We would like to update you on three key policy issues ACM's Publications Board is currently discussing, give you a glimpse of what some of the leaders of the field have told us, and invite your input into the discussion.
Joseph A. Konstan, Jack W. Davidson
As configuration complexity and scale grow, the need for smarter configuration systems, better online assistance, and the ability to share context with customer service agents will become increasingly important.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
We wish to clarify an account of the 2014 Turing Test experiment we conducted at the Royal Society London, U.K., as outlined by Moshe Y. Vardi in his Editor's Letter "Would Turing Have Passed the Turing Test?" (Sept. 2014) …
John Langford examines the results of the NIPS experiment, while Mark Guzdial considers the role of class size in teaching computer science.
John Langford, Mark Guzdial
Synthetic biologists may be closing in on potentially world-changing breakthroughs, but they are often hamstrung by a shortage of software tools.
Attackers using side-channel analysis require little knowledge of how an implementation operates.
Dynamic pricing finds its way into a growing number of industries.
COLUMN: Privacy and security
Two proposals intended to reduce flaws in software use two very different approaches for software security.
Dorothy E. Denning
COLUMN: Technology strategy and management
Considering the many different paths and unprecedented opportunities for companies exploring emerging markets.
COLUMN: Kode Vicious
Relevance and repeatability.
George V. Neville-Neil
A pioneer in the field of computational complexity theory reflects on his career.
Finding a better solution by thinking about the problem and its solution, rather than just thinking about the code.
In the end, dynamic systems are simply less secure.
The perpetual motion of parallel performance.
Neil J. Gunther, Paul Puglia, Kristofer Tomasette
SECTION: Contributed articles
Speaking military jargon, users can create labels and draw symbols to position objects on digitized maps.
Philip R. Cohen, Edward C. Kaiser, M. Cecelia Buchanan, Scott Lind, Michael J. Corrigan, R. Matthews Wesson
Engineers use TLA+ to prevent serious but subtle bugs from reaching production.
Chris Newcombe, Tim Rath, Fan Zhang, Bogdan Munteanu, Marc Brooker, Michael Deardeuff
SECTION: Review articles
Implantable devices, often dependent on software, save countless lives. But how secure are they?
Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, Peter Ott
SECTION: Research highlights
Specialization improves energy-efficiency in computing but only makes economic sense if there is significant demand. A balance can often be found by designing application-domain-specific components that have a degree of programmability …
We present the Convolution Engine (CE) — a programmable processor specialized for the convolution-like data-flow prevalent in computational photography, computer vision, and video processing.
Wajahat Qadeer, Rehan Hameed, Ofer Shacham, Preethi Venkatesan, Christos Kozyrakis, Mark Horowitz
COLUMN: Last byte
Launch swarms of self-replicating robots to exploit the most lucrative of resources.
David Allen Batchelor