Sign In

Communications of the ACM

Table of Contents

DEPARTMENT: Editor's letter

Open Collaboration in an Age of Distrust

We are manifestly in a new era of international relations—"An Age of Distrust"—where the trend toward increased trade and integration has stalled, if not reversed.

A People-Centered Economy

Innovation for Jobs ( recently published a book describing a new, people-centered view of work. Rather than organizing work around tasks, the idea is to organize work around people and their skills.
DEPARTMENT: Departments

Are We Having An Ethical Crisis in Computing?

The computing field seems to be going through another image crisis these days. Many view this as an ethical crisis. I am dubious of the diagnosis.

Answering Children's Questions About Computers

Judy Robertson addresses the disconnect between what children are taught about computers and what they actually wish to know.

Quantum Leap

A new proof supports a 25-year-old claim of the unique power of quantum computing.

Hidden Messages Fool AI

Forced errors focus attention on neural network quirks.

Who Owns 3D Scans of Historic Sites?

Three-dimensional scanning can be used to protect or rebuild historic structures, but who owns that digital data?
COLUMN: Law and technology

Illegal Pricing Algorithms

Examining the potential legal consequences of using pricing algorithms.
COLUMN: Technology strategy and management

CRISPR: An Emerging Platform for Gene Editing

Considering a potential platform candidate in the evolving realm of gene-editing technologies research.
COLUMN: Historical reflections

Hey Google, What's a Moonshot?: How Silicon Valley Mocks Apollo

Fifty years on, NASA's expensive triumph is a widely misunderstood model for spectacular innovation.
COLUMN: Viewpoint

UCF's 30-Year REU Site in Computer Vision

A unique perspective on experiences encouraging students to focus on further education.

Modeling in Engineering and Science

Understanding behavior by building models.
SECTION: Practice

Using Remote Cache Service for Bazel

Save time by sharing and reusing build and test output.

Research for Practice: Security for the Modern Age

Securely running processes that require the entire syscall interface.

SQL Is No Excuse to Avoid DevOps

Automation and a little discipline allow better testing, shorter release cycles, and reduced business risk.
SECTION: Contributed articles

Autonomous Tools and Design: A Triple-Loop Approach to Human-Machine Learning

In addition to having a detailed understanding of the artifacts they intend to create, designers need to guide the software tools they use.

Framework for Implementing a Big Data Ecosystem in Organizations

Featuring the various dimensions of data management, it guides organizations through implementation fundamentals.

The Church-Turing Thesis: Logical Limit or Breachable Barrier?

In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936—human computation.
SECTION: Review articles

Intelligent Systems for Geosciences: An Essential Research Agenda

A research agenda for intelligent systems that will result in fundamental new capabilities for understanding the Earth system.

Deception, Identity, and Security: The Game Theory of Sybil Attacks

Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world.
SECTION: Research highlights

Technical Perspective: Photorealistic Facial Digitization and Manipulation

If facial performance capture is possible for conventional RGB videos in real time, then believable facial expressions can be transferred effortlessly from one person to another in a live-action scenario. This capability is demonstrated …

Face2Face: Real-Time Face Capture and Reenactment of RGB Videos

Face2Face is an approach for real-time facial reenactment of a monocular target video sequence (e.g., Youtube video). Our goal is to animate the facial expressions of the target video by a source actor and re-render the manipulated …

Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account when choosing cryptographic parameters.

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.
COLUMN: Last byte

Randomized Anti-Counterfeiting

Consumers and pharmaceutical companies have at least one interest in common: Neither wants the consumer to consume counterfeit drugs.