A recent Turing-Test competition was won by a chatterbot pretending to be a teenage boy. The media was abuzz, claiming a machine has finally been able to pass the Turing Test. The real question, however, is whether the Turing …
Moshe Y. Vardi
Page 5
As our computational tools become more and more powerful, we can anticipate that our growing knowledge of the mechanics of our world will allow us to use simulation to visualize, understand, and even design processes that …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
David Anderson's "Tom Kilburn: A Tale of Five Computers" (May 2014) was fascinating and informative, but no article on the history of British computing can avoid the precedence controversy between the Universities of Manchester …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Philip Guo sees code reviews providing students "lots of pragmatic learning."
Philip Guo
Pages 10-11
COLUMN: News
Increased computing power combined with new and more advanced models are changing weather forecasting.
Samuel Greengard
Pages 12-14
In-memory databases promise speedier processing.
Neil Savage
Pages 15-17
Affordable, connected, personal medical devices are slowly changing the nature of health care.
Gregory Mone
Pages 18-20
COLUMN: Law and technology
Can technical and legal aspects be happily intertwined?
Stefan Bechtold, Adrian Perrig
Pages 21-23
COLUMN: Historical reflections
Reflections on the intersection of computing and the humanities.
Thomas Haigh
Pages 24-28
COLUMN: The profession of IT
Digital machines are automating knowledge work at an accelerating pace. How shall we learn and stay relevant?
Peter J. Denning
Pages 29-31
COLUMN: Viewpoint
Using theoretical models to plan for AI safety.
Luke Muehlhauser, Bill Hibbard
Pages 32-34
Seeking to overcome nontechnical challenges to the scientific enterprise.
John Leslie King, Paul F. Uhlir
Pages 35-37
SECTION: Practice
Preventing script injection vulnerabilities through software design.
Christoph Kern
Pages 38-47
An informal survey of real-world communications failures.
Peter Bailis, Kyle Kingsbury
Pages 48-55
Quality social science research and the privacy of human subjects require trust.
Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang
Pages 56-63
SECTION: Contributed articles
Defense begins by identifying the targets likely to yield the greatest reward for an attacker's investment.
Cormac Herley
Pages 64-71
The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.
Michail Tsikerdekis, Sherali Zeadally
Pages 72-80
SECTION: Review articles
Exploring the distinction between an optimal robot motion and a robot motion resulting from the application of optimization techniques.
Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre
Pages 82-89
SECTION: Research highlights
"Moving Portraits" is, in some sense, part of the perpetual quest to capture the perfect portrait. Its principal contribution is in adapting this age-old problem to our post-modern, big data world.
Alexei A. Efros
Page 92
We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are displayed, we can create moving portraits from collections of still …
Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz
Pages 93-99
COLUMN: Last byte
Last month (August 2014), we presented three puzzles concerning the Path Game and the Match Game, each of which can be played on any finite graph.
Peter Winkler
Page 102
ACM-Infosys Foundation Award recipient David Blei recalls the origins of his famous topic model, its extensions, and its uses in areas that continue to amaze him.
Marina Krakovsky
Pages 104-ff