Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 59, Issue 6June 2016
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0001-0782
EISSN:1557-7317
Published In:
cacm
Skip Table Of Content Section
editorial
Free
editorial
Free
DEPARTMENT: BLOG@CACM
research-article
Free
The solution to AI, what real researchers do, and expectations for CS classrooms

The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.

twitter

Follow us on Twitter at http://twitter.com/blogCACM

http://...

COLUMN: News
research-article
Free
The key to privacy

40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's online transactions.

research-article
Free
What happens when big data blunders?

Big data is touted as a cure-all for challenges in business, government, and healthcare, but as disease outbreak predictions show, big data often fails.

research-article
Free
Reimagining search

Search engine developers are moving beyond the problem of document analysis, toward the elusive goal of figuring out what people really want.

research-article
Free
What's next for digital humanities?

New computational tools spur advances in an evolving field.

COLUMN: Inside risks
opinion
Free
The risks of self-auditing systems

Unforeseen problems can result from the absence of impartial independent evaluations.

COLUMN: Kode Vicious
opinion
Free
What are you trying to pull?

A single cache miss is more expensive than many instructions.

COLUMN: The profession of IT
opinion
Free
How to produce innovations

Making innovations happen is surprisingly easy, satisfying, and rewarding if you start small and build up.

COLUMN: Interview
opinion
Free
An interview with Yale Patt

ACM Fellow Professor Yale Patt reflects on his career in industry and academia.

COLUMN: Viewpoint
opinion
Free
Computer science should stay young

Seeking to improve computer science publication culture while retaining the best aspects of the conference and journal publication processes.

opinion
Free
Privacy is dead, long live privacy

Protecting social norms as confidentiality wanes.

opinion
Free
A byte is all we need

A teenager explores ways to attract girls into the magical world of computer science.

SECTION: Practice
research-article
Free
Nine things I didn't know I would learn being an engineer manager

Many of the skills aren't technical at all.

research-article
Free
The flame graph

This visualization of software execution is a new necessity for performance profiling and debugging.

research-article
Free
Standing on distributed shoulders of giants

Farsighted physicists of yore were danged smart!

SECTION: Contributed articles
research-article
Public Access
Improving API usability

Human-centered design can make application programming interfaces easier for developers to use.

research-article
Free
Physical key extraction attacks on PCs

Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.

SECTION: Review articles
review-article
Free
RandNLA: randomized numerical linear algebra

Randomization offers new benefits for large-scale linear algebra computations.

COLUMN: Last byte
research-article
Free
Q&A: Finding New Directions in Cryptography

Whitfield Diffie and Martin Hellman on their meeting, their research, and the results that billions use every day.

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.