Sign In

Communications of the ACM

Home/About Communications/2017 Editorial Calendar

About Communications


2017 editorial calendar

JULY issue
AUGUST issue
SEPTEMBER issue
OCTOBER issue
NOVEMBER issue
DECEMBER issue
JULY

NEWS
    Building a Brain May Mean Going Analog – N. Savage
    Cracking the Code on DNA Storage – S. Greengard
    Artificial Intelligence Poised to Ride a New Wave – G. Anthes
    Jean E. Sammet 1928-2017 – L. Fisher
VIEWPOINTS
    Cryptovirology: The Birth, Neglect, and Explosion of Ransomware – A. Young and M. Yung
    Unknowns of the Gig-Economy – B. Greenwood, et al.
    The Beginner’s Creed – P. Denning
    The Informal Guide to ACM Fellow Nominations – M. Snir
PRACTICE
    Side Effects, Front and Center – P. Helland
    The IDAR Graph – M. Overton
    Research for Practice: Tracing and Debugging Distributed Systems; Programming by Examples
CONTRIBUTED ARTICLES
    Reimagining the Avatar Dream: Modeling Social Identity in Digital Media – D. Harrell and C. Lim< br /> How Important is IT? – P. Koutroumpis, et al.
REVIEW ARTICLES
    Inference Auction Design in Online Advertising – D. Nekipelov and T. Wang
RESEARCH HIGHLIGHTS
    IronFleet: Proving Safety and Liveness of Practical Distributed Systems – C. Hawblitzel, et al.
          With a Technical Perspective by F. Schneider
    Fast and Powerful Hashing Using Tabulation – M. Thorup
          With a Technical Perspective by M. Mitzenmacher
LAST BYTE
    Ruby Risk – D. Shasha

AUGUST

NEWS
    Hacker-Proof Coding
    AR/VR in the Workplace
    AI in Call Centers
VIEWPOINTS
    The Natural Science of Computing
PRACTICE
    Now That We Can Write Simultaneously
    Small Data Computing
CONTRIBUTED ARTICLES
    Turing’s Pre-War Analog Computers (with video)
    Data Science: Intrinsic Challenges
REVIEW ARTICLES
    The Science of Brute Force (with video)
RESEARCH HIGHLIGHTS
    The Scalable Commutativity Rule
    Spin-It

SEPTEMBER

NEWS
    Training Images Recognizers
    Laser Broadband
    GPS Spoofing
VIEWPOINTS
    Why Agile Teams Fail without UX Research
    When Does Law Enforcement’s Demand to Read Your Data Become a Demand to Read Your Mind?
PRACTICE
    The Calculus of Service Availability
    What is Data Sketching and Why Should I Care?
    10 Ways to be a Better Interviewer
CONTRIBUTED ARTICLES
    Trust and Distrust in Online Fact-Checking Services
    Moving Beyond the Turing Test with Allen AI Science Challenge (with video)
REVIEW ARTICLES
    Security in HPC Environments (with video)
RESEARCH HIGHLIGHTS
    Real-time Captioning by Groups of Non-Experts
    A2: Analog Malicious Hardware
LAST BYTE
    Recipient of ACM Prize in Computing

OCTOBER

NEWS
    3D Printing Body Parts
    Computerized Sound Processing
    Do Smartphones Harm Children?
VIEWPOINTS
    What Can Agile Methods Bring High-Integrity SW Development?
CONTRIBUTED ARTICLES
    Millennials’ Attitudes Toward IT: A Generation of Cherry-Pickers
    Barriers to Refractoring (with video)
REVIEW ARTICLES
    Internet Advertising: Ethics and Differences of Opinion (with video)
RESEARCH HIGHLIGHTS
    Multi-Objective Parametric Query Optimization
    Github
LAST BYTE
    Upstart Puzzles

NOVEMBER

NEWS
    Copolymers and Self-Assembly
    Brain-Computer Interfaces
    Policing Online Advertising?
VIEWPOINTS
    Pay What You Want for a Model of OA Publishing
    Social Agents: Bridging Simulation and Engineering
CONTRIBUTED ARTICLES
    Cambits: A Reconfigurable Camera System
    User Reviews of Top Mobile Apps in GooglePlay
REVIEW ARTICLES
    Healthcare Robotics (with video)
RESEARCH HIGHLIGHTS
    Heads-Up Limit Hold’em Poker is Solved
    Geodesics in Heat

DECEMBER

NEWS
    Perovskites and Solar Energy Capture
    Using Simulation to Teach Autonom. Vehicles
    Parallel Computational Thinking
VIEWPOINTS
    The Death of Big Software
    Losy Advice for the Lovelorn
CONTRIBUTED ARTICLES
    Cybersecurity: Nuclear Security, Turing, and Illogical Logic (with vide)
    Technology-Driven Changes in the Work and Employment
REVIEW ARTICLES
    Energy Efficiency: New Concern for Software Developers
RESEARCH HIGHLIGHTS
    A Theory of Pricing Private Data
    HELIX-RC

 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account