The Moral Hazard of Complexity-Theoretic Assumptions
February 2016 - Vol. 59 No. 2
Features
Expect ‘Ungoverned Actors’ to Use AI-Supported Weapons, Too
Drumming Up Support For AP CS Principles
Self-Repair Techniques Point to Robots That Design Themselves
How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet
In Privacy Law, It’s the U.S. vs. the World
Revealing the API Ecosystem and Enterprise Strategy via Visual Analytics
Broadening Access to Computing Education State By State
Lessons from the Tech Transfer Trenches
Having a Conversation About Bulk Surveillance
Schema.org: Evolution of Structured Data on the Web
The Verification of a Distributed System
YFCC100M: The New Data in Multimedia Research
The Land Sharks Are on the Squawk Box
Phonetic Analytics Technology and Big Data: Real-World Cases
The Beckman Report on Database Research
Technical Perspective: Catching Lies (and Mistakes) in Offloaded Computation
Pinocchio: Nearly Practical Verifiable Computation
Technical Perspective: Program Synthesis Using Stochastic Techniques
Stochastic Program Optimization