The Computer Science Curricula 2013 was released last fall with the goal of providing advice and guidance to the computing education community throughout the coming decade.
DEPARTMENT: Letter from the President
While ACM is deeply dependent on the extraordinary contributions of our volunteers, the organizational framework and underlying support for this work is key to ACM's successful operation.
DEPARTMENT: Letters to the Editor
If Moore's Law is indeed winding down, as Moshe Y. Vardi said in "Moore's Law and the Sand-Heap Paradox" (May 2014), software practitioners must focus even more than they already do on developing efficient code.
DEPARTMENT: [email protected]
Daniel Reed shares his experiences with Google Glass, while Chris Stephenson considers the kinds of support chapters of the Computer Science Teachers Association provide their members.
A technology inspired by biological principles but 'steamrolled for decades' prepares to take off as Moore's Law approaches its long-anticipated end.
4D printing combines the dimension of time with the hope of building objects with new capabilities.
New techniques are designed to translate "invisible numbers" into visible images.
Leslie Lamport contributed to the theory and practice of building distributed computing systems that work as intended.
COLUMN: Inside risks
What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
COLUMN: The business of software
On vital and supporting systems.
COLUMN: Privacy and security
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
COLUMN: The profession of IT
Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?
COLUMN: Kode Vicious
And the illogic of PDF.
Why business analytics and big data really matter for modern business organizations.
Looking at embedded DSLs.
"Mostly functional" programming does not work.
High-level DSLs for low-level programming.
SECTION: Contributed articles
EPIC helps assess cyberthreats against the cyber and physical dimensions of networked critical infrastructures.
How to use, and influence, consumer social communications to improve business performance, reputation, and profit.
These interactive applications let users perform, and thus preserve, traditional culture-defining crafts.
SECTION: Review articles
Atomically consistent memory services provide resiliency in dynamic settings.
SECTION: Research highlights
The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a motion field that governs how the state of a character evolves over …
We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling of arbitrary external disturbances.
COLUMN: Last byte
Last month (May 2014) we posted three puzzles in which you were asked to sort several cards using three stacks on a table.
Leslie Lamport on Byzantine generals, clocks, and other tools for reasoning about concurrent systems.