Table of Contents
The Boolean Satisfiability Problem is a problem of central importance in computer science. At the same time, it is a paradigmatic constraint-satisfaction problem with numerous applications, including hardware and software
DEPARTMENT: Letter from the President
If there are intelligent civilizations in our galaxy, why have we not yet detected any evidence of them? Noted science fiction writer David Brin has a particularly scary answer to the question. What if we are the ones who are
DEPARTMENT: Letters to the Editor
The Arab Middle East needs a cultural revolution in terms of research, especially in computer science.
Kate Matsudaira considers not only how to mine data from the Web, but what to do with it once you have it.
The first steps have been taken toward enabling a computer to perceive one's thoughts.
Capturing electricity from ambient RF transmissions can keep low-power applications off the grid.
Developers try to tap the beneficial effects of video games.
COLUMN: Legally speaking
Considering the implications of the late-2013 ruling in favor of Google in the Authors Guild case.
COLUMN: Computing ethics
Encouraging students to become comfortable exercising ethical discernment in a professional context with their peers.
COLUMN: The profession of IT
A new report from Chile about improving economic competitiveness advances a novel interpretation of innovation. Timing is everything.
COLUMN: Broadening participation
Codifying human rights and inclusiveness in a technical context for people with disabilities.
Sharing lessons learned from experiences creating successful multidisciplinary research centers.
Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems.
How can the expected interactions between caller and implementation be guaranteed?
Enabling existing lock-based programs to achieve performance benefits of nonblocking synchronization.
SECTION: Contributed articles
Stable multithreading dramatically simplifies the interleaving behaviors of parallel programs, offering new hope for making parallel programming easier.
To inspire women to major in CS, take them to the Grace Hopper Celebration of Women in Computing.
In the same way businesses use big data to pursue profits, governments use it to promote the public good.
SECTION: Review articles
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
SECTION: Research highlights
The TaintDroid project takes a runtime taint tracking approach toward analyzing Android apps.
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their privacy-sensitive data. We address these shortcomings with TaintDroid
COLUMN: Last byte
Last month (February 2014) we posted three games in which you were asked to pick a positive integer. The question in each was: What is the highest number you should think about picking? Here, we offer solutions to all three.
Having helped develop Reduced Instruction Set Computing and Redundant Arrays of Inexpensive Disks, David Patterson has set his sights on interdisciplinary research.
Access the latest issue, plus archived issues and more
Find the app for your mobile device
- ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
- ACM Digital Library apps available for iOS, Android, and Windows devices
- Download an app and sign in to it with your ACM Web Account