While optimists argue that though technology always destroy jobs, it also creates new jobs, pessimists argue that the speed in which information technology is currently destroying jobs is unparalleled.
Moshe Y. Vardi
Centuries before George Boole and Charles Babbage, the notion of binary encoding was well known and apparently even used! Julius Caesar was known to use a simple rotational cipher. Francis Bacon devised a binary encoding scheme …
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
Though I agree with the opening lines of "A New Software Engineering" (Dec. 2014) outlining the "promise of rigorous, disciplined, professional practices," we must also look at "craft" in software engineering if we hope to raise …
Mark Guzdial questions the practice of teaching programming to new CS students by having them practice programming largely on their own.
New techniques capture speech by looking for the vibrations it causes.
How do the U.S., Europe, and Japan differ in their approaches to data protection — and what are they doing about it?
Companies are creating technological solutions for individuals, then generalizing them to broader populations that need similar assistance.
COLUMN: Privacy and security
A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.
COLUMN: Economic and business dimensions
Insights into creating China's Taobao online marketplace ecosystem.
COLUMN: Inside risks
Considerably more anticipation is needed for what might seriously go wrong.
Peter G. Neumann
Investing in computing education research to transform computer science education.
COLUMN: Kode vicious
Visibility leads to debuggability.
George V. Neville-Neil
Comparing experiences publishing textbooks using traditional publishers and do-it-yourself methods.
Armando Fox, David Patterson
Soundy is the new sound.
Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ondřej Lhoták, J. Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, Dimitrios Vardoulakis
Crackers discover how to use NTP as a weapon for abuse.
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
Robert V. Binder, Bruno Legeard, Anne Kramer
SECTION: Contributed articles
Business leaders may bemoan the burdens of governing IT, but the alternative could be much worse.
Carlos Juiz, Mark Toomey
Model checking and logic-based learning together deliver automated support, especially in adaptive and autonomous systems.
Dalal Alrajeh, Jeff Kramer, Alessandra Russo, Sebastian Uchitel
SECTION: Review articles
From theoretical possibility to near practicality.
Michael Walfish, Andrew J. Blumberg
SECTION: Research highlights
As the equivalence problem is essential in many applications, we need algorithms that avoid the worst-case complexity as often as possible. In "Hacking Nondeterminism with Induction and Coinduction," Filippo Bonchi and Damien …
Thomas A. Henzinger, Jean-François Raskin
We introduce bisimulation up to congruence as a technique for proving language equivalence of nondeterministic finite automata.
Filippo Bonchi, Damien Pous
COLUMN: Last byte
A popular logic game involves figuring out an arrangement of people sitting around a circular table based on hints about, say, their relationships. Here, we aim to determine the smallest number of hints sufficient to specify …