acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Cook-Levin:  The Ugly Underbelly is Good for Us
From BLOG@CACM

Cook-Levin: The Ugly Underbelly is Good for Us

Don't just tell your students that SAT is NP-Complete; show why.

Jost Bürgi and the Discovery of Logarithms
From BLOG@CACM

Jost Bürgi and the Discovery of Logarithms

A forgotten universal genius.

Machine Learning: the Road to Artificial Intelligence?
From BLOG@CACM

Machine Learning: the Road to Artificial Intelligence?

In the mid-1990s, data-driven, statistical, and empirical methods have taken the field of artificial intelligence (AI) by storm. In the last two decades, machine...

Egalitarian Authorship
From BLOG@CACM

Egalitarian Authorship

Is there a way to provide egalitarian authorship to papers?

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

AI Does Not Help Programmers
From BLOG@CACM

AI Does Not Help Programmers

Getting past the"Wow" effect.

Serendipity: When Research in One Area Leads to a Positive Result in Another
From BLOG@CACM

Serendipity: When Research in One Area Leads to a Positive Result in Another

A problem of the extremely optimal family of circulant graphs: when research in one scientific field gives an unexpected result in another.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?
From BLOG@CACM

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?

Centralization leads to more efficient communication and control, which leads to lower transaction costs, which increases the useful work each node can spend on...

Statement Considered Harmful
From BLOG@CACM

Statement Considered Harmful

Instructions are not statements.

Not Your Grandmother's Textbook Exercise
From BLOG@CACM

Not Your Grandmother's Textbook Exercise

Sarcasm, where you least expected it.

The Year-Round Joys and Benefits of Open Source Software
From BLOG@CACM

The Year-Round Joys and Benefits of Open Source Software

One of the things that makes us programmers feel warm and fuzzy is open source software. Companies support open source too. Why give something away for free? A...

How Objective is Peer Review?
From BLOG@CACM

How Objective is Peer Review?

The ESA Experiment.

What Everyone Knows and What No One Knows
From BLOG@CACM

What Everyone Knows and What No One Knows

Who cares about logic?

Getting a Program Right (7)
From BLOG@CACM

Getting a Program Right (7)

Have you run a program proof before? Now is your chance!

Getting a Program Right (6)
From BLOG@CACM

Getting a Program Right (6)

Thanks for your patience.

Getting a Program Right (1)
From BLOG@CACM

Getting a Program Right (1)

Why it is good to have a systematic approach to software verification.

Talented Programmers Don't Tolerate Chaos
From BLOG@CACM

Talented Programmers Don't Tolerate Chaos

Talented programmers will strive to structure chaos and write perfect code.

Not So Good After All? Don't Let 'Altruism' Kill Your Company
From BLOG@CACM

Not So Good After All? Don't Let 'Altruism' Kill Your Company

Altruism is often heralded as a panacea for management challenges, but it could actually be a death sentence for your team and projects. Here's why. 

Soundness and Completeness: Defined With Precision
From BLOG@CACM

Soundness and Completeness: Defined With Precision

The two key properties of program analysis are dual of each other.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account