Letter from Chair of Education Board
In October, ACM Council approved the publication of the CS 2013 report — an exhaustive 10-year effort championed by ACM's Education Board and IEEE-Computer Society.
Letter from the President
Every time I see calendar dates like 2014, I feel as if I have been transported by time machine into the future. Isaac Asimov made some remarkably astute projections about 2014 in 1964, so what might he say today?
Letters to the Editor
Contribute More Than Algorithmic Speculation
Jacob Loveless et al.'s article "Online Algorithms in High-Frequency Trading" (Oct. 2013) is an example of potentially valuable research misdirected.
Clarifying Human-Computer Interaction
Philip Guo teaches an undergrad through the use of examples.
A New Type of Mathematics?
New discoveries expand the scope of computer-assisted proofs of theorems.
Should Everybody Learn to Code?
Not everyone needs coding skills, but learning how to think like a programmer can be useful in many disciplines.
Computational Photography Comes Into Focus
Advances in computational photography are making image capture the starting point. The technology is transforming the field.
ACM Fellows Inducted
ACM has recognized 50 of its members for their contributions to computing that are driving innovations across multiple domains and disciplines.
Privacy and security
Would Cybersecurity Professionalization Help Address the Cybersecurity Crisis?
Evaluating the trade-offs involved in cybersecurity professionalization.
Establishing a Nationwide CS Curriculum in New Zealand High Schools
Providing students, teachers, and parents with a better understanding of computer science and programming.
An Integrated Approach to Safety and Security Based on Systems Theory
Applying a more powerful new safety methodology to security risks.
Bugs and Bragging Rights
It is not always size that matters.
Economic and business dimensions
Digital Platforms: When Is Participation Valuable?
Assessing the benefits and challenges of knowledge spillovers.
Fast-tracking emerging business technologies.
Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster
A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta.
Center Wheel For Success
"Not invented here" syndrome is not unique to the IT world.
Provenance in Sensor Data Management
A cohesive, independent solution for bringing provenance to scientific research.
Redundant software (and hardware) ensured Curiosity reached its destination and functioned as its designers intended.
Automatic Exploit Generation
The idea is to identify security-critical software bugs so they can be fixed first.
Cryptography Miracles, Secure Auctions, Matching Problem Verification
A solution to the persistent problem of preventing collusion in Vickrey auctions.
Computation Takes Time, But How Much?
Timing analysis for hard real-time systems.
Technical Perspective: A New Spin on an Old Algorithm
A paper by Ballard, Demmel, Holtz, and Schwartz considers a fundamental problem, adopting a new perspective on an old algorithm that has for years occupied a peculiar place in the theory and practice of matrix algorithms.
Communication Costs of Strassen's Matrix Multiplication
Proving lower bounds on the communication of algorithms and finding algorithms that attain these bounds are fundamental goals.
Puzzled: Lowest Number Wins
Each of these puzzles involves a symmetric game. You will be asked about your best strategy, but what does "best strategy" mean?