Many of us have lived with Moore's Law for all of our professional lives. We knew that it cannot continue forever, but the end always seemed to be beyond the horizon. No more. We are witnessing the denouement of an extraordinary …
Moshe Y. Vardi
Page 5
DEPARTMENT: From the president
Too often one gets the impression of tacit expectation that scientific research has to produce
results within some predictable time. But many examples illustrate that it may take some time to validate the results of theoretical …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
"Trends in Steganography" (Mar. 2014) included a good survey of the history of data hiding and a comprehensive list of methods for inserting bits into cover objects but omitted an important actor from the scene — the enemy …
CACM Staff
Page 8
Meet the candidates who introduce their plans — and stands — for the Association.
CACM Staff
Pages 9-17
DEPARTMENT: BLOG@CACM
Judy Robertson reviews what happened when she decided to introduce Android development into the curriculum for first-year computer science students.
Judy Robertson
Pages 18-19
COLUMN: News
Sophisticated computer models and simulations are replacing test tubes and beakers. This revolution in biology research is redefining medicine, agriculture, and more.
Samuel Greengard
Pages 21-23
Can our digital data represent us a million years from now?
Tom Geller
Pages 24-26
Despite the need to make decisions relevant to technologies, the U.S. Supreme Court is not the most techno-savvy group.
Keith Kirkpatrick
Pages 27-29
COLUMN: Economic and business dimensions
Evaluating the evolving controversial digital currency.
Marshall Van Alstyne
Pages 30-32
COLUMN: Law and technology
How video games thrive in a world of piracy.
Ben Depoorter
Pages 33-34
COLUMN: Historical reflections
Reflections on a British computer engineer who influenced several important machines, including the first stored-program computer.
David Anderson
Pages 35-38
COLUMN: Education
Bringing educators together and focusing their interests toward improving computer science education in high schools.
Steve Cooper, Shuchi Grover, Beth Simon
Pages 39-41
COLUMN: Viewpoint
Considering the societal implications of the robotics revolution.
Ruzena Bajcsy
Pages 42-43
SECTION: Practice
How good security at the NSA could have stopped him.
Bob Toxen
Pages 44-51
Better understanding data requires tracking its history and context.
Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper
Pages 52-60
Stronger properties for low-latency geo-replicated storage.
Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen
Pages 61-68
SECTION: Contributed articles
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield
Pages 70-79
How to cope with the growing demand for software solutions at no extra cost.
Shimeon Pass, Boaz Ronen
Pages 80-87
Participating educational institutions get a much more cost-effective result compared to the commercial off-the-shelf alternative.
Manlu Liu, Sean Hansen, Qiang Tu
Pages 88-96
SECTION: Review articles
Using machine learning to predict algorithm runtime.
Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu
Pages 98-107
SECTION: Research highlights
An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is unconscious of the process and thus unable to give away or reveal …
Ari Juels, Bonnie Wong
Page 109
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow a user to implicitly learn a secret password without them having …
Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
Pages 110-118
COLUMN: Last byte
Sorting is one of the most fundamental, and most studied, computational tasks. The problem is typically to put
n items in order. The objective is to minimize time, space, number of comparisons, or number of rounds of comparisons …
Peter Winkler
Page 120