A major debate has erupted among economists regarding the impact of robots and automation on jobs and the possibility of technological unemployment.
Moshe Y. Vardi
Page 5
DEPARTMENT: From the president
One wonders whether legislative bodies and perhaps insurance companies will reach conclusions that suggest software designers and implementers should have imposed upon themselves regulatory requirements, authorizations, and certifications …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
Exploring the malicious hacker problem, Zheng-chuan Xu et al.'s "Why Computer Talents Become Computer Hackers" (Apr. 2013) overlooked many motivations for computer talents becoming computer hackers.
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Jason Hong considers how students working on their doctorates in computer science must adapt and evolve to succeed.
Jason Hong
Pages 10-11
COLUMN: News
New techniques could cut the power required to avoid overheating.
Esther Shein
Pages 13-16
3-D printing has come of age. It promises to revolutionize a wide range of industries and profoundly change the way people buy and consume.
Samuel Greengard
Pages 17-19
Hacker spaces are spreading around the world, though some government funding is raising questions.
Neil Savage
Pages 20-21
COLUMN: Legally speaking
Considering the negative influence of U.S. statutory damage rules on technology innovation.
Pamela Samuelson
Pages 24-26
COLUMN: Computing ethics
How to encourage ethical behavior among all links in a global supply chain.
Christopher S. Tang, Joshua Zimmerman
Pages 27-29
COLUMN: Technology strategy and management
Expertise and service ethics are just two of the many components comprising a modern professional.
Mari Sako
Pages 30-32
COLUMN: Broadening participation
Improving academic success and social development by merging computational thinking with cultural practices.
Ron Eglash, Juan E. Gilbert, Ellen Foster
Pages 33-36
COLUMN: Viewpoint
Advances in artificial intelligence and robotics will have significant implications for evolving economic systems.
Martin Ford
Pages 37-39
SECTION: Practice
We simply do not have a synchronization mechanism that can enforce mutual exclusion.
Paul E. McKenney
Pages 40-49
Exploring an alternative to lock-based synchronization.
Samy Al Bahra
Pages 50-61
Nonblocking synchronization can yield astonishing results in terms of scalability and real-time response, but at the expense of verification state space.
Mathieu Desnoyers
Pages 62-69
SECTION: Contributed articles
The RSVP voice-recognition search engine improves speech recognition and translation accuracy in question answering.
Yang Tang, Di Wang, Jing Bai, Xiaoyan Zhu, Ming Li
Pages 70-77
How to fairly allocate divisible resources, and why computer scientists should take notice.
Ariel D. Procaccia
Pages 78-87
SECTION: Review articles
The challenge of developing and using computer models to understand and control the diffusion of disease through populations.
Madhav Marathe, Anil Kumar S. Vullikanti
Pages 88-96
SECTION: Research highlights
The following paper makes a fundamental contribution to the world of vector graphics by introducing a new primitive called diffusion curve.
Peter Wonka
Page 100
We describe a new vector-based primitive for creating smooth-shaded images, called the diffusion curve.
Alexandrina Orzan, Adrien Bousseau, Pascal Barla, Holger Winnemöller, JoĆ«lle Thollot, David Salesin
Pages 101-108
COLUMN: Last byte
Visits home brought mixed feelings. Greta loved her parents, but she always came away tense and exhausted from the duplicity of self-censorship, guarding her parents from the aspects of her true self she knew they didn't, couldn't …
Mark McClelland
Pages 112-ff