Recent Issues
-
The Attention Machine
ACM Administrator
Human attention isn't stable, ever, and it costs us: lives …
-
Human Traffickers Caught on Hidden Internet
ACM Administrator
In November 2012 a 28-year-old woman plunged 15 meters from …
-
Look Into My Eyes: Tracking Your Gaze Could Be the Next Big Gaming Input
ACM Administrator
The bulk of the press release announcing a March 10 …
-
Why the Pass at the End of Super Bowl XLIX was the Right Call
Joel C. Adams
If we explore the logic behind the Seattle coaching decision near the end of Superbowl XLIX with computational thinking, we'll...
-
Socializing with Robots @Ginza
Mei Kobayashi
Modern social robots are making their debut in our daily lives.
-
Launching a New Girls Who Code Chapter
Joel Adams
What is involved in starting a new Girls Who Code club?
-
Net Neutrality: How the Government Finally Got It Right
The New Yorker
For years, the federal government supported the principle of net neutrality: the idea that broadband providers should treat all Internet traffic the same.
-
The Biggest Hole in the FCC's New Internet Rules
Bloomberg
The people clamoring for tough, new regulations for Internet service—everyone from net neutrality activists and a few blue-chip companies to President Obama and John Oliver— got pretty much everything they wanted in the proposals outlined by the head of the Federal Communications Commission.
-
FCC Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality
Wired
After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived.
-
Securing Network Time Protocol
Harlan Stenn
Crackers discover how to use NTP as a weapon for abuse.
-
Model-Based Testing: Where Does It Stand?
Robert V. Binder, Bruno Legeard, Anne Kramer
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
-
Internal Access Controls
Geetanjali Sampemane
Trust, but verify.
-
Technical Perspective: The Equivalence Problem for Finite Automata
Thomas A. Henzinger, Jean-François Raskin
As the equivalence problem is essential in many applications, we need algorithms that avoid the worst-case complexity as often...
-
Hacking Nondeterminism with Induction and Coinduction
Filippo Bonchi, Damien Pous
We introduce bisimulation up to congruence as a technique for proving language equivalence of nondeterministic finite automata...
-
To Govern IT, or Not to Govern IT?
Carlos Juiz, Mark Toomey
Business leaders may bemoan the burdens of governing IT, but the alternative could be much worse.
-
Automated Support for Diagnosis and Repair
Dalal Alrajeh, Jeff Kramer, Alessandra Russo, Sebastian Uchitel
Model checking and logic-based learning together deliver automated support, especially in adaptive and autonomous systems.
-
Analyzing Worldwide Research in Hardware Architecture, 1997-2011
Virender Singh, Alicia Perdigones, José Luis Garcia, Ignacio Cañas-Guerroro, Fernando R. Mazarrón
Results showed more published papers, collaboration with U.S. colleagues, preference for English, and uneven research impact.
-
Verifying Computations without Reexecuting Them
Michael Walfish, Andrew J. Blumberg
From theoretical possibility to near practicality.
-
Distributed Information Processing in Biological and Computational Systems
Saket Navlakha, Ziv Bar-Joseph
Exploring the similarities and differences between distributed computations in biological and computational systems.
-
Human-Agent Collectives
N. R. Jennings, L. Moreau, D. Nicholson, S. Ramchurn, S. Roberts, T. Rodden, A. Rogers
HACs offer a new science for exploring the computational and human aspects of society.