Addressing the needs of authors, readers, and the Association.
Ronald F. Boisvert, Jack W. Davidson
Pages 5-6
To ensure the timely publication of articles,
Communications created the Virtual Extension to bring readers high-quality articles in an online-only format. The following articles are now available in their entirety to ACM members …
CACM Staff
Page 7
DEPARTMENT: BLOG@CACM
Daniel Reed discusses how researchers communicate their project ideas to companies and product groups and get them successfully adopted. Mark Guzdial considers whether schools of education could create more high school CS teachers …
Daniel Reed, Mark Guzdial
Pages 8-9
DEPARTMENT: CACM online
After the successful launch of the ACM TechNews iPhone and iPad apps last year, ACM now introduces an Android version for both Android smartphones and tablets. ACM will continue to provide new and compatible options for accessing …
Scott E. Delman
Page 10
COLUMN: News
Researchers are demonstrating advances in restorative BCI systems that are giving paralyzed individuals more effective ways to communicate, move, and interact with their environment.
Kirk L. Kroeker
Pages 11-14
A new DARPA program is teaching cameras visual intelligence — how to spot and understand human behavior.
Tom Geller
Pages 15-16
Technology has created new opportunities to connect and interact. Yet, researchers are increasingly concerned that heavy technology usage is changing people's behavior in less than desirable ways.
Samuel Greengard
Pages 17-19
A high school student wins first prize from ACM for developing a faster keyboard layout.
Marina Krakovsky
Page 20
COLUMN: Technology strategy and management
Studying the lessons learned from past and present platform leaders.
Michael A. Cusumano
Pages 21-24
COLUMN: Kode vicious
Cleaning up your storage space quickly and efficiently.
George V. Neville-Neil
Pages 25-26
COLUMN: Inside risks
Examining the socio-technological issues involved in Denmark's decision to pursue the legalization of electronic elections.
Carsten SchÜrmann
Pages 27-29
COLUMN: The business of software
There are two situations in software testing that scare testers: when they see "too many" defects and when they do not see "enough."
Phillip G. Armour
Pages 30-31
COLUMN: Viewpoint
A proposal for a new cost-free open-access publication model for computer science papers.
Dan S. Wallach
Pages 32-35
SECTION: Practice
Applying lessons from software languages to hardware languages using Bluespec SystemVerilog.
Rishiyur S. Nikhil
Pages 36-44
Big data is about more than size, and LINQ is more than up to the task.
Erik Meijer
Pages 45-51
Avionics software safety certification is achieved through objective-based standards.
B. Scott Andersen, George Romanski
Pages 52-57
SECTION: Contributed articles
Expect more cyberwarfare on the conventional battlefield and less against civilian infrastructure . . . assuming containment is possible.
John Arquilla
Pages 58-65
How computer scientists can empower journalists, democracy's watchdogs, in the production of news in the public interest.
Sarah Cohen, James T. Hamilton, Fred Turner
Pages 66-71
SECTION: Review articles
Exploring the connection of biology with reactive systems to better understand living systems.
Jasmin Fisher, David Harel, Thomas A. Henzinger
Pages 72-82
SECTION: Research highlights
Moore's Law, and associated observations by Bob Dennard, describe key technical foundations of the semiconductor industry …
Charles Moore
Page 84
To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on a CMP system. We explore methods to eliminate these overheads by …
Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz
Pages 85-93
A typical machine learning program uses weighted combinations of features to discriminate between classes or to predict real-valued outcomes. The art of machine learning is …
Geoffrey E. Hinton
Page 94
There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full-sized, high-dimensional images remains a difficult problem.
Honglak Lee, Roger Grosse, Rajesh Ranganath, Andrew Y. Ng
Pages 95-103
Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and monuments in Rome, Venice, and …
Carlo Tomasi
Page 104
We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible to reconstruct city-scale image collections with more than a hundred …
Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski
Pages 105-112
COLUMN: Last byte
Inferred connections map our past and predict our future.
Shumeet Baluja
Pages 120-ff
SECTION: Contributed articles: Virtual extension
The power to predict outcomes based on Twitter data is greatly exaggerated, especially for political elections.
Daniel Gayo-Avello
Pages 121-128
A new paradigm is needed to cope with the application, technology, and discipline challenges to our computing profession in the coming decades.
Zhiwei Xu, Guojie Li
Pages 129-137