Table of Contents
The U.S. National Security Agency's pervasive phone and Internet eavesdropping and surveillance operations is making the surveillance technology in George Orwell's classic novel, 1984, seem rather primitive in comparison.
DEPARTMENT: From the president
The inaugural Heidelberg Laureate Forum affected my thinking about computability and computation.
DEPARTMENT: Letters to the Editor
"The Value of Microprocessor Designs" (Feb. 2013) aimed to analyze the value of microarchitectures in isolation, as though they could be mixed-and-matched with various silicon implementation technologies over the years. This
Jason Hong ponders why there has been so much negative press coverage of Google Glass with regard to privacy, considering the issue from two different perspectives.
Researchers are relying on quantum mechanics to generate unhackable methods of communication.
Gesture and gaze are among the newest additions to a growing family of computer interfaces.
Who is responsible when property is damaged or someone is injured by an automated system? Existing product liability laws have not yet been tested in the context of robots.
COLUMN: Privacy and security
Seeking to address the challenges of privacy by design through regulatory process and formal law.
COLUMN: Legally speaking
Assessing the shifting perspectives on patentability standards for software.
COLUMN: Computing ethics
Considering the ethical questions raised by technologies that are moving from knowing what we are doing (and where) to knowing who we are.
COLUMN: Economic and business dimensions
A question of biology, technology, and society.
Combining efforts and expertise, ACM and Code.org are partnering to address a rapidly changing education landscape.
How lessons learned from the evolution of the Web and Web browsers can influence the development of AR browsers.
Merging the art and science of software development.
Eliminating memory hogs.
Combining agile and SEMAT yields more advantages than either one alone.
SECTION: Contributed articles
Mobile apps manage data on individual residents to help carers deliver more person-centered care.
Tablets offer hope for improving learning and collaboration but only if truly integrated into learning settings.
SECTION: Review articles
The competitive nature of AT, the scarcity of expertise, and the vast profits potential, makes for a secretive community where implementation details are difficult to find.
Coupling content adaptation with context awareness is a promising approach for improving the user's experience.
SECTION: Research highlights
Exponentially increasing transistor integration also demands more interconnections, which have started hitting fundamental limits. The Centip3De design demonstrates two concepts to address this challenge: near-threshold computing
This paper evaluates the use of three-dimensional integration to reduce global interconnect by adding multiple layers of silicon with vertical connections between them using through-silicon vias.
COLUMN: Last byte
Each of these puzzles involves coin flipping. Simple stuff, right? Not necessarily . . . though solutions will indeed be provided in next month's column.
Access the latest issue, plus archived issues and more
Find the app for your mobile device
- ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
- ACM Digital Library apps available for iOS, Android, and Windows devices
- Download an app and sign in to it with your ACM Web Account