Table of Contents
DEPARTMENT: Letter from Chair of Education Board
In October, ACM Council approved the publication of the CS 2013 report — an exhaustive 10-year effort championed by ACM's Education Board and IEEE-Computer Society.
DEPARTMENT: Letter from the President
Every time I see calendar dates like 2014, I feel as if I have been transported by time machine into the future. Isaac Asimov made some remarkably astute projections about 2014 in 1964, so what might he say today?
DEPARTMENT: Letters to the Editor
Jacob Loveless et al.'s article "Online Algorithms in High-Frequency Trading" (Oct. 2013) is an example of potentially valuable research misdirected.
Philip Guo teaches an undergrad through the use of examples.
New discoveries expand the scope of computer-assisted proofs of theorems.
Not everyone needs coding skills, but learning how to think like a programmer can be useful in many disciplines.
Advances in computational photography are making image capture the starting point. The technology is transforming the field.
ACM has recognized 50 of its members for their contributions to computing that are driving innovations across multiple domains and disciplines.
COLUMN: Privacy and security
Evaluating the trade-offs involved in cybersecurity professionalization.
Providing students, teachers, and parents with a better understanding of computer science and programming.
COLUMN: Inside risks
Applying a more powerful new safety methodology to security risks.
COLUMN: Kode vicious
It is not always size that matters.
COLUMN: Economic and business dimensions
Assessing the benefits and challenges of knowledge spillovers.
Fast-tracking emerging business technologies.
A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta.
"Not invented here" syndrome is not unique to the IT world.
A cohesive, independent solution for bringing provenance to scientific research.
SECTION: Contributed articles
Redundant software (and hardware) ensured Curiosity reached its destination and functioned as its designers intended.
The idea is to identify security-critical software bugs so they can be fixed first.
A solution to the persistent problem of preventing collusion in Vickrey auctions.
SECTION: Review articles
Timing analysis for hard real-time systems.
SECTION: Research highlights
A paper by Ballard, Demmel, Holtz, and Schwartz considers a fundamental problem, adopting a new perspective on an old algorithm that has for years occupied a peculiar place in the theory and practice of matrix algorithms.
Proving lower bounds on the communication of algorithms and finding algorithms that attain these bounds are fundamental goals.
COLUMN: Last byte
Each of these puzzles involves a symmetric game. You will be asked about your best strategy, but what does "best strategy" mean?