In November 2015, the computing world was abuzz with the news that László Babai proved the Graph-Isomorphism Problem. If Babai’s result holds under scrutiny, it is likely to become one of the most celebrated results in theoretical …
Moshe Y. Vardi
There are trade-offs to be found between a native mode implementation of an application and a browser-based implementation.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
Both sides of the Point/Counterpoint "The Case for Banning Killer Robots" (Dec. 2015) over lethal autonomous weapons systems seemed to agree the argument concerns weapons "…that once activated, would be able to select and engage targets …
Mark Guzdial issues a "call to action" to encourage high schools to offer, and students to take, the Advanced Placement course in Computer Science Principles.
Robots are being taught to brainstorm alternatives when damaged.
Network experts share their greatest fears about attacks and accidents that could destroy the Internet.
Snowden revelations force changes, but Facebook (and others) resist.
ACM has recognized 42 of its members for significant contributions to the development and application of computing, in areas ranging from data management and spoken-language processing to robotics and cryptography.
COLUMN: Economic and business dimensions
Seeking better understanding of digital transformation.
Peter C. Evans, Rahul C. Basole
COLUMN: Privacy and security
What must we learn in order to support privacy requirements as technology advances?
Influencing computer science education at the state level.
Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial
COLUMN: Kode Vicious
Committing to commits, and the beauty of summarizing graphs.
George V. Neville-Neil
Moving from the research realm to real-world business application.
Satish Chandra, Suresh Thummalapenta, Saurabh Sinha
Considering a controversial subject that extends far beyond the collection of phone metadata.
Big data makes common schemas even more necessary.
R. V. Guha, Dan Brickley, Steve Macbeth
A practitioner's guide to increasing confidence in system correctness.
A view from computational journalism.
SECTION: Contributed articles
This publicly available curated dataset of almost 100 million photos and videos is free and legal for all.
Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li
SECTION: Turing Lecture
It turns out riding across America is more than a handy metaphor for building system software.
SECTION: Contributed articles
Data from phone interactions can help address customers' complaints, and predict their future purchasing behavior.
J. P. Shim, J. Koh, S. Fister, H. Y. Seo
SECTION: Review articles
Database researchers paint big data as a defining challenge. To make the most of the enormous opportunities at hand will require focusing on five research areas.
Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter,
SECTION: Research highlights
The system described in "Pinocchio: Nearly Practical Verifiable Computation" refines an important theoretical advance by Gennaro et al. Together, these two works represent a dramatic improvement in speed, generality, and functionality …
Michael Mitzenmacher, Justin Thaler
We introduce Pinocchio, a built system for efficiently verifying general computations while relying only on cryptographic assumptions.
Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova
The authors of "Stochastic Program Optimization" have developed a stochastic search technique and applied it to program optimization.
By encoding constraints of transformation correctness as terms in a cost function, and using a Markov Chain Monte Carlo sampler to explore the space of all possible code sequences, we are able to generate aggressively optimized …
Eric Schkufza, Rahul Sharma, Alex Aiken
COLUMN: Last byte
A social network can sometimes make more of us than we ought to be.