Sign In

Communications of the ACM

Home/About Communications/2017 Editorial Calendar

About Communications


2017 editorial calendar

FEBRUARY issue
MARCH issue
APRIL issue
MAY issue
JUNE issue
FEBRUARY

NEWS
    Secure Quantum Communications – C. Edwards
    Are Computer Chips the New Security Threat? – S. Greengard
    It’s Not the Algorithm, It’s the Data – K. Kirkpatric
VIEWPOINTS
    The Future of the Internet of Things – U. Lindqvist and P. Neumann
    Fostering Creativity through Computing – A. Yadav and S. Cooper
    The Unholy Trinity of Software Development – G. Neville-Neil
    User-Centric Distributed Solutions for Privacy-Preserving Analytics
    Smart Machines Are Not A Threat to Humanity – A. Bundy
    AI Dangers: Imagined and Real – D. Dubhashi and S. Lappin
PRACTICE
    Life Beyond Distributed Transactions – P. Helland
    Are You Load Balancing Wrong? – T. Limoncelli
    BBR: Congestion-Based Congestion Control – N. Cardwell, et al.
CONTRIBUTED ARTICLES
    Copyright Enforcement in the Digital Age: Empirical Evidence and Policy Implications – B. Danaher, et al.
    Computing History Beyond the U.K. and U.S.: Selected Landmarks from Continental Europe – H. Bruderer
REVIEW ARTICLES
    Model Learning – F. Vaandrager
RESEARCH HIGHLIGHTS
    A Messy State of the Union: Taming the Composite State Machines of TLS – B. Beurdouche, et al.
    Authentication Using Pulse-Response Biometrics – I. Martinovic, et al.
          With a Technical Perspective by E. Rescoria
LAST BYTE
    Fatal Guidance – W. Bainbridge

MARCH

NEWS
    Advances in Speech Synthesis
    The Future of Semiconductors
    Dark E-Commerce
VIEWPOINTS
    Learning from Mobile Technology
PRACTICE
    Time, But Faster
    Heterogeneous Computing: Here to Stay
    RfP: Distributed Transactions and Networks as Physical Sensors
CONTRIBUTED ARTICLES
    How to Make Computing Conferences, Digital Resources, and SIGs More Inclusive (with video)
    The Path to the Top – Insights from Career Histories of Top CIOs
REVIEW ARTICLES
    Computational Support for Academic Peer Review
RESEARCH HIGHLIGHTS
    Powering the Next Billion Devices w/ WiFi
          With a Technical Perspective by S. Keshav
    Parallel-Correctness and Transferability for Conjunctive Queries
          With a Technical Perspective by L.Libkin
LAST BYTE
    Q&A with Subhask Khot, recipient of MacArthur Grant

APRIL

NEWS
    Implantable Wireless Sensors
    Mapping Technologies
    Computing the Arts
VIEWPOINTS
    Wanted: Toolsmith
    Interview
CONTRIBUTED ARTICLES
    Computational Thinking for Teacher Education (with video)
    The Attack of the Killer Microseconds
REVIEW ARTICLES
    A Service Computing Manifesto
RESEARCH HIGHLIGHTS
    Using Crash Hoare Logic for Certifying FSCQ File System
          With a Technical Perspective by G. Heiser
    Preserving Statistical Validity in Adaptive Data Analysis
          With a Technical Perspective by J. Ullman
LAST BYTE
    Upstart Puzzles

MAY

NEWS
    Curing Cancer with Data
    Specialized Chips for ML
    Bionics in Competition
VIEWPOINTS
    Toward a Ban on Lethal Autonomous Weapons
CONTRIBUTED ARTICLES
    Responsible Research and Innovation in the Digital Age
    Who Owns the Social Web?
REVIEW ARTICLES
    Contest Theory (with vide)

JUNE

NEWS
    Specialized Computing
    Artificial (Criminal) Intelligence
    Turing Award Recipient
LAST BYTE
    Q&A with Turing Award Recipient

 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo