ACM's Special Interest Groups (SIGs) cover 36 areas of computing, from graphics to computer-human interfaces, theory to computer architecture, programming languages to bioinformatics, and much more. SIGs form the locus of ACM's …
DEPARTMENT: From the president
It is June again and we gather once more in San Francisco to honor the best among us. It is fitting that we do this, not only to celebrate the successes of our colleagues but to convey to the general public the remarkable power …
DEPARTMENT: Letters to the Editor
In his editor's letter "To Boycott or Not to Boycott" (Mar. 2013), Moshe Y. Vardi said the traditional author partnership with commercial publishers has turned into an abusive relationship. It is time computer scientists broke …
Jason Hong wonders whether computer security is missing the mark, while Judy Robertson supports refusing to tolerate discourtesy.
Advances on multiple fronts are bringing big improvements to the way computers learn, increasing the accuracy of speech and vision systems.
Manufacturers hint that bendable screens are coming soon, but academics argue that many engineering challenges remain.
The possibility of a new $200-billion-plus industry has cloud security experts bracing for the ramifications.
Shafi Goldwasser and Silvio Micali laid the foundations for modern cryptography, with contributions including interactive and zero-knowledge proofs.
ACM's awards celebrate achievements in networks, information retrieval, multi-agent systems, computer science education, versatile compiler technologies, and more.
COLUMN: Privacy and security
Where reality stops and perception begins.
COLUMN: The business of software
Whether forecasting is valuable.
COLUMN: Kode Vicious
Whenever someone asks you to trust them, don't.
COLUMN: The profession of IT
Rules of thumb stated as numerical rules are enticing, but many are folk theorems that may not apply in your critical situation.
COLUMN: Inside risks
The Space Shuttle software program can provide guidance to today's projects.
Connecting Internet access with freedom of expression and creativity.
Risk is a necessary consequence of dependence.
Real-time finite difference-based sound synthesis using graphics processors.
Building a distributed system requires a methodical approach to requirements.
SECTION: Contributed articles
Praise, pay, and promote crowd-member workers to elicit desired behavioral responses and performance levels.
How to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas.
SECTION: Review articles
How to offer recommendations to users when they have not specified what they want.
SECTION: Research highlights
For a semiconductor circuit with billions of transistors, finding desired locations of circuit components is a challenging task that substantially impacts circuit quality and manufacturing cost.
VLSI placement optimizes locations of circuit components so as to reduce interconnect. We propose an algorithm for large-scale placement that outperforms prior art both in runtime and solution quality on standard benchmarks. …
COLUMN: Last byte
Last month (May 2013) we posed a trio of brainteasers concerning Ant Alice and her ant friends who always march at 1 cm/sec in whatever direction they are facing, reversing direction when they collide.
Turing Award recipients Shafi Goldwasser and Silvio Micali talk about proofs, probability, and poker.