It is rare for research studies in computing to be reproduced. This seems odd, since we have an advantage over science done in wet labs. There is no reason for us not to be leaders in practices that enable audit and reuse when …
Ronald F. Boisvert
The Greeks and the Romans carved letters in stone and these are still eminently readable over 2,000 years later. Newer media have not been around as long but I think it is arguable that the more recent media do not have the resilience …
Vinton G. Cerf
Perry R. Cook considers the career path that led him to STEAM.
Perry R. Cook
Exploring ways to push more data through a fiber one-tenth the thickness of the average human hair.
While 3D technologies that make headlines are not truly holographic, holographic techniques are furthering advances in important applications such as biomedical imaging.
How do we ensure algorithms treat us fairly?
COLUMN: Technology strategy and management
Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.
Michael A. Cusumano
COLUMN: Global computing
Connecting increased mobile phone usage with political and market liberalization.
Michael L. Best
COLUMN: Kode vicious
Naming the next generation and remembering that the cloud is just other people's computers.
George V. Neville-Neil
COLUMN: Inside risks
Where automation is inevitable, let's do it right.
Peter G. Neumann
Considering the role of universities in promoting tolerance as well as education.
Kathrin Conrad, Nysret Musliu, Reinhard Pichler, Hannes Werthner
Taking advantage of idleness to reduce dropped frames and memory consumption.
Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross Mcilroy, Hannes Payer
Just because you have been doing it the same way doesn't mean you are doing it the right way.
Tame the dynamics of change by centralizing each concern in its own module.
SECTION: Contributed articles
Combine simple whitelisting technology, notably prefix filtering, in most BGP-speaking routers with weaker cryptographic protocols.
Robert Lychev, Michael Schapira, Sharon Goldberg
The most important consideration is how the collection of measurements may affect a person's well-being.
Craig Partridge, Mark Allman
SECTION: Review articles
With the implantation of software-driven devices comes unique privacy and security threats to the human body.
A. J. Burns, M. Eric Johnson, Peter Honeyman
SECTION: Research highlights
"Incremental, Iterative Data Processing with Timely Dataflow" describes Naiad, which combines three classes of dataflow systems, supporting high-throughput batch processing queries, low-latency data stream queries, and iterative …
We describe the timely dataflow model for distributed computation and its implementation in the Naiad system.
Derek G. Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martin Abadi
"Efficient Parallelization Using Rank Convergence in Dynamic Programming Algorithms" shows how some instances of dynamic programming can be effectively parallelized by taking advantage of the algebraic properties of the underlying …
This paper proposes an efficient parallel algorithm for an important class of dynamic programming problems that includes Viterbi, Needleman-Wunsch, Smith-Waterman, and Longest Common Subsequence.
Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz
COLUMN: Last byte
In this cooperative game, two players want to meet each other in a graph as quickly as possible.