In November 2015, the computing world was abuzz with the news that László Babai proved the Graph-Isomorphism Problem. If Babai’s result holds under scrutiny, it is likely to become one of the most celebrated results in theoretical …
Moshe Y. Vardi
Page 5
There are trade-offs to be found between a native mode implementation of an application and a browser-based implementation.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
Both sides of the Point/Counterpoint "The Case for Banning Killer Robots" (Dec. 2015) over lethal autonomous weapons systems seemed to agree the argument concerns weapons "…that once activated, would be able to select and engage targets …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Mark Guzdial issues a "call to action" to encourage high schools to offer, and students to take, the Advanced Placement course in Computer Science Principles.
Mark Guzdial
Pages 12-13
COLUMN: News
Robots are being taught to brainstorm alternatives when damaged.
Chris Edwards
Pages 15-17
Network experts share their greatest fears about attacks and accidents that could destroy the Internet.
Logan Kugler
Pages 18-20
Snowden revelations force changes, but Facebook (and others) resist.
Tom Geller
Pages 21-23
ACM has recognized 42 of its members for significant contributions to the development and application of computing, in areas ranging from data management and spoken-language processing to robotics and cryptography.
CACM Staff
Page 24
COLUMN: Economic and business dimensions
Seeking better understanding of digital transformation.
Peter C. Evans, Rahul C. Basole
Pages 26-28
COLUMN: Privacy and security
What must we learn in order to support privacy requirements as technology advances?
Carl Landwehr
Pages 29-31
COLUMN: Education
Influencing computer science education at the state level.
Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial
Pages 32-34
COLUMN: Kode Vicious
Committing to commits, and the beauty of summarizing graphs.
George V. Neville-Neil
Pages 35-36
COLUMN: Viewpoint
Moving from the research realm to real-world business application.
Satish Chandra, Suresh Thummalapenta, Saurabh Sinha
Pages 37-39
Considering a controversial subject that extends far beyond the collection of phone metadata.
Herbert Lin
Pages 40-42
SECTION: Practice
Big data makes common schemas even more necessary.
R. V. Guha, Dan Brickley, Steve Macbeth
Pages 44-51
A practitioner's guide to increasing confidence in system correctness.
Caitie McCaffrey
Pages 52-55
A view from computational journalism.
Nicholas Diakopoulos
Pages 56-62
SECTION: Contributed articles
This publicly available curated dataset of almost 100 million photos and videos is free and legal for all.
Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li
Pages 64-73
SECTION: Turing Lecture
It turns out riding across America is more than a handy metaphor for building system software.
Michael Stonebraker
Pages 74-83
SECTION: Contributed articles
Data from phone interactions can help address customers' complaints, and predict their future purchasing behavior.
J. P. Shim, J. Koh, S. Fister, H. Y. Seo
Pages 84-90
SECTION: Review articles
Database researchers paint big data as a defining challenge. To make the most of the enormous opportunities at hand will require focusing on five research areas.
Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter,
Pages 92-99
SECTION: Research highlights
The system described in "Pinocchio: Nearly Practical Verifiable Computation" refines an important theoretical advance by Gennaro et al. Together, these two works represent a dramatic improvement in speed, generality, and functionality …
Michael Mitzenmacher, Justin Thaler
Page 102
We introduce Pinocchio, a built system for efficiently verifying general computations while relying only on cryptographic assumptions.
Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova
Pages 103-112
The authors of "Stochastic Program Optimization" have developed a stochastic search technique and applied it to program optimization.
Sumit Gulwani
Page 113
By encoding constraints of transformation correctness as terms in a cost function, and using a Markov Chain Monte Carlo sampler to explore the space of all possible code sequences, we are able to generate aggressively optimized …
Eric Schkufza, Rahul Sharma, Alex Aiken
Pages 114-122
COLUMN: Last byte
A social network can sometimes make more of us than we ought to be.
Ken MacLeod
Pages 128-ff