DEPARTMENT: Departments
Recently I came across notes for a talk I gave in 1991 about women and computer science. It was depressing to read through it. Change the date and I could give the same talk today. How can that be?
Valerie Barr
Page 5
What is it about the residents of Silicon Valley that encourages risk taking? I have often wondered about that and have reached an interesting, if possibly controversial conclusion.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the editor
Alan Bundy's Viewpoint "Smart Machines Are Not a Threat to Humanity" (Feb. 2017) was too limited in light of the recent accomplishments of artificial intelligence. Reducing the entire field to four "successful AI systems" does …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
John Arquilla considers how we should interpret the alleged Russian cyberattack on the U.S. Presidential election; Mark Guzdial describes the potential benefits of a 'computing lab.'
John Arquilla, Mark Guzdial
Pages 10-11
COLUMN: News
Implantable wireless monitors give researchers a new look inside the human body.
Gregory Mone
Pages 12-14
Digital maps trawl for real-time updates.
Chris Edwards
Pages 15-16
Artists can use software to create art, and some software creates art all on its own.
Esther Shein
Pages 17-19
2002 ACM Turing laureate Len Adleman, 2014 ACM Prize in Computing recipient Dan Boneh, 2015 ACM Grace Murray Hopper Award recipient Brent Waters, and ACM Fellows Patrick McDaniel and Paul Van Oorschot discuss current issues in …
CACM Staff
Pages 20-21
COLUMN: Global computing
Mediating social change or reinforcing male hegemony?
Ineke Buskens
Pages 22-23
COLUMN: Kode vicious
AI: Soft and hard, weak and strong, narrow and general. Dear KV,
George V. Neville-Neil
Pages 24-25
COLUMN: Viewpoint
Seeking to use software, hardware, and algorithmic ingenuity to create unique domain-independent instruments.
William Regli
Pages 26-28
In his keynote address before the fifth edition of the Tech Open Air conference in Berlin in 2016, Kickstarter's cofounder and CEO Yancey Strickler suggests the city's tech community faces "a very rare opportunity."
Yancey Strickler
Pages 29-31
SECTION: Practice
The use of silicon PUF circuits.
Meng-Day (Mandel) Yu, Srinivas Devadas
Pages 32-39
Understanding the proposed revisions to the C language.
Robert C. Seacord
Pages 40-44
How do you step up from mere contributor to real change-maker?
Kate Matsudaira
Pages 45-46
SECTION: Contributed articles
Microsecond-scale I/O means tension between performance and productivity that will need new latency-mitigating ideas, including in hardware.
Luiz Barroso, Mike Marty, David Patterson, Parthasarathy Ranganathan
Pages 48-54
This framework for developing pre-service teachers' knowledge does not necessarily depend on computers or other educational technology.
Aman Yadav, Chris Stephenson, Hai Hong
Pages 55-62
SECTION: Review articles
Mapping out the challenges and strategies for the widespread adoption of service computing.
Athman Bouguettaya, Munindar Singh, Michael Huhns, Quan Z. Sheng, Hai Dong, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry, Boualem Benatallah, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos, Liang Chen, Surya Nepal, Zaki Malik, Abdelkarim Erradi, Yan Wang, Brian Blake, Schahram Dustdar, Frank Leymann, Michael Papazoglou
Pages 64-72
SECTION: Research highlights
"Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes" presents a big step toward real-world file systems that are crash-safe in a strict sense.
Gernot Heiser
Page 74
This paper introduces Crash Hoare logic, which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying disk states at different abstraction levels.
Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler
Pages 75-84
The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without compromising statistical validity even when the dataset is …
Jonathan Ullman
Page 85
In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.
Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth
Pages 86-93
COLUMN: Last byte
Consider 16 cards consisting of the ace through 8 of hearts and the ace through 8 of spades. You are allowed to arrange the cards as you wish. Your opponent chooses a number between 1 and 8.
Dennis Shasha
Page 96