ACM's new CEO lays out some brief thoughts on the future of the world's leading professional computing society in the hope of eliciting reactions and suggestions.
Bobby Schnabel
Page 5
I continue to look for ways to preserve digital information over long periods of time. Imagine storing petabytes of information in vials containing dried DNA and using robots to retrieve it.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
None of the three articles on the proposed Proceedings of the ACM (Sept. 2015) addressed what should be the fundamental concern for any publication: Who will actually read (and subscribe to) it?
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Valerie Barr suggests how men can better promote women in computing, while Michael Stonebraker shares how it feels to receive the top honor in the computer science field.
Valerie Barr, Michael Stonebraker
Pages 10-11
COLUMN: News
Natural Language Generation software begins delivering on the promise of automated prose.
Alex Wright
Pages 12-14
Organizations must balance their concerns with the protection of employee privacy.
Esther Shein
Pages 15-17
People can listen to a single voice amid the hubbub of a cocktail party; algorithms can help computers do it, too.
Chris Edwards
Pages 18-20
John Henry Holland, a pioneer in the study of complex adaptive systems and of what became known as genetic algorithms, died in August at the age of 86.
CACM Staff
Page 21
COLUMN: Privacy and security
How can customers tell they are getting it?
Steven B. Lipner
Pages 24-26
COLUMN: Legally speaking
Implications of the U.S. Supreme Court's new test for patentable subject matter.
Pamela Samuelson
Pages 27-29
COLUMN: Economic and business dimensions
Examining the effects of electronic health records on the safety of patients in medical facilities.
Muhammad Zia Hydari, Rahul Telang, William M. Marella
Pages 30-32
COLUMN: Education
Introducing students to visual programming as a pathway to text-based programming.
Pratim Sengupta, Amanda Dickes, Amy Voss Farris, Ashlyn Karan, David Martin, Mason Wright
Pages 33-35
COLUMN: Interview
ACM Fellow and A.M. Turing Award recipient Fred Brooks reflects on his career.
Len Shustek
Pages 36-40
COLUMN: Viewpoints
Implications of the Facebook emotions study.
Rafael A. Calvo, Dorian Peters, Sidney D'Mello
Pages 41-42
SECTION: Practice
Reliability in the face of rapid change
Ben Maurer
Pages 44-49
Probabilistic algorithms are all around us. Not only are they acceptable, some programmers actually seek out chances to use them.
Tyler Mcmullen
Pages 50-54
We may be on the cusp of a new revolution in Web development.
Taylor Savage
Pages 55-61
SECTION: Contributed articles
A metro map can tell a story, as well as provide good directions.
Dafna Shahaf, Carlos Guestrin, Eric Horvitz, Jure Leskovec
Pages 62-73
Explaining motivations for online comments, this study looks to help establish a positive, nonthreatening online comment culture.
So-Hyun Lee, Hee-Woong Kim
Pages 74-79
Sentiment analysis helps detect NBA players' pre-game moods from their tweets and predict their on-court performance.
Chenyan Xu, Yang Yu, Chun-Keung Hoi
Pages 80-89
SECTION: Review articles
Inductive programming can liberate users from performing tedious and repetitive tasks.
Sumit Gulwani, José Hernández-Orallo, Emanuel Kitzelmann, Stephen H. Muggleton, Ute Schmid, Benjamin Zorn
Pages 90-99
SECTION: Research highlights
"Geometric Tools for Exploring Manifolds of Light Transport Paths" presents a technique to address the challenging problems of light transport.
Frédo Durand
Page 102
We provide a geometric solution to the longstanding problem of light simulations by representing light paths as points in an abstract high-dimensional configuration space that is defined by a system of constraint equations.
Wenzel Jakob, Steve Marschner
Pages 103-111
"Software Dataplane Verification" takes existing static checking of networks to a new level by checking the real code in the forwarding path of a Click router using classical software verification tools, and not just a model …
George Varghese
Page 112
We present the result of working iteratively on two tasks: designing a domain-specific verification tool for packet-processing software, while trying to identify a minimal set of restrictions that packet-processing software must …
Mihai Dobrescu, Katerina Argyraki
Pages 113-121
COLUMN: Last byte
There are objects of four types and n people, each with a budget of $99. The objective of each one is to acquire three objects of the same type (any type) before anyone else does.
Dennis Shasha
Page 136