DEPARTMENT: Cerf's up
A significant test of any specification is that multiple, independent implementations can be shown to interwork. Establishing standards and allowing archives to be networked could create an ecosystem with substantial resilience …
DEPARTMENT: Vardi's insights
A dramatic drop in the public view of Tech, a term that I use to refer both to computing technology and the community that generates that technology, has accompanied the recent recognition of the adverse societal consequences …
DEPARTMENT: Letters to the editor
I am astonished that people who know what computers can do, and, especially, how they do it, still think we (humankind) will ever create a rational being, much less that the day is near.
Former Computer Science Teachers Association executive director Mark R. Nelson discusses his work with the group to overcome core challenges to computer science education.
A new wave of sensory substitution devices work to assist people who are blind or deaf.
A new generation of portable scientific instruments is taking shape, thanks to mobile processors and innovative data-gathering techniques.
As automation takes on more and more tasks, what will human workers do?
COLUMN: Technology strategy and management
Assessing the uncertainties of the business models driving the sharing economy.
COLUMN: Law and technology
Seeking to remedy bad legislation with good science.
COLUMN: Historical reflections
Reflections on a firm that encapsulated the American Century.
Considering the double-edged sword of learning technologies in various academic settings.
Seeking more effective strategies for training and nurturing CS postdocs to ensure their success.
The network era requires new models, with interactions instead of algorithms.
Ordinary users need tools that automate the selection of custom-tailored faults to inject.
Building a decentralized Web-delivery model.
SECTION: Contributed articles
Once a meme gets popular, it will have to evolve to keep being popular.
In a decentralized marketplace, buyers and sellers transact directly, without manipulation by intermediary platforms.
SECTION: Review articles
The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.
SECTION: Research highlights
The incentive auction scenario provides the backdrop for the breathtaking research contribution presented by Newman et al. in "Deep Optimization for Spectrum Repacking."
This paper describes the process by which we built the SAT-based Feasibility Checker, a crucial element of the 2016-17 U.S. FCC "incentive auction" design.
"Halide: Decoupling Algorithms from Schedules for High-Performance Image Processing" by Ragan-Kelley et al.
on the image processing language Halide explores a substantially different approach to architecture-specific code optimization …
We propose a new programming language for image processing pipelines, called Halide, that separates the algorithm from its schedule.
COLUMN: Last byte
Consider a configuration of six dancers on a grid, where three wear blue leotards and three wear red leotards.
DEPARTMENT: ACM code of ethics and professional conduct
THE ACM Code of Ethics and Professional Conduct (the Code) is being updated by the Code Update Task Force in conjunction with the ACM's Committee on Professional Ethics. The Code was initially written in 1992, and this is the …