default search action
Communications of the ACM, Volume 57
Volume 57, Number 1, January 2014
- Moshe Y. Vardi:
Scalable conferences. 5
- Vinton G. Cerf:
Virtual reality redux. 7 - Nominees for elections and report of the ACM nominating committee. 8
- ACM's FY13 annual report. 9-14
- U.S. does not control the internet. 16-17
- Mark Guzdial, Joel C. Adams:
MOOCs need more work; so do CS graduates. 18-19
- Gary Anthes:
French team invents faster code-breaking algorithm. 21-23 - Tom Geller:
How do you feel?: your computer knows. 24-26 - Paul Hyman:
'Peace technologies' enable eyewitness reporting when disasters strike. 27-29
- Michael A. Cusumano:
The legacy of Steve Ballmer. 30-32
- Christopher S. Yoo:
Toward a closer integration of law and computer science. 33-35
- Thomas Haigh:
Actually, Turing did not invent the computer. 36-41
- Phillip G. Armour:
Estimation is not evil. 42-43
- Doug Terry:
Publish now, judge later. 44-46
- Alex E. Bell:
The software inferno. 48-53 - Jason Lango:
Toward software-defined SLAs. 54-60 - Anil Madhavapeddy, David J. Scott:
Unikernels: the rise of the virtual library operating system. 61-69
- Kenton O'Hara, Gerardo Gonzalez, Abigail Sellen, Graeme P. Penney, Andreas Varnavas, Helena M. Mentis, Antonio Criminisi, Robert Corish, Mark Rouncefield, Neville Dastur, Tom Carrell:
Touchless interaction in surgery. 70-77 - Jessica Pu Li, Arun Vishwanath, H. Raghav Rao:
Retweeting the Fukushima nuclear radiation disaster. 78-85 - Vincent Gramoli, Rachid Guerraoui:
Democratizing transactional programming. 86-93
- Xuedong Huang, James Baker, Raj Reddy:
A historical perspective of speech recognition. 94-103
- Subramanian S. Iyer:
Silicon stress: technical perspective. 106 - Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim:
TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC. 107-115
- G. Seth Shostak:
Future tense. 128-
Volume 57, Number 2, February 2014
- Andrew D. McGettrick:
Education, always. 5
- Vinton G. Cerf:
Cognitive implants. 7
- Contribute more than algorithmic speculation. 9
- Philip J. Guo:
Clarifying human-computer interaction. 10-11
- Don Monroe:
A new type of mathematics? 13-15 - Esther Shein:
Should everybody learn to code? 16-18 - Samuel Greengard:
Computational photography comes into focus. 19-21 - ACM fellows inducted. 22
- Diana L. Burley, Jon Eisenberg, Seymour E. Goodman:
Would cybersecurity professionalization help address the cybersecurity crisis? 24-27
- Tim Bell:
Establishing a nationwide CS curriculum in New Zealand high schools. 28-30
- William Young, Nancy G. Leveson:
An integrated approach to safety and security based on systems theory. 31-35
- George V. Neville-Neil:
Bugs and bragging rights. 36-37
- Marco Ceccagnoli, Chris Forman, Peng Huang, Dongjun Wu:
Digital platforms: when is participation valuable? 38-39
- Stephen J. Andriole:
Ready technology. 40-42
- Kiran Prasad, Kelly Norton, Terry Coatta:
Node at LinkedIn: the pursuit of thinner, lighter, faster. 44-51 - Poul-Henning Kamp:
Center wheel for success. 52-54 - Zachary Hensley, Jibonananda Sanyal, Joshua R. New:
Provenance in sensor data management. 55-62
- Gerard J. Holzmann:
Mars code. 64-73 - Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. 74-84 - Silvio Micali, Michael O. Rabin:
Cryptography miracles, secure auctions, matching problem verification. 85-93
- Reinhard Wilhelm, Daniel Grund:
Computation takes time, but how much? 94-103
- Michael W. Mahoney:
A new spin on an old algorithm: technical perspective. 106 - Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz:
Communication costs of Strassen's matrix multiplication. 107-114
- Peter Winkler:
Puzzled: Lowest Number Wins. 120
Volume 57, Number 3, March 2014
- Moshe Y. Vardi:
Boolean satisfiability: theory and engineering. 5
- Vinton G. Cerf:
What if it's us? 7
- Develop research culture in the Arab Middle East. 9
- Kate Matsudaira:
Capturing and structuring data mined from the web. 10-11
- Erica Klarreich:
Reading brains. 12-14 - Keith Kirkpatrick:
World without wires. 15-17 - Neil Savage:
Playing at health. 18-19
- Pamela Samuelson:
Mass digitization as fair use. 20-22
- Arvind Narayanan, Shannon Vallor:
Why software engineering courses should include ethics coverage. 23-25
- Peter J. Denning:
'Surfing toward the future'. 26-29
- Richard E. Ladner:
The impact of the United Nations convention on the rights of persons with disabilities. 30-32
- David A. Patterson:
How to build a bad research center. 33-36
- Wojciech M. Golab, Muntasir Raihan Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li:
Eventually consistent: not what you were expecting? 38-44 - Robert F. Sproull, Jim Waldo:
The API performance contract. 45-51 - Andi Kleen:
Scaling existing lock-based applications with lock elision. 52-56
- Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu:
Making parallel programs reliable with stable multithreading. 58-69 - Christine Alvarado, Eugene Judson:
Using targeted conferences to recruit women into computer science. 70-77 - Gang-Hoon Kim, Silvana Trimi, Ji-Hyong Chung:
Big-data applications in the government sector. 78-85
- Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Trends in steganography. 86-95
- Dan S. Wallach:
Smartphone security 'taint' what it used to be: technical perspective. 98 - William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. 99-106
- Peter Winkler:
Puzzled: Solutions and sources. 109 - Leah Hoffmann:
Q&A: RISC and reward. 112-
Volume 57, Number 4, April 2014
- Alfred V. Aho, Georg Gottlob:
A front row seat to Communications' editorial transformation. 5
- Vinton G. Cerf:
The internet governance ecosystem. 7
- Code that missed Mars. 9
- Mark Guzdial, Daniel Reed:
Eyes forward. 10-11
- Chris Edwards:
Using patient data for personalized cancer treatments. 13-15 - Paul Hyman:
Speech-to-speech translations stutter, but researchers see mellifluous future. 16-19 - Gregory Mone:
New models in cosmetics replacing animal testing. 20-21
- Michael A. Cusumano:
MOOCs revisited, with some policy suggestions. 24-26
- Michael L. Best:
Thinking outside the continent. 27-29
- George V. Neville-Neil:
This is the foo field. 30-31
- Deborah Estrin:
Small data, where n = me. 32-34 - Uzi Vishkin:
Is multicore hardware for general-purpose parallel processing broken? 35-39
- Paul Vixie:
Rate-limiting state. 40-43 - Ivar Jacobson, Pan Wei Ng, Ian Spence, Paul McMahon:
Major-league SEMAT: why should an executive care? 44-50 - Christoph Paasch, Olivier Bonaventure:
Multipath TCP. 51-57
- Daniel T. Seaton, Yoav Bergner, Isaac L. Chuang, Piotr Mitros, David E. Pritchard:
Who does what in a massive open online course? 58-65 - Jeremy Avigad, John Harrison:
Formally verified mathematics. 66-75 - Martin Odersky, Tiark Rompf:
Unifying functional and object-oriented programming with Scala. 76-86
- Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. 88-96
- Joe Warren:
A 'reasonable' solution to deformation methods: technical perspective. 98 - Alec Jacobson, Ilya Baran, Jovan Popovic, Olga Sorkine-Hornung:
Bounded biharmonic weights for real-time deformation. 99-106
- Ken MacLeod:
Future Tense: Re: Search. 112-
Volume 57, Number 5, May 2014
- Moshe Y. Vardi:
Moore's law and the sand-heap paradox. 5
- Vinton G. Cerf:
Sometimes it takes some time! 7
- Know your steganographic enemy. 8
- ACM's 2014 general election: please take this opportunity to vote. 9-17
- Judy Robertson:
Rethinking how to teach programming to newcomers. 18-19
- Samuel Greengard:
How computers are changing biology. 21-23 - Tom Geller:
The forever disc. 24-26 - Keith Kirkpatrick:
Technology confounds the courts. 27-29
- Marshall W. van Alstyne:
Why Bitcoin has value. 30-32
- Ben Depoorter:
What happened to video game piracy? 33-34
- David Anderson:
Tom Kilburn: a tale of five computers. 35-38
- Steve Cooper, Shuchi Grover, Beth Simon:
Building a virtual community of practice for K-12 CS teachers. 39-41
- Ruzena Bajcsy:
Robots are coming. 42-43
- Bob Toxen:
The NSA and Snowden: securing the all-seeing eye. 44-51 - Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
A primer on provenance. 52-60 - Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen:
Don't settle for eventual consistency. 61-68
- Shimeon Pass, Boaz Ronen:
Reducing the software value gap. 80-87 - Manlu Liu, Sean Hansen, Qiang Tu:
The community source approach to software development and the Kuali experience. 88-96
- Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu:
Understanding the empirical hardness of NP-complete problems. 98-107
- Ari Juels, Bonnie Wong:
The interplay of neuroscience and cryptography: technical perspective. 109 - Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. 110-118
- Peter Winkler:
Puzzled: A Sort, of Sorts. 120
Volume 57, Number 6, June 2014
- Mehran Sahami, Steve Roach:
Computer science curricula 2013 released. 5
- Vinton G. Cerf:
The house elves of ACM. 7
- Efficient code to counter dying Moore's Law. 9
- Daniel Reed, Chris Stephenson:
First impressions, unexpected benefits. 10-11
- Don Monroe:
Neuromorphic computing gets ready for the (really) big time. 13-15 - Neil Savage:
Time for a change. 16-18 - Visualizations make big data meaningful. 19-21
- Neil Savage:
General agreement. 22-23
- Ross J. Anderson, Steven J. Murdoch:
EMV: why payment systems fail. 24-28
- Phillip G. Armour:
Owning and using. 29-30
- Dinei Florêncio, Cormac Herley, Adam Shostack:
FUD: a plea for intolerance. 31-33
- Peter J. Denning:
Avalanches are coming. 34-36
- George V. Neville-Neil:
The logic of logging. 37-38
- Charles K. Davis:
Beyond data and analysis. 39-41
- Andy Gill:
Domain-specific languages and code synthesis using Haskell. 42-49 - Erik Meijer:
The curse of the excluded middle. 50-55 - Bo Joel Svensson, Mary Sheeran, Ryan R. Newton:
Design exploration through code-generating DSLs. 56-63
- Christos Siaterlis, Béla Genge:
Cyber-physical testbeds. 64-73 - Weiguo Fan, Michael D. Gordon:
The power of social media analytics. 74-81 - Daniela K. Rosner, Marco Roccetti, Gustavo Marfia:
The digitization of cultural practices. 82-87
- Peter M. Musial, Nicolas C. Nicolaou, Alexander A. Shvartsman:
Implementing distributed shared memory for dynamic networks. 88-98
- Michiel van de Panne:
Motion fields for interactive character animation: technical perspective. 100 - Yongjoon Lee, Kevin Wampler, Gilbert Bernstein, Jovan Popovic, Zoran Popovic:
Motion fields for interactive character locomotion. 101-108
- Peter Winkler:
Puzzled: Solutions and sources. 110 - Leah Hoffmann:
Q&A: Divide and conquer. 112-
Volume 57, Number 7, July 2014
- Vicki L. Hanson, Reyyan Ayfer, Bev Bachmayer:
European women in computing. 5 - Vinton G. Cerf:
Responsible programming. 7
- Snowden weak link: copying to USB device. 8-9
- Mark Guzdial, Philip J. Guo:
The difficulty of teaching programming languages, and the benefits of hands-on learning. 10-11
- Alex Wright:
Big data meets big science. 13-15 - Logan Kugler:
Robots compete in disaster scenarios. 16-18 - Esther Shein:
Holographic projection systems provide eternal life. 19-21
- Pamela Samuelson:
Watching TV on internet-connected devices. 22-24
- Chuck Huff, Almut Furchert:
Toward a pedagogy of ethical practice. 25-27
- Mari Sako:
The business of the state. 28-30
- Jane Margolis, Joanna Goode, Gail Chapman, Jean J. Ryoo:
That classroom 'magic'. 31-33
- Batya Friedman:
Structural challenges and the need to adapt. 34-37 - Phillip A. Laplante:
Licensing professional software engineers: seize the opportunity. 38-40
- Thomas Wadlow:
Who must you trust? 42-49 - Michael Donat, Jafar Husain, Terry Coatta:
Automated QA testing at electronic arts. 50-57 - Mike Bland:
Finding more than one worm in the apple. 58-64
- Matthew Faulkner, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian J. Bunn, Richard Guy, Annie H. Liu, Michael Olson, MingHei Cheng, Andreas Krause:
Community sense and response systems: your phone as quake detector. 66-75 - Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:
The rise of RaaS: the resource-as-a-service cloud. 76-84
- H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi:
Big data and its technical challenges. 86-94
- Konstantina Papagiannaki:
The power of joint multiuser beamforming: technical perspective. 96 - Hariharan Rahul, Swarun Kumar, Dina Katabi:
JMB: scaling wireless capacity with user demands. 97-106
- Geoffrey A. Landis:
Future tense. 112-
Volume 57, Number 8, August 2014
- Moshe Y. Vardi:
Openism, IPism, fundamentalism, and pragmatism. 5 - Vinton G. Cerf:
ACM and the professional programmer. 7
- Mark Guzdial:
Why the U.S. is not ready for mandatory CS education. 8-9
- Chris Edwards:
Researchers probe security through obscurity. 11-13 - Keith Kirkpatrick:
Surgical robots deliver care more precisely. 14-16 - Erica Klarreich:
Hello, my name is... 17-19
- Seda F. Gürses:
Can you engineer privacy? 20-23
- Uri Wilensky, Corey E. Brady, Michael S. Horn:
Fostering computational literacy in science classrooms. 24-28
- Chris Coward:
Private then shared? 29-30
- George V. Neville-Neil:
Forked over. 31-32
- Frank Levy, Richard J. Murnane:
Researching the robot revolution. 33-35 - Jaime Teevan, Kevyn Collins-Thompson, Ryen W. White, Susan T. Dumais:
Slow search. 36-38
- Mark Cavage, David Pacheco:
Bringing arbitrary compute to authoritative data. 40-48 - Poul-Henning Kamp:
Quality software costs money - heartbleed was free. 49-51 - Michael J. Lutz, J. Fernando Naveda, James R. Vallino:
Undergraduate software engineering. 52-58
- Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes:
Reshaping terrorist networks. 60-69 - Sumit Gulwani:
Example-based learning in computer-aided STEM education. 70-80
- Andrew V. Goldberg, Robert Endre Tarjan:
Efficient maximum flow algorithms. 82-89
- Philip A. Bernstein:
Getting consensus for data replication: technical perspective. 92 - Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica:
Quantifying eventual consistency with PBS. 93-102
- Peter Winkler:
Puzzled: Paths and Matchings. 104
Volume 57, Number 9, September 2014
- Moshe Y. Vardi:
Would Turing have passed the Turing Test? 5 - Vinton G. Cerf:
Augmented reality. 7
- Provenance of British computing. 8-9
- Philip J. Guo:
Refining students' coding and reviewing skills. 10-11
- Samuel Greengard:
Weathering a new era of big data. 12-14 - Neil Savage:
The power of memory. 15-17 - Gregory Mone:
The new digital medicine. 18-20
- Stefan Bechtold, Adrian Perrig:
Accountability in future internet architectures. 21-23
- Thomas Haigh:
We have never been digital. 24-28
- Peter J. Denning:
Learning for the new digital age. 29-31
- Luke Muehlhauser, Bill Hibbard:
Exploratory engineering in artificial intelligence. 32-34 - John Leslie King, Paul F. Uhlir:
Soft infrastructure challenges to scientific knowledge discovery. 35-37
- Christoph Kern:
Securing the tangled web. 38-47 - Peter Bailis, Kyle Kingsbury:
The network is reliable. 48-55 - Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew D. Ho, Daniel T. Seaton, Isaac L. Chuang:
Privacy, anonymity, and big data in the social sciences. 56-63
- Cormac Herley:
Security, cybercrime, and scale. 64-71 - Michail Tsikerdekis, Sherali Zeadally:
Online deception in social media. 72-80
- Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre:
Optimality in robot motion: optimal versus optimized motion. 82-89
- Alexei A. Efros:
Portraiture in the age of big data: technical perspective. 92 - Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz:
Moving portraits. 93-99
- Peter Winkler:
Puzzled: Solutions and sources. 102 - Marina Krakovsky:
Q&A: Finding themes. 104
Volume 57, Number 10, October 2014
- John White:
ACM's challenges and opportunities. 5 - Vinton G. Cerf:
Unconventional computing. 7
- Responsible programming not a technical issue. 8-9
- John Langford, Mark Guzdial:
Finding a research job, and teaching CS in high school. 10-11
- Don Monroe:
Still seeking the optical transistor. 13-15 - Neil Savage:
Gradual evolution. 16-18 - Nidhi Subbaraman:
Museums go high-tech with digital forensics. 19-21
- Michael A. Cusumano:
The Bitcoin ecosystem. 22-24
- Peter G. Neumann:
Risks and myths of cloud computing and cloud storage. 25-27
- George V. Neville-Neil:
Outsourcing responsibility. 28-29
- Phillip G. Armour:
Vendor: vidi, vici. 30-31
- Henry C. Lucas:
Disrupting and transforming the university. 32-35 - Edgar G. Daylight:
A Turing tale. 36-38
- Ben Laurie:
Certificate transparency. 40-46 - Axel Arnbak, Hadi Asghari, Michel van Eeten, Nico Van Eijk:
Security collapse in the HTTPS market. 47-55 - Sharon Goldberg:
Why is it taking so long to secure internet routing? 56-63
- Hanan Samet, Jagan Sankaranarayanan, Michael D. Lieberman, Marco D. Adelfio, Brendan C. Fruin, Jack M. Lotkowski, Daniele Panozzo, Jon Sperling, Benjamin E. Teitler:
Reading news with maps by exploiting spatial synonyms. 64-77 - Denny Vrandecic, Markus Krötzsch:
Wikidata: a free collaborative knowledgebase. 78-85
- Martín Casado, Nate Foster, Arjun Guha:
Abstractions for software-defined networks. 86-95
- Bart Preneel:
Attacking a problem from the middle: technical perspective. 97 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. 98-105
- Daniel H. Wilson:
Future tense. 112-
Volume 57, Number 11, November 2014
- Alexander L. Wolf:
Dealing with the deep, long-term challenges facing ACM (part I). 5 - Vinton G. Cerf:
Heidelberg Laureate Forum II. 7
- Accountability is no excuse for surveillance. 9
- Mark Guzdial, Lawrence M. Fisher:
Teach the teachers, and contribute to humanity. 10-11
- Gary Anthes:
Researchers simplify parallel programming. 13-15 - Esther Shein:
Computing what fits. 16-19 - Logan Kugler:
Keeping online reviews honest. 20-23
- Arvind Malhotra, Marshall W. Van Alstyne:
The dark side of the sharing economy ... and how to lighten it. 24-27
- Pamela Samuelson:
Updates on the intellectual property front. 28-30
- Solon Barocas, Helen Nissenbaum:
Big data's end run around procedural privacy protections. 31-33
- Steve Cooper, Shuchi Grover, Mark Guzdial, Beth Simon:
A future for computing education research. 34-36
- Susan Landau:
Summing up. 37-39
- Mark Klein, Gregorio Convertino:
An embarrassment of riches. 40-42 - Terrence August, Robert August, Hyoduk Shin:
Designing user incentives for cybersecurity. 43-46
- Ellen Chisa:
Evolution of the product manager. 48-52 - Alex Liu:
JavaScript and the Netflix user interface. 53-59 - John T. Richards, Jonathan P. Brezin, Calvin Swart, Christine A. Halverson:
A decade of progress in parallel programming productivity. 60-66
- Stephen Gould, Xuming He:
Scene understanding by labeling pixels. 68-77 - Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti:
On Facebook, most ties are weak. 78-84
- Beryl Nelson:
The data on diversity. 86-95
- Szymon Rusinkiewicz:
The intricate dance of fabric and light: technical perspective. 97 - Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita Bala:
Building volumetric appearance models of fabric using micro CT imaging. 98-105
- Dennis E. Shasha:
Upstart Puzzles: Proving without Teaching/Teaching without Proving. 120
Volume 57, Number 12, December 2014
- Bobby Schnabel, John White:
Pathways to computing careers. 5 - Vinton G. Cerf:
Does innovation create or destroy jobs? 7
- On the significance of Turing's test. 8-9
- Mark Guzdial:
Meeting student and teacher needs in computing education. 10-11
- Chris Edwards:
Decoding the language of human movement. 12-14 - Gregory Mone:
Intelligent living. 15-16 - Keith Kirkpatrick:
Sensors for seniors. 17-19 - ACM's Turing Award prize raised to $1 million. 20
- Michael L. Best:
The internet that Facebook built. 21-23
- Peter J. Denning:
The whole professional. 24-27
- Telle Whitney, Elizabeth Ames:
Innovation and inclusion. 28-30
- George V. Neville-Neil:
Port squatting. 31-32
- Martin Naedele, Rick Kazman, Yuanfang Cai:
Making the case for a "manufacturing execution system" for software development. 33-36
- Erik Meijer, Vikram Kapoor:
The responsive enterprise: embracing the hacker way. 38-43 - David Chisnall:
No such thing as a general-purpose processor. 44-48 - Ivar Jacobson, Ed Seidewitz:
A new software engineering. 49-54
- Stacy Marsella, Jonathan Gratch:
Computationally modeling human emotion. 56-67 - Mark Silberstein, Bryan Ford, Emmett Witchel:
GPUfs: the case for operating system services on GPUs. 68-79
- Nicholas R. Jennings, Luc Moreau, David Nicholson, Sarvapali D. Ramchurn, Stephen J. Roberts, Tom Rodden, Alex Rogers:
Human-agent collectives. 80-88
- Stephen W. Keckler:
Rethinking caches for throughput processors: technical perspective. 90 - Timothy G. Rogers, Mike O'Connor, Tor M. Aamodt:
Learning your limit: managing massively multithreaded caches through scheduling. 91-98
- Gregory Mone:
Q&A: From Esterel to HipHop. 120-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.