Sign In

Communications of the ACM

Home/About Communications/2017 Editorial Calendar

About Communications


2017 editorial calendar

APRIL issue
MAY issue
JUNE issue
JULY issue
AUGUST issue
SEPTEMBER issue
OCTOBER issue
APRIL

NEWS
    Sensors on the Brain – G. Mone
    Digitizing the World – C. Edwards
    Computing the Arts – E. Shein
    ACM Panels in Print
VIEWPOINTS
    Online Social Networks and Global Women’s Empowerment – I. Buskens
    The Chess Player Who Couldn’t Pass the Salt – G. Neville-Neil
    Wanted: Toolsmith – W. Regli
    What It Means to Be an Entrepreneur Today – Y. Strickler
PRACTICE
    Pervasive, Dynamic Authentication of Physical Items – M. Yu and S. Devadas
    Uninitialized Reads – R. Seacord
    Does Anybody Listen to You? – K. Matsudaira
CONTRIBUTED ARTICLES
    Attack of the Killer Microseconds – L. Barroso, et al.< br /> Computational Thinking for Teacher Education – A. Yadav, et al.
REVIEW ARTICLES
    A Service Computing Manifesto: The Next 10 Years – A. Bouguettaya, et al.
RESEARCH HIGHLIGHTS
    Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes – T. Chajed, et al.
          With a Technical Perspective by G. Heiser
    Guilt-Free Data Reuse – C. Dwork, et al.
          With a Technical Perspective by J. Ullman
LAST BYTE
    Upstart Puzzles: Stacking the Deck – D. Shasha

MAY

NEWS
    Combating Cancer with Data – E. Shein
    Making Chips Smarter – S. Greengard
    Bionics in Competition – K. Kirkpatrick
    ACM Panels in Print
VIEWPOINTS
    The Anonymization Debate Should Be About Risk, Not Perfection – W. Hartzog and I. Rubinstein Preparing Tomorrow’s Faculty to Address Challenges in Teaching Computer Science – L. Porter, et al.
    Toward a Ban on Lethal Autonomous Weapons: Surmounting the Obstacles – W. Wallach
PRACTICE
    Making Money Using Math – E. Meijer
    MongoDB’s JavaScript Fuzzer – R. Guo
    Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning
CONTRIBUTED ARTICLES
    Who Owns the Social Web? – C. Marshall and F. Shipman
    Responsible Research and Innovation in the Digital Age – M. Jirotka, et al.
REVIEW ARTICLES
    Contest Theory – M. Vojnovic
RESEARCH HIGHLIGHTS
    Exploiting Vector Instructions with Generalized Stream Fusion – G. Mainland, et al.
          With a Technical Perspective by G. Blelloch
    DeepDive: Declarative Knowledge Base Construction – C. Zhang, et al.
          With a Technical Perspective by A. Halevy
LAST BYTE
    Beyond ‘Star Trek’ – D. Batchelor

JUNE

NEWS
    Using Networks for Machine Translation
    Specialized Chips in ML
    Bionics in Competition
    Turing Award Recipient
VIEWPOINTS
    Remaining Trouble Spots w/ Computational Thinking
PRACTICE
    The Debugging Mindset
    Too Big to NOT Fail
    Conversations with Technology Leaders: Erik Meijers
CONTRIBUTED ARTICLES
    Data Science: Intrinsic Challenges< br /> The SCION Internet Architecture
REVIEW ARTICLES
    Learnable Programming: Blocks and Beyond
RESEARCH HIGHLIGHTS
    ImageNet
          With a Technical Perspective by J. Malik
    Arithmetic Circuits
          With a Technical Perspective by A. Wigderson
LAST BYTE
    Q&A with Turing Award Recipient(s)

JULY

NEWS
    Analogue Neuromorphic Computing
    DNA Data Storage
    AI: More Artificial than Intellectual?
VIEWPOINTS
    On Cryptography Backdoors and Prosthetic Intelligence
CONTRIBUTED ARTICLES
    Reimaging the Avatar Dream: Remodeling Social ID< br /> The Dynamics of Work-Family Conflict
REVIEW ARTICLES
    Inference Auction Design in Online Advertising
RESEARCH HIGHLIGHTS
    IronFleet
          With a Technical Perspective by F. Schneider
    Fast and Powerful Hashing Using Tabulation
          With a Technical Perspective by M. Mitzenmacher
LAST BYTE
    Upstart Puzzles

AUGUST

NEWS
    Hacker-Proof Coding
    AR/VR in the Workplace
    AI in Call Centers
VIEWPOINTS
    The Natural Science of Computing
CONTRIBUTED ARTICLES
    Turing’s Pre-War Analog Computers< br /> How Important is IT?
REVIEW ARTICLES
    The Science of Brute Force (with video)
RESEARCH HIGHLIGHTS
    The Scalable Commutativity Rule
          With a Technical Perspective by M. Shapiro
    Spin-It
          With a Technical Perspective by H. Pottman

SEPTEMBER

NEWS
    Training Images Recognizers
    Laser Broadband
    GPS Spoofing
VIEWPOINTS
    Why Agile Teams Fail without UX Research
CONTRIBUTED ARTICLES
    Trust and Distrust in Online Fact-Checking Services
    Moving Beyond the Turing Test with Allen AI Science Challenge
REVIEW ARTICLES
    Security in HPC Environments
RESEARCH HIGHLIGHTS
    Real-time Captioning by Groups of Non-Experts
          With a Technical Perspective by E. Chi
    Multi-Objective Parametric Query Optimization
          With a Technical Perspective by J. Naughton

OCTOBER

NEWS
    3D Printing Body Parts
    Computerized Sound Processing
    Do Smartphones Harm Children?
VIEWPOINTS
    What Can Agile Methods Bring High-Integrity SW Development?
CONTRIBUTED ARTICLES
    Millenials’ Attitudes Toward IT: A Generation of Cherry-Pickers< br /> Barriers to Refractoring (with video)
REVIEW ARTICLES
    Internet Advertising: Ethics and Differences of Opinion (with video)
RESEARCH HIGHLIGHTS
    A2: Analog Malicious Hardware
          With a Technical Perspective by C. Thacker
LAST BYTE
    Upstart Puzzles w/ D. Shasha

 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo