In November 2015, the computing world was abuzz with the news that László Babai proved the Graph-Isomorphism Problem. If Babai’s result holds under scrutiny, it is likely to become one of the most celebrated results in theoretical …
There are trade-offs to be found between a native mode implementation of an application and a browser-based implementation.
DEPARTMENT: Letters to the Editor
Both sides of the Point/Counterpoint "The Case for Banning Killer Robots" (Dec. 2015) over lethal autonomous weapons systems seemed to agree the argument concerns weapons "…that once activated, would be able to select and engage targets …
Mark Guzdial issues a "call to action" to encourage high schools to offer, and students to take, the Advanced Placement course in Computer Science Principles.
Robots are being taught to brainstorm alternatives when damaged.
Network experts share their greatest fears about attacks and accidents that could destroy the Internet.
Snowden revelations force changes, but Facebook (and others) resist.
ACM has recognized 42 of its members for significant contributions to the development and application of computing, in areas ranging from data management and spoken-language processing to robotics and cryptography.
COLUMN: Economic and business dimensions
Seeking better understanding of digital transformation.
COLUMN: Privacy and security
What must we learn in order to support privacy requirements as technology advances?
Influencing computer science education at the state level.
COLUMN: Kode Vicious
Committing to commits, and the beauty of summarizing graphs.
Moving from the research realm to real-world business application.
Considering a controversial subject that extends far beyond the collection of phone metadata.
Big data makes common schemas even more necessary.
A practitioner's guide to increasing confidence in system correctness.
A view from computational journalism.
SECTION: Contributed articles
This publicly available curated dataset of almost 100 million photos and videos is free and legal for all.
SECTION: Turing Lecture
It turns out riding across America is more than a handy metaphor for building system software.
SECTION: Contributed articles
Data from phone interactions can help address customers' complaints, and predict their future purchasing behavior.
SECTION: Review articles
Database researchers paint big data as a defining challenge. To make the most of the enormous opportunities at hand will require focusing on five research areas.
SECTION: Research highlights
The system described in "Pinocchio: Nearly Practical Verifiable Computation" refines an important theoretical advance by Gennaro et al. Together, these two works represent a dramatic improvement in speed, generality, and functionality …
To instill greater confidence in computations outsourced to the cloud, we introduce Pinocchio, a built system for efficiently verifying general computations while relying only on cryptographic assumptions.
The authors of "Stochastic Program Optimization" have developed a stochastic search technique and applied it to program optimization.
By encoding constraints of transformation correctness as terms in a cost function, and using a Markov Chain Monte Carlo sampler to explore the space of all possible code sequences, we are able to generate aggressively optimized …
COLUMN: Last byte
A social network can sometimes make more of us than we ought to be.