ACM's Special Interest Groups (SIGs) cover 36 areas of computing, from graphics to computer-human interfaces, theory to computer architecture, programming languages to bioinformatics, and much more. SIGs form the locus of ACM's …
Erik R. Altman
DEPARTMENT: From the president
It is June again and we gather once more in San Francisco to honor the best among us. It is fitting that we do this, not only to celebrate the successes of our colleagues but to convey to the general public the remarkable power …
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
In his editor's letter "To Boycott or Not to Boycott" (Mar. 2013), Moshe Y. Vardi said the traditional author partnership with commercial publishers has turned into an abusive relationship. It is time computer scientists broke …
Jason Hong wonders whether computer security is missing the mark, while Judy Robertson supports refusing to tolerate discourtesy.
Jason Hong, Judy Robertson
Advances on multiple fronts are bringing big improvements to the way computers learn, increasing the accuracy of speech and vision systems.
Manufacturers hint that bendable screens are coming soon, but academics argue that many engineering challenges remain.
The possibility of a new $200-billion-plus industry has cloud security experts bracing for the ramifications.
Shafi Goldwasser and Silvio Micali laid the foundations for modern cryptography, with contributions including interactive and zero-knowledge proofs.
ACM's awards celebrate achievements in networks, information retrieval, multi-agent systems, computer science education, versatile compiler technologies, and more.
COLUMN: Privacy and security
Where reality stops and perception begins.
COLUMN: The business of software
Whether forecasting is valuable.
Phillip G. Armour
COLUMN: Kode Vicious
Whenever someone asks you to trust them, don't.
George V. Neville-Neil
COLUMN: The profession of IT
Rules of thumb stated as numerical rules are enticing, but many are folk theorems that may not apply in your critical situation.
Peter J. Denning
COLUMN: Inside risks
The Space Shuttle software program can provide guidance to today's projects.
Nancy G. Leveson
Connecting Internet access with freedom of expression and creativity.
Stephen B. Wicker, Stephanie M. Santoso
Risk is a necessary consequence of dependence.
Real-time finite difference-based sound synthesis using graphics processors.
Bill Hsu, Marc Sosnick-Pérez
Building a distributed system requires a methodical approach to requirements.
SECTION: Contributed articles
Praise, pay, and promote crowd-member workers to elicit desired behavioral responses and performance levels.
Ognjen Scekic, Hong-Linh Truong, Schahram Dustdar
How to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas.
Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra
SECTION: Review articles
How to offer recommendations to users when they have not specified what they want.
Deepak Agarwal, Bee-Chung Chen, Pradheep Elango, Raghu Ramakrishnan
SECTION: Research highlights
For a semiconductor circuit with billions of transistors, finding desired locations of circuit components is a challenging task that substantially impacts circuit quality and manufacturing cost.
VLSI placement optimizes locations of circuit components so as to reduce interconnect. We propose an algorithm for large-scale placement that outperforms prior art both in runtime and solution quality on standard benchmarks.
Myung-Chul Kim, Dong-Jin Lee, Igor L. Markov
COLUMN: Last byte
Last month (May 2013) we posed a trio of brainteasers concerning Ant Alice and her ant friends who always march at 1 cm/sec in whatever direction they are facing, reversing direction when they collide.
Turing Award recipients Shafi Goldwasser and Silvio Micali talk about proofs, probability, and poker.