The Turing Centenary is now behind us and we can afford some reflection on what has transpired. There is a risk, however, that in our focus on highlighting Turing's seminal contributions we may have gone from celebration to …
Moshe Y. Vardi
Page 5
DEPARTMENT: From the president
In most formulations, robots have the ability to manipulate and affect the real world. I would like to posit, however, that the notion of robot could usefully be expanded to include programs that perform functions, ingest …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
To the question Vinton G. Cerf addressed in his President's Letter "Where Is the Science in Computer Science?" (Oct. 2012), my first answer would be that there isn't any. A true science like physics or chemistry studies some …
CACM Staff
Pages 8-9
FY12 was an outstanding year for ACM. Membership reached an all-time high for the 10th consecutive year. We witnessed our global hubs in Europe, India, and China take root and flourish.
Alain Chesnais
Pages 11-15
DEPARTMENT: BLOG@CACM
Daniel Reed on straddling the intellectual divide between technology experts and policymakers.
Daniel Reed
Pages 16-17
COLUMN: News
Side channels give out information that can be used to crack secrets, but researchers are identifying the holes and trying to close them.
Neil Savage
Pages 19-21
The leading open source system for processing big data continues to evolve, but new approaches with added features are on the rise.
Gregory Mone
Pages 22-24
In repackaging other companies' news, some news aggregators are diverting readers and ad dollars, and, critics argue, undercutting the incentive to spend money on original reporting. It is an economic and ethical problem without …
Marina Krakovsky
Pages 25-27
COLUMN: Technology strategy and management
In search of a middle ground in the intellectual property wars.
Michael A. Cusumano
Pages 28-31
COLUMN: The business of software
It seems to be a law of software development that things always take longer than we expect. When a project manager talks to a designer, programmer, or tester and tries to get a sense of how "complete" the assigned task is …
Phillip G. Armour
Pages 32-33
COLUMN: Law and technology
Viewing evolving data security issues as engineering problems to be solved.
Deven Desai
Pages 34-36
COLUMN: Historical reflections
Lessons learned from four award-winning books on the history of information technology.
Thomas Haigh
Pages 37-40
COLUMN: Viewpoint
Imagining an optimized education model.
Salman Khan
Pages 41-43
Considering how to combine the best elements of conferences and journals.
Jonathan Grudin, Gloria Mark, John Riedl
Pages 44-49
SECTION: Practice
Constraints in an environment empower the services.
Pat Helland
Pages 50-59
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
CACM Staff
Pages 60-67
Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.
Jeremiah Grossman
Pages 68-72
SECTION: Contributed articles
Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.
Richard Becker, Ramón Cáceres, Karrie Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky
Pages 74-82
Large genomic databases with interactive access require new, layered abstractions, including separating "evidence" from "inference."
Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese
Pages 83-93
SECTION: Review articles
A framework for evaluating security risks associated with technologies used at home.
Tamara Denning, Tadayoshi Kohno, Henry M. Levy
Pages 94-103
SECTION: Research highlights
Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic practices through technology. The following paper is a watershed …
Doug DeCarlo, Matthew Stone
Page 105
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for generating such visualizations.
Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala
Pages 106-114
The following article by Shotton et al. describes a landmark computer vision system that takes a single depth image containing a person and automatically estimates the pose of the person's body in 3D.
James M. Rehg
Page 115
We propose a new method to quickly and accurately predict human pose — the 3-D positions of body joints — from a single depth image, without depending on information from preceding frames.
Jamie Shotton, Toby Sharp, Alex Kipman, Andrew Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore
Pages 116-124
COLUMN: Last byte
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be. I self-publish, and you get to sail my aether wave for free.
Rudy Rucker
Pages 136-ff