomasev, Ulrich Paquet, Demis Hassabis, Vladimir Kramnik:
Reimagining chess with AlphaZero. 60-66

Dorit Nevo, Benjamin D. Horne:
How topic novelty impacts the effectiveness of news veracity interventions. 68-75
Turing lecture

Alfred V. Aho, Jeffrey D. Ullman:
Abstractions, their algorithms, and their compilers. 76-91
Review articles

Alon Y. Halevy, Cristian Canton-Ferrer, Hao Ma, Umut Ozertem, Patrick Pantel, Marzieh Saeidi, Fabrizio Silvestri, Ves Stoyanov:
Preserving integrity in online social networks. 92-98
Research highlights

Robin Burke:
Personalized recommendation of PoIs to people with autism: technical perspective. 100

Noemi Mauro, Liliana Ardissono, Federica Cena:
Supporting people with autism spectrum disorders in the exploration of PoIs: an inclusive recommender system. 101-109

Sayan Mitra
:
Model structure takes guesswork out of state estimation: technical perspective. 110

Guillaume O. Berger, Raphaël M. Jungers:
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems. 111-118
Last byte

Brian Clegg:
Agent invisible.
Volume 65, Number 3, March 2022
Departments

Moshe Y. Vardi:
ACM, ethics, and corporate behavior. 5
Career paths in computing

Eunice Ratna Sari:
Changing the world through HCI and UX. 7
Letters to the editor

CACM Staff:
A division in computer science. 8-9
BLOG@CACM

Carlos Baquero
:
Picking publication targets. 10-11
News

Chris Edwards:
A group effort. 12-14

Don Monroe:
Accelerating AI. 15-16

Paul Marks:
Algorithmic hiring needs a human face. 17-19
Legally speaking

Pamela Samuelson:
Copyright implications of emulation programs. 20-22
Computing ethics

Ronald M. Baecker:
A call to action. 23-25
Privacy

Michael Skirpan, Maggie Oates, Daragh Byrne, Robert K. Cunningham, Lorrie Faith Cranor:
Is a privacy crisis experienced, a privacy crisis avoided? 26-29
Viewpoint

Urs Gasser
, Virgilio de Almeida:
Futures of digital governance. 30-32

Stuart E. Madnick:
Bursting a few balloons regarding the famous DARPA red balloon challenge. 33-34

Toby Walsh:
The troubling future for facial recognition software. 35-36
Practice

Ayman Nadeem:
Human-centered approach to static-analysis-driven developer tools. 38-45

Kirk McKusick:
A conversation with: Margo Seltzer and Mike Olson. 46-51
Contributed articles

Emerson R. Murphy-Hill, Ciera Jaspan, Carolyn D. Egelman
, Lan Cheng:
The pushback effects of race, ethnicity, gender, and age in code review. 52-57

Orli Weiser, Yoram M. Kalman, Carmel Kent, Gilad Ravid:
65 competencies: which ones should your data analytics experts have? 58-66

Tarun Mangla, Esther H. Showalter, Vivek Adarsh, Kipp Jones, Morgan Vigil-Hayes
, Elizabeth M. Belding, Ellen Zegura:
A tale of three datasets: characterizing mobile broadband access in the U.S. 67-74
Review articles

Tijl De Bie, Luc De Raedt
, José Hernández-Orallo, Holger H. Hoos, Padhraic Smyth, Christopher K. I. Williams:
Automating data science. 76-87
Research highlights

Jonathan Aldrich
:
Technical perspective: How do experts learn new programming languages? 90

Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin:
Here we go again: why is it difficult for developers to learn another programming language? 91-99

Frederic T. Chong:
Technical perspective: Applying design-space exploration to quantum architectures. 100

Prakash Murali, Dripto M. Debroy, Kenneth R. Brown, Margaret Martonosi:
Toward systematic architectural design of near-term trapped ion quantum computers. 101-109
Last byte

Leah Hoffmann:
Mining energy from 'empty' air.
Volume 65, Number 4, April 2022
Cerf's up

Vinton G. Cerf:
Preserving the internet. 5
BLOG@ACM

Mark Guzdial:
Achieving CS for all could take decades. 6-7
News

Samuel Greengard:
Can AI learn to forget? 9-11

Keith Kirkpatrick:
Still waiting for self-driving cars. 12-14

Logan Kugler:
Technology's impact on morality. 15-16
Technology strategy and management

Mari Sako:
Global supply chain disruption and resilience. 18-21
The profession of IT

Peter J. Denning:
Systems abstractions. 22-24
Kode Vicious

George V. Neville-Neil
:
Getting off the mad path. 25-26
Viewpoint

Veda C. Storey, Roman Lukyanenko, Wolfgang Maass, Jeffrey Parsons
:
Explainable AI. 27-29

Andrew A. Chien:
Communications' digital initiative and its first digital event. 30
Europe Region special section
Europe Region special section: Hot topics

Dima Kagan
, Michael Fire, Galit Fuhrmann Alpert:
Trends in computer science research within European countries. 36-37

Jürgen Steimle
:
On-skin computing. 38-39

Thomas R. C. Smallwood, Véronique Lefebvre, Linus Bengtsson:
Mobile phone usage data for disaster response. 40-41

Liliana Dobrica
:
Robotic process automation platform UiPath. 42-43

Boris Otto
:
A federated infrastructure for European data spaces. 44-45

Sadaf R. Alam, Javier Bartolome, Michele Carpenè, Kalle Happonen, Jacques-Charles Lafoucriere, Dirk Pleiter:
Fenix: a Pan-European federation of supercomputing and cloud e-infrastructure services. 46-47

Gerhard P. Fettweis, Holger Boche:
On 6G and trustworthiness. 48-49

Gertrude Kappel, Christian Brecher, Matthias Brockmann, István Koren:
Internet of production: entering phase two of industry 4.0. 50-51

Diego Perino, Kleomenis Katevas, Andra Lutu, Eduard Marin, Nicolas Kourtellis:
Privacy-preserving AI for future networks. 52-53

Edward Curry, Fredrik Heintz, Morten Irgens, Arnold W. M. Smeulders, Stefano Stramigioli:
Partnership on AI, data, and robotics. 54-55

Sepp Hochreiter:
Toward a broad AI. 56-57
Europe Region special section: Big trends

Hartmut Schmeck, Antonello Monti
, Veit Hagenmeyer:
Energy informatics: key elements for tomorrow's energy system. 58-63

Stuart E. Middleton
, Emmanuel Letouzé, Ali Hossaini
, Adriane Chapman
:
Trust, regulation, and human-in-the-loop AI: within the European region. 64-68

Tommaso Di Noia, Nava Tintarev, Panagiota Fatourou, Markus Schedl:
Recommender systems under European AI regulations. 69-73

Mor Peleg
, Yuval Shahar, Silvana Quaglini:
MobiGuide: guiding clinicians and chronic patients anytime, anywhere. 74-79

Wil M. P. van der Aalst
:
European leadership in process management. 80-83

Shaukat Ali, Tao Yue, Rui Abreu
:
When software engineering meets quantum computing. 84-88
Practice

Kallista A. Bonawitz, Peter Kairouz, Brendan McMahan, Daniel Ramage:
Federated learning and privacy. 90-97
Contributed articles
Research highlights

Marian Petre:
Exploring cognitive bias 'in the wild': technical perspective. 114

Souti Chattopadhyay, Nicholas Nelson, Audrey Au, Natalia Morales, Christopher A. Sanchez, Rahul Pandita, Anita Sarma:
Cognitive biases in software development. 115-122

Philippe Cudré-Mauroux
:
Leveraging social context for fake news detection: technical perspective. 123

Van-Hoang Nguyen, Kazunari Sugiyama
, Preslav Nakov, Min-Yen Kan:
FANG: leveraging social context for fake news detection using graph representation. 124-132
Last byte

Dennis E. Shasha:
Beating the house.
Volume 65, Number 5, May 2022
Editor's letter

Andrew A. Chien:
Four aspirations for ACM 2032. 5
Editorial

Vicki L. Hanson, Jennifer T. Chayes
:
ACM at 75. 6-7
Departments

Moshe Y. Vardi:
War and tech (and ACM). 9
Career paths in computing

Asim Munawar
:
How a shopping mall trip inspired me to work in neuro-symbolic AI. 11
ACM Open

Scott E. Delman
:
Thanks for the progress to date! 12-13
ACM's election

CACM Staff:
ACM's 2022 general election: please take this opportunity to vote. 15-23
BLOG@CACM

Jason Hong:
Modern tech can't shield your secret identity. 24-25
News

Chris Edwards:
Neural networks learn to speed up simulations. 27-29

Gregory Mone:
Raising robovoices. 30-31

Keith Kirkpatrick:
Artificial intelligence and mental health. 32-34
Law and Technology

Blake Reid:
Two paths for digital disability law. 36-38
Security

John Wroclawski, Terry Benzel:
Cybersecurity as illuminator for the future of computing research. 39-41
Education

Aman Yadav, Marie K. Heath, Anne Drew Hu:
Toward justice in computer science through community, criticality, and citizenship. 42-44
Viewpoint

Reinhard von Hanxleden:
Information: 'I' vs. 'we' vs. 'they'. 45-47
Practice

Reynold Xin, Wes McKinney, Alan Gates, Chris McCubbin:
It takes a community - : the open source challenge. 48-55

Alvaro Videla:
Meaning and context in computer programs. 56-58
Contributed articles

Sanjit A. Seshia:
Explorations in cyber-physical systems education. 60-69

Russ Cox, Robert Griesemer
, Rob Pike, Ian Lance Taylor, Ken Thompson:
The Go programming language and environment. 70-78

Jiyong Park
, Jongho Kim:
A data-driven exploration of the race between human labor and machines in the 21st century. 79-87
Review articles

Mohammed Eslami, Aaron Adler, Rajmonda Sulo Caceres, Joshua G. Dunn, Nancy Kelley-Loughnane, Vanessa A. Varaljay, Héctor García Martín
:
Artificial intelligence for synthetic biology. 88-97
Research highlights

Daniel Lohmann:
Technical perspective: 'What is the ideal operating system?'. 100

Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan
, Tianyin Xu:
Set the configuration for the heart of the OS: on the practicality of operating system kernel debloating. 101-109

Emina Soljanin:
Technical perspective: Balancing at all loads. 110

Ankur Mallick, Malhar Chaudhari, Utsav Sheth, Ganesh Palanikumar, Gauri Joshi:
Rateless codes for near-perfect load balancing in distributed matrix-vector multiplication. 111-118
Last byte

Brian Clegg:
Agent provocateur.
Volume 65, Number 6, June 2022
Editor's letter

Andrew A. Chien:
Five years as editor-in-chief of Communications. 5
Editorial

Gabriele Kotsis
, Vicki L. Hanson:
Our ACM community. 7
Cerf's up

Vinton G. Cerf:
Digital synergy. 9
Letters to the editor

CACM Staff:
More on computing's divided future. 10-11
BLOG@CACM

Andrei M. Sukhov
:
The role of math in IT education. 14-15
News

Neil Savage
:
Always improving performance. 16-18

Don Monroe:
A deeper understanding of deep learning. 19-20

Logan Kugler:
Addressing labor shortages with automation. 21-23

Samuel Greengard:
Immersion cooling heats up. 24-26
The profession of IT

Peter J. Denning:
Involvement and detachment. 28-31
Inside risks

Peter G. Neumann:
Toward total-system trustworthiness. 32-35
Kode Vicious

George V. Neville-Neil
:
The planning and care of data. 36-37
Viewpoint
Practice

Poul-Henning Kamp:
The software industry is still the problem. 42-43

Kelly Shortridge, Ryan Petrich:
Lamboozling attackers: a new generation of deception. 44-53
Contributed articles

Michael R. Crusoe
, Sanne Abeln
, Alexandru Iosup
, Peter Amstutz, John Chilton, Nebojsa Tijanic, Hervé Ménager
, Stian Soiland-Reyes
, Bogdan Gavrilovic
, Carole A. Goble, The Cwl Community:
Methods included. 54-63

Julia Stoyanovich, Serge Abiteboul, Bill Howe, H. V. Jagadish, Sebastian Schelter
:
Responsible data management. 64-74
Review articles

Nihar B. Shah:
Challenges, experiments, and computational solutions in peer review. 76-87
Research highlights

Gonzalo Navarro:
The compression power of the BWT: technical perspective. 90

Dominik Kempa
, Tomasz Kociumaka
:
Resolution of the burrows-wheeler transform conjecture. 91-98

Jeffrey P. Bigham:
Computation where the (inter)action is: technical perspective. 99

Dhruv Jain, Hung Ngo, Pratyush Patel, Steven Goodman, Khoa Huynh Anh Nguyen, Rachel Grossman-Kahn, Leah Findlater, Jon Froehlich
:
SoundWatch: deep learning for sound accessibility on smartwatches. 100-108
Last byte

Leah Hoffmann:
Learning new things and avoiding obstacles.
Volume 65, Number 7, July 2022
Editor's letter

James R. Larus:
CACM community. 5
Editorial

Jeanna Matthews:
Embracing critical voices. 7

Sally Fincher, Kathi Fisler
:
Exploring questions and answers in computer science education. 9
Departments

Moshe Y. Vardi:
An association of the members, by the members, for the members. 11
BLOG@CACM
News

Don Monroe:
Building a practical quantum computer. 15-17

Samuel Greengard:
Brain implants get real. 18-20

Esther Shein:
Using makeup to block surveillance. 21-23
Legally speaking

Pamela Samuelson:
Apple's challenge to virtualization software. 24-26
Economic and business dimensions

Longqi Yang, David Holtz, Sonia Jaffe, Siddharth Suri:
The future of information work. 27-29
Privacy

Lorrie Faith Cranor:
Cookie monster. 30-32
Viewpoint

Michael Mitzenmacher, Sergei Vassilvitskii:
Algorithms with predictions. 33-35

Juan E. Gilbert
, Stephanie Ludi, David A. Patterson, Lisa M. Smith:
Words matter. 36
Practice

Phil Vachon:
The keys to the kingdom. 38-41

Poul-Henning Kamp:
Surveillance too cheap to meter. 42-44
Contributed articles

Sanjit A. Seshia, Dorsa Sadigh, S. Shankar Sastry:
Toward verified artificial intelligence. 46-55

Hang Li:
Language models: past, present, and future. 56-63
Review articles

Curtis Bright, Ilias S. Kotsireas, Vijay Ganesh:
When satisfiability solving meets symbolic computation. 64-72
Research highlights

Fabio Vandin:
Technical perspective: Evaluating sampled metrics is challenging. 74

Walid Krichene, Steffen Rendle:
On sampled metrics for item recommendation. 75-83

Bill Howe:
Technical perspective: Visualization search: from sketching to natural language. 84

Tarique Siddiqui, Paul Luh, Zesheng Wang, Karrie Karahalios, Aditya G. Parameswaran
:
Expressive querying for accelerating visual analytics. 85-94
Last byte

Dennis E. Shasha:
Exclusivity probes.
Volume 65, Number 8, August 2022
Editor's letter

Yannis E. Ioannidis
:
To the members of ACM. 5
Cerf's up

Federico Monaco:
Color blind accessibility manifesto. 7
BLOG@CACM

Doug Meil:
Advancing in the technical hierarchy. 8-9
News

Marina Krakovsky:
Formalizing fairness. 11-13

Logan Kugler:
Crossing the uncanny valley. 14-15

Esther Shein:
Neurotechnology and the law. 16-18
Education

Carla E. Brodley:
Why universities must resist GPA-based enrollment caps in the face of surging enrollments. 20-22
Kode Vicious

George V. Neville-Neil
:
When should a black box be transparent? 23-24
Interview

Len Shustek:
An interview with Dana Scott. 25-29
Viewpoint

Manish Parashar, Amy Friedlander, Erwin P. Gianchandani, Margaret Martonosi:
Transforming science through cyberinfrastructure. 30-32

Koby Mike, Noa Ragonis
, Rinat B. Rosenberg-Kima, Orit Hazzan:
Computational thinking in the era of data science. 33-35
Practice

Michael Mattioli:
FPGAs in client compute hardware. 36-42

Valerie Chen, Jeffrey Li, Joon Sik Kim, Gregory Plumb, Ameet Talwalkar:
Interpretable machine learning: moving from mythos to diagnostics. 43-50
Contributed articles

Laszlo Gyongyosi, Sándor Imre
:
Advances in the quantum internet. 52-63

Yihong Wang, Konstantinos Papangelis, Ioanna Lykourentzou, Vassilis-Javed Khan, Michael Saker, Yong Yue
, Jonathan Grudin:
The dawn of crowdfarms. 64-70
Review articles

Daniel Abadi
, Anastasia Ailamaki, David G. Andersen, Peter Bailis, Magdalena Balazinska, Philip A. Bernstein, Peter Boncz, Surajit Chaudhuri, Alvin Cheung
, AnHai Doan, Luna Dong, Michael J. Franklin, Juliana Freire, Alon Y. Halevy, Joseph M. Hellerstein, Stratos Idreos, Donald Kossmann, Tim Kraska, Sailesh Krishnamurthy, Volker Markl, Sergey Melnik, Tova Milo, C. Mohan, Thomas Neumann, Beng Chin Ooi, Fatma Ozcan, Jignesh M. Patel, Andrew Pavlo
, Raluca A. Popa, Raghu Ramakrishnan, Christopher Ré, Michael Stonebraker, Dan Suciu
:
The Seattle report on database research. 72-79
Research highlights

Qin Zhang
:
Technical perspective: Can data structures treat us fairly? 82

Martin Aumüller, Sariel Har-Peled
, Sepideh Mahabadi, Rasmus Pagh
, Francesco Silvestri:
Sampling near neighbors in search for fairness. 83-90

Noa Zilberman:
Technical perspective: hXDP: Light and efficient packet processing offload. 91

Marco Spaziani Brunella, Giacomo Belocchi
, Marco Bonola, Salvatore Pontarelli, Giuseppe Siracusano, Giuseppe Bianchi, Aniello Cammarano, Alessandro Palumbo, Luca Petrucci, Roberto Bifulco:
hXDP: Efficient software packet processing on FPGA NICs. 92-100
Last byte

E. C. Logan:
The Luce Goose: a space-traveling bail-bond agent and the ship's resourceful AI chase fugitives across the galaxy.
Volume 65, Number 9, September 2022
Departments

Moshe Y. Vardi:
Technology and democracy. 5
Career paths in computing

Kristian Sørensen:
The making of an IT strategy consultant. 7
BLOG@CACM

Subbarao Kambhampati:
Changing the nature of AI research. 8-9
News

Chris Edwards:
Competition makes big datasets the winners. 11-13

Keith Kirkpatrick:
The road to 6G. 14-16

Logan Kugler:
How AI is driving the esports boom. 17-18
Law and technology

Andres Guadamuz:
These are not the apes you are looking for. 20-22
Security

Andreas Kuehn:
Security by labeling. 23-25
The profession of IT

Peter J. Denning, Roland N. Ibbett:
The Atlas milestone. 26-29
Point/counterpoint

William J. Dally:
On the model of computation: point. 30-32

Uzi Vishkin:
On the model of computation: counterpoint. 32-34
Viewpoint

Florence Maraninchi:
Let us not put all our eggs in one basket. 35-37
Practice

Alexandros Gazis
, Eleftheria Katsiri:
Middleware 101. 38-42

Archie L. Cobbs:
Persistence programming. 43-47
Contributed articles

Carmela Troncoso, Dan Bogdanov
, Edouard Bugnion, Sylvain Chatel, Cas Cremers, Seda F. Gürses, Jean-Pierre Hubaux, Dennis Jackson, James R. Larus, Wouter Lueks, Rui Oliveira, Mathias Payer, Bart Preneel, Apostolos Pyrgelis, Marcel Salathé, Theresa Stadler, Michael Veale
:
Deploying decentralized, privacy-preserving proximity tracing. 48-57

Leslie Lamport:
Deconstructing the bakery to build a distributed state machine. 58-66
Review articles
Research highlights

Falko Dressler:
Physical layer resilience through deep learning in software radios: technical perspective. 82

Francesco Restuccia, Tommaso Melodia
:
Polymorphic wireless receivers. 83-91

Nicolas Christin
:
The effectiveness of security measures: technical perspective. 92

Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring security practices. 93-102
Last byte

Leah Hoffmann:
Advancing the ability of robots to help.
Volume 65, Number 10, October 2022
Editor's letter

Andrew A. Chien:
Computing's grand challenge for sustainability. 5
Cerf's up

Vinton G. Cerf:
Quis custodiet ipsos custodes? 7
BLOG@CACM

Aleksandr Romanov
:
Driving an innovation contest into crisis. 8-9
News

Don Monroe:
Neurosymbolic AI. 11-13

Simson L. Garfinkel, Eugene H. Spafford
:
In memoriam: Juris Hartmanis 1928-2022. 14-15

Samuel Greengard:
Hidden malware ratchets up cybersecurity risks. 16-18

Esther Shein:
Applied AI teaches handwriting. 19-20
Technology strategy and management

Michael A. Cusumano:
Data platforms and network effects. 22-24
Kode Vicious

George V. Neville-Neil
:
Securing the company jewels. 25-26
Viewpoint

Titus Barik, Sumit Gulwani, Mario Juarez:
Storytelling and science. 27-30

Ryan Bockmon, Stephen Cooper:
What's your placebo? 31-33
Practice

Jenna L. Butler, Catherine Yeh
:
Walk a mile in their shoes. 34-41

Poul-Henning Kamp:
Linear address spaces. 42-44
Contributed articles

Umakishore Ramachandran, Zvi Galil:
Creating a revolutionary academic program. 46-56

Advait Deshpande:
Assessing the quantum-computing landscape. 57-65
Review articles

Ariel Rosenfeld, Oleg Maksimov:
Should young computer scientists stop collaborating with their doctoral advisors? 66-72
Research highlights

Athina Markopoulou
:
Technical perspective: Traffic classification in the era of deep learning. 74

Iman Akbari, Mohammad A. Salahuddin, Leni Aniva, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin
:
Traffic classification in an increasingly encrypted web. 75-83

Yang Zhang
:
Technical perspective: Achieve big with devices that track small things. 84

Farshid Salemi Parizi, Eric Whitmire, Shwetak N. Patel:
AuraRing: precise electromagnetic finger tracking. 85-92
Last byte

Dennis E. Shasha:
Card Nim. 96
Volume 65, Number 11, November 2022
Departments

Moshe Y. Vardi:
Accountability and liability in computing. 5
Career paths in computing

Andreea Danielescu
:
The many shapes of a computer science career. 7
Letters to the editor

CACM Staff:
The blood price of unrestricted privacy. 8-9

Orit Hazzan, Koby Mike, Herbert E. Bruderer:
Up with data science, and the first programmer. 10-11
News

Chris Edwards:
Go backward, save energy. 13-15

Keith Kirkpatrick:
Applying the metaverse. 16-18

Logan Kugler:
The impact of virtual meetings. 19-21
Legally speaking

Pamela Samuelson:
An emergent legal right to repair electronic devices. 22-25
Privacy

Lorrie Faith Cranor:
Mobile-app privacy nutrition labels missing key ingredients for success. 26-28
Education

Valerie Barr:
What must all post-secondary students learn about computing? 29-31
Viewpoint

John Markoff:
Rethinking Silicon Valley: Stewart Brand's lost journal. 32-34

Ryen W. White:
Intelligent futures in task assistance. 35-39
India Region Special Section

Hemangee Kalpesh Kapoor, Mausam, Venkatesh Raman:
Welcome back! 40-42
India Region Special Section: Big Trends

M. Balakrishnan:
Computing and assistive technology solutions for the visually impaired. 44-47

Kamakoti Veezhinathan:
Building the SHAKTI microprocessor. 48-51
India Region Special Section: Hot Topics

Priyanka Darke, Ravindra Metta, Raveendra Kumar Medicherla, R. Venkatesh:
Impactful research and tooling for program correctness. 52-53
India Region Special Section: Big Trends

Jayakrishnan Warriem, Andrew Thangaraj, Madhavan Mukund, Bharathi Balaji:
Digital interventions at scale: lessons from NPTEL and IIT Madras B.S. degree program. 54-57

Plaban Kumar Bhowmick, Partha Pratim Das, Partha Pratim Chakrabarti, Debarshi Kumar Sanyal:
National digital library of India: democratizing education in India. 58-61
India Region Special Section: Hot Topics

Amey Karkare
, Purushottam Kar:
Prutor: an intelligent learning and management system for programming courses. 62-64
India Region Special Section: Big Trends

Bidisha Chaudhuri
, Meenakshi D'Souza, Janaki Srinivasan:
Bringing the missing women back: CS education for women in India's engineering institutions. 65-67
India Region Special Section: Hot Topics

Vineeth N. Balasubramanian:
Toward explainable deep learning. 68-69

Iram Tariq Bhatti, Mahum Naseer, Muhammad Shafique
, Osman Hasan:
A formal approach to identifying the impact of noise on neural networks. 70-73
India Region Special Section: Big Trends

Hemant Belsare, Milind A. Sohoni, Rahul Gokhale, Pooja Prasad, Asim R. P., Chirag Marathe, Parth Gupta, Shubhada Sali, Swapnil Patil, Sudhanshu Deshmukh:
Computing for climate resilience in agriculture. 74-79
India Region Special Section: Hot Topics
India Region Special Section: Big Trends

Siva Athreya, Gautam I. Menon, Rajesh Sundaresan:
COVID-19 modeling for India and a roadmap for the future. 82-87

C. Aiswarya, Vikraman Arvind, Saket Saurabh:
Theory research in India: 2019-2022. 88-93

Balaraman Ravindran, Sunita Sarawagi, Aditi Jain:
AI and data science centers in top Indian academic institutions. 94-97

Debdeep Mukhopadhyay:
Cybersecurity in India. 98-102
Practice

Martin Kleppmann
, Peter Alvaro:
Research for practice: convergence. 104-106
Contributed articles

Matthias Falkner, John G. Apostolopoulos:
Intent-based networking for the enterprise: a modern network architecture. 108-117

Yuval Moskovitch, H. V. Jagadish:
Reliability at multiple stages in a data analysis pipeline. 118-128
Research highlights

Karthik Dantu:
Technical perspective: The power of low-power GPS receivers for nanosats. 132

Sujay Narayana, R. Venkatesha Prasad
, Vijay S. Rao, Luca Mottola, T. V. Prabhakar:
Hummingbird: an energy-efficient GPS receiver for small satellites. 133-140
Last byte

Brian Clegg:
The new wizard of Menlo Park.
Volume 65, Number 12, December 2022
Cerf's up

Vinton G. Cerf:
On truth and belief. 5
BLOG@CACM

Carlos Baquero
:
Is having AI generate text cheating? 6-7
News

Don Monroe:
Quantum computers and the universe. 9-11

Samuel Greengard:
Swarm robotics moves forward. 12-14

Esther Shein:
Preserving the past with immersive technologies. 15-17
The profession of IT

Peter J. Denning, John Arquilla:
The context problem in artificial intelligence. 18-21
Kode Vicious

George V. Neville-Neil
:
The four horsemen of an ailing software project. 22-23
Viewpoint

Devdatt P. Dubhashi:
Can universities combat the 'wrong kind of AI'? 24-26

Alex Pentland:
Building a new economy: data, AI, and Web3. 27-29

Luiz André Barroso, Tanzeem Choudhury, Manish Gupta, Oyekunle A. Olukotun
, Raluca Ada Popa, Dawn Xiaodong Song, David A. Patterson:
Global perspectives of diversity, equity, and inclusion. 30-31
Practice

CACM Staff:
FHIR: reducing friction in the exchange of healthcare data. 34-41

Poul-Henning Kamp:
CSRB's opus one. 42-44
Contributed articles
Turing lecture

Jack J. Dongarra:
The evolution of mathematical software. 66-72
Review articles

Domenico Amalfitano
, Ana C. R. Paiva, Alexis Inquel, Luís Pinto, Anna Rita Fasolino, René Just:
How do Java mutation tools differ? 74-89

Ewa Magdalena Nowara, Daniel McDuff, Ashutosh Sabharwal, Ashok Veeraraghavan:
Seeing beneath the skin with computational photography. 90-100
Research highlights

Peter Boncz:
Technical perspective: The 'art' of automatic benchmark extraction. 104

Shaleen Deep, Anja Gruenheid, Kruthi Nagaraj, Hiro Naito, Jeffrey F. Naughton, Stratis Viglas:
DIAMETRICS: benchmarking query engines at scale. 105-112
Last byte

Leah Hoffmann:
Finding an alternate way forward with AI.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






