acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Departments

Celebrating 50 Years of the Turing Award

To celebrate the first 50 years of the A.M. Turing Award, ACM is sponsoring a yearlong series of programs, as highlighted on the Turing 50th website http://www.acm.org/turing-award-50

Social and Ethical Behavior in the Internet of Things

"Denial-of-service" cyberattacks require us to up our technical game in Internet security and safety. They also expose the need to frame and enforce social and ethical behavior, privacy, and appropriate use in Internet environments …
DEPARTMENT: Letters to the editor

Use the Scientific Method in Computer Science

Adi Livnat's and Christos Papadimitriou's critique of genetic algorithms in "Sex as an Algorithm" (Nov. 2016) stands in counterpoint to a voluminous empirical record of practical successes.
DEPARTMENT: Panels in print

Artificial Intelligence

To help celebrate 50 years of the ACM Turing Award and the visionaries who have received it, ACM has launched a campaign called "Panels in Print," which takes the form of a collection of responses from Turing laureates, ACM award …
DEPARTMENT: BLOG@CACM

Liberal Arts Academia Wants You!

Janet Davis makes a plea to CS practitioners to consider even a short teaching stint.
COLUMN: News

Secure Quantum Communications

Data locking experiments provide stepping stones to a possible future in quantum cryptography.

Are Computer Chips the New Security Threat?

Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry.

It's Not the Algorithm, It's the Data

In risk assessment and predictive policing, biased data can yield biased results.
COLUMN: Inside risks

The Future of the Internet of Things

The IoT can become ubiquitous worldwide — if the pursuit of systemic trustworthiness can overcome the potential risks.
COLUMN: Education

Fostering Creativity Through Computing

How creative thinking tools and computing can be used to support creative human endeavors.
COLUMN: Kode vicious

The Unholy Trinity of Software Development

Tests, documentation, and code.
COLUMN: Privacy and security

User-Centric Distributed Solutions For Privacy-Preserving Analytics

How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
COLUMN: Viewpoint

Smart Machines Are Not a Threat to Humanity

Worrying about machines that are too smart distracts us from the real and present threat from machines that are too dumb.

AI Dangers: Imagined and Real

Arguing against the arguments for the concept of the singularity.
SECTION: Practice

Life Beyond Distributed Transactions

An apostate's opinion.

Are You Load Balancing Wrong?

Anyone can use a load balancer. Using it properly is much more difficult.

BBR: Congestion-Based Congestion Control

Measuring bottleneck bandwidth and round-trip propagation time.
SECTION: Contributed articles

Copyright Enforcement in the Digital Age: Empirical Evidence and Policy Implications

Government-sanctioned and market-based anti-piracy measures can both mitigate economic harm from piracy.

Computing History Beyond the U.K. and U.S.: Selected Landmarks from Continental Europe

It is past time to acknowledge 400 years of European computational innovation from non-English-speaking scientists and engineers.
SECTION: Review articles

Model Learning

Model learning emerges as an effective method for black-box state machine models of hardware and software components.
SECTION: Research highlights

Technical Perspective: Cleaning Up Flaws in TLS Implementations

One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight. A truism of the security community is that "complexity is the enemy …

A Messy State of the Union: Taming the Composite State Machines of TLS

We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities.  …

Authentication Using Pulse-Response Biometrics

We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.
COLUMN: Last byte

Fatal Guidance

In a series of interactive murder mysteries, I might not have done it, but, then again, maybe I did