In 1992, Yuri Gurevich wrote, "It is amazing, however, how different computer science is, especially theoretical computer science, in Europe and the U.S." How did such a sharp division arise between TCS in North America …
Moshe Y. Vardi
Page 5
I am on a brief holiday in the U.K. visiting stately homes and manor houses in Cotswolds. There is so much history and drama hidden in some of the mechanical designs in these ancient buildings
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
Meg Leta Jones's "Forgetting Made (Too) Easy" (June 2015) raised an important concern about the Court of Justice of the European Union's Google Spain judgment. Google "is without any guidance as to which interests should trump …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Mark Guzdial considers how the variety of learning outcomes and definitions impacts the teaching of computer science.
Mark Guzdial
Pages 10-11
COLUMN: News
Exploring the ways human vision can be fooled is helping developers of machine vision.
Esther Shein
Pages 13-15
Feeling the way across new frontiers at the interface of people and machines.
Logan Kugler
Pages 16-18
Autonomous vehicles will need to decide on a course of action when presented with multiple less-than-ideal outcomes.
Keith Kirkpatrick
Pages 19-20
COLUMN: Privacy and security
Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.
David Kotz, Kevin Fu, Carl Gunter, Avi Rubin
Pages 21-23
COLUMN: Economic and business dimensions
Seeking a better approach to pharmaceutical research and development.
Henry Chesbrough, Marshall Van Alstyne
Pages 24-26
COLUMN: Kode Vicious
On null encryption and automated documentation.
George V. Neville-Neil
Pages 27-28
COLUMN: Education
Two studies provide insights into how to increase the number of domestic doctoral students in U.S. computer science programs.
Susanne Hambrusch, Ran Libeskind-Hadas, Eric Aaron
Pages 29-32
COLUMN: Viewpoint
Improving learning and achievement in introductory computer science by incorporating creative thinking into the curriculum.
Leen-Kiat Soh, Duane F. Shell, Elizabeth Ingraham, Stephen Ramsay, Brian Moore
Pages 33-35
SECTION: Practice
Use states to drive your tests.
Arie van Deursen
Pages 36-43
Cloud computing for computer scientists.
Daniel C. Wang
Pages 44-51
SECTION: Contributed articles
The Quipper language offers a unified general-purpose programming framework for quantum computation.
BenoƮt Valiron, Neil J. Ross, Peter Selinger, D. Scott Alexander, Jonathan M. Smith
Pages 52-61
Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement agencies.
Petra Saskia Bayerl, Babak Akhgar
Pages 62-69
The National Palace Museum in Taiwan had to partner with experienced cloud providers to deliver television-quality exhibits.
Rua-Huan Tsaih, David C. Yen, Yu-Chien Chang
Pages 70-75
SECTION: Review articles
Exploring three interdisciplinary areas and the extent to which they overlap. Are they all part of the same larger domain?
Thanassis Tiropanis, Wendy Hall, Jon Crowcroft, Noshir Contractor, Leandros Tassiulas
Pages 76-82
SECTION: Research highlights
"Soylent: A Word Processor with a Crowd Inside," introduces an exciting vision of using crowd workers to power an interactive system — here, a word processor — in accomplishing complex cognitive tasks.
Aniket (Niki) Kittur
Page 84
This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces.
Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, Katrina Panovich
Pages 85-94
COLUMN: Last byte
You are given two bags, each containing some number NumPerBag of flares. You know there are NumBad flares in one of the bags but not which bag. The other bag has all good flares. Each time you test a flare, you use it up.
Dennis Shasha
Page 96