Communication of the ACM Magazine 10/2019 Vol 62 #10 Quantum Error Correction

$39.99

SKU: 18004 Category:

Description

Communication of the ACM Magazine 10/2019 Vol 62 #10 Quantum Error Correction

Communications of the ACM is the monthly journal of the Association for Computing Machinery. It was established in 1958, with Saul Rosen as its first managing editor. It is sent to all ACM members. Articles are intended for readers with backgrounds in all areas of computer science and information systems.

EDITORIAL
How ACM evolves in response to community needs

EDITORIAL
AI is not an excuse!

RESEARCH-ARTICLE
Pinning down variables, and taking an agile approach
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we’ll publish selected posts or excerpts.

RESEARCH-ARTICLE
Closing in on quantum error correction
Quantum computers will only become practical when they implement quantum error correction.

RESEARCH-ARTICLE
Protecting industrial control systems
Finding, and plugging, the security holes in SCADA.

RESEARCH-ARTICLE
The CS teacher shortage
How can we fill more computer science classrooms when there just aren’t enough teachers to go around?

OPINION
The cloud as an innovation platform for software development
How cloud computing became a platform.

OPINION
How might we increase system trustworthiness?
Summarizing some of the changes that seem increasingly necessary to address known system and network deficiencies and anticipate currently unknown vulnerabilities.

OPINION
What is a chief security officer good for?
Security requires more than an off-the-shelf solution.

OPINION
Multi-device digital assistance
Increased availability of cloud services and ownership of multiple digital devices create unique opportunities for digital assistants to provide guidance across a range of tasks and scenarios.

RESEARCH-ARTICLE
Open source firmware
Step into the world behind the kernel.

RESEARCH-ARTICLE
Demo data as code
Automation helps collaboration.

RESEARCH-ARTICLE
The evolution of management
Transitioning up the ladder.

RESEARCH-ARTICLE
Unlocking data to improve public policy
When properly secured, anonymized, and optimized for research, administrative data can be put to work to help government programs better serve those in need.

RESEARCH-ARTICLE
Sampling-based robot motion planning
To address the computational challenges that arise when planning for robotic systems, traditional CS algorithms, tools, and paradigms must be revisited.

REVIEW-ARTICLE
Consumer-grade fabrication and its potential to revolutionize accessibility
Digital fabrication technologies open new doors—and challenges—for real-world support.

REVIEW-ARTICLE
Protein design by provable algorithms
Protein design algorithms can leverage provable guarantees of accuracy to provide new insights and unique optimized molecules.

Technical Perspective: The scalability of CertiKOS

RESEARCH-ARTICLE
Building certified concurrent OS kernels
Operating system (OS) kernels form the backbone of system software. They can have a significant impact on the resilience and security of today’s computers. Recent efforts have demonstrated the feasibility of formally verifying simple general-purpose …

COLUMN: Last byte

Dust wars
Considering willful approaches to a golden opportunity.

Subjects
Computing profession
Computing platforms
Data structures design and analysis
Operating systems security
Program reasoning
Software verification
Verification
Accessibility systems and tools
Accessibility technologies
Accreditation
Artificial intelligence
Bio-inspired approaches
Computing and business
Computing education
Computing occupations
Computing organizations
Data centers
Data integration
Economics of security and privacy
Evolutionary algorithms
Exploratory data analysis
Firmware
Graph algorithms analysis
Hardware security implementation
Human-centered computing
Mathematics of computing
Medical information policy
Network security
Open source software
Planning and scheduling
Probabilistic representations
Programming logic
Project and people management
Quantum error correction and fault tolerance
Robotic autonomy
Security in hardware
Software development techniques
Symbolic and algebraic manipulation
Systems security
Ubiquitous and mobile computing systems and tools.

Address label on cover. Tiny tear in cover. Otherwise in unread condition. More pictures may be in description (which it is suggested you read!)