DEPARTMENT: Departments
It is rare for research studies in computing to be reproduced. This seems odd, since we have an advantage over science done in wet labs. There is no reason for us not to be leaders in practices that enable audit and reuse when …
Ronald F. Boisvert
Page 5
The Greeks and the Romans carved letters in stone and these are still eminently readable over 2,000 years later. Newer media have not been around as long but I think it is arguable that the more recent media do not have the resilience …
Vinton G. Cerf
Page 7
DEPARTMENT: BLOG@CACM
Perry R. Cook considers the career path that led him to STEAM.
Perry R. Cook
Pages 8-9
COLUMN: News
Exploring ways to push more data through a fiber one-tenth the thickness of the average human hair.
Don Monroe
Pages 10-12
While 3D technologies that make headlines are not truly holographic, holographic techniques are furthering advances in important applications such as biomedical imaging.
Marina Krakovsky
Pages 13-15
How do we ensure algorithms treat us fairly?
Keith Kirkpatrick
Pages 16-17
COLUMN: Technology strategy and management
Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.
Michael A. Cusumano
Pages 18-20
COLUMN: Global computing
Connecting increased mobile phone usage with political and market liberalization.
Michael L. Best
Pages 21-23
COLUMN: Kode vicious
Naming the next generation and remembering that the cloud is just other people's computers.
George V. Neville-Neil
Pages 24-25
COLUMN: Inside risks
Where automation is inevitable, let's do it right.
Peter G. Neumann
Pages 26-30
COLUMN: Viewpoint
Considering the role of universities in promoting tolerance as well as education.
Kathrin Conrad, Nysret Musliu, Reinhard Pichler, Hannes Werthner
Pages 31-33
SECTION: Practice
Taking advantage of idleness to reduce dropped frames and memory consumption.
Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross Mcilroy, Hannes Payer
Pages 34-39
Just because you have been doing it the same way doesn't mean you are doing it the right way.
Kate Matsudaira
Pages 40-41
Tame the dynamics of change by centralizing each concern in its own module.
Andre Medeiros
Pages 42-46
SECTION: Contributed articles
Combine simple whitelisting technology, notably prefix filtering, in most BGP-speaking routers with weaker cryptographic protocols.
Robert Lychev, Michael Schapira, Sharon Goldberg
Pages 48-57
The most important consideration is how the collection of measurements may affect a person's well-being.
Craig Partridge, Mark Allman
Pages 58-64
SECTION: Review articles
With the implantation of software-driven devices comes unique privacy and security threats to the human body.
A. J. Burns, M. Eric Johnson, Peter Honeyman
Pages 66-72
SECTION: Research highlights
"Incremental, Iterative Data Processing with Timely Dataflow" describes Naiad, which combines three classes of dataflow systems, supporting high-throughput batch processing queries, low-latency data stream queries, and iterative …
Johannes Gehrke
Page 74
We describe the timely dataflow model for distributed computation and its implementation in the Naiad system.
Derek G. Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martin Abadi
Pages 75-83
"Efficient Parallelization Using Rank Convergence in Dynamic Programming Algorithms" shows how some instances of dynamic programming can be effectively parallelized by taking advantage of the algebraic properties of the underlying …
James Larus
Page 84
This paper proposes an efficient parallel algorithm for an important class of dynamic programming problems that includes Viterbi, Needleman-Wunsch, Smith-Waterman, and Longest Common Subsequence.
Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz
Pages 85-92
COLUMN: Last byte
In this cooperative game, two players want to meet each other in a graph as quickly as possible.
Dennis Shasha
Page 96