Some of the most perplexing and frustrating experiences that technologists have are with politics and social policy. One that is currently playing out involves encryption, and what (if anything) should be done to regulate it.
Eugene H. Spafford
Page 5
Computer science is in significant measure all about analyzing problems, breaking them down into manageable parts, finding solutions, and integrating the results. The skills needed for this kind of thinking apply to more than …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
I concur with Moshe Y. Vardi's Editor's Letter "On Lethal Autonomous Weapons" (Dec. 2015) but think the answer to his philosophical logjam is readily available in the "ACM Code of Ethics and Professional Conduct."
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Valerie Barr considers the continuing attraction of the woman considered the first computer programmer.
Valerie Barr
Pages 10-11
COLUMN: News
Neural net advances improve computers' language ability in many fields.
Gregory Goth
Pages 13-16
Diverse technologies help farmers produce food in resource-poor areas.
Tom Geller
Pages 17-18
Classification algorithms can lead to biased decisions, so researchers are trying to identify such biases and root them out.
Neil Savage
Pages 19-21
Peter Naur, a Danish computer scientist and 2005 recipient of the ACM A.M. Turing Award, died recently after a brief illness.
CACM Staff
Pages 22-23
COLUMN: Legally speaking
Allowing some reverse engineering of technical measures for non-infringing purposes.
Pamela Samuelson
Pages 24-26
COLUMN: Computing ethics
Information justice is both a business concern and a moral question.
Jeffrey Johnson
Pages 27-29
COLUMN: The profession of IT
A recent celebration of 50 years of operating system research yields lessons for all professionals in designing offers for their clients.
Peter J. Denning
Pages 30-32
COLUMN: Broadening participation
In addition to alliances created for broadening participation in computing, research is required to better utilize the knowledge they have produced.
Tiffany Barnes, George K. Thiruvathukal
Pages 33-34
COLUMN: Viewpoint
Guidelines for the enterprise.
Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculin, Wei Tan, Vijay Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch
Pages 35-37
Seeking an improved paper presentation process.
H. V. Jagadish
Pages 38-39
COLUMN: Interview
Stanford University President John Hennessy discusses his academic and industry experiences in Silicon Valley with UC Berkeley CS Professor David Patterson.
David Patterson
Pages 40-45
SECTION: Practice
A discussion with Amin Vahdat, David Clark, and Jennifer Rexford.
Pages 46-54
Thoughts on trust and merit in software team culture.
Kate Matsudaira
Pages 55-57
The "Leftover Principle" requires increasingly more highly skilled humans.
Tom Limoncelli
Pages 58-61
SECTION: Contributed articles
To encourage repeatable research, fund repeatability engineering and reward commitments to sharing research artifacts.
Christian Collberg, Todd A. Proebsting
Pages 62-69
MINIX shows even an operating system can be made to be self-healing.
Andrew S. Tanenbaum
Pages 70-78
UPON Lite focuses on users, typically domain experts without ontology expertise, minimizing the role of ontology engineers.
Antonio De Nicola, Michele Missikoff
Pages 79-86
SECTION: Review articles
What does it mean to be secure?
Boaz Barak
Pages 88-96
SECTION: Research highlights
In "A Differential Approach to Undefined Behavior Detection," Wang et al. hypothesize that any time a compiler is able to delete code by using reasoning based on undefined behavior, the program being compiled probably contains …
John Regehr
Page 98
This paper studies undefined behavior arising in systems programming languages such as C/C++. We introduce a new static checker called STACK that precisely identifies undefined behavior bugs.
Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama
Pages 99-106
In "Learning to Name Objects," the authors offer a method to determine a basic-level category name for an object in an image.
David Forsyth
Page 107
This paper looks at the problem of predicting category labels that mimic how human observers would name objects.
Vicente Ordonez, Wei Liu, Jia Deng, Yejin Choi, Alexander C. Berg, Tamara L. Berg
Pages 108-115
COLUMN: Last byte
Andries van Dam on interfaces, interaction, and why he still teaches undergraduates.
Leah Hoffmann
Pages 120-ff