It is apparent that the world needs thoughtful and technically credible debate on alternatives for containing the problem of harmful behavior on the Internet.
Vinton G. Cerf Page 5DEPARTMENT: BLOG@CACM
Frances E. Allen was the first woman recipient of the ACM A.M. Turing Award.
Simson Garfinkel, Eugene H. Spafford Pages 18-19COLUMN: Technology strategy and management
Leveraging existing data sources to improve the declaration and management of authorship conflicts of interest.
Richard T. Snodgrass, Marianne Winslett Pages 30-32
Hitting a nerve with field-programmable gate arrays.
Oskar Mencer, Dennis Allison, Elad Blatt, Mark Cummings, Michael J. Flynn, Jerry Harris, Carl Hewitt, Quinn Jacobson, Maysam Lavasani, Mohsen Moazami, Hal Murray, Masoud Nikravesh, Andreas Nowatzyk, Mark Shand, Shahram Shirazi Pages 36-39
Bots increasingly tamper with political elections and economic discussions. Tracing trends in detection strategies and key suggestions on how to win the fight.
Stefano Cresci Pages 72-83SECTION: Research highlights
"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection approach based on a static analysis.
Benjamin Livshits Page 86
We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very high confidence.
Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis Pages 87-95
"Lower Bounds for External Memory Integer Sorting via Network Coding" proves a remarkable connection between how efficiently computers can perform sorting and transmitting.
Paul Beame Page 96
In this paper, we present a tight conditional lower bound on the complexity of external memory sorting of integers.
Alireza Farhadi, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi Pages 97-105COLUMN: Last byte