DEPARTMENT: Cerf's up
Computer programs are being used to emulate humans to fool less-sophisticated programs into treating computer-generated actions as if they originate from a human. This is an important practical problem.
Vinton G. Cerf
Page 5
DEPARTMENT: Editorial
The publishing landscape is changing, and ACM with it. We take this opportunity to describe what ACM thinks about recent trends, recent changes, and the future.
Jack Davidson, Joseph Konstan, Andrew A. Chien, Scott Delman
Pages 6-7
DEPARTMENT: Vardi's insights
We cannot understand the current gender disparity in computing without understanding the history of women in computing. How did we lose the women in computing? They did not just leave; they were pushed out.
Moshe Y. Vardi
Page 9
DEPARTMENT: ACM's election
Meet the candidates who introduce their plans—and stands—for the Association.
CACM Staff
Pages 13-21
DEPARTMENT: Letters to the editor
Recent editorial policy seems to have let ACM morph into what I would call the left-leaning ACM.
CACM Staff
Pages 20-11
DEPARTMENT: BLOG@CACM
Edwin Torres considers the enduring value of code comments, while Walid Saba wonders if we have overreacted to the knowledge acquisition bottleneck.
Edwin Torres, Walid Saba
Pages 24-25
COLUMN: News
Scientists are using DNA and RNA to build the world's tiniest robots and computing devices.
Gregory Mone
Pages 26-28
Functional programming languages automate many of the details underlying specific operations.
Neil Savage
Pages 29-30
Researchers are exploring ways to put medical data to greater use while better protecting privacy.
Samuel Greengard
Pages 31-33
COLUMN: Law and technology
Yes, with one big exception.
Ryan Calo
Pages 34-36
COLUMN: Privacy and security
Proposing a stronger foundation for an engineering discipline to support the design of secure systems.
Fred B. Schneider
Pages 37-39
COLUMN: Education
Moving beyond self-selected computer science education in Switzerland.
Alexander Repenning
Pages 40-42
COLUMN: Viewpoint
Addressing the root causes of rapidly increasing software complexity.
Harold "Bud" Lawson
Pages 43-45
Some thoughts on the way forward.
Margaret Martonosi
Pages 46-48
SECTION: Practice
Expert-curated guides to the best of CS research.
Malte Schwarzkopf, Peter Bailis
Pages 50-53
Automated canarying quickens development, improves production safety, and helps prevent outages.
Štěpán Davidovič, Betsy Beyer
Pages 54-62
Praise matters just as much as money.
Kate Matsudaira
Pages 63-64
SECTION: Contributed articles
A teacher and students coding together make explicit the unwritten rules of programming.
Josh Tenenberg, Wolff-Michael Roth, Donald Chinn, Alfredo Jornet, David Socha, Skip Walter
Pages 66-71
The U.S. State Department's Internet Freedom agenda is being adapted to help them communicate without DNS and IP address filtering.
Richard R. Brooks, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc
Pages 72-82
The data comes from multiple optimal sources in parallel, helping reduce addressing and data-acquisition latency.
Xiaonan Wang
Pages 83-88
SECTION: Review articles
Tracing 20 years of progress in making machines hear our emotions based on speech signal properties.
Björn W. Schuller
Pages 90-99
SECTION: Research highlights
"Never-Ending Learning" is the latest and one of the most compelling incarnations of Tom Mitchell and his collaborators' research investigating how to broaden the machine learning field.
Oren Etzioni
Page 102
In this paper we define more precisely the never-ending learning paradigm for machine learning, and present one case study: the Never-Ending Language Learner (NELL), which achieves a number of the desired properties of a never …
T. Mitchell, W. Cohen, E. Hruschka, P. Talukdar, B. Yang, J. Betteridge, A. Carlson, B. Dalvi, M. Gardner, B. Kisiel, J. Krishnamurthy, N. Lao, K. Mazaitis, T. Mohamed, N. Nakashole, E. Platanios, A. Ritter, M. Samadi, B. Settles, R. Wang, D. Wijaya, A. Gupta, X. Chen, A. Saparov, M. Greaves, J. Welling
Pages 103-115
COLUMN: Last byte
When all online news and comment can be digitally manipulated, some might recall a more trustworthy way to spread the word.
Ken MacLeod
Pages 120-ff