acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Departments

Gender Diversity in Computing: Are We Making Any Progress?

Recently I came across notes for a talk I gave in 1991 about women and computer science. It was depressing to read through it. Change the date and I could give the same talk today. How can that be?

A Genetic Theory of the Silicon Valley Phenomenon

What is it about the residents of Silicon Valley that encourages risk taking? I have often wondered about that and have reached an interesting, if possibly controversial conclusion.
DEPARTMENT: Letters to the editor

Consider Indirect Threats of AI, Too

Alan Bundy's Viewpoint "Smart Machines Are Not a Threat to Humanity" (Feb. 2017) was too limited in light of the recent accomplishments of artificial intelligence. Reducing the entire field to four "successful AI systems" does …
DEPARTMENT: BLOG@CACM

Crafting a National Cyberdefense, and Preparing to Support Computational Literacy

John Arquilla considers how we should interpret the alleged Russian cyberattack on the U.S. Presidential election; Mark Guzdial describes the potential benefits of a 'computing lab.'
COLUMN: News

Sensors on the Brain

Implantable wireless monitors give researchers a new look inside the human body.

Digitizing the World

Digital maps trawl for real-time updates.

Computing the Arts

Artists can use software to create art, and some software creates art all on its own.

Cybersecurity

2002 ACM Turing laureate Len Adleman, 2014 ACM Prize in Computing recipient Dan Boneh, 2015 ACM Grace Murray Hopper Award recipient Brent Waters, and ACM Fellows Patrick McDaniel and Paul Van Oorschot discuss current issues in …
COLUMN: Global computing

Online Social Networks and Global Women's Empowerment

Mediating social change or reinforcing male hegemony?
COLUMN: Kode vicious

The Chess Player Who Couldn't Pass the Salt

AI: Soft and hard, weak and strong, narrow and general. Dear KV,
COLUMN: Viewpoint

Wanted: Toolsmiths

Seeking to use software, hardware, and algorithmic ingenuity to create unique domain-independent instruments.

What It Means to Be an Entrepreneur Today

In his keynote address before the fifth edition of the Tech Open Air conference in Berlin in 2016, Kickstarter's cofounder and CEO Yancey Strickler suggests the city's tech community faces "a very rare opportunity."
SECTION: Practice

Pervasive, Dynamic Authentication of Physical Items

The use of silicon PUF circuits.

Uninitialized Reads

Understanding the proposed revisions to the C language.

Does Anybody Listen to You?

How do you step up from mere contributor to real change-maker?
SECTION: Contributed articles

Attack of the Killer Microseconds

Microsecond-scale I/O means tension between performance and productivity that will need new latency-mitigating ideas, including in hardware.

Computational Thinking For Teacher Education

This framework for developing pre-service teachers' knowledge does not necessarily depend on computers or other educational technology.
SECTION: Review articles

A Service Computing Manifesto: The Next 10 Years

Mapping out the challenges and strategies for the widespread adoption of service computing.
SECTION: Research highlights

Technical Perspective: Proving File Systems Meet Expectations

"Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes" presents a big step toward real-world file systems that are crash-safe in a strict sense.

Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes

This paper introduces Crash Hoare logic, which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying disk states at different abstraction levels.

Technical Perspective: Building a Safety Net For Data Reuse

The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without compromising statistical validity even when the dataset is …

Guilt-Free Data Reuse

In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.
COLUMN: Last byte

Stacking the Deck

Consider 16 cards  consisting  of  the  ace  through 8 of hearts and the ace through 8 of spades. You are allowed to arrange the cards as you wish. Your opponent chooses a  number  between  1  and  8.