The age of open access is upon us. Increasingly, the consensus of authors and their funding institutions is that the fruits of taxpayer-supported research should be freely available. This is a compelling argument and a noble …
Ronald F. Boisvert, Jack W. Davidson
DEPARTMENT: From the president
I have been thinking about the demographics of the computing profession and wondering what steps ACM and its members might take to increase interest in this career across a full spectrum of potential candidates.
Vinton G. Cerf
Bertrand Meyer wonders why malicious reviews run rampant in computer science.
Computational models are tackling the complexity of biology, from single-celled microbes to human organs.
The new Mars rover has attracted plenty of attention for its planetary gymnastics, but the big breakthroughs are under the hood.
Computer modeling is radically redefining healthcare and epidemiology by providing new tools for understanding the impact of different intervention strategies.
COLUMN: Privacy and security
Seeking to protect the fundamental privacy of network interactions.
COLUMN: Inside risks
My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections.
In addition, I reflect on the collateral effects of Hurricane Sandy …
Peter G. Neumann
COLUMN: Kode Vicious
Is there a "best used by" date for software?
George V. Neville-Neil
New possibilities in online education create new challenges.
Steve Cooper, Mehran Sahami
COLUMN: Economic and business dimensions
Applying a centuries-old technique to modern cost estimation.
Ana Aizcorbe, Samuel Kortum, Unni Pillai
How to address the lack of transparency, trust, and acceptance in cloud services.
Ali Sunyaev, Stephan Schneider
Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.
Our authentication system is lacking. Is improvement possible?
The USE method addresses shortcomings in other commonly used methodologies.
Open source security foundations for mobile and embedded devices.
Robert N. M. Watson
SECTION: Contributed articles
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
Ari Juels, Alina Oprea
Software techniques that tolerate latency variability are vital to building responsive large-scale Web services.
Jeffrey Dean, Luiz André Barroso
SECTION: Review articles
The challenges — and great promise — of modern symbolic execution techniques, and the tools to help implement them.
Cristian Cadar, Koushik Sen
SECTION: Research highlights
The microprocessor chip R&D community has been well aware of the so-called "power wall" challenge for over a decade. The following work by Esmaeilzadeh et al. is a landmark paper that opens our eyes to the unrelenting power challenge …
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases continue, the per-transistor speed and energy efficiency improvements …
Hadi Esmaeilzadeh, Emily Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger
COLUMN: Last byte
These puzzles involve computing probabilities associated with dice.