Many of us have lived with Moore's Law for all of our professional lives. We knew that it cannot continue forever, but the end always seemed to be beyond the horizon. No more. We are witnessing the denouement of an extraordinary …
Moshe Y. Vardi
DEPARTMENT: From the president
Too often one gets the impression of tacit expectation that scientific research has to produce results
within some predictable time. But many examples illustrate that it may take some time to validate the results of theoretical …
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
"Trends in Steganography" (Mar. 2014) included a good survey of the history of data hiding and a comprehensive list of methods for inserting bits into cover objects but omitted an important actor from the scene — the enemy …
Meet the candidates who introduce their plans — and stands — for the Association.
Judy Robertson reviews what happened when she decided to introduce Android development into the curriculum for first-year computer science students.
Sophisticated computer models and simulations are replacing test tubes and beakers. This revolution in biology research is redefining medicine, agriculture, and more.
Can our digital data represent us a million years from now?
Despite the need to make decisions relevant to technologies, the U.S. Supreme Court is not the most techno-savvy group.
COLUMN: Economic and business dimensions
Evaluating the evolving controversial digital currency.
Marshall Van Alstyne
COLUMN: Law and technology
How video games thrive in a world of piracy.
COLUMN: Historical reflections
Reflections on a British computer engineer who influenced several important machines, including the first stored-program computer.
Bringing educators together and focusing their interests toward improving computer science education in high schools.
Steve Cooper, Shuchi Grover, Beth Simon
Considering the societal implications of the robotics revolution.
How good security at the NSA could have stopped him.
Better understanding data requires tracking its history and context.
Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper
Stronger properties for low-latency geo-replicated storage.
Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen
SECTION: Contributed articles
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield
How to cope with the growing demand for software solutions at no extra cost.
Shimeon Pass, Boaz Ronen
Participating educational institutions get a much more cost-effective result compared to the commercial off-the-shelf alternative.
Manlu Liu, Sean Hansen, Qiang Tu
SECTION: Review articles
Using machine learning to predict algorithm runtime.
Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu
SECTION: Research highlights
An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is unconscious of the process and thus unable to give away or reveal …
Ari Juels, Bonnie Wong
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow a user to implicitly learn a secret password without them having …
Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
COLUMN: Last byte
Sorting is one of the most fundamental, and most studied, computational tasks. The problem is typically to put n
items in order. The objective is to minimize time, space, number of comparisons, or number of rounds of comparisons …