Sign In

Communications of the ACM

Table of Contents


Computer Science Curricula 2013 Released

The Computer Science Curricula 2013 was released last fall with the goal of providing advice and guidance to the computing education community throughout the coming decade.
DEPARTMENT: Letter from the President

The House Elves of ACM

While ACM is deeply dependent on the extraordinary contributions of our volunteers, the organizational framework and underlying support for this work is key to ACM's successful operation.
DEPARTMENT: Letters to the Editor

Efficient Code to Counter Dying Moore's Law

If Moore's Law is indeed winding down, as Moshe Y. Vardi said in "Moore's Law and the Sand-Heap Paradox" (May 2014), software practitioners must focus even more than they already do on developing efficient code.
DEPARTMENT: BLOG@CACM

First Impressions, Unexpected Benefits

Daniel Reed shares his experiences with Google Glass, while Chris Stephenson considers the kinds of support chapters of the Computer Science Teachers Association provide their members.
COLUMN: News

Neuromorphic Computing Gets Ready for the (Really) Big Time

A technology inspired by biological principles but 'steamrolled for decades' prepares to take off as Moore's Law approaches its long-anticipated end.

Time for a Change

4D printing combines the dimension of time with the hope of building objects with new capabilities.

Visualizations Make Big Data Meaningful

New techniques are designed to translate "invisible numbers" into visible images.

General Agreement

Leslie Lamport contributed to the theory and practice of building distributed computing systems that work as intended.
COLUMN: Inside risks

EMV: Why Payment Systems Fail

What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
COLUMN: The business of software

Owning and Using

On vital and supporting systems.
COLUMN: Privacy and security

FUD: A Plea for Intolerance

Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
COLUMN: The profession of IT

Avalanches Are Coming

Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?
COLUMN: Kode Vicious

The Logic of Logging

And the illogic of PDF.
COLUMN: Viewpoint

Beyond Data and Analysis

Why business analytics and big data really matter for modern business organizations.
SECTION: Practice

Domain-Specific Languages and Code Synthesis Using Haskell

Looking at embedded DSLs.

The Curse of the Excluded Middle

"Mostly functional" programming does not work.

Design Exploration Through Code-Generating DSLs

High-level DSLs for low-level programming.
SECTION: Contributed articles

Cyber-Physical Testbeds

EPIC helps assess cyberthreats against the cyber and physical dimensions of networked critical infrastructures.

The Power of Social Media Analytics

How to use, and influence, consumer social communications to improve business performance, reputation, and profit.

The Digitization of Cultural Practices

These interactive applications let users perform, and thus preserve, traditional culture-defining crafts.
SECTION: Review articles

Implementing Distributed Shared Memory for Dynamic Networks

Atomically consistent memory services provide resiliency in dynamic settings.
SECTION: Research highlights

Technical Perspective: Motion Fields for Interactive Character Animation

The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a motion field that governs how the state of a character evolves over …

Motion Fields for Interactive Character Locomotion

We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling of arbitrary external disturbances.
COLUMN: Last byte

Puzzled: Solutions and Sources

Last month (May 2014) we posted three puzzles in which you were asked to sort several cards using three stacks on a table.

Q&A: Divide and Conquer

Leslie Lamport on Byzantine generals, clocks, and other tools for reasoning about concurrent systems.