Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Departments

Technology for the Most Effective Use of Mankind

In a keynote address (see https://goo.gl/RwkwK1) at the 2016 meeting of the Computing Research Association, Kentaro Toyama argued that persistent societal challenges, such as socio-economic inequality, do not have technology-centric …

The ACM Future of Computing Academy

I am pleased to announce the establishment of the ACM Future of Computing Academy (ACM-FCA), created to bring together talented young professionals from various computing disciplines to address the most pressing challenges facing …

Information and Misinformation on the Internet

The Internet influenced the decisions of voters in both the June 2016 U.K. referendum on European Union membership and the November 2016 U.S. elections. The disturbing aspect of these is the quantity of poor-quality content, …
DEPARTMENT: BLOG@CACM

How We Teach CS2All, and What to Do About Database Decay

Valerie Barr considers how to make computer science education meaningful and relevant to all, while a team from the Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory offers strategies …
COLUMN: News

Pure Randomness Extracted from Two Poor Sources

Developments from several disparate areas of computer science provide "a huge jump, both technically and also quantitatively."

Mapping the Internet of Things

Researchers are discovering surprising new risks across the fast-growing IoT.

Bias in Technology

As leading companies release troubling diversity statistics, experts search for solutions.
COLUMN: Technology strategy and management

Is Google's Alphabet a Good Bet?

A relatively simple query raises myriad complicated issues.
COLUMN: Law and technology

Why Less Is More When It Comes to Internet Jurisdiction

Considering legal uncertainty in the online environment.
COLUMN: Historical reflections

Colossal Genius: Tutte, Flowers, and a Bad Imitation of Turing

Reflections on pioneering code-breaking efforts.
COLUMN: Viewpoint

Artificial Intelligence: Think Again

Social and cultural conventions are an often-neglected aspect of intelligent-machine development.

Effects of International Trafficking in Arms Regulations Changes

Considering the impact of recent ITAR changes to the U.S. software industry and software education.
SECTION: Practice

Resolving Conflict

Don't "win." Resolve.

Faucet: Deploying SDN in the Enterprise

Using OpenFlow and DevOps for rapid development.

Research for Practice: Web Security and Mobile Web Computing

Expert-curated guides to the best of CS research.
SECTION: Contributed articles

Exponential Laws of Computing Growth

Moore's Law is one small component in an exponentially growing planetary computing ecosystem.

Bottom-Up Enterprise Information Systems: Rethinking the Roles of Central IT Departments

Central IT needs to guide functional areas and departments toward effective operational and procurement practices.
SECTION: Review articles

Cell-Graphs: Image-Driven Modeling of Structure-Function Relationship

Cell-graph construction methods are best served when physics-driven and data-driven paradigms are joined.
SECTION: Research highlights

Technical Perspective: Magnifying Motions the Right Way

"Eulerian Video Magnification and Analysis" demonstrates that phase differences at a given frequency band, due to subtle motions in a video, can be independently amplified and added back into the original signal.

Eulerian Video Magnification and Analysis

We present Eulerian Video Magnification, a computational technique for visualizing subtle color and motion variations in ordinary videos by making the variations larger.

Technical Perspective: Mapping the Universe

"HACC: Extreme Scaling and Performance Across Diverse Architectures" describes the Hardware/Hybrid Accelerated Cosmology Code (HACC) framework, which uses a novel algorithmic structure to map code onto multiple supercomputer …

HACC: Extreme Scaling and Performance Across Diverse Architectures

In this Research Highlight, we demonstrate the success of HACC on two very different machines, the CPU/GPU system Titan and the BG/Q systems Sequoia and Mira, attaining very high levels of scalable performance.
COLUMN: Last byte

Open Field Tic-Tac-Toe

In the spirit of Gomoku, two people play a version of the classic paper-and-pencil game tic-tac-toe but on an infinite checkerboard. In it, a player wins by getting four pieces in a row — vertically, horizontally, or diagonally …