Enrollments in computing-related undergraduate degree programs are booming. What is driving the enrollment boom is undoubtedly the global technology boom. We must remember, however, we have witnessed such booms in the past.
Moshe Y. Vardi
Page 5
I want to return to the theme of diversity in our discipline. To do this, I have enlisted the help of my colleague at Google, Maggie Johnson. We are both concerned the computer science community is still not benefiting from the …
Vinton G. Cerf, Maggie Johnson
Page 7
DEPARTMENT: Letters to the Editor
I appreciated Phillip G. Armour's use of coupled pendulums as an analogy for software project management in his The Business of Software column "The Chaos Machine" (Jan. 2016) but would like to set the record straight on a few …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Mark Guzdial examines a logical fallacy in consumer science education; John Arquilla sees an absence of discussion about the use of information technologies in future conflicts.
Mark Guzdial, John Arquilla
Pages 10-11
COLUMN: News
Math struggles with the usability of formal proofs.
Chris Edwards
Pages 13-15
Researchers consider how to adapt broadly available technology products for those battling physical impairments.
Keith Kirkpatrick
Pages 16-18
Is Google trying to trick you on the way to the polls?
Gary Anthes
Pages 19-21
Marvin Minsky, an American scientist who co-founded the Massachusetts Institute of Technology AI laboratory and was honored with the ACM A.M. Turing Award, passed away on Sunday, Jan. 24, 2016 at the age of 88.
Lawrence M. Fisher
Pages 22-24
President Obama has asked Congress to approve $4.1 billion in spending to support the Computer Science for All initiative, aimed at providing computer science education in U.S. public schools. CS education in public schools has …
Lawrence M. Fisher
Pages 25-27
COLUMN: Global computing
Is universal access to the Internet a realistic method for addressing worldwide socioeconomic inequality?
Kentaro Toyama
Pages 28-30
COLUMN: Kode Vicious
What's in a name?
George V. Neville-Neil
Pages 31-32
COLUMN: Technology strategy and management
Whether global companies succeed or fail often depends on how effectively they develop and maintain cooperative relationships with other organizations and governments.
Mari Sako
Pages 33-35
COLUMN: Viewpoint
The proliferation of social media usage has not resulted in significant social change.
Manuel Cebrian, Iyad Rahwan, Alex "Sandy" Pentland
Pages 36-39
SECTION: Practice
Retaining electronic privacy requires more political engagement.
Poul-Henning Kamp
Pages 40-42
Sometimes all you need is the right language.
Carlos Baquero, Nuno Preguiça
Pages 43-47
How to lose friends and alienate coworkers.
Thomas A. Limoncelli
Pages 48-49
SECTION: Contributed articles
Business dashboards that overuse or misuse colors cause cognitive overload for users who then take longer to make decisions.
Palash Bera
Pages 50-57
Fusing information from multiple biometric traits enhances authentication in mobile devices.
Mikhail I. Gofman, Sinjini Mitra, Tsu-Hsiang Kevin Cheng, Nicholas T. Smith
Pages 58-65
SECTION: Review articles
Tracing the first four decades in the life of suffix trees, their many incarnations, and their applications.
Alberto Apostolico, Maxime Crochemore, Martin Farach-Colton, Zvi Galil, S. Muthukrishnan
Pages 66-73
SECTION: Research highlights
"Secure Multiparty Computations on Bitcoin" introduces an exciting new idea for how to provide fairness: leverage Bitcoin’s existing infrastructure for distributed consensus.
David Wagner
Page 75
In this work, we propose to use Bitcoin to design fully decentralized protocols that are secure even if no trusted third party is available.
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Ćukasz Mazurek
Pages 76-84
"A Fistful of Bitcoins" examines, in the context of Bitcoin, what we could learn by studying the patterns encoded in a complete record of every single financial transaction that took place worldwide over a span of five years.
Emin GÜn Sirer
Page 85
Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique characteristic further, and consider the challenges for those …
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
Pages 86-93
COLUMN: Last byte
We begin simply, with a 60-minute clock that counts only minutes, from 0 to 59. The alarm can also be set from 0 to 59 and will go off when the clock reaches the same value.
Dennis Shasha
Page 96