Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: From the president

New Ways to Think About CS Education

Two new approaches could have an impact on both the quality of CS education and on our professional responsibilities to society.
DEPARTMENT: Cerf's up

Multisensory Adventures

Two books, one published to great acclaim and the other still in process, resonate with a visceral intensity for which I was honestly unprepared and surprised.
DEPARTMENT: Letters to the editor

Adding More Color to Patch Picture

"Automated Program Repair" (Dec. 2019) holds out the promise of substantially improving software quality. Quantitative data can help researchers and practitioners better understand the capabilities and current limitations of …
DEPARTMENT: BLOG@CACM

Teaching Teachers to Offer STEM to Undergrads

Mark Guzdial considers how teaching computing to undergraduates requires better education of the teachers as well.
COLUMN: Last byte

Reinventing Virtual Machines

The notion of scalable operating systems led Mendel Rosenblum to virtual machines, which have revolutionized datacenters and enabled modern cloud computing.
COLUMN: News

Dead Languages Come to Life

Artificial intelligence automates the translation of extinct languages.

Machine Learning, Meet Whiskey

Technologies are coming increasingly closer to approximating the human senses of taste and smell.

How Universities Deploy Student Data

Personalizing efforts to drive greater student retention and success.
COLUMN: Computing ethics

The Temptation of Data-Enabled Surveillance

Are universities the next cautionary tale?
COLUMN: Technology strategy and management

Artificial Intelligence and the Future of Professional Work

Considering the implications of the influence of artificial intelligence given previous industrial revolutions.
SECTION: Kode vicious

Master of Tickets

Valuing the quality, not the quantity, of work.
COLUMN: Viewpoint

Why Is Cybersecurity Not a Human-Scale Problem Anymore?

Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.

Organizing Family Support Services at ACM Conferences

Seeking to improve access to conferences and provide support for attendees with children.

A Taxonomy of Automated Assistants

Rating your intelligent (human or automated) assistant.
SECTION: East Asia and Oceania Region special section

Welcome

Welcome to the special section covering East Asia and Oceania, which includes Southeast Asia, Oceania, and Asia-Pacific countries including Japan and Korea.
SECTION: East Asia and Oceania Region special section: Hot topics

The NII Shonan Meeting in Japan

Since the inaugural NII Shonan Meeting in February 2011, more than 140 meetings have been held with participants representing 60 countries and regions.

Capturing Cultural Heritage in East Asia and Oceania

How to capture (the experience of) cultural objects in digital form?

Cybersecurity in Pacific Island Nations

One security issue that has begun to emerge and will only accelerate without individual and collective action is the threat of cyberattacks and cybercrime in the Oceania region.

Singapore's Cybersecurity Ecosystem

Since 2013, Singapore's medium- to long-term directions for cybersecurity is to develop R&D expertise and capabilities to improve the trustworthiness of cyber infrastructures and systems.

Innovating Services and Digital Economy in Singapore

A report on Singapore's technology development in the services and digital economy, with insights for research over the next five years.
SECTION: East Asia and Oceania Region special section: Big trends

AI Singapore: Empowering a Smart Nation

The AI Singapore national initiative was launched in June 2017 as an integrated, impact-driven, research and innovation program in artificial intelligence for the entire country.

Developing AI for Law Enforcement in Singapore and Australia

The Intelligent Case Retrieval System (ICRS), using AI capabilities, better enables all parties to evaluate the strengths or weaknesses of their legal cases.

Digital Healthcare Across Oceania

What is the current state of progress of digital health?

Detecting Fake News in Social Media: An Asia-Pacific Perspective

Many of the latest techniques to automatically debunk fake news were initiated in the Asia and Oceania region.

seL4 in Australia: From Research to Real-World Trustworthy Systems

An overview of developments, and of ongoing research, related to the correctness proof of the seL4 microkernel.

Advances in Security Research in the Asiacrypt Region

Members of the International Association for Cryptologic Research explore regional work and collaboration activities.

5G Commercialization and Trials in Korea

Government-industry 5G collaborations, including the R&D roadmap, the first 5G experience, and 5G vertical trials made the 5G-enabled industrial transformation take place in Korea.

Asia's Surging Interest in Binary Analysis

The expanding cyber infrastructure in Asia has ignited strong interests in software security, leading to a surge of research activities in binary analysis in the region.
SECTION: Practice

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.
SECTION: Contributed articles

Cyber Warranties: Market Fix or Marketing Trick?

Risk transfer options offer hope, but little more.
SECTION: Review articles

The Antikythera Mechanism

The discovery of this calculating machine is so significant that part of the history of ancient technology must be rewritten.
SECTION: Research highlights

Technical Perspective: An Answer to Fair Division's Most Enigmatic Question

The envy-free cake-cutting problem stood its ground for two decades, until it was cracked by Aziz and Mackenzie. Their solution is presented in "A Bounded and Envy-Free Cake Cutting Algorithm."

A Bounded and Envy-Free Cake Cutting Algorithm

We report on our algorithm that resolved the well-studied cake cutting problem in which the goal is to find an envy-free allocation of a divisible resource based on queries from agents.