Sign In

Communications of the ACM

Table of Contents

DEPARTMENT: From the President

How ACM Evolves in Response to Community Needs

One question people ask me as President is how ACM — as a global, volunteer-based organization — can evolve over time. Does it evolve to keep up with changes going on in our profession?

AI Is Not an Excuse!

I keep hearing excuses for not working on difficult problems: "Eventually AI will solve this so there's no point working on it now." Sorry, wrong answer.

Pinning Down Variables, and Taking an Agile Approach

Robin K. Hill tries to better define variables, while Edwin Torres acknowledges he is his own greatest obstacle.

Closing In on Quantum Error Correction

Quantum computers will only become practical when they implement quantum error correction.

Protecting Industrial Control Systems

Finding, and plugging, the security holes in SCADA.

The CS Teacher Shortage

How can we fill more computer science classrooms when there just aren't enough teachers to go around?
COLUMN: Technology strategy and management

The Cloud as an Innovation Platform for Software Development

How cloud computing became a platform.
COLUMN: Inside risks

How Might We Increase System Trustworthiness?

Summarizing some of the changes that seem increasingly necessary to address known system and network deficiencies and anticipate currently unknown vulnerabilities.
COLUMN: Kode Vicious

What Is a Chief Security Officer Good For?

Security requires more than an off-the-shelf solution.
COLUMN: Viewpoint

Multi-Device Digital Assistance

Increased availability of cloud services and ownership of multiple digital devices create unique opportunities for digital assistants to provide guidance across a range of tasks and scenarios.
SECTION: Practice

Open Source Firmware

Step into the world behind the kernel.

Demo Data as Code

Automation helps collaboration.

The Evolution of Management

Transitioning up the ladder.
SECTION: Contributed articles

Unlocking Data to Improve Public Policy

When properly secured, anonymized, and optimized for research, administrative data can be put to work to help government programs better serve those in need.

Sampling-Based Robot Motion Planning

To address the computational challenges that arise when planning for robotic systems, traditional CS algorithms, tools, and paradigms must be revisited.
SECTION: Review articles

Consumer-Grade Fabrication and Its Potential to Revolutionize Accessibility

Digital fabrication technologies open new doors — and challenges — for real-world support.

Protein Design by Provable Algorithms

Protein design algorithms can leverage provable guarantees of accuracy to provide new insights and unique optimized molecules.
SECTION: Research highlights

Technical Perspective: The Scalability of CertiKOS

The authors of "Building Certified Concurrent OS Kernels" illustrate that formal verification can scale up to a moderate-size program (6,500 lines of C) that has substantial shared-memory concurrency.

Building Certified Concurrent OS Kernels

In this work, we present CertiKOS, a novel compositional framework for building verified concurrent OS kernels.
COLUMN: Last byte

Dust Wars

Considering willful approaches to a golden opportunity.