DEPARTMENT:
Letter from Chair of Education Board
Education, Always
In October, ACM Council approved the publication of the CS 2013 report — an exhaustive 10-year effort championed by ACM's Education Board and IEEE-Computer Society.
Andrew McGettrick
Page 5
DEPARTMENT:
Letter from the President
Cognitive Implants
Every time I see calendar dates like 2014, I feel as if I have been transported by time machine into the future. Isaac Asimov made some remarkably astute projections about 2014 in 1964, so what might he say today?
Vinton G. Cerf
Page 7
DEPARTMENT:
Letters to the Editor
Contribute More Than Algorithmic Speculation
Jacob Loveless et al.'s article "Online Algorithms in High-Frequency Trading" (Oct. 2013) is an example of potentially valuable research misdirected.
CACM Staff
Page 9
DEPARTMENT:
[email protected]
Clarifying Human-Computer Interaction
Philip Guo teaches an undergrad through the use of examples.
Philip Guo
Pages 10-11
COLUMN:
News
A New Type of Mathematics?
New discoveries expand the scope of computer-assisted proofs of theorems.
Don Monroe
Pages 13-15
Should Everybody Learn to Code?
Not everyone needs coding skills, but learning how to think like a programmer can be useful in many disciplines.
Esther Shein
Pages 16-18
Computational Photography Comes Into Focus
Advances in computational photography are making image capture the starting point. The technology is transforming the field.
Samuel Greengard
Pages 19-21
ACM Fellows Inducted
ACM has recognized 50 of its members for their contributions to computing that are driving innovations across multiple domains and disciplines.
CACM Staff
Page 22
COLUMN:
Privacy and security
Would Cybersecurity Professionalization Help Address the Cybersecurity Crisis?
Evaluating the trade-offs involved in cybersecurity professionalization.
Diana L. Burley, Jon Eisenberg, Seymour E. Goodman
Pages 24-27
COLUMN:
Education
Establishing a Nationwide CS Curriculum in New Zealand High Schools
Providing students, teachers, and parents with a better understanding of computer science and programming.
Tim Bell
Pages 28-30
COLUMN:
Inside risks
An Integrated Approach to Safety and Security Based on Systems Theory
Applying a more powerful new safety methodology to security risks.
William Young, Nancy G. Leveson
Pages 31-35
COLUMN:
Kode vicious
Bugs and Bragging Rights
It is not always size that matters.
George V. Neville-Neil
Pages 36-37
COLUMN:
Economic and business dimensions
Digital Platforms: When Is Participation Valuable?
Assessing the benefits and challenges of knowledge spillovers.
Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu
Pages 38-39
COLUMN:
Viewpoint
Ready Technology
Fast-tracking emerging business technologies.
Stephen J. Andriole
Pages 40-42
SECTION:
Practice
Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster
A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta.
Pages 44-51
Center Wheel For Success
"Not invented here" syndrome is not unique to the IT world.
Poul-Henning Kamp
Pages 52-54
Provenance in Sensor Data Management
A cohesive, independent solution for bringing provenance to scientific research.
Zachary Hensley, Jibonananda Sanyal, Joshua New
Pages 55-62
SECTION:
Contributed articles
Mars Code
Redundant software (and hardware) ensured Curiosity reached its destination and functioned as its designers intended.
Gerard J. Holzmann
Pages 64-73
Automatic Exploit Generation
The idea is to identify security-critical software bugs so they can be fixed first.
Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley
Pages 74-84
Cryptography Miracles, Secure Auctions, Matching Problem Verification
A solution to the persistent problem of preventing collusion in Vickrey auctions.
Silvio Micali, Michael O. Rabin
Pages 85-93
SECTION:
Review articles
Computation Takes Time, But How Much?
Timing analysis for hard real-time systems.
Reinhard Wilhelm, Daniel Grund
Pages 94-103
SECTION:
Research highlights
Technical Perspective: A New Spin on an Old Algorithm
A paper by Ballard, Demmel, Holtz, and Schwartz considers a fundamental problem, adopting a new perspective on an old algorithm that has for years occupied a peculiar place in the theory and practice of matrix algorithms.
Michael W. Mahoney
Page 106
Communication Costs of Strassen's Matrix Multiplication
Proving lower bounds on the communication of algorithms and finding algorithms that attain these bounds are fundamental goals.
Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz
Pages 107-114
COLUMN:
Last byte
Puzzled: Lowest Number Wins
Each of these puzzles involves a symmetric game. You will be asked about your best strategy, but what does "best strategy" mean?
Peter Winkler
Page 120