ACM held a strategic planning retreat last November. The motivation was the realization that the ecosystem that supports scholarly and professional societies is undergoing rapid change, and this change is creating significant …
The prospect of increasingly unconventional computing methods that may force us to rethink how we analyze problems for purposes of getting computers to solve them for us.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
Vinton G. Cerf's "Responsible Programming" (July 2014) raised the interesting question of whether it is responsible to produce software without using state-of-the-art defect-detection-and-validation tools. The answer is legal …
John Langford considers how to stand out when seeking a research position, while Mark Guzdial suggests what teachers need to know to teach computer science at the high school level.
John Langford, Mark Guzdial
Optical information handling is a critical staple for communications and the Internet, but using light for computer-scale computation remains a distant dream.
Dynamically typed languages adopt features of static typing to cope with growth.
Scientists are using cutting-edge scanning and visualization techniques to wow visitors and find new stories in ancient artifacts.
COLUMN: Technology strategy and management
Speculating on how the Bitcoin economy might evolve.
Michael A. Cusumano
COLUMN: Inside risks
Considering existing and new types of risks inherent in cloud services.
Peter G. Neumann
COLUMN: Kode vicious
What do you do when your debugger fails you?
George V. Neville-Neil
COLUMN: The business of software
Some hidden costs of outsourcing.
Phillip G. Armour
Higher education institutions must modify their business models in response to technology-driven influences.
Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.
Edgar G. Daylight
Public, verifiable, append-only logs.
Assessing legal and technical solutions to secure HTTPS.
Axel Arnbak, Hadi Asghari, Michel Van Eeten, Nico Van Eijk
Routing security incidents can still slip past deployed security defenses.
SECTION: Contributed articles
Use this map query interface to search the world, even when not sure what information you seek. (View a related original video at https://vimeo.com/106352925.)
Hanan Samet, Jagan Sankaranarayanan, Michael D. Lieberman, Marco D. Adelfio, Brendan C. Fruin, Jack M. Lotkowski, Daniele Panozzo, Jon Sperling, Benjamin E. Teitler
This collaboratively edited knowledgebase provides a common source of data for Wikipedia, and everyone else.
Denny Vrandečić, Markus Krötzsch
SECTION: Review articles
New abstractions are critical for achieving SDN goals.
Martin Casado, Nate Foster, Arjun Guha
SECTION: Research highlights
"Dissection: A New Paradigm for Solving Bicomposite Search Problems," by Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir, presents an elegant new algorithm for solving a broad class of combinatorial optimization problems …
In this paper, we introduce the new notion of bicomposite search problems, and show that they can be solved with improved combinations of time and space complexities by using a new algorithmic paradigm called dissection.
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
COLUMN: Last byte
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be. When machines are in the natural world, what in the world is still unnatural?
Daniel H. Wilson