


default search action
Communications of the ACM, Volume 57
Volume 57, Number 1, January 2014
- Moshe Y. Vardi:

Scalable conferences. 5 
- Vinton G. Cerf:

Virtual reality redux. 7 - Nominees for elections and report of the ACM nominating committee. 8

 - ACM's FY13 annual report. 9-14

 
- U.S. does not control the internet. 16-17

 
- Mark Guzdial

, Joel C. Adams
:
MOOCs need more work; so do CS graduates. 18-19 
- Gary Anthes:

French team invents faster code-breaking algorithm. 21-23 - Tom Geller:

How do you feel?: your computer knows. 24-26 - Paul Hyman:

'Peace technologies' enable eyewitness reporting when disasters strike. 27-29 
- Michael A. Cusumano:

The legacy of Steve Ballmer. 30-32 
- Christopher S. Yoo:

Toward a closer integration of law and computer science. 33-35 
- Thomas Haigh:

Actually, Turing did not invent the computer. 36-41 
- Phillip G. Armour:

Estimation is not evil. 42-43 
- Doug Terry:

Publish now, judge later. 44-46 
- Alex E. Bell:

The software inferno. 48-53 - Jason Lango:

Toward software-defined SLAs. 54-60 - Anil Madhavapeddy

, David J. Scott
:
Unikernels: the rise of the virtual library operating system. 61-69 
- Kenton O'Hara

, Gerardo Gonzalez, Abigail Sellen, Graeme P. Penney, Andreas Varnavas, Helena M. Mentis, Antonio Criminisi, Robert Corish, Mark Rouncefield, Neville Dastur, Tom Carrell:
Touchless interaction in surgery. 70-77 - Jessica Pu Li, Arun Vishwanath, H. Raghav Rao:

Retweeting the Fukushima nuclear radiation disaster. 78-85 - Vincent Gramoli, Rachid Guerraoui

:
Democratizing transactional programming. 86-93 
- Xuedong Huang, James Baker, Raj Reddy:

A historical perspective of speech recognition. 94-103 
- Subramanian S. Iyer:

Silicon stress: technical perspective. 106 - Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim

:
TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC. 107-115 
- G. Seth Shostak:

Future tense. 128- 
Volume 57, Number 2, February 2014
- Andrew D. McGettrick:

Education, always. 5 
- Vinton G. Cerf:

Cognitive implants. 7 
- Contribute more than algorithmic speculation. 9

 
- Philip J. Guo:

Clarifying human-computer interaction. 10-11 
- Don Monroe:

A new type of mathematics? 13-15 - Esther Shein:

Should everybody learn to code? 16-18 - Samuel Greengard:

Computational photography comes into focus. 19-21 - ACM fellows inducted. 22

 
- Diana L. Burley, Jon Eisenberg

, Seymour E. Goodman:
Would cybersecurity professionalization help address the cybersecurity crisis? 24-27 
- Tim Bell:

Establishing a nationwide CS curriculum in New Zealand high schools. 28-30 
- William Young, Nancy G. Leveson:

An integrated approach to safety and security based on systems theory. 31-35 
- George V. Neville-Neil

:
Bugs and bragging rights. 36-37 
- Marco Ceccagnoli

, Chris Forman, Peng Huang
, Dongjun Wu:
Digital platforms: when is participation valuable? 38-39 
- Stephen J. Andriole:

Ready technology. 40-42 
- Kiran Prasad, Kelly Norton, Terry Coatta:

Node at LinkedIn: the pursuit of thinner, lighter, faster. 44-51 - Poul-Henning Kamp:

Center wheel for success. 52-54 - Zachary Hensley, Jibonananda Sanyal

, Joshua R. New
:
Provenance in sensor data management. 55-62 
- Gerard J. Holzmann:

Mars code. 64-73 - Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley

:
Automatic exploit generation. 74-84 - Silvio Micali, Michael O. Rabin:

Cryptography miracles, secure auctions, matching problem verification. 85-93 
- Reinhard Wilhelm, Daniel Grund:

Computation takes time, but how much? 94-103 
- Michael W. Mahoney:

A new spin on an old algorithm: technical perspective. 106 - Grey Ballard

, James Demmel, Olga Holtz
, Oded Schwartz:
Communication costs of Strassen's matrix multiplication. 107-114 
- Peter Winkler:

Puzzled: Lowest Number Wins. 120 
Volume 57, Number 3, March 2014
- Moshe Y. Vardi:

Boolean satisfiability: theory and engineering. 5 
- Vinton G. Cerf:

What if it's us? 7 
- Develop research culture in the Arab Middle East. 9

 
- Kate Matsudaira:

Capturing and structuring data mined from the web. 10-11 
- Erica Klarreich:

Reading brains. 12-14 - Keith Kirkpatrick:

World without wires. 15-17 - Neil Savage

:
Playing at health. 18-19 
- Pamela Samuelson:

Mass digitization as fair use. 20-22 
- Arvind Narayanan, Shannon Vallor

:
Why software engineering courses should include ethics coverage. 23-25 
- Peter J. Denning:

'Surfing toward the future'. 26-29 
- Richard E. Ladner

:
The impact of the United Nations convention on the rights of persons with disabilities. 30-32 
- David A. Patterson:

How to build a bad research center. 33-36 
- Wojciech M. Golab, Muntasir Raihan Rahman, Alvin AuYoung, Kimberly Keeton

, Xiaozhou (Steve) Li:
Eventually consistent: not what you were expecting? 38-44 - Robert F. Sproull, Jim Waldo:

The API performance contract. 45-51 - Andi Kleen:

Scaling existing lock-based applications with lock elision. 52-56 
- Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu:

Making parallel programs reliable with stable multithreading. 58-69 - Christine Alvarado, Eugene Judson

:
Using targeted conferences to recruit women into computer science. 70-77 - Gang-Hoon Kim, Silvana Trimi

, Ji-Hyong Chung:
Big-data applications in the government sector. 78-85 
- Elzbieta Zielinska, Wojciech Mazurczyk

, Krzysztof Szczypiorski
:
Trends in steganography. 86-95 
- Dan S. Wallach:

Smartphone security 'taint' what it used to be: technical perspective. 98 - William Enck

, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. 99-106 
- Peter Winkler:

Puzzled: Solutions and sources. 109 - Leah Hoffmann:

Q&A: RISC and reward. 112- 
Volume 57, Number 4, April 2014
- Alfred V. Aho, Georg Gottlob

:
A front row seat to Communications' editorial transformation. 5 
- Vinton G. Cerf:

The internet governance ecosystem. 7 
- Code that missed Mars. 9

 
- Mark Guzdial

, Daniel Reed:
Eyes forward. 10-11 
- Chris Edwards:

Using patient data for personalized cancer treatments. 13-15 - Paul Hyman:

Speech-to-speech translations stutter, but researchers see mellifluous future. 16-19 - Gregory Mone:

New models in cosmetics replacing animal testing. 20-21 
- Michael A. Cusumano:

MOOCs revisited, with some policy suggestions. 24-26 
- Michael L. Best:

Thinking outside the continent. 27-29 
- George V. Neville-Neil

:
This is the foo field. 30-31 
- Deborah Estrin:

Small data, where n = me. 32-34 - Uzi Vishkin:

Is multicore hardware for general-purpose parallel processing broken? 35-39 
- Paul Vixie:

Rate-limiting state. 40-43 - Ivar Jacobson, Pan Wei Ng, Ian Spence, Paul McMahon:

Major-league SEMAT: why should an executive care? 44-50 - Christoph Paasch, Olivier Bonaventure:

Multipath TCP. 51-57 
- Daniel T. Seaton, Yoav Bergner

, Isaac L. Chuang, Piotr Mitros
, David E. Pritchard:
Who does what in a massive open online course? 58-65 - Jeremy Avigad

, John Harrison:
Formally verified mathematics. 66-75 - Martin Odersky, Tiark Rompf:

Unifying functional and object-oriented programming with Scala. 76-86 
- Franziska Roesner, Tadayoshi Kohno, David Molnar:

Security and privacy for augmented reality systems. 88-96 
- Joe Warren:

A 'reasonable' solution to deformation methods: technical perspective. 98 - Alec Jacobson, Ilya Baran, Jovan Popovic, Olga Sorkine-Hornung:

Bounded biharmonic weights for real-time deformation. 99-106 
- Ken MacLeod:

Future Tense: Re: Search. 112- 
Volume 57, Number 5, May 2014
- Moshe Y. Vardi:

Moore's law and the sand-heap paradox. 5 
- Vinton G. Cerf:

Sometimes it takes some time! 7 
- Know your steganographic enemy. 8

 - ACM's 2014 general election: please take this opportunity to vote. 9-17

 
- Judy Robertson:

Rethinking how to teach programming to newcomers. 18-19 
- Samuel Greengard:

How computers are changing biology. 21-23 - Tom Geller:

The forever disc. 24-26 - Keith Kirkpatrick:

Technology confounds the courts. 27-29 
- Marshall W. van Alstyne

:
Why Bitcoin has value. 30-32 
- Ben Depoorter:

What happened to video game piracy? 33-34 
- David Anderson:

Tom Kilburn: a tale of five computers. 35-38 
- Steve Cooper, Shuchi Grover, Beth Simon:

Building a virtual community of practice for K-12 CS teachers. 39-41 
- Ruzena Bajcsy:

Robots are coming. 42-43 
- Bob Toxen:

The NSA and Snowden: securing the all-seeing eye. 44-51 - Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway

, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
A primer on provenance. 52-60 - Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen:

Don't settle for eventual consistency. 61-68 
- Shimeon Pass, Boaz Ronen:

Reducing the software value gap. 80-87 - Manlu Liu, Sean Hansen, Qiang Tu:

The community source approach to software development and the Kuali experience. 88-96 
- Kevin Leyton-Brown

, Holger H. Hoos
, Frank Hutter, Lin Xu:
Understanding the empirical hardness of NP-complete problems. 98-107 
- Ari Juels, Bonnie Wong

:
The interplay of neuroscience and cryptography: technical perspective. 109 - Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:

Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. 110-118 
- Peter Winkler:

Puzzled: A Sort, of Sorts. 120 
Volume 57, Number 6, June 2014
- Mehran Sahami, Steve Roach:

Computer science curricula 2013 released. 5 
- Vinton G. Cerf:

The house elves of ACM. 7 
- Efficient code to counter dying Moore's Law. 9

 
- Daniel Reed, Chris Stephenson:

First impressions, unexpected benefits. 10-11 
- Don Monroe:

Neuromorphic computing gets ready for the (really) big time. 13-15 - Neil Savage

:
Time for a change. 16-18 - Visualizations make big data meaningful. 19-21

 - Neil Savage

:
General agreement. 22-23 
- Ross J. Anderson, Steven J. Murdoch

:
EMV: why payment systems fail. 24-28 
- Phillip G. Armour:

Owning and using. 29-30 
- Dinei Florêncio, Cormac Herley, Adam Shostack:

FUD: a plea for intolerance. 31-33 
- Peter J. Denning:

Avalanches are coming. 34-36 
- George V. Neville-Neil

:
The logic of logging. 37-38 
- Charles K. Davis:

Beyond data and analysis. 39-41 
- Andy Gill:

Domain-specific languages and code synthesis using Haskell. 42-49 - Erik Meijer:

The curse of the excluded middle. 50-55 - Bo Joel Svensson, Mary Sheeran, Ryan R. Newton:

Design exploration through code-generating DSLs. 56-63 
- Christos Siaterlis, Béla Genge:

Cyber-physical testbeds. 64-73 - Weiguo Fan

, Michael D. Gordon:
The power of social media analytics. 74-81 - Daniela K. Rosner, Marco Roccetti

, Gustavo Marfia
:
The digitization of cultural practices. 82-87 
- Peter M. Musial, Nicolas C. Nicolaou, Alexander A. Shvartsman

:
Implementing distributed shared memory for dynamic networks. 88-98 
- Michiel van de Panne:

Motion fields for interactive character animation: technical perspective. 100 - Yongjoon Lee, Kevin Wampler, Gilbert Bernstein, Jovan Popovic, Zoran Popovic:

Motion fields for interactive character locomotion. 101-108 
- Peter Winkler:

Puzzled: Solutions and sources. 110 - Leah Hoffmann:

Q&A: Divide and conquer. 112- 
Volume 57, Number 7, July 2014
- Vicki L. Hanson, Reyyan Ayfer, Bev Bachmayer:

European women in computing. 5 - Vinton G. Cerf:

Responsible programming. 7 
- Snowden weak link: copying to USB device. 8-9

 
- Mark Guzdial

, Philip J. Guo:
The difficulty of teaching programming languages, and the benefits of hands-on learning. 10-11 
- Alex Wright:

Big data meets big science. 13-15 - Logan Kugler:

Robots compete in disaster scenarios. 16-18 - Esther Shein:

Holographic projection systems provide eternal life. 19-21 
- Pamela Samuelson:

Watching TV on internet-connected devices. 22-24 
- Chuck Huff, Almut Furchert:

Toward a pedagogy of ethical practice. 25-27 
- Mari Sako:

The business of the state. 28-30 
- Jane Margolis, Joanna Goode, Gail Chapman, Jean J. Ryoo:

That classroom 'magic'. 31-33 
- Batya Friedman:

Structural challenges and the need to adapt. 34-37 - Phillip A. Laplante:

Licensing professional software engineers: seize the opportunity. 38-40 
- Thomas Wadlow:

Who must you trust? 42-49 - Michael Donat, Jafar Husain, Terry Coatta:

Automated QA testing at electronic arts. 50-57 - Mike Bland:

Finding more than one worm in the apple. 58-64 
- Matthew Faulkner, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica D. Kohler, Julian J. Bunn

, Richard Guy, Annie H. Liu, Michael Olson, MingHei Cheng, Andreas Krause
:
Community sense and response systems: your phone as quake detector. 66-75 - Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:

The rise of RaaS: the resource-as-a-service cloud. 76-84 
- H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis

, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi:
Big data and its technical challenges. 86-94 
- Konstantina Papagiannaki:

The power of joint multiuser beamforming: technical perspective. 96 - Hariharan Rahul, Swarun Kumar

, Dina Katabi:
JMB: scaling wireless capacity with user demands. 97-106 
- Geoffrey A. Landis:

Future tense. 112- 
Volume 57, Number 8, August 2014
- Moshe Y. Vardi:

Openism, IPism, fundamentalism, and pragmatism. 5 - Vinton G. Cerf:

ACM and the professional programmer. 7 
- Mark Guzdial

:
Why the U.S. is not ready for mandatory CS education. 8-9 
- Chris Edwards:

Researchers probe security through obscurity. 11-13 - Keith Kirkpatrick:

Surgical robots deliver care more precisely. 14-16 - Erica Klarreich:

Hello, my name is... 17-19 
- Seda F. Gürses:

Can you engineer privacy? 20-23 
- Uri Wilensky, Corey E. Brady

, Michael S. Horn:
Fostering computational literacy in science classrooms. 24-28 
- Chris Coward

:
Private then shared? 29-30 
- George V. Neville-Neil

:
Forked over. 31-32 
- Frank Levy, Richard J. Murnane:

Researching the robot revolution. 33-35 - Jaime Teevan, Kevyn Collins-Thompson, Ryen W. White, Susan T. Dumais:

Slow search. 36-38 
- Mark Cavage, David Pacheco:

Bringing arbitrary compute to authoritative data. 40-48 - Poul-Henning Kamp:

Quality software costs money - heartbleed was free. 49-51 - Michael J. Lutz, J. Fernando Naveda, James R. Vallino:

Undergraduate software engineering. 52-58 
- Francesca Spezzano

, V. S. Subrahmanian, Aaron Mannes:
Reshaping terrorist networks. 60-69 - Sumit Gulwani:

Example-based learning in computer-aided STEM education. 70-80 
- Andrew V. Goldberg, Robert Endre Tarjan:

Efficient maximum flow algorithms. 82-89 
- Philip A. Bernstein:

Getting consensus for data replication: technical perspective. 92 - Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica:

Quantifying eventual consistency with PBS. 93-102 
- Peter Winkler:

Puzzled: Paths and Matchings. 104 
Volume 57, Number 9, September 2014
- Moshe Y. Vardi:

Would Turing have passed the Turing Test? 5 - Vinton G. Cerf:

Augmented reality. 7 
- Provenance of British computing. 8-9

 
- Philip J. Guo:

Refining students' coding and reviewing skills. 10-11 
- Samuel Greengard:

Weathering a new era of big data. 12-14 - Neil Savage

:
The power of memory. 15-17 - Gregory Mone:

The new digital medicine. 18-20 
- Stefan Bechtold, Adrian Perrig:

Accountability in future internet architectures. 21-23 
- Thomas Haigh

:
We have never been digital. 24-28 
- Peter J. Denning:

Learning for the new digital age. 29-31 
- Luke Muehlhauser, Bill Hibbard:

Exploratory engineering in artificial intelligence. 32-34 - John Leslie King, Paul F. Uhlir:

Soft infrastructure challenges to scientific knowledge discovery. 35-37 
- Christoph Kern:

Securing the tangled web. 38-47 - Peter Bailis, Kyle Kingsbury:

The network is reliable. 48-55 - Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew D. Ho, Daniel T. Seaton, Isaac L. Chuang:

Privacy, anonymity, and big data in the social sciences. 56-63 
- Cormac Herley:

Security, cybercrime, and scale. 64-71 - Michail Tsikerdekis, Sherali Zeadally:

Online deception in social media. 72-80 
- Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre

:
Optimality in robot motion: optimal versus optimized motion. 82-89 
- Alexei A. Efros

:
Portraiture in the age of big data: technical perspective. 92 - Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz:

Moving portraits. 93-99 
- Peter Winkler

:
Puzzled: Solutions and sources. 102 - Marina Krakovsky:

Q&A: Finding themes. 104 
Volume 57, Number 10, October 2014
- John White:

ACM's challenges and opportunities. 5 - Vinton G. Cerf:

Unconventional computing. 7 
- Responsible programming not a technical issue. 8-9

 
- John Langford, Mark Guzdial

:
Finding a research job, and teaching CS in high school. 10-11 
- Don Monroe:

Still seeking the optical transistor. 13-15 - Neil Savage

:
Gradual evolution. 16-18 - Nidhi Subbaraman:

Museums go high-tech with digital forensics. 19-21 
- Michael A. Cusumano:

The Bitcoin ecosystem. 22-24 
- Peter G. Neumann:

Risks and myths of cloud computing and cloud storage. 25-27 
- George V. Neville-Neil

:
Outsourcing responsibility. 28-29 
- Phillip G. Armour:

Vendor: vidi, vici. 30-31 
- Henry C. Lucas:

Disrupting and transforming the university. 32-35 - Edgar G. Daylight

:
A Turing tale. 36-38 
- Ben Laurie:

Certificate transparency. 40-46 - Axel Arnbak, Hadi Asghari, Michel van Eeten

, Nico Van Eijk:
Security collapse in the HTTPS market. 47-55 - Sharon Goldberg:

Why is it taking so long to secure internet routing? 56-63 
- Hanan Samet, Jagan Sankaranarayanan, Michael D. Lieberman, Marco D. Adelfio, Brendan C. Fruin, Jack M. Lotkowski, Daniele Panozzo, Jon Sperling, Benjamin E. Teitler:

Reading news with maps by exploiting spatial synonyms. 64-77 - Denny Vrandecic, Markus Krötzsch

:
Wikidata: a free collaborative knowledgebase. 78-85 
- Martín Casado, Nate Foster, Arjun Guha:

Abstractions for software-defined networks. 86-95 
- Bart Preneel

:
Attacking a problem from the middle: technical perspective. 97 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Dissection: a new paradigm for solving bicomposite search problems. 98-105 
- Daniel H. Wilson:

Future tense. 112- 
Volume 57, Number 11, November 2014
- Alexander L. Wolf:

Dealing with the deep, long-term challenges facing ACM (part I). 5 - Vinton G. Cerf:

Heidelberg Laureate Forum II. 7 
- Accountability is no excuse for surveillance. 9

 
- Mark Guzdial

, Lawrence M. Fisher:
Teach the teachers, and contribute to humanity. 10-11 
- Gary Anthes:

Researchers simplify parallel programming. 13-15 - Esther Shein:

Computing what fits. 16-19 - Logan Kugler:

Keeping online reviews honest. 20-23 
- Arvind Malhotra, Marshall W. Van Alstyne

:
The dark side of the sharing economy ... and how to lighten it. 24-27 
- Pamela Samuelson:

Updates on the intellectual property front. 28-30 
- Solon Barocas

, Helen Nissenbaum:
Big data's end run around procedural privacy protections. 31-33 
- Steve Cooper, Shuchi Grover, Mark Guzdial

, Beth Simon:
A future for computing education research. 34-36 
- Susan Landau:

Summing up. 37-39 
- Mark Klein, Gregorio Convertino:

An embarrassment of riches. 40-42 - Terrence August, Robert August, Hyoduk Shin:

Designing user incentives for cybersecurity. 43-46 
- Ellen Chisa:

Evolution of the product manager. 48-52 - Alex Liu:

JavaScript and the Netflix user interface. 53-59 - John T. Richards, Jonathan P. Brezin, Calvin Swart, Christine A. Halverson:

A decade of progress in parallel programming productivity. 60-66 
- Stephen Gould, Xuming He:

Scene understanding by labeling pixels. 68-77 - Pasquale De Meo, Emilio Ferrara

, Giacomo Fiumara, Alessandro Provetti:
On Facebook, most ties are weak. 78-84 
- Beryl Nelson:

The data on diversity. 86-95 
- Szymon Rusinkiewicz

:
The intricate dance of fabric and light: technical perspective. 97 - Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita Bala

:
Building volumetric appearance models of fabric using micro CT imaging. 98-105 
- Dennis E. Shasha:

Upstart Puzzles: Proving without Teaching/Teaching without Proving. 120 
Volume 57, Number 12, December 2014
- Bobby Schnabel, John White:

Pathways to computing careers. 5 - Vinton G. Cerf:

Does innovation create or destroy jobs? 7 
- On the significance of Turing's test. 8-9

 
- Mark Guzdial

:
Meeting student and teacher needs in computing education. 10-11 
- Chris Edwards:

Decoding the language of human movement. 12-14 - Gregory Mone:

Intelligent living. 15-16 - Keith Kirkpatrick:

Sensors for seniors. 17-19 - ACM's Turing Award prize raised to $1 million. 20

 
- Michael L. Best:

The internet that Facebook built. 21-23 
- Peter J. Denning:

The whole professional. 24-27 
- Telle Whitney, Elizabeth Ames:

Innovation and inclusion. 28-30 
- George V. Neville-Neil

:
Port squatting. 31-32 
- Martin Naedele, Rick Kazman, Yuanfang Cai:

Making the case for a "manufacturing execution system" for software development. 33-36 
- Erik Meijer, Vikram Kapoor:

The responsive enterprise: embracing the hacker way. 38-43 - David Chisnall

:
No such thing as a general-purpose processor. 44-48 - Ivar Jacobson, Ed Seidewitz

:
A new software engineering. 49-54 
- Stacy Marsella, Jonathan Gratch:

Computationally modeling human emotion. 56-67 - Mark Silberstein, Bryan Ford

, Emmett Witchel
:
GPUfs: the case for operating system services on GPUs. 68-79 
- Nicholas R. Jennings

, Luc Moreau
, David Nicholson, Sarvapali D. Ramchurn
, Stephen J. Roberts, Tom Rodden, Alex Rogers:
Human-agent collectives. 80-88 
- Stephen W. Keckler:

Rethinking caches for throughput processors: technical perspective. 90 - Timothy G. Rogers

, Mike O'Connor
, Tor M. Aamodt:
Learning your limit: managing massively multithreaded caches through scheduling. 91-98 
- Gregory Mone:

Q&A: From Esterel to HipHop. 120- 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














