ACM held a strategic planning retreat last November. The motivation was the realization that the ecosystem that supports scholarly and professional societies is undergoing rapid change, and this change is creating significant …
John White
Page 5
The prospect of increasingly unconventional computing methods that may force us to rethink how we analyze problems for purposes of getting computers to solve them for us.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
Vinton G. Cerf's "Responsible Programming" (July 2014) raised the interesting question of whether it is responsible to produce software without using state-of-the-art defect-detection-and-validation tools. The answer is legal …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
John Langford considers how to stand out when seeking a research position, while Mark Guzdial suggests what teachers need to know to teach computer science at the high school level.
John Langford, Mark Guzdial
Pages 10-11
COLUMN: News
Optical information handling is a critical staple for communications and the Internet, but using light for computer-scale computation remains a distant dream.
Don Monroe
Pages 13-15
Dynamically typed languages adopt features of static typing to cope with growth.
Neil Savage
Pages 16-18
Scientists are using cutting-edge scanning and visualization techniques to wow visitors and find new stories in ancient artifacts.
Nidhi Subbaraman
Pages 19-21
COLUMN: Technology strategy and management
Speculating on how the Bitcoin economy might evolve.
Michael A. Cusumano
Pages 22-24
COLUMN: Inside risks
Considering existing and new types of risks inherent in cloud services.
Peter G. Neumann
Pages 25-27
COLUMN: Kode vicious
What do you do when your debugger fails you?
George V. Neville-Neil
Pages 28-29
COLUMN: The business of software
Some hidden costs of outsourcing.
Phillip G. Armour
Pages 30-31
COLUMN: Viewpoint
Higher education institutions must modify their business models in response to technology-driven influences.
Henry Lucas
Pages 32-35
Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.
Edgar G. Daylight
Pages 36-38
SECTION: Practice
Public, verifiable, append-only logs.
Ben Laurie
Pages 40-46
Assessing legal and technical solutions to secure HTTPS.
Axel Arnbak, Hadi Asghari, Michel Van Eeten, Nico Van Eijk
Pages 47-55
Routing security incidents can still slip past deployed security defenses.
Sharon Goldberg
Pages 56-63
SECTION: Contributed articles
Use this map query interface to search the world, even when not sure what information you seek. (View a related original video at https://vimeo.com/106352925.)
Hanan Samet, Jagan Sankaranarayanan, Michael D. Lieberman, Marco D. Adelfio, Brendan C. Fruin, Jack M. Lotkowski, Daniele Panozzo, Jon Sperling, Benjamin E. Teitler
Pages 64-77
This collaboratively edited knowledgebase provides a common source of data for Wikipedia, and everyone else.
Denny Vrandečić, Markus Krötzsch
Pages 78-85
SECTION: Review articles
New abstractions are critical for achieving SDN goals.
Martin Casado, Nate Foster, Arjun Guha
Pages 86-95
SECTION: Research highlights
"Dissection: A New Paradigm for Solving Bicomposite Search Problems," by Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir, presents an elegant new algorithm for solving a broad class of combinatorial optimization problems …
Bart Preneel
Page 97
In this paper, we introduce the new notion of bicomposite search problems, and show that they can be solved with improved combinations of time and space complexities by using a new algorithmic paradigm called dissection.
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Pages 98-105
COLUMN: Last byte
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be. When machines are in the natural world, what in the world is still unnatural?
Daniel H. Wilson
Pages 112-ff