Issue Downloads
Programming programming languages, and analyzing Facebook's failure
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http://...
Rewarded for RISC
ACM A.M. Turing Award recipients David Patterson and John Hennessy developed the "dangerous" idea that software should be simpler so it can be executed more quickly, which evolved into the Reduced Instruction Set Computer architecture.
Deep learning hunts for signals among the noise
Neural networks can deliver surprising, and sometimes unwanted, results.
3D sensors provide security, better games
A variety of techniques allow sensors to locate and recognize objects in space.
Getting hooked on tech
Are technology companies maximizing profits by making users addicted to their products?
Risks of cryptocurrencies
Considering the inherent risks of cryptocurrency ecosystems.
An interview with Dave Parnas
A discussion of ideas about software engineering.
Effectiveness of anonymization in double-blind review
Assessing the effectiveness of anonymization in the review process.
Designing cluster schedulers for internet-scale services
Embracing failures for improving availability.
Thou shalt not depend on me
A look at JavaScript libraries in the wild.
Documentation is automation
A.B.A. = Always be automating.
Bias on the web
Bias in Web data and use taints the algorithms behind Web-based applications, delivering equally biased results.
Ability-based design
By focusing on users' abilities rather than disabilities, designers can create interactive systems better matched to those abilities.
Identifying patterns in medical records through latent semantic analysis
- David Gefen,
- Jake Miller,
- Johnathon Kyle Armstrong,
- Frances H. Cornelius,
- Noreen Robertson,
- Aaron Smith-McLallen,
- Jennifer A. Taylor
Text analysis can reveal patterns of association among medical terms and medical codes.
Privacy in decentralized cryptocurrencies
When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all.
Coz: finding code that counts with causal profiling
Improving performance is a central concern for software developers. To locate optimization opportunities, developers rely on software profilers. However, these profilers only report where programs spend their time: optimizing that code may have no impact ...
RISC management
ACM A.M. Turing award recipients John Hennessy and David Patterson have introduced generations of students to reduced instruction set computing.