• Corpus ID: 214735129

A Complete Bibliography of Publications in Communications of the ACM : 2020–2029

  title={A Complete Bibliography of Publications in Communications of the ACM : 2020–2029},
  author={Nelson H. F. Beebe}
A* [11]. Above [53]. abuse [120]. accelerators [157]. access [120]. accessibility [133]. achieve [21]. ACM [103, 74, 96, 99]. Across [45, 84]. adapting [96]. Adding [64]. address [151]. adoption [131]. ads [151]. Advances [87]. Advancing [40, 158]. Adventures [63]. AI [102, 133, 150, 82, 83]. aim [25]. Algorithm [95, 140, 141]. Algorithms [44]. alive [43]. Analysis [89]. animating [125]. Anomaly [91]. Answer [94]. antifraud [25]. Antikythera [93]. antitrust [108]. any [50]. Anymore [73]. anyone… 


Technical perspective: A recipe for protecting against speculation attacks
This paper proposes new software and hardware techniques that thoughtfully and even provably limit information flows that can maintain existing abstractions while simultaneously providing real clarity on where information can and cannot escape.
Knuth's art of recovering from errors
Donald E. Knuth’s self-effacing modesty notwithstanding, he would like to challenge anyone to examine the literature preceding Knuth's contribution to algorithms and compiler theory and set the field on its feet.
Communications of the ACM
CACM is really essential reading for students, it keeps tabs on the latest in computer science and is a valuable asset for us students, who tend to delve deep into a particular area of CS and forget everything that is happening around us.
Technical Perspective: Treating Networks Like Programs
The techniques in this paper can be combined with other techniques to verify entire networks at a more realistic level of abstraction than was considered previously, and the results do not produce the copious amount of bugs found in prior work.
Responsible programming not a technical issue
One question is whether it is responsible to produce software without using state-of-the-art defect-detection-and-validation tools, and how computer science can accelerate development of effective tools and motivate their widespread adoption.
Children's magic won't deliver the semantic web
The W3C standards relate only to the languages themselves, leaving the design and implementation of tools to developers to developers.
The simplicity of cache efficient functional algorithms
The authors show how efficient cache-oblivious functional algorithms over lists and trees can be expressed and analyzed as easily as imperative algorithms over arrays.
Breaking the memory wall in MonetDB
This paper reports how research around the MonetDB database system has led to a redesign of database architecture in order to take advantage of modern hardware, and in particular to avoid hitting the memory wall.
Reboot the computing-research publication systems
It is proposed that ACM establish a policy change for its conferences, requiring that authors of accepted papers may opt out from in-person involvement and contribute instead by video, indicating that computing-research conferences today are clearly the preferred venue for archival publication.
Cache efficient functional algorithms
A cost model for analyzing the memory efficiency of algorithms expressed in a simple functional language is presented and provable bounds imply that purely functional programs based on lists and trees with no special attention to any details of memory layout can be asymptotically as efficient as the carefully designed imperative I/O efficient algorithms.