SGB Fortifies Global SIG Community
ACM's Special Interest Groups (SIGs) cover 36 areas of computing, from graphics to computer-human interfaces, theory to computer architecture, programming languages to bioinformatics, and much more. SIGs form the locus of ACM's …
Erik R. Altman
Page 5
DEPARTMENT:
From the president
Honoring Our Best
It is June again and we gather once more in San Francisco to honor the best among us. It is fitting that we do this, not only to celebrate the successes of our colleagues but to convey to the general public the remarkable power …
Vinton G. Cerf
Page 7
DEPARTMENT:
Letters to the Editor
How to Claim Your Fair Share in Academic Publishing
In his editor's letter "To Boycott or Not to Boycott" (Mar. 2013), Moshe Y. Vardi said the traditional author partnership with commercial publishers has turned into an abusive relationship. It is time computer scientists broke …
CACM Staff
Pages 8-9
DEPARTMENT:
BLOG@CACM
Computer Security Needs Refocus; And Be Nice About It
Jason Hong wonders whether computer security is missing the mark, while Judy Robertson supports refusing to tolerate discourtesy.
Jason Hong, Judy Robertson
Pages 10-11
COLUMN:
News
Deep Learning Comes of Age
Advances on multiple fronts are bringing big improvements to the way computers learn, increasing the accuracy of speech and vision systems.
Gary Anthes
Pages 13-15
The Future Is Flexible Displays
Manufacturers hint that bendable screens are coming soon, but academics argue that many engineering challenges remain.
Gregory Mone
Pages 16-17
Augmented-Reality Glasses Bring Cloud Security Into Sharp Focus
The possibility of a new $200-billion-plus industry has cloud security experts bracing for the ramifications.
Paul Hyman
Pages 18-20
Proofs Probable
Shafi Goldwasser and Silvio Micali laid the foundations for modern cryptography, with contributions including interactive and zero-knowledge proofs.
Neil Savage
Pages 22-24
ACM Honors Computing Innovators
ACM's awards celebrate achievements in networks, information retrieval, multi-agent systems, computer science education, versatile compiler technologies, and more.
CACM Staff
Page 25
COLUMN:
Privacy and security
Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much of It in the Air?
Where reality stops and perception begins.
Stas Filshtinskiy
Pages 28-30
COLUMN:
The business of software
What Is a 'Good' Estimate?
Whether forecasting is valuable.
Phillip G. Armour
Pages 31-32
COLUMN:
Kode Vicious
Swamped By Automation
Whenever someone asks you to trust them, don't.
George V. Neville-Neil
Pages 33-34
COLUMN:
The profession of IT
Thumb Numbers
Rules of thumb stated as numerical rules are enticing, but many are folk theorems that may not apply in your critical situation.
Peter J. Denning
Pages 35-37
COLUMN:
Inside risks
Learning from the Past to Face the Risks of Today
The Space Shuttle software program can provide guidance to today's projects.
Nancy G. Leveson
Pages 38-42
COLUMN:
Viewpoint
Access to the Internet Is a Human Right
Connecting Internet access with freedom of expression and creativity.
Stephen B. Wicker, Stephanie M. Santoso
Pages 43-46
SECTION:
Practice
Resolved: The Internet Is No Place For Critical Infrastructure
Risk is a necessary consequence of dependence.
Dan Geer
Pages 48-53
Real-Time GPU Audio
Real-time finite difference-based sound synthesis using graphics processors.
Bill Hsu, Marc Sosnick-Pérez
Pages 54-62
There Is No Getting Around It: You Are Building a Distributed System
Building a distributed system requires a methodical approach to requirements.
Mark Cavage
Pages 63-70
SECTION:
Contributed articles
Incentives and Rewarding in Social Computing
Praise, pay, and promote crowd-member workers to elicit desired behavioral responses and performance levels.
Ognjen Scekic, Hong-Linh Truong, Schahram Dustdar
Pages 72-82
Consequence Analysis of Complex Events on Critical U.S. Infrastructure
How to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas.
Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra
Pages 83-91
SECTION:
Review articles
Content Recommendation on Web Portals
How to offer recommendations to users when they have not specified what they want.
Deepak Agarwal, Bee-Chung Chen, Pradheep Elango, Raghu Ramakrishnan
Pages 92-101
SECTION:
Research highlights
Technical Perspective: Circuit Placement Challenges
For a semiconductor circuit with billions of transistors, finding desired locations of circuit components is a challenging task that substantially impacts circuit quality and manufacturing cost.
Yao-Wen Chang
Page 104
SimPL: An Algorithm For Placing VLSI Circuits
VLSI placement optimizes locations of circuit components so as to reduce interconnect. We propose an algorithm for large-scale placement that outperforms prior art both in runtime and solution quality on standard benchmarks. …
Myung-Chul Kim, Dong-Jin Lee, Igor L. Markov
Pages 105-113
COLUMN:
Last byte
Puzzled: Solutions and Sources
Last month (May 2013) we posed a trio of brainteasers concerning Ant Alice and her ant friends who always march at 1 cm/sec in whatever direction they are facing, reversing direction when they collide.
Peter Winkler
Page 117
Q&A: Cracking the Code
Turing Award recipients Shafi Goldwasser and Silvio Micali talk about proofs, probability, and poker.
Leah Hoffmann
Pages 120-ff