Sign In

Communications of the ACM

Home/About Communications/2018 Editorial Calendar

About Communications


2018 editorial calendar

FEBRUARY 2018 issue
MARCH 2018 issue
APRIL 2018 issue
MAY 2018 issue
JUNE 2018 issue
JULY 2018 issue
AUGUST 2018 issue

FEBRUARY

 

NEWS

 

  • Quantum Technology Forgoes Unconditional Security to Extend Its Reach – C. Edwards
    Going Serverless – N. Savage
    The War Over the Value of Personal Data – L. Kugler

VIEWPOINTS

 

 

  • Risks of Trusting the Physics of Sensors – K. Fu and W. Xu
    The Inclusive and Accessible Workplace – S.Wille and D. Sajous-Brady
    Reducing the Attack Surface – G. Neville-Neil
    Teaching Artificial Intelligence and Humanity – J. Keating and I. Nourbakhsh
    Innovation from the Edges – S. Greenstein

PRACTICE

 

 

  • Titus: Introducing Containers to the Netflix Cloud – A.Leung, et al.
    Research for Practice: Private Online Communication; Highlights in Systems Verification
    Views from the Top – K. Matsudaira

CONTRIBUTED ARTICLES

 

 

  • The Next Phase in the Digital Evolution: Intelligent Tools, Platforms, Growth, Employment – J. Zysman and M. Kenney
    A Large-Scale Comparative Study of Beta Testers and Regular Users – V. Stavova, et al.

REVIEW ARTICLES

 

 

  • Elements of the Theory of Dynamic Networks – O. Michail and P. Spirakis

RESEARCH HIGHLIGHTS

 

 

  • Practical Verification of Peephole Optimizations with Alive – N. Lopez, et al.
          With a Technical Perspective by S. Zdancewic
    Which is the Fairest (Rent Division) of Them All? – K. Gal, et al.       With a Technical Perspective by V. Conitzer


 

MARCH

 

NEWS

 

  • Virtual Life
    Construction in the 21st Century
    The State of Faking

VIEWPOINTS

 

 

  • Computational Social Science Equals CS + Social Data
    Responsible Research w/ Crowds

CONTRIBUTED ARTICLES

 

 

  • A Programmable Programming Language (with video)
    The Evolution Toward Soft(er) Products
    Comparative Study of Beta Testers and Standard Users

REVIEW ARTICLES

 

 

  • How Can We Trust A Robot?

RESEARCH HIGHLIGHTS

 

 

  • Time-Inconsistent Planning
    SSL Certificate Reissues and Revocations in the Wake of Heartbleed


 

APRIL

 

NEWS

 

  • Nash Equilibria
    AI Chips
    Artificial (Emotional) Intelligence

VIEWPOINTS

 

 

  • Push vs Pull: Flipping the Publishing Business Model
    Smartphones, Contents of Mind, and the 5th Amendment

PRACTICE

 

 

  • DevOps Delivers: Introduction
    Continuous Delivery Sounds Great, But Will It Work Here?
    Containers Will Not Fix Your Broken Culture (and other hard truths)
    DevOps Metrics

CONTRIBUTED ARTICLES

 

 

  • Building a Smart City - Lessons from Barcelona (with video)
    Realizing the Potential of Data Science (with video)
    Lessons Building Static Analysis Tools @ Google

REVIEW ARTICLES

 

 

  • Bridgeware: The Air-Gap Malware

RESEARCH HIGHLIGHTS

 

 

  • A Practical Algorithm for Topic Modeling
    With a Technical Perspective by David Blei

LAST BYTE

 

 

  • Upstart Puzzles


 

MAY

 

NEWS

 

  • Biological Computing
    Functional Languages
    Protecting/Sharing Medical Data

VIEWPOINTS

 

 

  • The March into the Black Hole Complexity
    Science, Policy and Service: Thoughts on the Way Forward

PRACTICE

 

 

  • How Is Your Week Going So Far?
    Canary Analysis Service
    RfP: Cluster Scheduling for Datacenters

CONTRIBUTED ARTICLES

 

 

  • Internet Freedom in West Africa (with video)
    Learning Rules of Rejection in Writing Programs
    Data Acquisition in VANET w/ Multihoming

REVIEW ARTICLES

 

 

  • Speech Emotion Recognition: 20 Years in a Nutshell (with video)

RESEARCH HIGHLIGHTS

 

 

  • Never Ending Learning
    With a Technical Perspective by Oren Etzioni

LAST BYTE

 

 

  • Future Tense


 

JUNE

 

NEWS

 

  • How Deep Learning Works
    3D Sensor Chips and Apps
    Getting Hooked on Tech

VIEWPOINTS

 

 

  • Effectiveness of Anonymotizing Double-Blind Reviews

CONTRIBUTED ARTICLES

 

 

  • Identifying Patterns in Medical Records w/Latent Analysis
    Bias and the Web (with video)
    Ability-based Design

REVIEW ARTICLES

 

 

  • Privacy in Decentralized Cryptocurrencies

RESEARCH HIGHLIGHTS

 

 

  • COZ: Finding Code that Counts with Causal Profiling


  •  

LAST BYTE

 

 

  • Q&A w/Turing recipient(s)


 

JULY

 

NEWS

 

  • Energy and Cryptocurrencies
    Smart Email Systems
    Global Internet Availability

VIEWPOINTS

 

 

  • A New Perspective on Computational Thinking
    The Case of the Disappearing Cybersecurity

CONTRIBUTED ARTICLES

 

 

  • The Challenge of Making Machine Learning Robust (with video)
    Always Measure One-Level Deeper
    Digital Nudging (with video)

REVIEW ARTICLES

 

 

  • Digital Effectiveness Through Caps and Limits in Access

RESEARCH HIGHLIGHTS

 

 

  • Bitcoin Mining Is Vulnerable
    With a Technical Perspective by Sharon Goldberg

LAST BYTE

 

 

  • Upstart Puzzles


 

AUGUST

 

NEWS

 

  • Steering Like a Rat
    3D Stacking
    The Battle of Women in CS

VIEWPOINTS

 

 

  • Foundations of Internet-Enabled Democracy
    Internet Democracy Won't Save Democracy

CONTRIBUTED ARTICLES

 

 

  • Amdahl's Law for Tail Latency
    How to Teach Computer Ethics w/Science Fiction (with video)

REVIEW ARTICLES

 

 

  • Multiparty Privacy in Social Media (with video)

RESEARCH HIGHLIGHTS

 

 

  • Scalable and H-P Betweeness Centrality on the GPU
    With a Technical Perspective by John Owens

LAST BYTE

 

 

  • Future Tense

 

 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account