DEPARTMENT: Editor's letter
I am pleased to announce a new Communications of the ACM
initiative with the ambitious goal of expanding the Communications
community globally to include important voices and perspectives in the conversation about the present …
DEPARTMENT: Cerf's up
The Internet as we know it today has driven the barrier to the generation and sharing of information to nearly zero. But there are consequences of the reduced threshold for access to the Internet.
DEPARTMENT: Vardi's insights
Just as you cannot separate the mind and the body, you cannot separate cyberspace and physical space. It is time to accept this dependence and act accordingly.
DEPARTMENT: Letters to the editor
The proposed changes to the ACM Code of Ethics and Professional Conduct as discussed in "ACM Code of Ethics: A Guide for Positive Action" (Digital Edition, Jan. 2018), are generally misguided and should be rejected by the ACM …
Mark Guzdial considers the enormous opportunity costs of computer science teachers, while Bertrand Meyer ponders the pleasures of arguing with graduate students.
Scientists are simulating biological organisms and replicating evolution in the lab. How far can they expand the boundaries of virtual life?
Three-dimensional printing and other new technologies are revitalizing the business of building buildings.
How digital media could be authenticated, from computational, legal, and ethical points of view.
COLUMN: Privacy and security
Can there be an Internet of durable goods?
COLUMN: Legally speaking
Considering the longer-term implications of a soon-to-be-decided U.S. Supreme Court case.
COLUMN: Computing ethics
A look in the rearview mirror at Volkswagon software engineering.
COLUMN: The profession of IT
Taking stock of progress toward a computing profession since this column started in 2001.
A call for discussion of governmental investment and intervention in support of cybersecurity.
High-level guidelines for the treatment of crowdworkers.
The important intersection of computer science and social science.
The unseen economic forces that govern the Bitcoin protocol.
Being funny is serious work.
Perfect should never be the enemy of better.
SECTION: Contributed articles
As the software industry enters the era of language-oriented programming, it needs programmable programming languages.
Older adults consistently reject digital technology even when designed to be accessible and trustworthy.
As software becomes a larger part of all products, traditional (hardware) manufacturers are becoming, in essence, software companies.
SECTION: Review articles
If intelligent robots take on a larger role in our society, what basis will humans have for trusting them?
SECTION: Research highlights
In "Time-Inconsistent Planning: A Computational Problem in Behavioral Economics," Kleinberg and Oren describe a graph-theoretic framework for task planning with quasi-hyperbolic discounting.
We propose a graph-theoretic model of tasks and goals, in which dependencies among actions are represented by a directed graph, and a time-inconsistent agent constructs a path through this graph.
When a serious security vulnerability is discovered in the SSL/TLS protocol, one would naturally expect a rapid response. "Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed," by Zhang et al., paints …
We use Heartbleed, a widespread OpenSSL vulnerability from 2014, as a natural experiment to determine whether administrators are properly managing their X.509 certificates.
COLUMN: Last byte
The developer of convolutional neural networks looks at their impact, today and in the long run.