Sei sulla pagina 1di 116

CACM.ACM.ORG 12/2017 VOL.60 NO.

12

Computing Is the
Secret Ingredient
The Death of Big Software
Bitcoins Academic Pedigree
Q&A with John Hennessy

Association for
Computing Machinery
32nd IEEE May 21-25, 2018
International Parallel and Vancouver, British Columbia
Distributed Processing CANADA
Symposium

ANNOUNCING 23 PLANNED WORKSHOPS


IPDPS Workshops IPDPS Workshops IPDPS Workshops are the bookends to the three-day
papers, Monday 21 May 2018 Friday 25 May 2018
conference technical program of contributed papers,
PhD HCW Heterogeneity in Computing Workshop CHIUW Chapel Implementers and Users invited speakers, student programs, and industry
hey RAW Reconfigurable Architectures Workshop Workshop
participation. They provide the IPDPS community an
ty to HiCOMB High Performance Computational Biology PDSEC Parallel and Distributed Scientific and
GABB Graph Algorithms Building Blocks Engineering Computing opportunity to explore special topics and present work
t is more
EduPar NSF/TCPP W. on Parallel and Distributed JSSPP Job Scheduling Strategies for Parallel that is more preliminary or cutting-edge than the more
mature Computing Education Processing mature research presented in the main symposium.
Each HIPS High Level Programming Models and iWAPT International Workshop on Automatic
ion Supportive Environments Performance Tunings
for most HPBDC High-Performance Big Data, Deep ParSocial Parallel and Distributed Processing for Each workshop has its own website and submission
hor Learning, and Cloud Computing Computational Social Systems requirements, and the submission deadline for most
AsHES Accelerators and Hybrid Exascale GraML Graph Algorithms and Machine Learning workshops is after the main conference author
s page
Systems CEBDA Convergence of Extreme Scale
op and notification dates. When a workshop announces
PDCO Parallel / Distributed Computing and Computing and Big Data Analysis
Optimization MPP Parallel Programming Model: Special its Call for Papers, the link on the IPDPS Workshops
HPPAC High-Performance, Power-Aware Edition on Edge/Fog/In-Situ Computing webpage is activated, and the call for papers
days Computing PASCO Parallel Symbolic Computation submission due date is posted. Proceedings of the
ustry APDCM Advances in Parallel and Distributed PMAW Programming Models and Algorithms
workshops are distributed at the conference and are
Computational Models Workshop
d by submitted for inclusion in the IEEE Xplore Digital
ParLearning Parallel and Distributed Computing for ROME Runtime and Operating Systems for the
nd Large-Scale Machine Learning and Big Many-core Era Library after the conference.
Data Analytics

GENERAL CHAIR STUDENT PARTICIPATION CHAIR and INDUSTRY PARTICIPATION


Bora Uar (CNRS and ENS Lyon, France) VICE-CHAIR IPDPS extends a special invitation for companies to be-
Trilce Estrada (University of New Mexico, USA) and come an IPDPS 2018 Industry Partner and to share in the
PROGRAM CHAIR and VICE-CHAIR Jay Lofstead (Sandia National Laboratories, USA) benefits of associating with an international community of
Anne Benoit (ENS Lyon, France) and top researchers and practitioners in fields related to paral-
mit V. atalyrek (Georgia Institute of Technology, PhD FORUM & STUDENT MENTORING lel processing and distributed computing. Visit the IPDPS
USA) This event will include traditional poster presentations by website to see ways to participate.
PhD students enhanced by a program of mentoring and
WORKSHOPS CHAIR and VICE-CHAIR coaching in scientific writing and presentation skills and a
Erik Saule (University of North Carolina at Charlotte, special opportunity for students to hear from and interact
USA) and with senior researchers attending the conference.
Jaroslaw Zola (University at Buffalo, USA)

IPDPS 2018 VENUE IMPORTANT DATES


Rising against a backdrop of majestic coastal mountains on the Pacific Northwest
Conference Preliminary Author Notification December 8, 2017
coast, the JW Marriott Parq Vancouver is located in the heart of downtown Vancouvers
urban entertainment and resort complex. IPDPS 2018 attendees will enjoy state of
the art meeting facilities, with Vancouver as a jumping off point for some of the Workshops Call for Papers Deadlines Most Fall After
worlds grand sightseeing adventures. December 8, 2017

For details, visit www.ipdps.org

Sponsored by IEEE Computer Society In cooperation with


Technical Committee on Parallel Processing ACM SIGARCH & SIGHPC and IEEE TCCA & TCDP
COMMUNICATIONS OF THE ACM

Departments News Viewpoints

5 Editors Letter
Computing Is the Secret Ingredient
(well, not so secret)
By Andrew A. Chien

6 Letters to the Editor


Start CS Students Off with
Industry Best Practices

7 Cerfs Up
Now for Something
Entirely Different
By Vinton G. Cerf

14 33
8 BLOG@CACM
Building Tools to Help Students
Learn to Program 11 Perovskites Boost Solar-Cell Potential 20 The Profession of IT
Philip Guo summarizes his first New materials could allow cheaper, The Forgotten Engineer
three years of research into building more efficient solar cells for both Engineering has been marginalized by
tools to support those learning traditional and novel applications. the unhealthy belief that engineering
computer programming. By Don Monroe is the application of science.
By Peter J. Denning
23 Calendar 14 Gaming Machine Learning
Game simulations are driving 24 Broadening Participation
98 Careers improvements in machine learning Community Colleges: A Resource
for autonomous vehicles and for Increasing Equity and Inclusion
other devices. in Computer Science Education
Last Byte By Samuel Greengard Challenging a simplistic
pathway metaphor.
112 Q&A 17 Parallel Computational Thinking By Louise Ann Lyon and Jill Denner
Grooming the Leaders of Tomorrow Applications must be programmed
By Leah Hoffmann to process instructions in 27 Kode Vicious
parallel to take full advantage Cold, Hard Cache
of the new multicore processors. On the implementation and
By Keith Kirkpatrick maintenance of caches.
By George V. Neville-Neil

29 Viewpoint
The Death of Big Software
We are past the tipping point in
the transition away from 20th-century
big software architectures.
By Stephen J. Andriole
IMAGES BY ROCKSTA R GAM ES; A KUM A- PH OTO

33 Viewpoint
Lousy Advice to the Lovelorn
The 37% rule is rarely applicable
in real-world situations.
It is certainly entirely wrong-headed
Association for Computing Machinery
Advancing Computing as a Science & Profession as advice for getting married.
By Ernest Davis

2 COMMUNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


12/2017 VOL. 60 NO. 12

Practice Contributed Articles Review Articles

68 Energy Efficiency: A New Concern for


Application Software Developers
Development of energy-efficient
software is hindered by a lack of
knowledge and a lack of tools.
By Gustavo Pinto and Fernando Castor

Watch the authors discuss


their work in this exclusive
Communications video.
https://cacm.acm.org/videos/
energy-efficiency-a-new-
concern-for-application-
software-developers

Research Highlights
36 52
78 Technical Perspective
36 Bitcoins Academic Pedigree 52 Cybersecurity, Nuclear Security, Pricing Information
The concept of cryptocurrencies Alan Turing, and Illogical Logic (and Its Implications)
is built from forgotten ideas in Cyber deterrence, like nuclear By Aaron Roth
research literature. deterrence, depends on our
By Arvind Narayanan and Jeremy Clark adversaries being rational enough 79 A Theory of Pricing Private Data
to be deterred by our threats By Chao Li, Daniel Yang Li,
46 XML and JSON Are Like Cardboard but us not by theirs. Gerome Miklau, and Dan Suciu
Cardboard surrounds and protects By Martin E. Hellman
stuff as it crosses boundaries. 87 Technical Perspective
By Pat Helland Watch the author discuss A Simple, Elegant Approach
his work in this exclusive
Communications video.
to Non-Numeric Parallelization
48 Research for Practice: https://cacm.acm.org/videos/ By James Larus
cybersecurity-nuclear-
Vigorous Public Debates in security-alan-turing-and-
Academic Computer Science illogical-logic 88 Automatically Accelerating
Expert-curated guides to Non-Numerical Programs by
the best of CS research. 60 Technology-Driven Changes Architecture-Compiler Co-Design
By John Regehr in Work and Employment By Simone Campanoni,
Even when surrounded by Kevin Brownell, Svilen Kanev,
Articles development led by ubiquitous computing, humans Timothy M. Jones, Gu-Yeon Wei,
queue.acm.org
should be encouraged to do what and David Brooks
they do better than machines.
By Ramiro Montealegre
and Wayne F. Cascio
IMAGES BY INK ED PIXELS; A NDRIJ BORYS ASSO CIATES

About the Cover:


Martin E. Hellman, co-recipient
of the 2016 ACM A.M. Turing
Award, delivers his Turing
Lecture (p. 52) as an
absorbing, personal story
weaving past and present,
logic and illogic, cyber-
security and nuclear security,
and even love and marriage.
His story begins over 40
years agoan era that
inspired our cover image
just as the first crypto war
was taking shape. Cover
illustration by Shotopop.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF THE ACM 3


COMMUNICATIONS OF THE ACM
Trusted insights for computings leading professionals.

Communications of the ACM is the leading monthly print and online magazine for the computing and information technology fields.
Communications is recognized as the most trusted and knowledgeable source of industry information for todays computing professional.
Communications brings its readership in-depth coverage of emerging areas of computer science, new trends in information technology,
and practical applications. Industry leaders use Communications as a platform to present and debate various technology implications,
public policies, engineering challenges, and market trends. The prestige and unmatched reputation that Communications of the ACM
enjoys today is built upon a 50-year commitment to high-quality editorial content and a steadfast dedication to advancing the arts,
sciences, and applications of information technology.

ACM, the worlds largest educational STA F F EDITORIAL BOARD ACM Copyright Notice
and scientific computing society, delivers DIRECTOR OF PU BL ICATIONS E DITOR- IN- C HIE F Copyright 2017 by Association for
resources that advance computing as a Scott E. Delman Andrew A. Chien Computing Machinery, Inc. (ACM).
science and profession. ACM provides the cacm-publisher@cacm.acm.org eic@cacm.acm.org Permission to make digital or hard copies
computing fields premier Digital Library of part or all of this work for personal
and serves its members and the computing Deputy to the Editor-in-Chief or classroom use is granted without
Executive Editor Lihan Chen
profession with leading-edge publications, fee provided that copies are not made
Diane Crawford cacm.deputy.to.eic@gmail.com
conferences, and career resources. or distributed for profit or commercial
Managing Editor
advantage and that copies bear this
Thomas E. Lambert S E NIOR E DITOR
Executive Director and CEO notice and full citation on the first
Senior Editor Moshe Y. Vardi
Bobby Schnabel page. Copyright for components of this
Andrew Rosenbloom
Deputy Executive Director and COO work owned by others than ACM must
Senior Editor/News NE W S
Patricia Ryan be honored. Abstracting with credit is
Lawrence M. Fisher Co-Chairs
Director, Office of Information Systems permitted. To copy otherwise, to republish,
Web Editor William Pulleyblank and Marc Snir
Wayne Graves to post on servers, or to redistribute to
David Roman Board Members
Director, Office of Financial Services lists, requires prior specific permission
Rights and Permissions Monica Divitini; Mei Kobayashi;
Darren Ramdin and/or fee. Request permission to publish
Deborah Cotton Michael Mitzenmacher; Rajeev Rastogi;
Director, Office of SIG Services from permissions@hq.acm.org or fax
Editorial Assistant Franois Sillion
Donna Cappo (212) 869-0481.
Jade Morris
Director, Office of Publications
Scott E. Delman VIE W P OINTS For other copying of articles that carry a
Art Director Co-Chairs code at the bottom of the first or last page
Andrij Borys Tim Finin; Susanne E. Hambrusch; or screen display, copying is permitted
ACM CO U N C I L John Leslie King; Paul Rosenbloom
Associate Art Director provided that the per-copy fee indicated
President Board Members
Margaret Gray in the code is paid through the Copyright
Vicki L. Hanson Stefan Bechtold; Michael L. Best;
Assistant Art Director Clearance Center; www.copyright.com.
Vice-President Judith Bishop; Mark Guzdial;
Cherri M. Pancake Mia Angelica Balaquiot
Production Manager Richard Ladner; Carl Landwehr; Subscriptions
Secretary/Treasurer Beng Chin Ooi; Loren Terveen;
Bernadette Shade An annual subscription cost is included
Elizabeth Churchill Marshall Van Alstyne; Jeannette Wing
Advertising Sales Account Manager in ACM member dues of $99 ($40 of
Past President
Ilia Rodriguez which is allocated to a subscription to
Alexander L. Wolf
Communications); for students, cost
Chair, SGB Board P R AC TIC E
is included in $42 dues ($20 of which
Jeanna Matthews Columnists Chair is allocated to a Communications
Co-Chairs, Publications Board David Anderson; Phillip G. Armour; Stephen Bourne and Theo Schlossnagle subscription). A nonmember annual
Jack Davidson and Joseph Konstan Michael Cusumano; Peter J. Denning; Board Members subscription is $269.
Members-at-Large Mark Guzdial; Thomas Haigh; Eric Allman; Samy Bahra; Peter Bailis;
Gabriele Anderst-Kotis; Susan Dumais; Leah Hoffmann; Mari Sako; Terry Coatta; Stuart Feldman; Nicole Forsgren; ACM Media Advertising Policy
Elizabeth D. Mynatt; Pamela Samuelson; Pamela Samuelson; Marshall Van Alstyne Camille Fournier; Benjamin Fried; Communications of the ACM and other
Eugene H. Spafford Pat Hanrahan; Tom Killalea; Tom Limoncelli; ACM Media publications accept advertising
SGB Council Representatives Kate Matsudaira; Marshall Kirk McKusick;
C O N TAC T P O IN TS in both print and electronic formats. All
Paul Beame; Jenna Neefe Matthews; Erik Meijer; George Neville-Neil;
Copyright permission advertising in ACM Media publications is
Barbara Boucher Owens Jim Waldo; Meredith Whittaker
permissions@hq.acm.org at the discretion of ACM and is intended
Calendar items to provide financial support for the various
BOARD C HA I R S
calendar@cacm.acm.org C ONTR IB U TE D A RTIC LES activities and services for ACM members.
Education Board Co-Chairs Current advertising rates can be found
Change of address
Mehran Sahami and Jane Chu Prey James Larus and Gail Murphy by visiting http://www.acm-media.org or
acmhelp@acm.org
Practitioners Board Board Members by contacting ACM Media Sales at
Letters to the Editor
Terry Coatta and Stephen Ibaraki William Aiello; Robert Austin; (212) 626-0686.
letters@cacm.acm.org
Elisa Bertino; Gilles Brassard; Kim Bruce;
REGIONA L C O U N C I L C HA I R S Alan Bundy; Peter Buneman; Carl Gutwin; Single Copies
W E B S IT E
ACM Europe Council Yannis Ioannidis; Gal A. Kaminka; Single copies of Communications of the
http://cacm.acm.org
Dame Professor Wendy Hall Ashish Kapoor; Kristin Lauter; Igor Markov; ACM are available for purchase. Please
ACM India Council Bernhard Nebel; Lionel M. Ni; Adrian Perrig; contact acmhelp@acm.org.
Srinivas Padmanabhuni AU T H O R G U ID E L IN ES
Marie-Christine Rousset; Krishan Sabnani;
ACM China Council http://cacm.acm.org/about-
Ron Shamir; Alex Smola; Josep Torrellas; COMMUN ICATION S OF THE ACM
Jiaguang Sun communications/author-center
Michael Vitale; Hannes Werthner; (ISSN 0001-0782) is published monthly
Reinhard Wilhelm by ACM Media, 2 Penn Plaza, Suite 701,
PUB LICATI O N S BOA R D New York, NY 10121-0701. Periodicals
ACM ADVERTISIN G DEPARTM E NT
Co-Chairs RES E A R C H HIGHLIGHTS postage paid at New York, NY 10001,
2 Penn Plaza, Suite 701, New York, NY
Jack Davidson; Joseph Konstan Co-Chairs and other mailing offices.
10121-0701
Board Members Azer Bestavros and Gregory Morrisett
T (212) 626-0686
Phoebe Ayers; Karin K. Breitman; Board Members POSTMASTER
F (212) 869-0481
Terry J. Coatta; Anne Condon; Nikil Dutt; Martin Abadi; Amr El Abbadi; Sanjeev Arora; Please send address changes to
Roch Guerrin; Chris Hankin; Carol Hutchins; Michael Backes; Maria-Florina Balcan; Communications of the ACM
Yannis Ioannidis; Michael L. Nelson; Advertising Sales Account Manager Andrei Broder; Doug Burger; Stuart K. Card; 2 Penn Plaza, Suite 701
M. Tamer Ozsu; Eugene H. Spafford; Ilia Rodriguez Jeff Chase; Jon Crowcroft; Alexei Efros; New York, NY 10121-0701 USA
Stephen N. Spencer; Alex Wade; ilia.rodriguez@hq.acm.org Alon Halevy; Sven Koenig; Steve Marschner;
Keith Webster; Julie R. Williamson Tim Roughgarden; Guy Steele, Jr.;
Printed in the U.S.A.
Media Kit acmmediasales@acm.org Margaret H. Wright; Nicholai Zeldovich;
ACM U.S. Public Policy Office Andreas Zeller
1701 Pennsylvania Ave NW, Suite 300,
Washington, DC 20006 USA WEB
T (202) 659-9711; F (202) 667-1066 Association for Computing Machinery Chair
(ACM) James Landay
Computer Science Teachers Association 2 Penn Plaza, Suite 701 Board Members A
SE
REC
Y

Deborah Seehorn, New York, NY 10121-0701 USA Marti Hearst; Jason I. Hong;
E

CL
PL

Interim Executive Director T (212) 869-7440; F (212) 869-0481 Jeff Johnson; Wendy E. MacKay
NE
TH

S
I

Z
I

M AGA

4 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


editors letter

DOI:10.1145/3156284 Andrew A. Chien

Computing Is the Secret Ingredient


(well, not so secret)

P
ERHAPS YOU REMEMBER the and now an explosion of change. An ini- promote high-quality STEM and com-
iconic theme of the globally tial burst of innovation around electronic puter science education curriculum
popular Kung Fu Panda currencies that improve Bitcoin to create and programs in high schools.
movies, You are the secret currencies with different properties con- While these are just three, there are
ingredient! This meant that tinues to make waves, sparking new ac- doubtless many more, and I would love
self-belief is important and with it tivity, government regulation, and in to hear about them!
great things can be achievedPo, for some cases outright bans. Over time, in- Computing is more important than
example, became the Dragon Warrior. novation has matured and broadened ever and driving disruptive change. But
My meaning here is that computer sci- into a staggering breadth of applications its also moving faster than ever because
ence is both a powerful enabler of rap- based on the core disruptions that de- of so many creative and innovative com-
id advances in all intellectual fields centralized trust represents. Reformu- puting professionals, huge capabilities
and a disruptor driving furious revolu- lated business and government activities in chips and massive clouds, and com-
tions in commerce and society world- around a distributed, trusted ledger panies with extraordinary scope and
wide. Computer science is more impor- abound, including new approaches to ability to drive innovation. One of the
tant and potent than ever! provenance, decentralized markets, and giants of our field, the late Jim Gray,
Computing is driving unprecedent- a host of financial applications, but few said in his 1999 Turing lecture, Boy,
ed rapid change. One cluster of revolu- examples of the structural disruptions we thought computing was moving
tions is around artificial intelligence from centralized to distributed trust that fast in the 70s and 80s, but its really
(AI) and machine learning. Every day blockchain is driving. moving fast now. I believe the rate of
brings evidence of the rapidly growing Equally exciting are efforts to recast change that computer science is ad-
capabilities in AI, driven by a host of al- foundational Internet services such as vancing more rapidly and driving
gorithmic advances, but notably ma- DNS on blockchain ideas. The Internet more change in society today and
chine learning, to perform tasks here- was conceived as the decentralized net- with dramatically broader scope.
tofore exclusively the province of work of peers, but the design of core ser- So, sit back for a moment these holi-
humankind. With high-profile applica- vices, such as DNS, have always depended days as a computing professional and
tions such as speech, question and an- on trusted servicesand organizations. revel in where we are, and think about
swer systems, image and face recogni- Reinventing these services decentralized the exciting opportunitiesand re-
tion, robotics with growing autonomy trust presents a radical new future for sponsibilitieswe have before us!
and flexibilityincluding self-driving these and perhaps many types of Internet
cars, deep ocean exploration, and services and distributed systems. Andrew A. Chien, EDITOR-IN-CHIEF
space explorationsociety is broadly While these two clusters of revolu-
aware of AIs growing capabilities. And tions are enabled by generations of Andrew A. Chien is the William Eckhardt Distinguished
Service Professor in the Department of Computer Science
worldwide, industry is ablaze in virtu- Moores Law and large-scale distributed at the University of Chicago, Director of the CERES Center
ally every sector with the specter of dis- systems, its notable that the essence of for Unstoppable Computing, and a Senior Scientist at
Argonne National Laboratory.
ruptive, radical new opportunities. each is algorithmic advances and break-
Further, as AI capabilities push throughs. Algorithms are in the essen-
References
computing into new domains, there is tial core of the field of computer science. 1. ACM and Partners Release Framework for Computer
growing concern2 in economic, policy, A third revolution is the growing rec- Science Education in U.S. K12 Schools, Oct. 18, 2016.
2. De Lange Conference on Humans, Machines, and the
and computing communities about ognition that computer science is a Future of Work, Dec. 5, 2016
the potential impact on employment, fundamental element of secondary ed- 3. United Kingdom Department of Education. Statutory
Guidance: National Curriculum in England: Computing
types of work, and global competition. ucation. Recent signs include formal Programmes of Study, Sept. 11, 2013
A second cluster of revolution is adoption of computer science educa- 4. U.S.A. Presidential Memorandum on Creating
Pathways to Jobs by Increasing Access to
around blockchain and decentralized tion guidelines for primary and sec- High-Quality Science, Technology, Engineering, and
trust. The advent of Bitcoin has produced ondary education in the U.K.,3 an ACM- Mathematics and Computer Science Education.
Sept. 25, 2017.
a cascade of academic research, startup Industry vision,1 and a $200M U.S.
experimentation, industrial innovation, Department of Education program1 to Copyright held by author.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF THE ACM 5


letters to the editor

DOI:10.1145/3155226

Start CS Students Off with


Industry Best Practices

L
A M E N T I N G T H AT CS students reading code for such tests. 15 other individuals established The
are often not exposed to best Focus on reading, understanding, Pledge of the Computing Professional
practices in the classroom, and adding value to existing systems, a (http://computing-professional.org/)
software engineer Thomas A. practice much more common in software to recognize graduates of computing
Limoncelli offered advice for engineering than greenfield develop- programs as professionals in service
serving students better in his article ment. ESaaS includes a two-part home- to society, as the Order of the Engineer
Four Ways to Make CS and IT More work assignment on enhancing legacy (http://www.order-of-the-engineer.
Immersive (Oct. 2017). We agree code, but, more valuable for students, org/) does with graduates of U.S. engi-
with that sentiment, as we reported an increasing fraction of available neering programs. Today, 38 institu-
in our Viewpoint Crossing the Soft- team projects for nonprofits under- tions in the U.S. conduct the Pledges
ware Education Chasm (May 2012), taken in Berkeleys version of the rite-of-passage ceremony as part of
describing development of a course course10 of 11 projects in Summer their graduation activities. Graduates
very much in line with Limoncellis 2017 and 13 of 20 projects in Fall taking the Pledge sign a certificate
recommendations. We continue to 2017are functioning legacy systems both publicly and in the presence of
welcome instructors to use our course in need of additional features. Agile- their peers and are then presented
materials and approach for Engineer- Ventures, a U.K. nonprofit with which with a pin to remind them of their
ing Software as a Service, or ESaaS, we work closely and whose developer- commitment to self-accountability
originally developed at the University training programs closely follow the through ethical and moral behavior
of California, Berkeley, as a way to fol- ESaaS pedagogy and methodology, within the profession.
low Limoncellis guidelines: also curates a portfolio of such legacy The Pledge has been endorsed by
Use best-of-breed dev/ops tools from systems to support its mission of the Order of the Engineer, the ACM
the start. In our ESaaS course, stu- training developers to contribute to Special Interest Group on Computers
dents use Git from day one, including open-source projects in agile teams, and Society, and the ACM Committee
(in their open-ended design project) as do several other colleges using our on Professional Ethics. We would wel-
badges for coverage, CodeClimate, materials. come a more comprehensive collabora-
and continuous integration. We applaud Limoncelli for urging tion with ACM toward our mutual goal
Homework programs, even Hello CS instructors to more closely track of promoting the attributes of deep
World, should generate Web pages, not best practices in industry. We invite technical expertise, essential, valued,
text. This requires some minimum students and instructors to try our societal contribution, and the need to
understanding of SaaS architecture, free two-part (soon three-part) MOOC adhere to high ethical and technical
languages, and moving parts. ESaaSs sequencecalled Agile Development standards characteristic of the noblest
week-two assignment requires that Using Ruby on Railson edX and in- ambitions of the profession.
students modify and deploy to the vite instructors to avail themselves of For more on the Pledge, see http://
public cloud a simple SaaS app built the wealth of instructor materials computing-professional.org/ or con-
with the Sinatra framework. The goal available through http://www.saas- tact us directly.
is to get them thinking SaaS early on book.info/, including auto-graders to  ohn K. Estell, Ada, OH, and
J
by addressing several questions: How relieve them of having to manually Ken Christensen, Tampa, FL
is state persisted? How does the app grade these realistic assignments.
interact with the user? How do routes Armando Fox and David Patterson,
and URIs map to actions the user Berkeley, CA, and Communications welcomes your opinion. To submit a
Letter to the Editor, please limit yourself to 500 words or
wants to take? And how can apps be Sam Joseph, Harrow, U.K. less, and send to letters@cacm.acm.org.
structured as a set of RESTful resourc-
es and operations?
Curricula should start with a work- Inspire Ethical Behavior
ing system that reflects best practices, Within the Profession
not just build from low-level to higher- In his Editors Letter Computing Is a
level abstractions. The same assign- Profession (Oct. 2017), Editor In
ment requires that students examine Chief Andrew A. Chien said those in
the code of a simple Sinatra app that computing should welcome, educate,
demonstrates good coding practices, and mentor new generations, not just
including integration and unit tests as programmers but as professionals.
before being introduced to creating or We agree. That is why, in 2010, we and 2017 ACM 0001-0782/17/12

6 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


cerfs up

DOI:10.1145/3154767 Vinton G. Cerf

Now for Something


Entirely Different

D
E PA R T I N G F R O M M Y usual objects even weirder than they were filter good information from bad in all
stream of consciousness, when they were first predicted to ac- sources, but especially in our increas-
this column is about three count for conservation of mass/ener- ingly online world.
books I have just read: gy in subatomic interactions. While In Deep Future, Curt Stager, a cli-
Bullsh*t,a Future Babbleb Grant does not deal with neutrinos, matologist, lays out the consequenc-
and Deep Future.c The first two get at he does cope with endless examples es of global warming, citing credible
the proliferation of wrong but persua- of junk science, bogus claims, wacky reasons for human contribution to
sive assertions about the past, pres- theories, and general human stupid- increased greenhouse gases that
ent, or future. The last one appeals ity to quote the subtitle of his book. trap heat in the atmosphere. The au-
to logic and humility. I draw them to In Future Babble, Dan Gardner goes thors most interesting observations
your attention because I found them to great lengths to explain the dynam- takes us 55 million years into the
usefully thought-provoking and often ics and even fundamental aspects of past when the so-called Paleocene-
very clarifying. human nature that lead us to accept Eocene Thermal Maximum (PETM)f
In Bullsh*t, John Grant systemati- predictions that prove to be wrong. produced a warming period last-
cally demolishes a wide range of mis- He explains Paul Ehrlichs elevation ing about 200,000 years after which
taken beliefs and illustrates human and recognition (that is, many prizes Earth was returned to its previously
foibles that often lead us to believe and awards) for his Population Bombd scheduled ice age. Stager uses a sig-
the unbelievable because we want book and the subsequent failure of nificant body of scientific evidence
to, not because the arguments for most of his predictions to material- to show how increased atmospheric
somehow outweigh the arguments ize. Gardner presents examples of the carbon content produced measur-
against. In a world filled with mis- rationalizations that lead people to able and significant increases in
information (whether intentional or cling to favored theories and beliefs. average temperature and increased
out of ignorance), disinformation, He distinguishes hedgehogs from ocean acidity with consequences for
and scientific theories that have foxes in that the hedgehog knows flora and fauna. A surprise for me
been falsified by new experimental only one thing and is certain of it was his observation that the warm-
evidence, we need all the tools we (and conveys this conviction emphat- ing we have apparently launched
can muster to put claims to rigorous ically) and the foxes know they dont may actually postpone the next ice
test. This takes real work and even know everything and are prepared age (predicted to come in about
some pain as some favorite notion to cope with discovering error and 50,000 years based on detectable
is undermined by counterevidence. adapting to it. We learn what it is the cycles) for up to 400,000 years. He
Good science demands that we be hedgehogs project that induces some points out that ice ages may be far
prepared to abandon long-held be- to believe them and not others who more damaging to human society
liefs when confronted by new facts. have humility in the face of unknown than global warming despite the
Once it was thought that neutrinos unknowns.e We crave certainty and predicted and very negative side ef-
had no mass, now we find they have predictability and uncertainty makes fects of the latter.
very small, variable mass and the us uncomfortable. Even our brains try If you read any of these, let me know
various flavors of neutrinos oscillate hard to find patterns in noise to make what you think.
from one flavor to another while trav- sense of the world around us.
eling from their origins. Current evi- Both of these books should be re- f https://en.wikipedia.org/wiki/
dence makes extremely lightweight quired reading for people struggling to Paleocene%E2%80%93Eocene_Thermal_Max-
imum

a Bullsh*t, J. Grant (pseudonym of Paul Barnett),


MJF Books, NY, 2014. d The Population Bomb, P. Ehrlich, Buccaneer
b Future Babble, D. Gardner, Penguin Group, NY, Books, NY, 1971. Vinton G. Cerf is vice president and Chief Internet Evangelist
at Google. He served as ACM president from 20122014.
2011. e Whatever else you may think of Donald Rums-
c Deep Future: The Next 100,000 Years on Earth, feld, his explication of unknown unknowns
C. Stager, St. Martins Press, 2011. is creditable. Copyright held by author.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF THE ACM 7


The Communications Web site, http://cacm.acm.org,
features more than a dozen bloggers in the BLOG@CACM
community. In each issue of Communications, well publish
selected posts or excerpts.

Follow us on Twitter at http://twitter.com/blogCACM

DOI:10.1145/3148245 http://cacm.acm.org/blogs/blog-cacm

Building Tools With Chris Parnin and his students,


we studied the unique challenges faced

to Help Students
by female programmers when seek-
ing and providing help on the popular
Stack Overflow question-and-answer

Learn to Program website.8 We found five participation


barriers that affected women more
than men: 1) not being aware of certain
Philip Guo summarizes his first three years of research into building features of the site, 2) not feeling quali-
tools to support those learning computer programming. fied enough to chime in with questions
and answers, 3) being intimidated by
the large size of the online community,
4) discomfort from interacting with
Philip Guo 1. Understanding why and how strangers online, and 5) fear of appear-
Learning Programming people from diverse backgrounds ing like they are slacking on the job.
at Scale are learning programming. My student Jeremy Warner and I
http://bit.ly/2vMvEth One critical prerequisite for improv- also studied the recent phenomenon
August 8, 2017 ing how programming is taught is to of hackathons where college students
understand why and how people are gather for 24-to-36-hour periods to
My current research trajectory centers currently learning and what obstacles learn coding by creating software
on what I call learning programming they face. To work toward this goal, I prototypes.3 We found that the time-
at scale. Decades of prior research have have been studying traditionally under- limited format of hackathons gener-
worked to improve how computer pro- represented learner populations and ated excitement and focus and that
gramming is taught in traditional K12 non-traditional learning environments. learning occurred incidentally, oppor-
and university classrooms, but the vast I recently studied how older adults tunistically, and from peers. However,
majority of people around the world aged 60 and over are learning pro- some students were discouraged from
children in low-income areas, working gramming.1 I found that they were attending by perceptions of an overly
adults with full-time jobs, the fast-grow- often motivated by age-related rea- competitive climate, an unwelcom-
ing population of older adults, and mil- sons such as keeping their brains ing culture, and fears of not having
lions in developing countriesdo not challenged as they aged, making enough prior experience.
have access to high-quality classroom up for missed learning opportuni- Parmit Chilana and I identified and
learning environments. Thus, the cen- ties during their youth, connecting studied an emerging population of col-
tral question that drives my research with younger family members, and lege students10 and professionals at
is: How can we better understand the mil- improving their job prospects. They technology companies9 who want to
lions of people from diverse backgrounds reported a variety of age-related learn programming but do not actu-
who are now learning programming on- frustrations such as a perceived ally need to write code for their jobs.
line and then design scalable software to decline in cognitive abilities, lack We call these people conversational
support their learning goals? In my first of social opportunities to interact programmers since their main goal is to
three years as an assistant professor with tutors and peers, and trouble learn just enough about programming
so far, I have approached this question dealing with constantly changing to be able to hold productive technical
from three main directions: software technologies. conversations with programmers.

8 COMMUNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


blog@cacm

2. Designing new kinds of a term called command-line BS-ery to rate, informative, and even contained
programming environments refer to these sources of extrinsic com- insights that expert instructors missed.
to support learners. plexity that demoralize novices. To Back to eliminating command-line
Current programming environments help remove these complexities, Jer- BS-ery, my student Alok Mysore and
are designed to maximize the produc- emy Warner and I created CodePilot,2 I created Torta4, a macOS app that al-
tivity of professionals who are already a programming environment that lets lows users to create step-by-step tu-
experts. Instead, Ive been creating new novices quickly get started with pair torials that span multiple command-
environments to address the unique programming and test-driven devel- line and GUI applications by simply
challenges faced by novice program- opment by integrating real-time col- demonstrating the intended actions
mers, which can hopefully ease their laborative coding, testing, bug report- on their computers. The Torta system:
path to eventually becoming experts. ing, and version control management a) automatically records a screencast
First, I built a series of tools to help into a single unified system. Similarly, video along with relevant operating
novices overcome a fundamental bar- my student Xiong Zhang and I created system events, b) generates a new kind
rier to learning programming: under- DS.js,5 which lets novices get started of mixed-media tutorial with the ben-
standing what happens under the learning data science by writing code efits of both video and text formats,
hood as the computer runs each line to analyze data directly on any web- and c) gives step-by-step feedback
of source code. These tools are all built page instead of needing to download to people who are following the tutorial
on top of the Python Tutor Web-based datasets and configure analysis soft- and automatically runs certain steps.
programming environment (http://py- ware on their own computers.
thontutor.com/) that I created in 2010.16 References
1. Guo, PJ. Older Adults Learning Computer Programming:
Python Tutor (despite its outdated 3. Designing new formats Motivations, Frustrations, and Design Opportunities, CHI
name!) lets users write code in lan- for programming-related 2017. (Honorable Mention Paper Award)
2. Warner, J., and Guo, P.J. CodePilot: Scaffolding End-to-
guages such as Python, Java, C, C++, instructional materials. End Collaborative Software Development for Novice
Programmers, CHI 2017.
Java-Script, TypeScript, and Ruby; it My third major research direction in- 3. Warner, J., and Guo, P.J. Hack.edu: Examining How
runs the users code and automatically volves studying the shortcomings of College Hackathons Are Perceived By Student
Attendees and Non-Attendees. ICER 2017.
visualizes what the computer is doing existing formats for programming-re- 4. Mysore, A., and Guo, P.J. Torta: Generating Mixed-
step-by-step. So far, over 3.5 million lated instructional materials and then Media GUI and Command-Line App Tutorials Using
Operating-System-Wide Activity Tracing. UIST 2017.
people from over 180 countries have designing new instructional formats 5. Zhang, X., and Guo, P.J. DS.js: Turn Any Webpage into
used Python Tutor to understand and that improve the user experience an Example-Centric Live Programming Environment
for Learning Data Science. UIST 2017. (Honorable
debug their code. for both creators and consumers of Mention Paper Award)
I extended Python Tutor with a those materials. 6. Kang, H., and Guo, P.J. Omnicode: A Novice-Oriented
Live Programming Environment with Always-On Run-
real-time collaborative mode called My students and I analyzed all of Time Value Visualizations. UIST 2017.
Codechella12, which lets multiple us- the discussion forum messages in a 7. Drosos, I., Guo, P.J., and Parnin, C. HappyFace:
Identifying and Predicting Frustrating Obstacles for
ers connect to the same visualization popular programming MOOC 14 and Learning Programming at Scale. VL/HCC 2017.
session and work together to solve also how people navigated a comput- 8. Ford, D., Smith, J., Guo, P.J., and Parnin, C. Paradise
Unplugged: Identifying Barriers for Female
programming problems and tutor one er programming digital textbook.15 Participation on Stack Overflow. FSE 2016.
another. I followed up on these ideas We found that people often wanted 9. Chilana, P.K., Singh, R., and Guo, P.J. Understanding
Conversational Programmers: A Perspective from the
with Codeopticon11, a real-time ac- to discuss runtime code execution Software Industry. CHI 2016.
10. Chilana, P.K., Alcock, C., Dembla, S., Ho, A., Hurst,
tivity monitoring dashboard that al- state but had lots of trouble doing so A., Armstrong, B., and Guo, P.J.Perceptions of Non-
lows a single tutor to simultaneously since forums are purely text-based. CS Majors in Intro Programming: The Rise of the
Conversational Programmer. VL/HCC 2015.
watch dozens of people working on From these findings, we propose 11. Guo, P.J. Codeopticon: Real-Time, One-To-Many Human
the Python Tutor website and jump that a better discussion forum for Tutoring for Computer Programming. UIST 2015.
12. Guo, P.J., White, J., and Zanelatto, R. Codechella:
in to tutor multiple learners at once. learning programming should in- Multi-User Program Visualizations for Real-Time
My student Hyeonsu Kang and I then tegrate automatically generated vi- Tutoring and Collaborative Learning. VL/HCC 2015.
13. Gordon, M., and Guo, P.J.Codepourri: Creating
morphed Python Tutor into Omni- sualizations of execution state and Visual Coding Tutorials Using A Volunteer Crowd Of
code,6 a live programming environ- enable inline annotations of source Learners. VL/HCC 2015.
14. Zhu, J., Warner, J., Gordon, M., White, J., Zanelatto,
ment that continually visualizes the code and output. R., and Guo, P.J.Toward a Domain-Specific
entire history of all program values to My student Mitchell Gordon and I Visual Discussion Forum for Learning Computer
Programming: An Empirical Study of a Popular MOOC
give programmers a birds-eye view of created Codepourri,13 a new tutorial Forum. VL/HCC 2015.
execution. With Chris Parnin and our format and crowdsourcing workflow 15. Warner, J., Doorenbos, J., Miller, B.N., and Guo, P.J.
How High School, College, and Online Students
student Ian Drosos, we created Happy- that lets Python Tutor users work to- Differentially Engage with an Interactive Digital
Face,7 a medically inspired pain scale gether to create step-by-step tutorials Textbook. EDM 2015.
16. Guo, P.J. Online Python Tutor: Embeddable Web-
embedded into Python Tutor to let us- by directly annotating runtime code Based Program Visualization for CS Education.
SIGCSE 2013.
ers self-report their frustration levels. visualizations. Since there are far more
The second set of challenges that I learners than experts, using learners
Philip Guo is an assistant professor of cognitive science
tackle here relates to the fact that nov- as a volunteer crowd of workers is a at the University of California, San Diego. His research
ices have trouble installing, configur- potentially more scalable way to create spans human-computer interaction, online learning, and
computing education. Learn more at http://pgbovine.net/
ing, and managing the complex array coding tutorials than relying solely on
of software tools required to become experts. We found that crowd-created
productive as programmers. I coined tutorials for simple code were accu- 2017 ACM 0001-0782/17/12 $15.00

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF THE ACM 9


Inviting Young
Scientists
Meet Great Minds in Computer
Science and Mathematics
As one of the founding organizations of the Heidelberg Laureate Forum
http://www.heidelberg-laureate-forum.org/, ACM invites young computer
science and mathematics researchers to meet some of the preeminent scientists
in their field. These may be the very pioneering researchers who sparked your
passion for research in computer science and/or mathematics.
These laureates include recipients of the ACM A.M. Turing Award, the Abel Prize,
the Fields Medal, and the Nevanlinna Prize.
The Heidelberg Laureate Forum is September 2328, 2018 in Heidelberg, Germany.
This week-long event features presentations, workshops, panel discussions, and
social events focusing on scientific inspiration and exchange among laureates
and young scientists.

Who can participate?


New and recent Ph.Ds, doctoral candidates, other graduate students
pursuing research, and undergraduate students with solid research
experience and a commitment to computing research
How to apply:
Online: https://application.heidelberg-laureate-forum.org/
Materials to complete applications are listed on the site.
What is the schedule?
The application process is open between November 6, 2017
and February 9, 2018.
We reserve the right to close the application website
early depending on the volume
Successful applicants will be notified by mid April 2018.
More information available on Heidelberg social media

PHOTOS: HLFF / B. Kreutzer (top);


HLFF / C. Flemming (bottom)
N
news

Science | DOI:10.1145/3148690 Don Monroe

Perovskites Boost
Solar-Cell Potential
New materials could allow cheaper, more efficient
solar cells for both traditional and novel applications.

O
VE R T H E PAST five years, rap-
id progress in photovoltaic
technology has been fur-
ther accelerated by materi-
als called perovskites. They
require only common ingredients and
relatively easy manufacturing meth-
ods, holding out the possibility of
cheap thin-film cells on a variety of sur-
faces or combined with silicon in large
panels. In the laboratory, small-area
cells made with these materials already
feature solar-conversion efficiencies as
high as 22%, rivaling those of tradition-
al silicon solar cells.
Ive been in the business since the
late 70s, said David Cahen, a chemist
and materials scientist at the Weiz- Material structure sketching the stacking of nanometer-thick layers of two-dimensional
mann Institute in Rehovot, Israel. This perovskite and organic spacing layers.
is a time of developments in solar cells
and photovoltaics that is unprecedent- toxicity from lead in the materials, they the octahedra. The octahedra can easily
IMAGE COURTESY OF LOS A L AM OS NATIONA L L ABORATORY

ed, including new materials, efficiency may not be able to avoid a public per- rotate while maintaining contact at
improvements, and cost reductions. ception of danger. their corners, giving perovskites unusu-
But there has not been anything like But perovskites potential is clearly al properties that have long been ex-
this one, he said. The perovskites shaking up the field. ploited in specialized applications.
have put all of those into shadow. Lithium niobate, for example, acts both
A practical technology will require A New Twist as a piezoelectric transducer between
further engineering for large-scale Perovskites are a well-known family of electrical and mechanical signals and
manufacture and long-term stability, materials whose crystals consist of a lat- in high-speed optical modulators for
and there are still open scientific ques- tice of octahedra, each comprising six telecommunications. In the new mate-
tions. Moreover, although researchers negative ions around a positive ion, with rials, the arrangement follows these
think they can avoid environmental a second positive ion in the gap between rules, but the ingredients are different.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 11


news

The first hints of the solar-cell po- ate a negatively charged electron into structure of the material. In many semi-
tential of perovskite semiconductors the empty band, leaving behind a posi- conductors, he noted, one can regard
came from Japan in 2009, but research- tively charged hole. the bandgap as reflecting the energy
ers really took notice in 2012 with the If the electron and hole make their separation of bonding and anti-
report of cells having an efficiency of way to opposite electrodes connected to bonding combinations of states on
about 8%. In these hybrid organic-inor- the material, they provide that energy to neighboring atoms, so broken bonds at
ganic lead-halide perovskites, the sec- the outside world as an electric current. a defect create states with energy in the
ond positive ion is generally a large or- The voltage at which this current is sup- middle of the bandgap, where they are
ganic (carbon-containing) molecule, plied is limited by the bandgap (mea- most troublesome. In the perovskites,
while the octahedra consist of lead sured in electron-volts). If the photon by contrast, McGehee says the gap has a
(sometimes tin) surrounded by halo- has more energy than this, the excess is different origin, and defect states do
gen ions (from Group VII of the peri- lost as heat, while photons with too little not promote recombination.
odic table, commonly iodine). energy to span the bandgap simply pass Whatever the theoretical explana-
There are reasons why they escaped through without being absorbed. Be- tion, experimenters have already
peoples attention, said Michael McGe- cause sunlight includes photons with a pushed the efficiency of a single
hee, a professor of Materials Science and wide range of energies, the electrical perovskite cell above 22%, compared to
Engineering at Stanford University in power output of a single cell cannot ex- almost 27% achieved for the best crystal-
Palo Alto, CA. They have an inorganic as- ceed about 33% of the light energy. line silicon cells after decades of work.
pect to them and then they have an organ- However, the actual efficiency is al-
ic ion in there as well. The current work- ways lower than this theoretical limit. Cool Manufacturing
horse solar-cell material is silicon, carved One reason is that an electron can refill Beyond their high efficiency, hybrid
from large single-crystal wafers, although an empty state, locally recombining perovskites have other useful features:
other inorganic materials are also em- with a hole, rather than traversing the ex- their ingredients are abundant, and thin
ployed. Organic semiconductors, similar ternal circuit. This process occurs much films can be formed near room tempera-
to those in some LED displays, also make faster when there are electronic states in ture by either liquid- or vapor-based pro-
good solar cells, and can be deposited the bandgap, an energy range that would cessing. These properties should make
near room temperatures. But the hybrid ideally be empty. A key feature of the hy- them inexpensive to create compared to
perovskites are very different than ei- brid-perovskite materials is that they silicon crystals grown at very high tem-
ther of these, McGehee said. seem to have few electrically active de- peratures. Still, Henry Snaith, a physicist
Importantly, hybrid perovskites en- fects. The resulting long lifetime before at the University of Oxford, cautions that
compass a whole class of materials, de- recombination, together with speedy quality and uniformity are at least as im-
pending on which components are motion of electrons and holes, makes it portant as equipment cost for large-
combined in the crystal framework. By easier to approach the ideal efficiency. scale production.
combining different metal, halogen, Cahen suspects that defects are rare Low-temperature processing also
and organic components, researchers in perovskites because of their soft, allows deposition of thin-film photo-
can tune the materials optical and elec- floppy crystal structure, which he re- voltaics on surfaces that could not tol-
tronic properties, as well as the chemi- gards as dynamically disordered, and erate high heat. For example, emerging
cal interactions that form the complete possibly even self-healing. McGehee, applications known as building-inte-
device. There are many thousands of by contrast, said that the material is grated photovoltaics (BIPV) encom-
materials, McGehee said, and, ac- full of defects, but that the defects are pass solar cells deposited directly on
counting for electrode and interface not a problem because of the chemical roof shingles or on the window glass of
materials needed for a complete device, an office tower, where they generate
millions of combinations. power while letting some light through.
By combining These applications inspired Snaith to
Harvesting Photons start a company called Oxford Photovol-
Extraction of electrical energy from sun- different metal, taics in 2010 to develop dye-sensitized
light requires complex, highly engi- halogen, and organic organic photovoltaics, which use one
neered structures. Various layers are molecule to absorb the light and others
combined to first direct sunlight into components, to carry the electrical current (and which
the semiconductor layer and then to researchers can can also be deposited at low tempera-
pass the generated electricity to the out- tures). Yet after promising results from
side world, and to prevent water or air tune the materials his own university group and others, the
from reacting with the materials. But the optical and company rapidly shifted all activity to-
central role involves a semiconductor wards perovskites. The company also
property known as its bandgap, which is electronic properties. shifted from the tiny BIPV market to
the energy range separating low-energy mainstream solar panel applications,
states that are initially filled with elec- Snaith said. We recognized very early
trons from higher-energy empty states. on that perovskites could augment sili-
A photon, or quantum of light, that has con in a tandem device, taking advan-
more energy than the bandgap can liber- tage of the low-temperature processing

12 COM MUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


news

to fabricate a perovskite cell on top of an


existing crystalline-silicon cell.
Researchers are
ACM
Tandem cells can extract more ener-
gy from the solar spectrum, potentially
beating the efficiency limit for any sin-
still exploring which Member
gle cell. By using a material with a larger ingredients make the News
bandgap, the perovskite cell makes bet- best semiconductors
ter use of the high-energy part of the so-
lar spectrum, while lower-energy pho- (not to mention HELPING GOVERNMENT
ACCELERATE INNOVATION
tons continue into the silicon cell to the various interface, Technology
entrepreneur
generate a voltage more closely matched
to their energy. Published perovskite/ electrode, and Robert H Zakon
has over
silicon tandem-cell efficiencies are as encapsulation 20 years
experience as a
high as 23.6% (about 26% when the cells
are wired separately). An alternative ap- materials). consultant,
applying the latest innovations
proach, combining two perovskite ma- in computing technologies to
terials with different bandgaps, has address client challenges. His
demonstrated efficiency of 20.3% in the experience ranges from
engineering the tallest Wi-Fi
separately wired configuration. without lead, Cahen said. (Research- link in the northeastern U.S.
ers have had some success by replacing (atop Mount Washington, in
Scaling Up lead with tin, but these materials have New Hampshire), to working on
cybersecurity policy for the
In spite of the rapid research progress had stability issues so far.)
healthcare records of hundreds
in small perovskite-based solar cells, Because the perovskite layer need of millions of people, to
much more work will be needed for a only be less than a micron thick, howev- designing and developing one of
commercial technology. Practical mod- er, compared to hundreds of microns of the first corporate intranets.
Regarding his career
ules require large, uniform, high-quali- silicon, the overall fraction of lewad in a trajectory, Zakon says, I am
ty films, for example, as well as ancillary module is quite small. In addition, any usually the odd person out. I
circuits to keep individual cells from encapsulation required for stability work on whatever is interesting
hampering the entire array. Toward this should keep the lead in place. Although and challenging.
Born in Brazil, Zakon was
end, Snaith said, Oxford Photovoltaics its something were very sensitive to, 12 years old when he was given
has acquired a facility in Brandenburg, Snaith said, I think theres very little the opportunity to come to the
Germany, and is aiming toward the end chance of any real environmental risk, U.S. He completed high school
in New Jersey, then earned
of 2018 for pilot production on six-inch- provided panels are sensibly deployed both his undergraduate and
diameter silicon wafers. Other compa- and recycled at the end of their lifetime. masters degrees in computer
nies may not be far behind. He acknowledged, however that public engineering from Case Western
Because the perovskites can react perception could still be an issue. Reserve University in Ohio.
Most recently, Zakon served
chemically with water or air, commer- It does mean I dont think youll see as a White House Presidential
cial cells will probably need multiple this in portable products, McGehee Innovation Fellow, participating
levels of protection or encapsulation. said. For panels, he speculated, 30% ef- in a program designed to foster
innovation and bring start-
Customers will expect extra assurance ficiency of cost-effective tandem designs
up sensibilities to the federal
that panels using these new materials is very do-able, he speculated, whereas government.
will be stable over multiple years of use. silicon panels max out at 22%23%. I was looking for an
Researchers are also still exploring opportunity to do some work
for the public good, but
which ingredients make the best semi- could not make a long-term
Further Reading
conductor (not to mention the various commitment, Zakon says.
interface, electrode, and encapsula- Shockly, W., and Queisser, H.J. The Presidential Innovation
Detailed Balance Limit of Efficiency of p-n Fellowship, which lasted a year,
tion materials). If I had to make a pre-
Junction Solar Cells, J. Appl. Phys. 32, 510 gave Zakon the opportunity
diction, I would say the material has (1961). http://dx.doi.org/10.1063/1.1736034 to work at a policy level; he
not been found, McGehee said. Snaith partnered with leaders at the
Bush, K.A., et al. U.S. Treasury, Department
noted his company has settled on a 23.6%-efficient monolithic perovskite/ of Defense, and the Office of
particular composition for its initial silicon tandem solar cells with improved Science and Technology Policy,
manufacturing, but he expects that will stability, Nat. Energy 2, 17009 (2017). to try to accelerate innovation.
change over the years. http://dx.doi.org/10.1038/nenergy.2017.9 The interaction between
One component that has proven dif- Perovskite Cells for Tandem Applications, industry, academia and
government is invaluable,
ficult to change is lead, which has a cole Polytechnique Fdrale de Lausanne
Zakon said, and I would
well-deserved nasty reputation be- http://pvlab.epfl.ch/page-124775-en.html
encourage others to take a turn
cause of insidious health impacts from at public service.
Don Monroe is a science and technology writer based in John Delaney
past use in gasoline and paint. We Boston, MA.
havent been able to do anything that
remotely approximates these materials 2017 ACM 0001-0782/17/12 $15.00

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 13


news

Technology | DOI:10.1145/3148817 Samuel Greengard

Gaming Machine
Learning
Game simulations are driving improvements in
machine learning for autonomous vehicles and other devices.

O
VER THE LAST few years, the
quest to build fully autono-
mous vehicles has shifted
into high gear. Yet, despite
huge advances in both the
sensors and artificial intelligence (AI) re-
quired to operate these cars, one thing
has so far proved elusive: developing al-
gorithms that can accurately and consis-
tently identify objects, movements, and
road conditions. As Mathew Monfort, a
postdoctoral associate and researcher at
the Massachusetts Institute of Technol-
ogy (MIT) puts it: An autonomous vehi-
cle must actually function in the real
world. However, its extremely difficult
and expensive to drive actual cars
around to collect all the data necessary
to make the technology completely re-
liable and safe.
All of this is leading researchers A scene from Rockstar Games Grand Theft Auto V, which is helping to revolutionize how
down a different path: the use of game researchers develop autonomous vehicles.
simulations and machine learning to
build better algorithms and smarter ve- Not only is it possible to better under- works (CNNs) suddenly made it possi-
hicles. By compressing months or stand machine behaviorincluding ble to explore scenes and scenarios in
years of driving into minutes or even how sensors view and read the sur- deeper and broader ways. By tossing
seconds, it is possible to learn how to rounding environmentit offers in- vast numbers of images at the artificial
better react to the unknown, the unex- sights into human behavior in different neural networkstop signs, traffic sig-
pected, and unforeseen, whether it is a situations. These games offer ex- nals, road markings, barriers, trees,
stop sign obscured by graffiti, a worn or tremely rich environments that allow dogs, pedestrians, other vehicles, and
missing lane marking, or snow cover- you to drive through a broad range of much moreand comparing actions
ing the road and obscuring everything. road conditions that would be difficult and reactions such as steering, brak-
A human could analyze a situation to duplicate in the physical world, says ing, and acceleration, its possible to
and adapt quickly. But an autonomous Artur Filipowicz, a recent graduate in cycle rapidly through an array of events
vehicle that doesnt detect something operations research and financial engi- and scenarios en route to more refined
correctly could produce a result ranging neering at Princeton University who algorithms and better performing self-
from annoying to catastrophic, ex- has used machine learning to advance driving cars.
plains Julian Togelius, associate profes- research on autonomous vehicles. Of course, the allure of this ap-
sor of computer science and engineer- proach is that in the virtual world, cars
ing at New York University (NYU). The Road Less Traveled never run out of fuel or need new tires,
The use of computer games and sim- Although the idea of using video game and theyre able to log millions of miles
IMAGE COURTESY OF ROCKSTAR GA MES

ulationsincluding the likes of open- simulations and AI to boost real-world in a single day. There are no fatigued
source TORCS (The Open Racing Car performance for autonomous vehicles drivers and no risk of real-world colli-
Simulator) and commercially available has been around for more than a de- sions or injuries. However, the benefits
Grand Theft Auto Valready is revolu- cade, the concept has zoomed forward dont stop there.
tionizing the way researchers develop over the last few years. The rise of One can say that the real world is
autonomous vehicles, as well as robots, graphics processing units (GPUs) and richer in terms of character than the
drones, and other machine systems. the advent of convolutional neural net- virtual world, but in the virtual world

14 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


news

you can create specific situations and Milestones


scenarios and study them faster and
The game images Computer
better, says Alain Kornhauser, profes-
Scientists Receive
sor of operations research and finan- provided a way to MacArthur
cial engineering, and director of the
Transportation Program, at Princeton study driving in Genius Grants
University. The big advantage is that difficult situations, Two computer scientists were
you can focus in on specific corner cas-
es, the really difficult situations that including rain, sleet, among the 24 people selected to
receive John D. and Catherine
represent the greatest risk and lead to hail, and snow. T. MacArthur Foundation
the greatest number of crashes. fellowships.
About three years ago, Chenyi Chen, The MacArthur Fellowship is
a $625,000, no-strings-attached
then a Ph.D. candidate at Princeton award intended to encourage
and now a deep learning researcher for people of outstanding talent
autonomous driving at NVIDIA, began rithms that could be used by auto manu- to pursue their own creative,
intellectual, and professional
exploring the concept in earnest. He facturers, while a China-based startup inclinations.
turned to the open-source car racing electric auto manufacturer, NIO, has Regina Barzilay is a
game TORCS to supply low-resolution turned to simulations to design and computer scientist in the
visual data for a deep learning network. build a fully autonomous vehicle that it Department of Electrical
Engineering and Computer
Working with Kornhauser, they de- hopes to bring to market in 2020. In re- Science of the Massachusetts
vised a method for grabbing still imag- cent months, Waymo, the autonomous Institute of Technology.
es from the game and plugging them vehicle arm of Alphabet (Googles par- Barzilay is a computational
into the CNN. Chen then studied how ent company), has begun using simula- linguist developing machine
learning methods that enable
to train a network for highway driving tors to study every situation and varia- computers to interpret
and how to judge the distance of other tion engineers can imagine, including unstructured document content
vehicles using 12 hours of human driv- multiple vehicles changing lanes at the and perform real-world tasks
with the promise for significant
ing within the video game. We real- same time in close proximity, and the societal impact.
ized we could create any situation we car recognizing road debris that could Barzilay has made significant
wanted and recreate any trajectory we damage a vehicle or pose a crash hazard. contributions to a wide range
desired. The game images provided a Yet, while the use of video games of problems in computational
linguistics, including both
way to study driving in difficult situa- and AI has already caught the eye of interpretation and generation of
tions, including rain, sleet, hail, and major automotive companies, putting human language.
snow, Kornhauser explains. the data to full use is not without chal- Stefan Savage is a computer
scientist in Department
All of this attracted attention in the lenges. Transforming pixels and RGB of Computer Science and
AI and autonomous vehicle communi- values into useful data for a vehicle or Engineering of the University of
ties. For example, Filipowicz decided to other machine is a steep challenge, California, San Diego.
study stop signs to understand how hu- Kornhauser says. Savage uses an
interdisciplinary approach
mans recognize and react to signs. Dis- In addition, NYUs Togelius, who to address challenges to
tance is difficult to measure in the real has experimented with computer computer security and to
world but easy to measure in the virtual games and AI to better understand counter cybercrime. In addition
world, even under adverse weather con- player performance, as well as events to identifying technological
deficiencies, he contextualizes
ditions, he explains. Filipowicz tapped and systems within the game, says the cybersecurity threats within
Grand Theft Auto V for its rich and highly virtual and physical worlds do not al- much broader ecosystems,
varied environment; it includes more ways mesh neatly. Whats more, not all including underlying economic
incentives and social structures
than 250 models of vehicles, thousands game scenarios are faithful to physical contributing to vulnerabilities.
of pedestrians, and animals, along with reality. In some cases, Its possible to Savage has created new
realistic settings and weather condi- learn from a simulation, take the strategies for defending against
tions. Future simulations might focus knowledge into the real world and malware and distributed denial
of service attacks. He and
on additional detection, including signs then find out that things dont comply colleagues measured network-
covered with dirt, faded, partially ob- to the simulation. So, it is necessary to level interactions to characterize
scured by fog, trees branches, or other take a very iterative approach to AI and the value chain of Internet-
related crime.
objects, and those completely obscured video game simulations and carefully Said Cecilia Conrad,
by paint or graffiti, or broken off entire- validate results. managing director of the
ly. The performance on both real and MacArthur Fellows Program,
synthetic data, while not perfect, are AI in Overdrive These new MacArthur Fellows
bring their exceptional creativity
promising, he says. The use of AI and images to drive real- to diverse people, places, and
Researchers at Darmstadt University world gains shows no signs of subsid- social challenges. Their work
of Technology in Germany and Intel ing. For instance, Monfort and a group gives us reason for optimism
Labs have also turned to Grand Theft of researchers at NVIDIA have used a and inspires us all.
CACM Staff
Auto V to develop and fine-tune algo- CNN to map raw pixels from time-

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 15


news

stamped video captured by a single extract data from games and apply it
front-facing camera. With minimum to the real world is gaining momen-
training data from humans, the neural Researchers are tum. Not only do these simulations
net learned to drive in traffic on local increasingly attracted eliminate the cost, time, and human
roads and highways with or without resources involved with building and
lane markings or guardrails by using to video games operating complex machinesau-
the underlying mathematics of human and simulations to tonomous vehicles, robots, drones,
steering angles as the training signal. software agents and morethey make
Whats more, the project accomplished understand how to it possible to cycle through millions of
the task across a wide spectrum of road build better robots, possibilities and find subtle anoma-
and weather conditions in less than 100 lies and correlations that determine
hours. It also learned to operate in ar- drones, and agents. whether an autonomous vehicle ma-
eas with unclear visual guidance, such neuvers correctly for a dog on the road
as in parking lots and on unpaved and stops at a traffic light that is not
roads. Monfort describes the method, working, or simply crashes.
which led to a test on an actual vehicle, Says Kornhauser, Humans are very
as surprisingly powerful. from that study to the physical world. good at recognizing situations. In or-
Although Monforts research in- Katja Hofmann, chief researcher for der to build autonomous vehicles and
volved actual video and real-world the project, has stated that endless other devices that work correctly, we
data rather than game images, it dem- possibilities for experimentation ex- must understand and translate all the
onstrated the promise of deep learn- ist. Others, such as Googles Deep- factors and variables to a machine. Its
ing applied to game graphics and ac- Mind project, are also examining a challenge that AI can solve.
tual videosand how the two are games and how they can apply data to
closely related. For one thing, deep the physical world.
Further Reading
learning used for both synthetic and Togelius says the goal is to build
actual images could eliminate the smarter systems and agents that can Bainbridge, L.
Ironies of automation. New Technology and
need for a near infinite number of continue to tap data and adapt on the
Human Error, J. Rasmussen, K. Duncan, J.
ifthenelse statements, which are fly. Within this framework, humans Leplat (Eds.). Wiley, Chichester, U.K., 1987,
impractical to code when dealing with could learn from agents, agents could 271283.
the randomness of the road. For an- learn from humans, and agents could
Bojarski, M., Del Testa, D., Dworakowski, D.,
other, this type of data could be com- learn from other agents. He says a Firner, B., Flepp, B., Goyal, P., Jackel, L.D.,
bined with game data using a genera- competitive, co-evolutionary process Monfort, M., Muller, U., Zhang, J., Zhang, X.,
tive adversarial network (GAN), which could result in neural nets and learn- Zhao, J., and Zieba, K.
relies on two neural networks com- ing systems that are better adapted to End to End Learning for Self-Driving Cars,
April 25, 2016
peting with one another to boost ma- the increasingly blurry line between
https://arxiv.org/pdf/1604.07316v1.pdf
chine learning. This approach could silicon and carbon-based intelligence.
bridge the gap between data collected Within games, they would handle Chen, C., Seff, A., Kornhauser, A., and Xiao, J.
DeepDriving: Learning Affordance for Direct
from the synthetic world and data more of the unexpected features of the Perception in Autonomous Driving,
from the physical world, Filipowicz physical world, but also fuel real- Proceedings of 15th IEEE International
says. This may be the next phase of world gains by finding relationships Conference on Computer Vision (ICCV2015),
research. You could transfer the learn- and correlations that humans proba- May 2015
ing from one network to the other us- http://deepdriving.cs.princeton.edu
bly would not or could not notice.
ing either simulated or real-world im- Not surprisingly, there are limita- Loiacono, D., Lanzi, P.L., Togelius, J.,
ages, he explains. tions to how videogames can be used to Onieva, E., Pelta, D.A., Butz, M.V., Lnneker, T.D.,
Cardamone, L., Perez, D., Sez, Y.,
In addition, researchers are in- train robotic and autonomous systems. Preuss, M., and Quadflieg, J.
creasingly attracted to video games Software such as Grand Theft Auto V typ- The 2009 Simulated Car Racing
and simulations to understand how ically requires hundreds of millions of Championship, IEEE Transactions on
to build better robots, drones, and dollars to develop, yet these packages Computational Intelligence and AI in
agents. By applying the same type of are available commercially at a relative- Games, Vol. 2, No. 2, June 2010
http://julian.togelius.com/Loiacono2010The.pdf
deep learning techniques, they can ly low cost. Essentially, the game manu-
discover things that would have previ- facturer is footing the bill for research Filipowicz, A.
Virtual Environments as Driving Schools for
ously gone undetected. For example, and development that would be un- Deep Learning Vision-Based Sensors in
in 2015, Microsoft embarked on a achievable and unaffordable in a lab. Self-Driving Cars, June 2017.
project called Malmo, which created As a result, the use of games for ma- http://orfe.princeton.edu/~alaink/Theses/
an AI-based development platform re- chine learning will likely be limited to SeniorTheses17/Artur_Filipowicz_
volving around the popular world- specific fields, such as autonomous ve- VirtualEnvironmentsAsDrivingSchools.pdf
building game Minecraft. The goal of hicle and robotics research. Its diffi-
Samuel Greengard is an author and journalist based in
the project was to experiment with cult to envision a game for training sur- West Linn, OR.
and study complex virtual environ- gical robots, for example.
ments and apply the lessons learned Nevertheless, the idea of using AI to 2017 ACM 0001-0782/17/12 $15.00

16 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


news

Society | DOI:10.1145/3148760 Keith Kirkpatrick

Parallel Computational
Thinking
Applications must be programmed to process instructions in
parallel to take full advantage of the new multicore processors.

W
HEN LEARNING A new
skill, it is often advanta- Amdahls Law
geous to start out sim- 20
ply, and then incorpo-
18
rate greater complexity
Parallel portion
as the learner gains greater experience, 50%
16
expertise, and familiarity with the sub- 75%
ject at hand. 14 90%
Indeed, most computer science edu- 95%
cation has followed that line of thinking, 12
Speedup

teaching beginning computer science


students to write programs that perform 10
one instruction at a time, and then move
on to the next instruction. This is known 8

as sequential programming, and it has


6
largely been the accepted model of com-
puter science instruction at both the 4
university and K12 levels, in contrast
with parallel computing, a model of pro- 2
gramming where multiple instructions
are processed simultaneously. 0
The educational system is, mostly
1

16

32

64

128

256

512

1024

2048

4096

8192

16384

32768

65536
through inertia, still focused on the
Number of processors
computing paradigm of the 20th centu-
ry, which was one processor executing A chart illustrating Amdahls Law, which says the speed-up of a program from parallelization
instructions one after another, so al- is limited by how much of the program can be parallelized.
gorithmic problem-solving was mainly
oriented toward a sequential model, students to think and program in par- has run its course. We have added other
explains Charles (Chip) Weems, an as- allel will not only better prepare them forms of parallelism that do not hide the
sociate professor of computer science to code and program these devices, but issue as much for programmers.
at the University of Massachusetts. also helps to train their minds to think Computing societies have recog-
Today, however, nearly all applica- in abstractions to solve problems, rath- nized the need to incorporate parallel-
tions running on smartphones, tab- er than simply in terms of writing code. ism as part of a core collegiate comput-
lets, and PCs, are powered by multi- Computer architectures have been er science curriculum. The ACM and
core processors, which are necessary doing parallelism at the instruction level the IEEE jointly introduced new guide-
when working with the large datasets for decades in a way that the vast major- lines in 2013, and recommended inte-
that drive both consumer applications, ity of programmers can ignore that its grating parallel education throughout
such a Twitter or Facebook feed, as well there, says Dan Grossman, a professor the curriculum. Although these are
as business and commerce-related ap- at the Paul G. Allen School of Computer only guidelines, and most universities
IMAGE BY DA NIELS22 0/W IKIMEDIA CC BY- SA 3 .0

plications, such as travel deal sites, Science & Engineering at the University still tend to teach parallel program-
weather applications, and real-time of Washington, and a member of the ming concepts only to more advanced
traffic data. To take full advantage of ACM steering committee on computing students, there is a growing push to in-
these multicore processors, program- curricula, which concluded its work in corporate parallelism in college-level
ming applications to process instruc- 2013. If that had remained the only form programming courses from the start.
tions in parallelwhich allows multi- of parallelism, there would be a much In the last 15 years, systems have
ple instructions to be processed at the weaker argument for teaching parallel- gone almost entirely parallel, Weems
same timeis required. ism at the undergraduate level. But that says. Unless youre talking about
Teaching new computer science has not remained the dominant form; it small embedded systems, everything

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 17


news

you might encounter is a multicore in still having to choose among algo-


thats multithreaded, and nearly every- rithmic approaches, Weems says.
thing comes with a graphics processor, When a student learns There are times when communicat-
which can be programmed. parallelism, it helps ing via shared memory is most effec-
Moreover, programming in paral- tive, while in other cases its better
leland training students to think at them develop a more to work locally and communicate via
a higher levelallows for program- flexible approach messages, or to use a combination of
ming to be more direct and concise, these approaches at different levels of
compared with sequential program- to problem solving granularity. [Parallelism] forces pro-
ming, according to Guy Blelloch, a because there are grammers to look more explicitly and
professor and Associate Dean for holistically at the interactions that
Undergraduate Programs in the com- more algorithmic take place among the data and opera-
puter science department at Carnegie models to draw upon. tions in solving the problem, by con-
Mellon University. Its not so much sidering them from more perspectives
that parallel code is simpler than se- than the sequential model.
quential code, its that in the abstrac- Weems, a member of the working
tion of code [it] basically makes [the group for the Center for Parallel and
problem to solved] simpler and at the of it is I just want to add five to every Distributed Computing Curriculum
same time makes it parallel. element in the array. By doing the par- Development and Educational Re-
Blelloch, who notes that CMU teach- allelism, youre more focusing on the sources (CDER), which is funded by
es parallelism from the start in its In- underlying ideas, as opposed to getting the U.S. National Science Foundation
tro to Data Structures and Algorithms stuck in details of loops. (NSF), also notes that there is a de-
Course during the first semester of Another added benefit of parallel- mand for new programmers who have
sophomore year, says that by teaching ism, Weems says, is that when a stu- parallel programming skills, from gov-
beginning computer science students dent learns parallel programming, it ernment science labs as well as large
to think about problems in terms of helps them develop a more flexible technology industry companies.
abstractions, they are able to move approach to problem solving because Some major universities, includ-
beyond a basic understanding of pro- there are more algorithmic models ing the University of Massachusetts,
gramming to get the heart of the mat- to draw upon. While theres also the where Weems is a faculty member,
ter of actually solving problems. added benefit of learning how to break have begun to incorporate parallel-
Theres a lot of emphasis on intro apart larger problems into simpler ism into their curricula, with prom-
programming on a loop, Blelloch says. ones, parallelism also requires pro- ising results. For example, a faculty-
And thats really not that interesting. grammers to learn to see alternate ab- authored paper from Texas State
Often you just want to be thinking, stractions of the problem. University highlights the success
I want to add five to every element in There are situations where a of its new curriculum, which was
this array. I could start the loop at the problem can be decomposed into launched in the 20162017 academic
beginning, but the right way to think subtasks, but various factors result year. According to the paper, parallel

Technology

Out of Sight, Into Mind


French researchers are la Vision in Paris, France, who is computer. Once processed, the engage more than one million
developing a video technology working with Jose Alain Sahel, the visual signal will be broadcast to neurons in parallel, NESD
that will completely bypass Instituts director, to return sight wireless devices the researchers aims to enable rich, two-way
the eyes and project an image to those who live in darkness. plan to implant inside the brain, communication with the brain at
directly into ones brain. Both Picaud and Sahel are part which in turn will fire individual a scale that will help deepen our
Essentially, they want to enable of a larger, $21.6-million initiative neurons in the brains visual understanding of that organs
the blind to see again, without ever overseen by the U.S. Defense cortex to create sight. underlying biology, complexity,
having to rely on the human eye. Advanced Research Projects The implanted devices and function.
The researchers have been Agency (DARPA), which is looking containing LED arrays will Its deeper complexities are
partially successful in their quest; to use technology to enable the deliver light stimuli on the visual going to remain a mystery for
so far, they have found a way to blind to see, the deaf to hear, and cortex, Sahel says. some time to come, Alvelda
model how the human retina the speech-impaired to talk. Picaud and Sachel will be adds, but if were successful in
captures visual information Picaud and Sahel hope experimenting on animals before delivering rich sensory signals
using machine vision, a camera, their nascent technology will they move into the human brain. directly to the brain, NESD will
and a computer. ultimately work by using a Says Phillip Alvelda, manager lay a broad foundation for new
We aim at extending this specially designed machine of DARPAs Neural Engineering neurological therapies.
modeling to the visual cortex vision camera from Chronocam, System Design (NESD) program, Joe Dysart is an Internet
of the brain, says Serge Picaud, which will feed imagery from By increasing the capacity of speaker and business consultant
scientific supervisor at Institut de the outside world into a pocket advanced neural interfaces to based in Manhattan.

18 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


news

computing concepts are introduced what more conservative approach, he


and reiterated via a series of short, says. Theyve taught this course for
self-contained modules across sever- We live in a world 20 years in a particular way and its not
al lower division courses. Then, most of multicore devices, very hard to add three weeks at the end
concepts are combined into a senior- which makes them think in parallel.
level capstone course in multicore but I dont know Perhaps the larger question for com-
programming. The evaluations con- if we should be puter science educators revolves around
ducted during the first year displayed selecting the right material to introduce
encouraging results for the early-and- teaching [parallel to beginning computer science students.
often approach in terms of learning programming] to Its very tempting in computer sci-
outcomes, student interest, and con- ence education to think that we do stu-
fidence gains in computer science. everyone. It may be dents a service if we introduce x from
Still, some educators are not con- better off to start day one, for various values of x, and
vinced that introducing parallelism youre asking about x being parallel-
during introductory or lower-division with sequential ism, Grossman says. I do see value in
computer science courses is necessary programming. that, but I also see value in introducing
in order to produce well-trained com- security from day one. I see value in intro-
puter programmers of the future. ducing ethics from day one. I also see the
We live in a world of multicore de- value of introducing performance from
vices, says Mark Guzdial, a professor day one. But theres only one day one.
in the School of Interactive Comput- younger kids, sequential, logical step- Everyone who crafts a curriculum
ing at the Georgia Institute of Technol- ping is an important foundation for has to make choices about what they
ogy. But I dont know if we should be learning how to think logically. introduce from the beginning as the
teaching [parallel programming] to ev- Lynn does note that some platforms default way to think about a program,
eryone. It may be better off to start with may provide some exposure to parallel compared with what they push off until
sequential programming, and then programming. At times however, plat- later, Grossman says. Trade-offs are
move on to parallel. forms such as Scratch do allow kids to trade-offs, and people can spend their
Whether to teach elements of par- get some exposure to parallel program- lives studying pedagogy.
allelism in early coursework may also ming (such as multiple objects moving
depend on the focus of the coursework, and detecting collision simultaneous-
Further Reading
Grossman says, noting that the key to in- ly), Lynn says. While we may create
tegrating parallelism is to limit the com- projects with parallel programming Grossman, M., Aziz, M., Chi, H.,
Tibrewal, A., Imam, S., and Sarkar, V.
plexity of the program itself, by ensuring concepts embedded, we dont typically
Pedagogy and tools for teaching parallel
that computations and variables are not focus on parallel thinking, as we find it computing at the sophomore undergraduate
highly dependent upon one another dilutes the focus on building their se- level, Journal of Parallel and Distributed
during parallel processing operations. quential logic thinking skills. Computing, Volume 105 Issue C,
The way to get parallelism to work Whether at the collegiate or second- July 2017, pp. 18-30
http://dl.acm.org/citation.cfm?id=3085740
correctly is to have as fewer shared ary level, there are challenges related to
variables as you can that can change, revamping the curriculum to include Burtscher, M., Peng, W., Qasem, A.,
Shi, H., Tamir, D., and Thiry, H.
Grossman says, noting instead of set- parallelism. First, many professors have
Integrating Parallel Computing into the
ting up a single variable that may not had been exposed to parallelism Undergraduate Curriculum at Texas State
change its value, it may make more on a programming level, particularly if University: Experiences from the First Year
sense to simply program a second vari- they were educated before parallel pro- http://bit.ly/2tl7rpe
able that can hold the second value. cessing became mainstream, which oc- Computer Science Curricula 2013:
There are different ways to teach curred about a decade or so ago. There Curriculum Guidelines for Undergraduate
introductory programming without are also non-technical issues, such as Degree Programs in Computer Science
getting buy-in from other faculty mem- The Joint Task Force on Computing
parallelism that make it harder or
Curricular: Association for Computing
easier to add parallelism later, Gross- bers, as well as the challenge of updat- Machinery IEEE Computer Society
man adds. For initial exposure to ing online tutorials and auto-graders, December 20, 2013
programming for younger, pre-college which must be revamped to deal with http://www.acm.org/education/CS2013-
students, I havent seen much focus on different types of code. Additionally, final-report.pdf
parallelism and I think thats fine. textbooks need to be augmented or Video:
Hansel Lynn owns Silicon Valley- amended, as many introductory texts
Parallel Computing Explained:
based theCoderSchool, an afterschool dont cover parallelism. There was one
https://www.youtube.com/
coding instruction franchise that that mentioned concurrency, but it was watch?v=q7sgzDH1cR8
works exclusively with children ages 8 in Chapter 23, Weems quips.
to 18. Lynn believes sequential coding Blelloch says that the trend, for now, Keith Kirkpatrick is principal of 4K Research &
should be taught first. For kids aged is to simply add a discussion about par- Consulting, LLC, based in Lynbrook, NY.
818, we always teach sequential cod- allelism to existing coursework. I think
ing first, Lynn says. Especially for most departments are taking a some- 2017 ACM 0001-0782/17/12 $15.00

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 19


V
viewpoints

DOI:10.1145/3152912 Peter J. Denning

The Profession of IT
The Forgotten
Engineer
Engineering has been marginalized by the unhealthy belief
that engineering is the application of science.

W
E L I VE IN a time that re- science. This slogan was an XL mis- Much the same happened with
veres science. It was not representation of how aviation came computing technology. The first digital
always this way: in much to be.8 electronic computer was built in Ger-
of the previous centu- The linear model of research and many in 1938 by Konrad Zuse, who
ries, engineers were he- development behind this slogan has was educated as a civil engineer. John
roes. In the late 20th century, however, been repeatedly challenged and dis- Atanasoff and Clifford Berry built a
the engineers image eroded because proved. Science advertised this popular digital computer that solved linear
science seemed to offer more hope with fallacy on a T-shirtwith the worst ex- equations and demonstrated it in
difficult problems and because technol- ample imaginable. 1942. The first digital computer ca-
ogy seemed to inflict collateral damage The Wright brothers did look pable of any computable function
through such issues as pollution, ex- to science for help in answering fun- ENIAC (1945)was built by electrical
ploitation of nature, weapons of mass damental questions about wings and engineers J. Presper Eckert and John
destruction, and massive surveillance. propellers.8 The premier institution of Mauchly under a U.S. Army contract.
Our modern fascination for science the day, the Smithsonian, was unable They spent many hours tinkering to
is marginalizing engineering. This is to help them. These bicycle mechan- find reliable electronic logic circuits.
especially bad for computer science ics and self-taught engineers conducted In 1945, they joined with Herman
and engineering. For instance, we rou- their own experiments, spending many Goldstine, Arthur Burks, and John von
tinely teach programming as a set of hours studying the flights of birds to Neumann to design a stored-program
abstractions to be applied rather than a understand what enabled them to soar, machine, which they demonstrated
skill of design to satisfy customers. We eventually concluding that wing warping would be more powerful and signifi-
routinely make claims about what com- would be a key to controlling gliders and cantly less complex than ENIAC.
puting can theoretically accomplish powered aircraft. Only when they had a Although Alan Turing, whom many
without knowing that we can deliver. sketch of a mechanical concept could computer scientists revere, proposed
Not long ago, Science magazine dis- they begin to apply science to its devel- his Turing machine model of compu-
tributed a subscription solicitation opment. Science did not bring us avia- tation in 1936, his work was known
that offered a T-shirt bearing on the tion. Rather, the Wright brothers built only to a handful of mathematical logi-
front the image of a Leonardo da Vinci working flying machines that opened cians, and completely unknown to the
flying machine and on the back the in- the possibility of aviation and gave birth engineers who built the first electronic
scription Aviation. Brought to you by to a new science, aeronautics. computers.2,5 It was not until the 1950s,

20 COM MUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


viewpoints

when the first academic programs were be analyzed by the engineer as scien- velopment is multiperson development
being born, that Turings work offered tist in as rigorous an application of the of multiversion programsin other
the theoretical basis to make computer scientific method that any scientist words, teams and organizations build-
science credible as a new department must make.7 What happened to the ing families of software. Curricula that
in universities. In other words, as im- idea that engineering is both science lack a strong emphasis on design can-
portant as Turings work is, it did not and art? not prepare their graduates for this.
inform or inspire the first electronic When I recently reviewed the status What happened to the engineering in
computers or the stored program con- of computational thinking in educa- software engineering?
cept. Instead, the success of the first tion,3 I noticed that the recommenda- Engineering has helped all the so-
stored-program electronic computers tions for curricula focus almost exclu- cial, life, and physical sciences advance
created the opening for Turings work sively about the science-math side of by providing tools and instruments.
to become important. Yet we have our computational thinking and have little Engineering has helped civilization ad-
own T-shirts proclaiming that Turing or nothing to say about architecture or vance by providing reliable infrastruc-
was the father of digital computing. design side. This seemed odd because tures such as electricity, transporta-
programs are designed to control ma- tion, water, and food. Since the 1980s,
Incongruities chines, and moreover most of the new the engineering of supercomputers
Most engineering associations and jobs in computing are in architecture and networks has given birth to a raft
the accrediting body ABET define en- and design. Why are architecture and of new branches of science, mostly
gineering as application of science design not showing on the computa- called computational X where X
and mathematics to finding practical tional thinking radars? names a traditional science. Most com-
solutions to problems, a definition Software pioneer David Parnas has puting professionals today are heavily
that makes engineering an applica- long been a critic of the adopted approach engaged in engineeringthey design
IMAGE BY AND RIJ BORYS ASSOCIAT ES

tion of science or a branch of science. to teaching software engineering, which systems for customers and experiment
Not that long ago, some engineering seemed to him to downplay an engineer- to find out what works. Why has the en-
associations defined engineering as ing view in favor of a math-theory view. gineering outlook lost favor in many CS
the science and art of designing and He wants students to get plenty of prac- departments?
making structures. Petroski com- tice programming and designing pro- Much engineering is oriented
ments, Once that design is articu- grams to meet customer requirements.6 around design of systems and struc-
lated by the engineer as artist, it must He notes that the crux of software de- tures that will be reliable, safe, and se-

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 21


viewpoints

cure. Aside from design of experiments The second main distinction is how
and models, scientists hardly ever dis- scientists and engineers regard knowl-
cuss design. How could engineering be Design in edge. Scientists treat knowledge as data
a subset of science when its main con- computing is and information that have been orga-
cern is not a concern of science? nized into a body of knowledge that
fundamentally is then available for anyone to use. The
Distinctions an engineering scientific method is a process of stan-
It is clear that science and engineer- dard, outside observers gathering and
ing are distinct enterprises with dif- practice. weighing evidence in support of claims
ferent ways of looking at the world. Yet that might be added to the body. Engi-
they cannot advance without interact- neers treat knowledge as skillful prac-
ing with each other. Historians Bowler tices that enable design and building
and Morus trace the evolution of the of tools and technologies. Engineers
steam engine and the telegraph in the are not disinterested outside observers;
1700s and 1800s.1 They debunked the particularly helpful. The first con- they are immersed in the communi-
modern myths of one-directional flow cerns the nature of their work. Engi- ties of use. They embody practices for
from science to technology. In those neers design and build technologies building, maintaining, and repairing
days, there was no practical differ- that serve useful purposes, whereas technologies; attending to reliability,
ence between science and technology. scientists search for laws explaining dependability, and safety in the context
It seems that the distinction between phenomena. Design is among the of use; and following engineering stan-
science and engineering is recent most common words of engineering, dards and codes of ethics.
introduced in the late 1940s when whereas it is uncommon in science. The third main distinction concerns
Vannevar Bush advocated the estab- Design in engineering is a process of the role of abstractions and models.
lishment of the U.S. National Science finding practical, safe, cost-effective Science emphasizes models, and en-
Foundation for government support implementations. Whereas scientists gineering machines. There is a funda-
of basic research. have a knack for finding recurrences, mental distinction between modeling
Given the contemporary defini- engineers have a knack for listening to machines and building them. Abstrac-
tions, I have found three distinctions clients and proposing technologies of tions are useful for what they leave out.
between engineering and science value to them. Machines are useful for what they leave
in. Hardware and software are inter-
Dispositions toward design in computing. changeable to the theorist, but not to
the engineer.
Science Engineering The familiar phrase devil is in the
A design is a plan or a blueprint for a model Design is a process of proposing systems that meet details is an engineers motto. Engi-
or an experiment customer concerns neers must get the details right for sys-
Designs aim to reveal causes Designers aim to harness naturally occurring effects tems to work. Scientists want to elimi-
nate the details so that the recurrences
Designers find and validate models Designers align software with user practices
stand out.
Designers work with proven abstractions and Designers know that every detail counts for a reliable
The accompanying table summa-
models that omit inessential details and safe product or system rizes, compares, and contrasts how
Designers are ultimately concerned with Designers are ultimately concerned with whether computer scientists and engineers
whether claims are true products or systems work tend to view design. These are disposi-
Designers are objective observers detached Designers are immersed in their communities tions and tendencies, not formal defi-
from communities nitions. Computer scientists need to
Designers aim to understand the world Designers aim for working implementations that can function with both worldviews.
change the world
Correctness and validation measure success Client satisfaction measures success
Engineering and Science
Mistakes can be eliminated with formal Mistakes and defects are inherent, the system must in Computing
verification tolerate them As we noted in 1989,4 science, engi-
Good designs can be formally verified so that Good designs are fault tolerant so that they continue neering, and mathematics are irrevo-
they will work the first time to be reliable and safe even when faults and defects cably interwoven in the fabric of com-
appear
puting. Every computing technology
Good designs rule out contingencies or Designers work with contingencies and surprises
has a science, an engineering, and a
surprises
mathematics aspect. Computing can-
Experiments validate hypotheses Tinkering is experimenting to find what works
not be dissected into the three com-
What we know is expressed as our body of What we know is expressed in our practices, ponents. It is not a branch of science,
knowledge standards, and lore about what works engineering, or mathematics. In
Engineering and technology will apply We build technologies to have something to apply computing, design means develop-
the science science to ing practical systems with the aid of
mathematical tools such as program

22 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


viewpoints

verifiers, practices from science such


as taxonomies of design patterns,
crucial engineering aspects in archi-
tecture and design. This is unhealthy Calendar
and validation methods such as care-
ful statistical testing. Design in com-
puting is fundamentally an engineer-
because most of the jobs for which
our graduates are aiming are much
more strongly oriented around en-
of Events
ing practice. gineering than science. It is no won- December 46
In computing, we work closely with der that employers complain that CS K-CAP 2017: Knowledge Capture
Conference,
the notion that programs can be ex- graduates do not fit and need exten-
Austin, TX,
pressed as structures of abstract ob- sive training and hand holding to be- Sponsored: ACM/SIG,
jects, and the useful work happens come profitable employees. Contact: Oscar Corcho,
when those abstract objects control It bothers me that all the modern Email: ocorcho@gmail.com
machines that affect the world. The sci- advancesin AI, machine learning,
December 58
ence-math mind plays a strong role with big data, cloud computing, and com- UCC 17: 10th International
structuring the abstractions; the engi- puter securityare touted as triumphs Conference on Utility
neering mind plays a strong role with of science rather than what they really and Cloud Computing,
Austin, TX,
bringing the effects into the world. The are, achievements of engineering and Co-Sponsored: Other Societies,
field cannot survive if these two aspects science working together. Contact: Alan Fraser Sill,
do not maintain a synergized balance. Email: Alan.Sill@ttu.edu
These arguments are not new. In Conclusion
December 1115
his 1968 ACM A.M. Turing lecture, Science and engineering need each Middleware 17: 18th
award recipient Richard Hamming ar- other. Neither is the application or International Middleware
gued that the computer is at the heart fulfillment of the other. Science em- Conference.
of computing; without it, almost ev- phasizes the discovery of recurrenc- Las Vegas, NV,
Sponsored: ACM/SIG,
erything computing professionals do es. Engineering seeks to harness ef- Contact: Anshul Gandhi,
would be idle speculation. In the past fects before the recurrences are fully Email: anshul@cs.stonybrook.
two decades, we have added natural known. Science moves in when the ef- edu
information processes, such as DNA fect has proved useful and we seek to
December 1215
transcription, to what we study, but understand it better, optimize it, make CoNEXT 17: The 13th
the computer remains the heart. Every it more reliable, and exploit its recur- International Conference
programming language is a means for rences for prediction. Science takes on Emerging Networking
Experiments and Technologies,
designers to control an abstract ma- care of abstractions, engineering the Incheon, Republic of Korea,
chine that when simulated produces details that enable abstractions to Contact: Taekyoung Kwon,
useful and practical results. Comput- work. The marriage of science and en- Email: tkkwon98@gmail.com
er science graduates, Hamming ar- gineering in computing is critical for
gued, must learn design in the context the continued health of the field.
2018
of bringing value to users.
References
This is why I am concerned that 1. Bowler, P.J. and Morus, I. Making Modern Science: An January
our academic departments embody Historical Survey. University of Chicago Press, 2010.
2. Daylight, E. A Turing tale. Commun. ACM 57, 10 (Sept.
too strong an emphasis on the theo- 2014), 3638. January 710
retical side of computing. The engi- 3. Denning, P. Remaining trouble spots with computational GROUP 18: 2018 ACM
thinking. Commun. ACM 60, 6 (June 2017), 3339. Conference on Supporting
neering side has been diminished in 4. Denning, P. et al. Computing as a discipline. Commun. Groupwork,
the process. Recent reforms to com- ACM 32, 1 (Jan. 1989), 923.
Sanibel Island, FL,
5. Haigh, T. Actually, Turing did not invent the computer.
puting curricula have introduced Commun. ACM 57, 1 (Jan. 2014), 3641. Sponsored: ACM/SIG,
a new first course CS principles. 6. Parnas, D. David Parnas speaks of software Contact: Michael Prilla,
engineering. CCSL Centro de Competncia em Email:
Most of the content of these courses Software Livre, 2014; http://ccsl.ime.usp.br/en/ prilla.michael@googlemail.com
is concepts relating to programming news/14/09/17/david-parnas-speaks-software-
engineering-ccsl
and algorithm organization. A few de- 7. Petroski, H. To Engineer is Human: The Role of Failure February
partments, more so in engineering, in Successful Design. Vintage, 1992.
8. Petroski, H. and Denning, P. Your science T-shirt
use design courses and Raspberry Pi doesnt fly. ACM Ubiquity (Dec. 2016); http://ubiquity. February 2124
or Arduino labs to introduce students acm.org/blog/your-science-t-shirt-doesnt-fly/ SIGCSE 18: The 49th ACM
Technical Symposium on
to the field. The teachers are always Computing Science Education,
surprised by how much the students Peter J. Denning (pjd@nps.edu) is Distinguished
Baltimore, MD,
Professor of Computer Science and Director of the
accomplish in the role of designers Cebrowski Institute for information innovation at the Sponsored: ACM/SIG,
Naval Postgraduate School in Monterey, CA, is Editor of Contact: Tiffany Barnes,
without much grounding in the sci- ACM Ubiquity, and is a past president of ACM. Email: tiffany.barnes@gmail.
ence of the field. More departments The authors views expressed here are not necessarily com
those of his employer or the U.S. federal government.
ought to consider starting students
with a design course.
The author thanks Fernando Flores and Henry Petroski for
The result is curricula that encap- conversations with insights about science and engineering.
sulate computing inside a boundary
of math-science-theory and diminish Copyright held by author.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 23


V
viewpoints

DOI:10.1145/3152914 Louise Ann Lyon and Jill Denner

Broadening Participation
Community Colleges:
A Resource for Increasing
Equity and Inclusion in
Computer Science Education
Challenging a simplistic pathway metaphor.

I
N T H E L O N G - S TA N D I N G and
persistent lack of diversity in
computer science (CS), too
little attention has been paid
to the role that community
colleges (CCs) can play. Community
colleges are poised to provide an
important resource for preparing a
21st-century workforce begging for
more computer science graduates as
well as more diversity in those gradu-
ates. To broaden participation in CS,
CCs must be the focus of increased
study and intervention. As part of
this work, we revisit the current
metaphors that guide CS education
research and practicethe idea that
students follow a pipeline or even a
pathway is too simplistic to capture
the convoluted routes that many CC
students are constrained to follow.
In this column, we argue that there is
a misalignment between the existing
research and practice approaches
and institutional structures, which
are based on a traditional education- tion of the demographics in higher students through transfer to comple-
al pipeline metaphor, and the experi- education. As noted in an earlier Com- tion of a bachelors degree would be a
ences of students attempting to pur- munications Broadening Participation large step forward in helping diversify
sue a CS bachelors degree. column,8 there is a high participation the field.
IMAGE BY RAW PIXEL.COM

Community colleges are typically of minorities in CS at CCs; more than Despite these differences between
open access, lower-division institu- half of CC students are non-white, populations of students at CCs and
tions whose student population is and more than half of all Hispanic at four-year institutions, research
more diverse than that of four-year and Black undergraduates start at and institutional strategies continue
universities and reflect a transforma- community college.1 Efforts to retain to be informed by assumptions and

24 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


viewpoints

findings that do not always apply to Research provides support for


students who begin their journey to a what we argue is a more realistic
bachelors degree at a CC. We argue When decision model of CC students experiences.
that an understanding of the unique makers implement For example, we found that students
strengths and challenges of CC stu- were delayed at CCs in preparation for
dents is needed to strengthen efforts policies and transfer for many reasons including
to broaden participation in CS. In procedures that rely impacted CS classes, math anxiety or
addition, we claim that educational aversion, dropping and re-enrolling
pathway metaphors need to be up- on a pipeline model, in classes in an effort to increase GPA,
dated and applied to most effectively they unwittingly and family and financial responsibili-
implement institutional changes ties.5 Students struggled to create and
that will encourage students to con- suppress diversity. follow a plan to transfer, complicated
tinue through CCs on to completion by the fact that receiving institutions
of bachelors degrees. Specifically, had varying requirements for transfer
we argue that efforts to increase eq- admission. In addition to these diffi-
uity and inclusion in CS should in- cultiessome of which are shared by
crease the focus on community col- all students at CCsCS students had
leges, and employ metaphors that Students Experience a Snarled only vague ideas of how the field is
more accurately represent the lived Pathway Education Model applied in professional settings and
experiences of CC students. In contrast to the educational pipeline how to prepare for a career in CS. For
model that students are led to expect, students who were five years out from
Students Expect community college students path- taking an introductory programming
a Modified Traditional ways are often not direct or simple. For class at a CC, pathways were compli-
Education Pipeline Model many students, they involve time off cated by incorrect advising, changing
A traditional educational model from school, enrollment, and reenroll- majors or schools, leaving school due
based on previous generations of ment at different community colleges, to job responsibilities, and the neces-
white, upper-middle class menfol- and time in the workforce while also sity of starting their college years in
lows a pipeline metaphor in which attending school. These twists and remedial math classes.5
students prepare for professional, turns result in convoluted, individual-
white-collar jobs by entering directly ized routes that can be full of detours Suggestions for Simplifying
into and graduating from four-year and setbacks unexpected by students CC CS Students Pathways
postsecondary institutions (see Tra- envisioning a simpler pipeline, and Changes implemented to increase
ditional Education Model diagram). complicated by policies and restric- equity and inclusion in CS should be
As states have shifted the burden of tions at both CCs and four-year re- more responsive to the twists and turns
paying for higher education to stu- ceiving institutions (see Experienced of the pathways of CC students, while
dents, many are attracted to what Education Model diagram). Jaggars et also working to straighten and simplify
they view as an equal but less-expen- al.4 for example, found 1,213 distinct these pathways to more closely resem-
sive model that includes two initial paths to graduation for CS bachelors ble a traditional education model. This
years at a community college before degree holders in their study. includes increasing awareness about
transferring and completing a bach-
elors degree at a four-year institution Three education models.
in preparation for the workforce (see
Expected Education Model dia- Traditional Expected Experienced
Education Model Education Model Education Model
gram). In our research, we found that
CS students chose community college
Professional Professional Professional
and transfer over direct admission to Job Job Job
a four-year institution often because Bachelors
degree
Bachelors
they anticipated receiving the same Degree Skills
update
Entry-level
degree while saving money.5 How- Bachelors
Degree University
Job
University
ever, our work also reveals that the Hired

experienced pathways of students do Transfer Change Transfer


Associates
degree(s)
University (with or without major
not follow a traditional educational Associates Degree) Certificate(s)
Internship

model; the fragility of the educational Community Community


College Change
College
support structure for the CC student colleges

Technical
is such that the traditional education Diploma
Diploma
Training
Tested out Diploma
model is rarely attainable. In sum, of high school
GED

when decision makers implement High School High School High School
policies and procedures that rely on a
pipeline model, they unwittingly sup-
press diversity.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 25


viewpoints

the challenges students face and build- likely to attain a CS bachelors degree; it
ing structural supports to keep them is likely that these students were more
moving forward. We advocate for sev- Research, familiar with the range of job opportu-
eral research-based strategies to be im- policy, and nities in technology.
plemented at educational institutions. We argue that research, policy, and
Advising and Support. Studies interventions interventions will be more effective
have shown the importance of advis- will be more if they are based on a realistic under-
ing and support from faculty, coun- standing of CC students experiences.
selors, and peers for the successful effective if We hope efforts to broaden participa-
transfer from a CC to a four-year uni- they are based tion in CS will increase their focus on
versity in a STEM field7 and to help CC students and faculty, and will lead
students remain on a CS pathway.5 on a realistic to new, research-based interventions
But these sources of support should understanding resulting in a marked increase in suc-
be based on an understanding of the cessful transfer and graduation and a
complex and prolonged paths that of CC students broader diversity of students.
CC students follow. experiences. References
Culturally Responsive Practices.
1. American Association of Community Colleges. Fact
Faculty can play a critical role in ensur- Sheet, 2016; http://bit.ly/2d3jnEI
ing policies and practices are tailored 2. Center for Community College Student Engagement.
Aspirations to Achievement: Men of Color and
to respond to challenges faced by low- Community Colleges, 2014; http://bit.ly/1mCjPrv
3. Denner, J. et al. Community college men and women:
income students and those from un- A test of three widely held beliefs about who pursues
derrepresented minority groups. In CS, computer science. Community College Review, 2014.
4. Jaggars, S.S. et al. A Longitudinal Analysis of
this requires providing extra support to facultys heightened awareness Community College Pathways to Computer Science
and flexibility in schedules, developing of impacts on transfer students of Bachelors Degrees. Google Inc., Mountain View, CA,
2016; http://bit.ly/2hOzEzW
clear CS transfer pathways, and build- program decisions. Statewide web- 5. Lyon, L.A. and Denner, J. Student Perspectives of
ing knowledge of CS careers.5 sites such as http://www.njtransfer. Community College Pathways to Computer Science
Bachelors Degrees. Google Inc., Mountain View, CA,
Gender Differences and Similari- org and http://www.assist.org help 2016; http://bit.ly/2yTqjC0
ties. Strategies should also be respon- students have transfer informa- 6. National Academies of Sciences, Engineering, and
Medicine. Barriers and Opportunities for 2-Year and
sive to gender differences and simi- tion at their fingertips, but should 4-Year STEM Degrees: Systemic Change to Support
larities. Studies show that while both be enhanced with individualized Students Diverse Pathways. National Academies
Press, 2016.
women and men benefit from peer study plans to take into account the 7. Packard, B.W. et al. Womens experiences in the STEM
encouragement, CC women are more unique pathway of each student. To community college pathway. Journal of Women and
Minorities in Science and Engineering 17, 2 (Feb. 2011),
likely to intend to persist in CS if they ease the transfer experience of CC 129147.
are confident and interested in solv- students, efforts should be made to 8. Taylor, V. and Ladner, R. Data trends on minorities and
people with disabilities in computing. Commun. ACM
ing challenging problems, while men familiarize them with the settings, 54, 12 (Dec. 2011), 3437.
are more likely to intend to persist if people, and events at receiving uni-
they have positive interactions with versities. Opening hackathons to Louise Ann Lyon (louAnn.lyon@etr.org) is a Senior
Research Associate at ETR (Education, Training, Research)
their instructors and value comput- CC student participation, univer- in Silicon Valley, CA.
ing.3 In addition, supports for men of sity open houses or regional con-
Jill Denner (jilld@etr.org) is a Senior Research Scientist
color in CCs should be based on per- ferences that include CC students, at ETR in Silicon Valley, CA.
sonal connections, engaged faculty direct mailings to CC students, and
and staff with high expectations, and access to university counselors and This material is based in part upon work supported by
opportunities to apply what they learn research faculty are all best practic- Google, Inc., and by the National Science Foundation
under grant 0936791. Any opinions, findings, and
in the real world.2 es in this area. conclusions or recommendations expressed in this
material are those of the authors and do not necessarily
Stronger Partnerships between Involvement from Industry. We also reflect the views of Google, Inc., or of the National
Four-year Institutions and CCs. advocate for the involvement of the Science Foundation.
Four-year institutions should reach CS industry in the call to enable stu- Diagrams of educational models adapted from the
out to CCs to build true partner- dentsparticularly from underrepre- Developing Computing Pathways presentation (http://
batec.org). Thank you to Cheryl Calhoun of Santa Fe
ships based on listening to CC fac- sented groupsto have the resources College, Pat Morreale of Kean University, and Cindy
ulty to make changes to streamline and information they need to efficiently Tucker, and Melanie Williamson from Bluegrass
Community, and Technical College for reviewing and
student pathways and increase flex- move through CCs to transfer, and then providing comments on a draft of this column.
ibility along those pathways. Cur- through four-year institutions to bach-
rent patterns of transfer indicate elors degrees. Our research5 found that
the importance of articulation and career knowledge early in CS postsec-
transfer agreements 6 and should be ondary pathways gave students the im-
enhanced by faculty exchanges on petus to persist in CS but that specific
advisory boards. At the University knowledge of job skills and preparation
of Washington, Tacoma campus for particular jobs was lacking. Jaggars
and at Kean University in New Jer- et al.4 found that students who grew up
sey, such reciprocal visits have led near a technology hub city were more Copyright held by authors.

26 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


V
viewpoints

DOI:10.1145/3152916 George V. Neville-Neil

Kode Vicious
Cold, Hard Cache
On the implementation and maintenance of caches.

Dear KV,
Our latest project at work requires a
large number of slightly different soft-
ware stacks to deploy within our cloud
infrastructure. With modern hardware,
I can test this deployment on a laptop.
The problem I keep encountering is
that our deployment system seems to
secretly cache some of my files and set-
tings and not clear them, even when I
repeatedly issue the command to do
so. I have resorted to repeatedly using
the find command so that I can blow
away the offending files. What I have
found is that the system caches data in
many placesnot in one single, easy-
to-find placeso I have started a list.
All of which brings me to my question: which must be carried out correctly room in the cache, an entry is added,
Who writes this stuff?! for the cache to be of any real use. hopefully, in a place that is quicker to ac-
Out of Cache The only reason to create a cache in cess the second time around. Accessing
the first place is that there is some piece an entry in the cache requires a lookup
of information that is frequently used operation, which can fail. Failing to find
Dear OOC, and that can be stored in a place where an entry in the cache is called a miss
I am not quite sure who writes this it is quicker to access. For example, a and is the caches way of telling you to
stuff, but I am pretty sure they do systems main memory can be thought go back where you came from and look
not know what they are doing. A wise of as a cache for files on disk, because up the data in the old, slow way.
person once said, There are only it is perfectly possible to read a file into The problems you are having with
two hard things in computer sci- memory, execute the instructions read your system come from its inability
ence: cache invalidation and naming from the file, and then immediately to invalidate stale data. If you change
things, and that wise guy was suppos- free the memory. No one builds sys- something in files that are being de-
edly Phil Karlton, but, no matter who tems like that because it is expensive ployed and your deployment system
said it, they are partially correct. Lets to keep copying the data from disk for does not notice that change, then it is
skip the naming problem for now and each execution, so we leave the data we going to think the data it has cached
go right into caching and the concerns have copied in memory until we need is fresh when, in fact, it is stale. Noth-
one might have while maintaining a the memory for some other purpose. ing stinks quite like stale data. Since I
cache. You will note I said, maintain- Your particular case seems like a cache have no idea how your system is judg-
ing, because plenty of people can of either settings or files, rather than a ing the freshness of your data, lets
build up a cachethat is just making memory, CPU, or chip-level cache, so I just assume for a moment that its us-
IMAGE BY MA RC DIETRICH

copies of stuff you might want later will narrow my remarks a bit more to ing the file modification timestamp,
and putting it in a place that is easier cover just this case, but the principles and then lets further assume that its
for you to find or faster for you to ac- apply to all sorts of caches. not looking at seconds, but instead,
cess. Maintaining a cache actually Adding to a cache is relatively minutes. That means if you are do-
has several distinct operations, all of straightforward. As long as there is ing a file save and then an immediate

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 27


viewpoints

handle things, because they are pretty


smart at managing data and keeping
A correctly the fresh data near at hand.
implemented cache When you build a cache, pick a
key that is easy to search for. Here is
tracks all the things a hint: strings are not easy to search
being cached. for, but hashes of strings are. When
you add new object types to the cache,
do not do it by adding a pointer from
one object to another, unless those
two objects must be treated as one
thing. Trying to track down whether
deploy, your system will not, in fact, or not a sub-object has changed by
think that the data is stale. That is, if walking all the parent objects is in-
you do deploy-change-deploy in the efficient. When using timestamps
same minute, which is quite possible to indicate freshness, look at the
Advertise with ACM! for a touch typist, the system will not secondscomputers are fast; many
think that the old data is out of date. things happen in a computer minute.
Another possibility is that the settings If the cache contains files, put them
Reach the innovators youre changing are in a file thats not all under a common root directory, as
and thought leaders being watched by the system, and that this will make flushing them easier
the thing that it cares about is some file for the user.
working at the that points to your file. Much of what I have discussed is
cutting edge A correctly implemented cache local caching, and KV has left out the
tracks all the things being cached, distributed case, for reasons of per-
of computing not just the thing that the program- sonal sanity. The advice here is a good
and information mer assumes other people will modify. start to building a distributed cache,
The problem usually comes as more because if you get this wrong in the
technology through types of data are added to the cache. local case, your chances of getting it
ACMs magazines, A file here, a database entry there, and right in the distributed case are nil.
eventually what you have is not really a If KV gets a good letter about the dis-
websites well-organized cache, but instead, the tributed case, he might take leave of
and newsletters. data-storage equivalent of spaghetti his senses long enough to try to an-
code, where files point to files, and the swer it, or he might burn the letter
file with the dragon has the pellet with and since sending letters is also a dis-
the poison, but the directory with the tributed system, there is no guarantee
dragon has the file that is true. that you will know if the message was
One way for you, the user, to deal delivered, lost, or is in a stale cache.
Request a media kit with this is to be a tad brutal and flush KV
with specifications the cache. Whereas invalidation is the
careful, even surgical, removal of stale
and pricing: data, a flush is just what it sounds like:
Related articles
on queue.acm.org
it sends all the crap right down the
What Are You Trying to Pull?
Ilia Rodriguez drain, fresh and stale. It sounds like
Kode Vicious
whoever implemented your system has
+1 212-626-0686 made this difficult for you by scattering
http://queue.acm.org/detail.cfm?id=2931077
Division of Labor in Embedded Systems
acmmediasales@acm.org the requisite files all over the system, Ivan Godard
but once you have your complete list, http://queue.acm.org/detail.cfm?id=644266
it is probably time to write a flush.sh Beautiful Code Exists,
shell script to clear out all the cruft you If You Know Where to Look
can think of. Kode Vicious
Coming back up for air, lets think http://queue.acm.org/detail.cfm?id=1454458
about how a proper cache is managed,
so that the next system any of us come George V. Neville-Neil (kv@acm.org) is the proprietor of
Neville-Neil Consulting and co-chair of the ACM Queue
across does not require the use of sys- editorial board. He works on networking and operating
tem-call tracing to find out why the systems code for fun and profit, teaches courses on
various programming-related subjects, and encourages
system is misbehaving. Caches make your comments, quips, and code snips pertaining to his
sense only if they speed up access to Communications column.

frequently used data; otherwise, let


the operating system or your database Copyright held by author.

28 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


V
viewpoints

DOI:10.1145/3152722 Stephen J. Andriole

Viewpoint
The Death of
Big Software
We are past the tipping point in the transition
away from 20 th-century big software architectures.

W
HY WOULD ANYONE
undertake a multi-
year software project
today? Or upgrade
an in-house-hosted
legacy application? Or buildor use
anything that behaved like a mono-
lithic software application? Big soft-
ware project failure data is legendary.11
There are myriad horror stories with
titles like 9 VERY Scary ERP and ERP
System Implementation Statistics.12
The Standish Group actually labels
their annual technology project analy-
ses as Chaos Reports.14 They report-
ed that 66% of all technology projects
completely or partially failed in 2015.
So assuming that management is
reasonably well informed, it knows
that big software projects are likely
to fail. Yet in the 1990s and early 21st
century there were still companies
willing to try their hand with big soft-
ware and prove they were unlike the
others who failed so spectacularly. In
spite of this unjustifiable optimism,
many of these companies also failed.
Even the U.S. Defense Department
failed spectacularly.6 problems with single, integrated plat- of assassins. Some were all business,
IMAGE BY ALICIA KUBISTA /A ND RIJ BORYS ASSOCIAT ES

So that no one thinks that failure forms fail. Failure crosses vertical and some were hiding in the governance
only plagues ERP applications, the functional areas as well, including re- trenches, some were up in the clouds
data suggests all kinds of big software tail, government, financial services, and some were architectural. Lets look
projects fail.13 Big customer relation- and even science.10 at the assassins in a little detail.
ship management (CRM) projects fail. The high rate of failure helped kill One of the business assassins was
Big database management systems big software. But there were other control. When a company embarks
(DBMS) projects fail. Big infrastructure causes of death. on a multiyear journey with a big soft-
projects fail. Big communications proj- ware vendor it cedes significantif not
ects fail. In fact, most software projects Causes of Death totalcontrol to that vendor and the
designed to address enterprisewide Big software is dead. There were lots business processes embedded in the

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 29


viewpoints

code. For example, ERP modules were The cloud also killed big software.
originally designed to eliminate proc- Years ago, companies would imple-
ess chaos. Remember when there were ment huge software systems in their
ACM Journal of no intra- or intercompany (or industry) own data centers. Armies of program-
Data and standardized processes? Remember
when software applications never in-
mers would work with armies and na-
vies of (happy) consultants to bring
Information Quality tegrated? Remember when 1970s and big systems to life. Some years later
1980s legacy software was a barrier to the software might launch with a
Providing Research and Tools scalability, not to mention how expen- switch thataccording to the data
for Better Data sive it was to customize and maintain? usually failed (at least the first time). So
ERP vendors came to the rescue by the armies and navies would go back
controlling the mess that homegrown to work to get it right (until they got it
applications created. But one of the right). Implementation cost was also
ACM JDIQ is a multi- side effects was the loss of process con- a killer. $10M often turned into $50M,
trol to the vendors who defined supply which often turned into $250M and
disciplinary journal chain management, financial report- sometimes into billions: the Standish
that attracts papers ing, and other business processes for Group reports that big technology proj-
the companies (and industries) they de ects run anywhere from 40%50% over
ranging from facto managed. budgetand deliver less than 50%
theoretical research While tightly bundled standardized 60% of the promised ROI.14 Cloud deliv-
software made some sense back in the ery changed all that: it is now possible
to algorithmic solutions day, it makes little or no sense in the era to access an enterprise application di-
to empirical research of digital transformation where disrup-
tive business processes and business
rectly from the cloud from any number
of providers.
to experiential models are seen as necessary paths to While implementation pain was
competitiveness: disruption and stan- avoided through cloud delivery, pro-
evaluations. Its dardized big software are not birds of a cess control was still ceded to the
mission is to publish feather. Of course, in 1995 would have big software vendors who owned the
seemed heretical. Companies were embedded business processes in the
high impact articles desperate to end the chaos of uncoor- cloud-delivered software (while some
contributing to the dinated business processes and rules. of the control went to the cloud provid-
Standardized processes incarnated in er who deployed the systems on behalf
field of data and software were the vitamin pills everyone of their clients). While it was almost
information quality (IQ). needed. But in retrospect it is not clear
that everyone understood exactly what
always cheaper (by total cost of owner-
ship [TCO] metrics) to move from on-
they were consuming. When business premise big software applications to
models moved slowly in the 20th cen- cloud hosted applications, companies
tury, slow-and-steady worked, but when were still denied access to the trans-
whole new disruptive business mod- formational and disruptive playing
els began to appear in the 21st century fields.4,18,a
(fueled by new and more powerful digi-
tal technologies), slow-and-steady be- a TCO debates around on-premise-versus-
cloud continue. There are all sorts of ways
came a clear threat to competitiveness.
to compare costs across services, and many
Governance also killed big software. of the results will vary depending on indi-
Big software projects that are stan- vidual services such as SaaS, IaaS, PaaS, and
dardizedthat is, requiredby cor- other cloud-based services. But a full com-
porate technology groups also usually parison should include variables like agility,
governance and long-term costs connected
failed, not because they did not work
with training, testing, upgrades and security,
as advertised (which they often did among others. If a company is looking to get
not) but because of the governance out of the technology business by moving its
that forced a one-size-fits-all approach operational and strategic technology to the
to technology use. Huge off-the-shelf cloud, it will find ways to justify the cost mod-
el. If there is a bias toward keeping everything
software packageslike ERP, CRM and
For further information DBMS packagesor even large custom
in-house then favorable on-premise cost
models can be developed. The larger ques-
or to submit your in-house developed applications man- tion is around core competency: Does the
dated by corporate ITusually failed company want to be in the technology acqui-
manuscript, under the weight of their own gover- sition, deployment and support businessor
not? The cloud offers opportunities to reas-
visit jdiq.acm.org nance which, to make matters worse, sess core competencies and enables rational
often resulted in increased Shadow for various cost models, though ideally the
IT spending.1,2 models are based on empirical evidence.

30 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


viewpoints

Finally, some of the assassins plication: if something goes wrong,


were (sometimes unknowingly) ar- it will go wrong only within its own
chitects. The overwhelming technical Software microspace, while the rest of the ap-
complexity and inflexibility of huge, architectures plication will continue working as be-
standardized software systems also fore.
explain the death of big software. must be blank Was there any doubt that these ar-
Enormous whole-company projects canvasses chitectural assassins would hit their
were often beyond the capabilities target?
of even the most experienced project capable of yielding All of that said, SOA architecture
and program managersespecially tiny pictures dreams continue to develop.9 The big
when there is never 100% consensus data world, for example, has already
about the need for a total enterprise or large defined an open source architecture
project in the first place. High-level masterpieces. that is fast, flexible, cost-effective
functional and non-functional re- and always changing.15 The tools en-
quirements were nearly impossible to able low latency and real-time pro-
comprehensively define and validate; cessing through Spark and Flink,
detailed requirements were even among other open source tools. The
more elusive. details are specified in tools like Lam-
But perhaps the real architectural da, Kappa, and SummingBird. Ma-
assassin was monolithic software de- formation. Big standardized software pReduce moved us from parallel pro-
sign. Many of the big software ar- systems conceived in the 20th century cessing, and file systems have evolved
chitectures of the 20th century were were not designed to adapt or self- from Google File Systems to Hadoop.
conceived as integrated functional destruct the moment a company or Building on Hadoop, Spark and Flink
wholes versus decoupled services. industry pivots. provide real-time runtime environ-
Over time, monolithic architectures Another way of thinking about all ments. Even data streaming has been
became impossible to cost-effectively this is the relationship between micro addressed with tools like Storm and
modify or maintain andmuch more and macro (or monolithic) services. Spark Streaming. But while SOA com-
importantlybecame obstacles to Big software begins with macroservices plements microservice-based archi-
business process change. The trend in monolithic architectures.3,5 Or we tecture, they are different.7 SOA is not
toward microservice-based architec- could just think about all this as small the threat to monolithic big software
tures represents an exciting replace- versus large programming.8 that microservice-based architecture
ment to monolithic architectures (see Architectural assassins argue that is; in fact, SOA often behaves like a big
below). monolithic architectures are stiff, software vitamin supplement. Said
inflexible, and unyielding. They are differently, SOA is not a replacement
The Rise of Small, also difficult and expensive to main- for monolithic big software and is
Cloudy Software tain primarily because functionality therefore not a big software assassin.c
There are also small software cloud- is so interconnected and interdepen- But candidly, SOA-based integration
based alternatives that scale, in- dent. They also argue that monolithic and interoperability have proved il-
tegrate, and share process control architectures should be replaced by lusive in spite of continued promises
through customization tools delib- microservice-based architectures.16,17 and a growing library of open source
erately built into smaller, more man- According to Annenko,3 the concept application programming interfaces
ageable platforms. Companies can is rather easy, its about building an (APIs) and Web services. SOA is still
find lots of incredibly inexpensive application consisting of many small more of a dream than an answer for
alternatives, from vendors like Zoho services that can be independently continuous digital transformation. It
and Zendesk, among many others.b deployed and maintained, dont have might, in fact, be the wrong answer.
While small software packages any dependencies but rather com- In addition, cloud delivery is be-
also embed business rules and pro- municate with each other through coming increasingly flexible. Contain-
cesses, they are built in smaller, more lightweight mechanisms and lack a er technology offered by companies
integrate-able pieces, which provides centralized infrastructure. It is even like Docker offers freedom to compa-
much more flexibility to clients who possible to write these small (micro-) nies who may need to pivot away from
want to mix-and-match (existing and services each in its own language.
new) functionality. Why microservice-based architec-
c Clark7 describes the differences simply: mi-
The major driver of software tures? Annenko continues: their croservices architecture is an alternative ap-
change is continuous digital trans- benefits are undoubted, too: they proach to structuring applications. An ap-
easily allow for continuous deploy- plication is broken into smaller, completely
ment, and certain parts of an appli- independent components, enabling them to
b Zoho (www.zoho.com), Zendesk (www.ze- cation can be changed, debugged or have greater agility, scalability, and availabil-
ndesk.com). Also see: https://www.getapp. ity. SOA exposes the functions of applications
com/customer-management-software/a/zoho-
even replaced quickly and without af- as more readily accessible service interfaces,
crm/alternatives/ and https://www.crowdre- fecting the rest. With microservices, making it easier to use their data and logic in
views.com/zoho-crm/alternatives you absolutely cannot break an ap- the next generation of applications.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 31


viewpoints
CACM_TACCESS_one-third_page_vertical:Layout 1 6/9/09 1:04 PM Page 1

big software and the liberators of


new small software. In 20 years very
The entire world few of us will recognize the software
of traditional big architectures of the 20th century or how
software in the cloud enables ever-
software design, changing business requirements.
development,
ACM deployment, and
References
1. Andriole, S. Who owns IT? Commun. ACM 58, 8 (Aug.

Transactions on
2015).
support is dead. 2. Andriole, S., Cox, T. and Khin, K. Technology Adoption
& Digital Transformation. CRC Press, 2017.
3. Annenko, O. Breaking down the monolithic:

Accessible Microservices vs. self-contained systems. DZone, June


2016; http://bit.ly/2dEfFBG
4. Boisvert, G. Cost of Server Ownership: On-Premise Vs.

Computing
IaaS. SherWeb, Sept. 2015; http://bit.ly/2z3Sg9l
5. Brown, S. What is agile software architecture,
Coding the Architecture, 2013; http://www.codingthe
architecture.com/2013/09/03/what_is_agile_
software_architecture.html
6. Charette, R.N. U.S. Air Force blows $1 billion on failed
ERP project. IEEE Spectrum, Nov. 2012; http://bit.
their cloud providers to another pro- ly/2zim1El
vider for any number of reasons. Con- 7. Clark, T. Microservices, SOA, and APIs: Friends
or enemies?: A comparison of key integration and
tainers enable clients to retain control application architecture concepts for an evolving
over their applications just as emerg- enterprise. IBM DeveloperWorks, Jan. 2016; https://
ibm.co/2zhsMWR
ing application architectures enable 8. DeRemer, F. and Kron, H.K. Programming-in-the-
them to retain control over their soft- large versus programming-in-the-small. IEEE
Transactions on Software Engineering, 2 (June 1976);
ware-enabled business processes.19 http://bit.ly/2xyLvZM
This means that dependencies are 9. Erl, T. et al. Next Generation SOA: A Concise
Introduction to Service Technology & Service-
shrinking. So the combination of Orientation. Prentice Hall, 2015.
microservice-based architectures and 10. Gorton, I. Cyberinfrastructures: Bridging the divide
between scientific research and software engineering,
container technology may be the re- Computer 47, 8 (Aug. 2014); 48, 55; http://bit.
sponse to monolithic applications. ly/2yWVjkf
11. Kimberling, E. Key Findings from the 2015 Report.
Will the big software vendors re- Panorama Consulting, Apr. 2015; http://bit.
ly/2hpGwWo
spond? Yes. 12. Lee, J. 9 VERY scary ERP and ERP system
They will milk the current big en- implementation statistics. ERP/VAR, Oct. 2014; http://
bit.ly/2yukxFj
terprise revenue streams for as long 13. Leibowitz, J. IT project failures: What management
as they can and then systematically can learn. IEEE IT Professional (Apr. 2016); http://bit.
ly/2ynZhlF
make their offerings to look more 14. Lynch, J. The Chaos Report. The Standish Group,
and more like their small software 2015; http://bit.ly/2zScMqv
15. Madan, A. 100 open source big data architecture
This quarterly publication is a competitors. Many of them, like SAP papers for data professionals. LinkedIn, (June 2015);
quarterly journal that publishes and Oracle, have already by neces- http://bit.ly/1UEZdRt
16. McLarty, M. Microservice architecture is agile
sity begun this process through small software architecture. Infoworld, May 2016; http://bit.
refereed articles addressing issues
business and mid-market cloud of- ly/24hvrnD
of computing as it impacts the ferings that are much cheaper than
17. Proctor, S. From monolith to microservices: Big
rewards from small software architecture. IT World
lives of people with disabilities. the gold-plated goliaths they sold for Canada, (Aug. 2016); http://bit.ly/2iglbgk
18. Tomkins, B. SaaS solutions 77% cheaper than on-
The journal will be of particular years. They began to cannibalize their premises. Information Week, (May 2010); http://ubm.
own products because they too know io/2z4wAd9
interest to SIGACCESS members 19. Townsend, K. Containers: The pros and the cons of
that the days of big software are num- these VM alternatives. TechRepublic, Feb. 2015; http://
and delegates to its aliated bered. But they have not fundamen- tek.io/2nfzjav
20. Wailgum, T. 10 famous ERP disasters, dustups and
conference (i.e., ASSETS), as well tally rearchitected their applications. disappointments. CIO Magazine (Mar. 2009); http://
bit.ly/2zv2mxK
as other international accessibility They have shrunken them.
conferences. Stephen J. Andriole (steve@andriole.com) is the Thomas
The Death and Resurrection G. Labrecque Professor of Business at the Villanova
of Software School of Business at Villanova University where he

www.acm.org/taccess The entire world of big software de-


teaches and conducts research in emerging technologies,
requirements modeling and business technology strategy.
sign, development, deployment and His most recent book is Ready Technology: Fast Tracking
www.acm.org/subscribe support is dead. Customers know it,
Emerging Business Technologies (CRC Press, 2014).

big software vendors know it and next The author thanks the reviewers who significantly
generation software architects know it. improved the article. With their help, the death of big
software message was clarified especially regarding the
The implications are far-reaching and discussion of microservice-based architectures.
likely permanent. Business require-
ments, governance, cloud delivery and
architecture are the assassins of old Copyright held by author.

32 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


V
viewpoints

DOI:10.1145/3152876 Ernest Davis

Viewpoint
Lousy Advice
to the Lovelorn
The 37% rule is rarely applicable in real-world situations. It is
certainly entirely wrong-headed as advice for getting married.

P
EOPLE SEEKING ADVICE on
getting married have recently
been directed to a decidedly
unromantic algorithm. The
algorithm has two stages. Let
N be the maximum number of people
you expect to be able to date before you
give up. In the first stage, you date and
dump N/e .37N people to get a sense
of the overall quality of the field. In
the second stage, you continue down
the list, and you marry the first person
that is better than everyone you met in
the first stage. (If you reach the end of
the list, and the last person is not the
best, then the algorithm is indifferent;
you can marry them or not.) There is a
theorem that supposedly states that fol-
lowing this strategy maximizes the like-
lihood of marrying the best possible
partner of those on your original list.
This algorithm is the subject of the
first chapter of Algorithms to Live By, by
Brian Christian and Tom Griffiths,1 and
has been repeated in recent articles in
The Washington Post,6 Business Insider,7
Slate,5 and NPR.4 The headline in Busi-
ness Insider makes the advice even sim-
pler: 26 is the perfect age to get married.
If this advice seems dubious, your
intuitions are working well. Taken lit-
erally, the advice is crazy, because the
assumptions of the underlying theo-
rem bear no relation to the real world
IMAGE BY AK UMA-P HOTO

of dating and marriage.


I tell a tale to illustrate the problems
with the algorithm. (A version of this tale
in verse can be found at Davis.2) Streph-
on lives in Arcadia with 100 eligible

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 33


viewpoints

bachelorettes. He is happy to date them to select one. At each stage, you must
all, so N = 100. Therefore, following the choose the current object or you can
algorithm, his plan is first to date 37 of pass on it, but either way, your decision
ACM Transactions them, and then to marry the next one is irrevocable. Suppose further that:
who is better than any of those 37. The only pertinent information

on Social Computing However, the course of following al- you get about the candidates is ordinal.
gorithms never did run smooth. Date That is, you can judge how the new can-
17 is Chloe, who is amazing. Strephon didate compares to the earlier ones,
is completely smitten. However, a the- but you cannot assign a meaningful
orem is a theorem, and Strephon can cardinal score.
ACM TSC seeks to publish easily calculate that the probability is Your goal is to maximize the prob-

work that covers the 0.83 that someone he has not met yet is ability of getting the best of the N can-
even better than Chloe. Goodbye Chloe. didates; you are indifferent between all
full spectrum of social The next 34 dates go by with no magic. other outcomes.
computing including Date 52 is Phoebe. Phoebe is even more In that case, the preceding algo-
theoretical, empirical, amazing than Chloe. Patting himself rithmpass on the first N/e, then
on the back for his wisdom and pa- choose the next one that is better than all
systems, and design tience in passing up Chloe, Strephon thoseis provably optimal. Following
research contributions. proposes to Phoebe. For Phoebe, that algorithm, the probability is about
TSC welcomes research Strephon is date #40 out of 75, so she 1/e that you will get the best partner.
employing a wide range is in her second stagea and she really The problem and its solution were
likes him. Sadly, though, she liked Co- first published in Martin Gardners
of methods to advance lin, her #15, even better, so no dice. Mathematical Games column.3 Chap-
the tools, techniques, Forty-five more women come and ter 1 of Christian and Griffiths1 and its
understanding, and go. Date 98 is Daphne. Daphne is as 15 pages of notes contain a thorough
amazing as Chloe except that she lis- discussion of the problems history,
practice of social tens to the controversial avant-garde variants, and applications; see also the
computing, particularly composer Karlheinz Stockhausen, but Wikipedia entry, Secretary Problem.8
research that designs, Strephon can live with that. The prob- Given the extreme restrictions, it is
ability that one of the remaining two easy to see that the optimal rule to fol-
implements or studies women is better than Daphne is only low must have the form, Pass on the
systems that mediate about 0.06. However, the goal of the first f (N), then choose the next one that
social interactions among algorithm is to marry the best partner, is better for some function f (N). Obvi-
users, or that develops and Daphne is definitely not the best
partner, since she is inferior to Chloe.
ously, a candidate that is not better than
all those seen so far cannot be chosen,
theory or techniques Strephon knows better than to contra- since it cannot be the best. Moreover, all
for application in those vene an algorithm endorsed by a pro- the information that you have in choos-
systems. fessor at Berkeley and published in the ing is the sequence of ordinals; and it is
Washington Post. Goodbye Daphne. easy to see that the order in which the
What the algorithm prescribes in ones you have passed on carries no use-
the case where Daphne is better than ful information.
Chloe but worse than Phoebe is not
clearly specified; it depends on whether
the goal is to marry the best partner of The assumptions
all those on the list, or to marry the best
partner who would have accepted you. of the theorem are
You might suppose that Strephon almost never even
could try calling Chloe and begging
for forgiveness; but the theorem that approximately
Strephon is relying on assumes that is satisfied in real-world
impossible. By assumption, Chloe has
already married someone else. situationsand are
For further information Enough of the melodrama; what is especially far-fetched
the math? The theorem is as follows:
or to submit your Suppose you will be presented with a se- in regard to dating.
quence of options, from which you are
manuscript,
visit tsc.acm.org a There is a dating service in Arcadia that matches
first-stagers with first-stagers and second-stag-
ers with second-stagers.

34 COMMUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


viewpoints

For example, suppose that for N = 100 are not even stochastic processes that
someone were to propose an alternative randomly accept or reject marriage
rule: Pass on the first 37, then wait un- It is not good to proposals. At least in our society, they
til someonecall her Aliceis better promote the view of are players engaged in much the same
than those 37, then continue to wait un- game as Strephon. Suppose that Phoe-
til someone elseBettyis better than romantic partners as bes and Strephons preferences are
Alice. Suppose that Strephon executes commodities that are uncorrellated; that is, Phoebes prefer-
this, meets Alice at 40, and meets Betty ences are independent of the fact that
at 51. Then all the useful information inspected and chosen Strephon proposed to her. Then, even
that he actually has is that Betty is better rather than people given that Phoebe is in stage 2, the prob-
than 50 women out of 100. Consider an ability that she prefers Strephon to all
alternative order in which Betty is still whom you woo and the men she met in stage 1 is only about
50, but Alice is now 17. Then Betty is now who woo you. e/N. Of course Strephon may have an-
the first person he has met better than other chance to propose; but the aver-
the first 37, so by the rule, he should age number of stage 2 candidates who
pass on Betty. But there is no significant are better than all the stage 1 candidates
difference between the first and second is only about e 1. There will be a lot of
situation in what Strephon knows, since unmarried people in Arcadia.
the ordering was random. Probably preferences between po-
The fact that f (N) converges to and of 0 if it is not. But the agent never tential partners are substantially cor-
N/e is, to my mind, cute, but not very knows whether the item he has chosen related, which makes things better;
profound. The proof is an exercise in is actually the best, and therefore does but they are also probably correlated
combinatorics, with nothing particu- not know his own utility. For instance, across rivals, which makes things
larly insightful. suppose that Strephon decides to ig- worse. In any case, the analysis in this
It seems to me the assumptions of nore the algorithm and marry Chloe situation would be completely differ-
the theorem are almost never even ap- even though she is only date number ent (and very difficult).
proximately satisfied in real-world situ- 17. Then his utility is 1 if she actually is Lovers are proverbially unwise, but
ationsand are especially far-fetched the best partner for him and 0 if there I think that most would have the good
in regard to dating. There are many is someone better, despite the fact that sense to ditch the algorithm when its ad-
problems. I will first mention a few that he has no idea which is the case and vice is obviously idiotic. So I am not actu-
seem to me comparatively superficial that his state of nuptial bliss is pre- ally very worried about Strephon and the
and open to technical solutions. The as- sumably unaffected. I cannot find any rest. However, it is not good to promote
sumption that you cannot go backthat axiom that prohibits this kind of utility the view of romantic partners as com-
Strephon cannot go back to Chloeis function, but it seems counter to the modities that are inspected and chosen
often false, but it is reasonable in cases general spirit of what is usually meant rather than people whom you woo and
like real-estate hunting or searching for by a utility.b who woo you. Moreover, publishing
a parking space where there is a lot of The assumption that there is only senseless advice as the unquestionable
competition for desirable resources. It ordinal information is also problem- dictate of mathematics strengthens the
is arguably reasonable as regards dat- atic. This is critical in Strephons deci- general view that mathematics and sci-
ing. The assumption that you know the sion to reject Chloe; it is assumed that ence are just theories that have nothing
value of N in advance is often dubious, there is no difference between her be- to do with the real world.
but certainly there are cases where N ing slightly better than the others he
can be reasonably estimated. The analy- has seen and her being enormously References
1. Christian, B. and Griffiths, T. Algorithms to Live By:
sis ignores transactional costs; dating better. In most real situations, once The Computer Science of Human Decisions. Henry
takes time and effort. you have seen a reasonable number Holt, 2016.
2. Davis, E. The 37% Rule. 2017; http://cs.nyu.edu/
Then there are more fundamental of options, you have some idea of the faculty/davise/Verses/ThirtySeven.html
problems. The assumption that seems ordinary range and you can spot an as- 3. Gardner, M. New Mathematical Diversions from
Scientific American. Simon and Schuster, 1966.
most far-fetched is the best or noth- tonishing outlier. 4. Krulwich, R. How to marry the right girl: A
mathematical solution. National Public Radio, May
ing assumption: you want to maxi- These objections apply in all cases of 15, 2014.
mize the probability of getting the best choice. For courtship specifically, there 5. Parker, M. The secretary problem: An algorithm for
deciding who to marry and other tough choices. Slate
option and are completely indifferent is another serious problem. Chloe, (Dec. 17, 2014).
between the other outcomes. Phoebe, and Daphne are not parking 6. Swanson, A. When to stop dating and settle down,
according to math. The Washington Post (Feb. 16, 2016).
I cannot think of any choice prob- spots, waiting there to be chosen; they 7. Weller, C. A mathematical theory says the perfect
lem where this is a reasonable as- age to get married is 26heres why. Business Insider
(Nov. 25, 2016).
sumption. This becomes clear if the b Richard Cole points out that the algorithm has 8. Wikipedia. Secretary problem; http://en.wikipedia.org/
assumption is cast in terms of maxi- the property that, regardless of the distribu- wiki/Secretary_problem

mum expected utility theory, the stan- tion of utilities over items, which is generally
poorly known and even poorly defined, the ex- Ernest Davis (davise@cs.nyu.edu) is Professor of
dard normative theory of choice. This pected value of the utility of the outcome over Computer Science at New York University.
assumption corresponds to assigning random orderings is at least 1/e of the optimal
a utility of 1 if the best item is chosen choice, assuming all utilities are non-negative. Copyright held by author.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 35


practice
DOI:10.1145/ 3132259
This article challenges that view by

Article development led by
queue.acm.org
showing nearly all of the technical com-
ponents of bitcoin originated in the
academic literature of the 1980s and
The concept of cryptocurrencies is built 1990s (see Figure 1). This is not to di-
from forgotten ideas in research literature. minish Nakamotos achievement but to
point out he stood on the shoulders of
BY ARVIND NARAYANAN AND JEREMY CLARK giants. Indeed, by tracing the origins of
the ideas in bitcoin, we can zero in on
Nakamotos true leap of insightthe

Bitcoins
specific, complex way in which the un-
derlying components are put together.
This helps explain why bitcoin took so
long to be invented. Readers already
familiar with how bitcoin works may
gain a deeper understanding from this

Academic
historical presentation. (For an introduc-
tion, see Bitcoin and Cryptocurrency Tech-
nologies.36) Bitcoins intellectual history
also serves as a case study demonstrat-
ing the relationships among academia,
outside researchers, and practitioners,

Pedigree
and offers lessons on how these groups
can benefit from one another.

The Ledger
If you have a secure ledger, the process
to leverage it into a digital payment sys-
tem is straightforward. For example, if
Alice sends Bob $100 by PayPal, then
PayPal debits $100 from Alices ac-
count and credits $100 to Bobs ac-
count. This is also roughly what hap-
pens in traditional banking, although
the absence of a single ledger shared
IF YOU HAVE read about bitcoin in the press and have between banks complicates things.
some familiarity with academic research in the field of This idea of a ledger is the starting
point for understanding bitcoin. It is
cryptography, you might reasonably come away with a place to record all transactions that
the following impression: Several decades worth of happen in the system, and it is open
to and trusted by all system partici-
research on digital cash, beginning with David pants. Bitcoin converts this system
Chaum,10,12 did not lead to commercial success for recording payments into a curren-
because it required a centralized, bank-like server cy. Whereas in banking, an account
balance represents cash that can be
controlling the system, and no banks wanted to sign demanded from the bank, what does
on. Along came bitcoin, a radically different proposal a unit of bitcoin represent? For now,
assume that what is being transacted
for a decentralized cryptocurrency that did not need holds value inherently.
the banks, and digital cash finally succeeded. Its How can you build a ledger for use
IMAGE BY INK ED PIXELS

inventor, the mysterious Satoshi Nakamoto, was an in an environment like the Internet
where participants may not trust each
academic outsider, and bitcoin bears no resemblance other? Lets start with the easy part: the
to earlier academic proposals. choice of data structure. There are a

36 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 37
practice

few desirable properties. The ledger pants. This contrasts with another ap- want to establish that the document was
should be immutable or, more precise- proach to decentralizing digital led- created at a certain point in time, and no
ly, append only: you should be able to gers,7,13,21 in which many participants later. Their notion of document is quite
add new transactions but not remove, maintain local ledgers and it is up to general and could be any type of data.
modify, or reorder existing ones. There the user querying this set of ledgers to They do mention, in passing, financial
should also be a way to obtain a suc- resolve any conflicts. transactions as a potential application,
cinct cryptographic digest of the state of Linked timestamping. Bitcoins ledger but it was not their focus.
the ledger at any time. A digest is a data structure is borrowed, with mini- In a simplified version of Haber
short string that makes it possible to mal modifications, from a series of pa- and Stornettas proposal, documents
avoid storing the entire ledger, know- pers by Stuart Haber and Scott Stornetta are constantly being created and
ing that if the ledger were tampered written between 1990 and 1997 (their broadcast. The creator of each docu-
with in any way, the resulting digest 1991 paper had another co-author, Dave ment asserts a time of creation and
would change, and thus the tampering Bayer).5,22,23 We know this because Naka- signs the document, its timestamp,
would be detected. The reason for moto says so in his bitcoin white paper.34 and the previously broadcast docu-
these properties is that unlike a regular Haber and Stornettas work addressed ment. This previous document has
data structure that is stored on a single the problem of document timestamp- signed its own predecessor, so the
machine, the ledger is a global data ingthey aimed to build a digital nota- documents form a long chain with
structure collectively maintained by a ry service. For patents, business con- pointers backwards in time. An out-
mutually untrusting set of partici- tracts, and other documents, one may side user cannot alter a timestamped
message since it is signed by the cre-
Figure 1. Chronology of key ideas found in bitcoin. ator, and the creator cannot alter the
message without also altering the en-
tire chain of messages that follows.
Linked Byzantine Public Thus, if you are given a single item in
Timestamping, Digital Proof Fault Keys as Smart the chain by a trusted source (for ex-
Verifiable Logs Cash of work Tolerance Identities Contracts ample, another user or a specialized
1980 Merkle Chaum timestamping service), the entire
Tree33 Ecash10
Byzantine Anonymous chain up to that point is locked in, im-
Generals27 Communication9
mutable, and temporally ordered.
Chaum Further, if you assume the system re-
1985 Security w/o jects documents with incorrect cre-
Identification11
ation times, you can be reasonably as-
Haber &
Offline Paxos28 sured that documents are at least as
Ecash32
stornetta22 old as they claim to be. At any rate, bit-
1990 Benaloh & Digicash coin borrows only the data structure
de mare6 from Haber and Stornettas work and
Anti-spam15
Bayer, haber, reengineers its security properties
Szabo
stornetta5
Essay41
with the addition of the proof-of-work
1995
scheme described later in this article.
Micro-
Haber & Mint40
In their follow-up papers, Haber
Hashcash2 B-money13
stornetta23 and Stornetta introduced other ideas
Client Pbft8 that make this data structure more ef-
Puzzles25 Goldberg
fective and efficient (some of which
2000 Paxos made Dissertation20
Simple29 were hinted at in their first paper).
Sybil attack14 First, links between documents can be
Bit Gold 42
created using hashes rather than signa-
tures; hashes are simpler and faster to
2005
Computational
compute. Such links are called hash
Bitcoin34
Impostors1 pointers. Second, instead of threading
documents individuallywhich might
be inefficient if many documents are
2010 Private created at approximately the same
Blockchains
timethey can be grouped into batch-
es or blocks, with documents in each
Ethereum block having essentially the same time-
2015 stamp. Third, within each block, docu-
ments can be linked together with a bi-
Nakamoto Consensus
nary tree of hash pointers, called a
Merkle tree, rather than a linear chain.
Incidentally, Josh Benaloh and Michael

38 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


practice

de Mare independently introduced all state is one of the key functionalities cause of an adversary trying to disrupt
three of these ideas in 1991,6 soon after provided by the ledger in Ethereum, a the ledgers operation or simply be-
Haber and Stornettas first paper. new cryptocurrency. cause of network latency, resulting in
Merkle trees. Bitcoin uses essential- Bitcoin may be the most well- blocks occasionally being generated
ly the data structure in Haber and known real-world instantiation of near-simultaneously by different
Stornettas 1991 and 1997 papers, Haber and Stornettas data structures, nodes unaware of each others blocks.
shown in simplified form in Figure 2 but it is not the first. At least two com- Linked timestamping alone is not
(Nakamoto was presumably unaware paniesSurety starting in the mid- enough to resolve forks, as was shown
of Benaloh and de Mares work). Of 1990s and Guardtime starting in by Mike Just in 1998.26
course, in bitcoin, transactions take 2007offer document timestamping A different research field, fault-
the place of documents. In each services. An interesting twist present tolerant distributed computing, has
blocks Merkle tree, the leaf nodes are in both of these services is an idea studied this problem, where it goes
transactions, and each internal node mentioned by Bayer, Haber, and Stor- by different names, including state
essentially consists of two pointers. netta,5 which is to publish Merkle replication. A solution to this prob-
This data structure has two important roots periodically in a newspaper by lem is one that enables a set of nodes
properties. First, the hash of the latest taking out an ad. Figure 3 shows a to apply the same state transitions in
block acts as a digest. A change to any Merkle root published by Guardtime. the same ordertypically, the pre-
of the transactions (leaf nodes) will Byzantine fault tolerance. Of course, cise order does not matter, only that
necessitate changes propagating all the requirements for an Internet cur- all nodes are consistent. For a digital
the way to the root of the block, and rency without a central authority are currency, the state to be replicated is
the roots of all following blocks. Thus, more stringent. A distributed ledger the set of balances, and transactions
if you know the latest hash, you can will inevitably have forks, which means are state transitions. Early solutions,
download the rest of the ledger from that some nodes will think block A is including Paxos, proposed by Turing
an untrusted source and verify that it the latest block, while other nodes will Award winner Leslie Lamport in
has not changed. A similar argument think it is block B. This could be be- 1989,28,29 consider state replication
establishes another important prop-
erty of the data structurethat is, Figure 2. The ledger data structure in linked timestamping.
someone can efficiently prove to you
that a particular transaction is includ-
ed in the ledger. This user would have
to send you only a small number of
nodes in that transactions block (this
is the point of the Merkle tree), as well
as a small amount of information for
every following block. The ability to ef-
ficiently prove inclusion of transac-
tions is highly desirable for perfor-
mance and scalability.
Merkle trees, by the way, are named
for Ralph Merkle, a pioneer of asym-
metric cryptography who proposed the Merkle tree nodes hash pointers time intervals
idea in his 1980 paper.33 His intended
application was to produce a digest for
a public directory of digital certificates.
When a website, for example, presents
you with a certificate, it could also pres- Figure 3. Guardtime Merkle root published in newspaper.
ent a short proof that the certificate ap-
pears in the global directory. You could
efficiently verify the proof as long as
you know the root hash of the Merkle
tree of the certificates in the directory.
This idea is ancient by cryptographic
standards, but its power has been ap-
preciated only of late. It is at the core of
the recently implemented Certificate
Transparency system.30 A 2015 paper
proposes CONIKS, which applies the
idea to directories of public keys for
end-to-end encrypted emails.32 Effi-
cient verification of parts of the global

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 39


practice

when communication channels are sharpened to provide a more stan-


unreliable and when a minority of dard consistency definition that
nodes may exhibit certain realistic holds under more realistic assump-
faults, such as going offline forever or tions about message delivery.37 All of
rebooting and sending outdated mes-
sages from when it first went offline. Virtually all this work, however, makes assump-
tions about honest, that is, pro-
A prolific literature followed with
more adverse settings and efficiency
fault-tolerant cotol-compliant, behavior among a
subset of participants, whereas Naka-
trade-offs. systems assume moto suggests that honest behavior
A related line of work studied the
situation where the network is mostly
that a majority or need not be blindly assumed, be-
cause it is incentivized. A richer anal-
reliable (messages are delivered with supermajority of ysis of Nakamoto consensus account-
bounded delay), but where the defini-
tion of fault was expanded to handle
nodes in the system ing for the role of incentives does not
fit cleanly into past models of fault-
any deviation from the protocol. Such are both honest tolerant systems.
Byzantine faults include both naturally
occurring faults as well as maliciously and reliable. Proof Of Work
crafted behaviors. They were first studied Virtually all fault-tolerant systems as-
in a paper also by Lamport, cowritten sume that a strict majority or superma-
with Robert Shostak and Marshall jority (for example, more than half or
Pease, as early as 1982.27 Much later, in two-thirds) of nodes in the system are
1999, a landmark paper by Miguel Cas- both honest and reliable. In an open
tro and Barbara Liskov introduced peer-to-peer network, there is no reg-
practical Byzantine fault tolerance istration of nodes, and they freely join
(PBFT), which accommodated both and leave. Thus an adversary can create
Byzantine faults and an unreliable net- enough Sybils, or sockpuppet nodes, to
work.8 Compared with linked time- overcome the consensus guarantees of
stamping, the fault-tolerance literature the system. The Sybil attack was formal-
is enormous and includes hundreds of ized in 2002 by John Douceur,14 who
variants and optimizations of Paxos, turned to a cryptographic construction
PBFT, and other seminal protocols. called proof of work to mitigate it.
In his original white paper, Naka- The origins. To understand proof
moto does not cite this literature or use of work, lets turn to its origins. The
its language. He uses some concepts, first proposal that would be called
referring to his protocol as a consensus proof of work today was created in
mechanism and considering faults 1992 by Cynthia Dwork and Moni
both in the form of attackers, as well as Naor.15 Their goal was to deter spam.
nodes joining and leaving the network. Note that spam, Sybil attacks, and de-
This is in contrast to his explicit reli- nial of service are all roughly similar
ance on the literature in linked time- problems in which the adversary am-
stamping (and proof of work, as we will plifies its influence in the network
discuss). When asked in a mailing-list compared to regular users; proof of
discussion about bitcoins relation to work is applicable as a defense against
the Byzantine Generals Problem (a all three. In Dwork and Naors design,
thought experiment requiring BFT to email recipients would process only
solve), Nakamoto asserts the proof-of- those email messages that were ac-
work chain solves this problem.35 companied by proof that the sender
In the following years, other aca- had performed a moderate amount of
demics have studied Nakamoto con- computational workhence, proof
sensus from the perspective of dis- of work. Computing the proof would
tributed systems. This is still a work take perhaps a few seconds on a regu-
in progress. Some show that bitcoins lar computer. Thus, it would pose no
properties are quite weak,45 while difficulty for regular users, but a spam-
others argue that the BFT perspective mer wishing to send a million email
does not do justice to bitcoins con- messages would require several
sistency properties.41 Another ap- weeks, using equivalent hardware.
proach is to define variants of well- Note that the proof-of-work in-
studied properties and prove that stance (also called a puzzle) must
bitcoin satisfies them.19 Recently be specific to the email, as well as to
these definitions were substantially the recipient. Otherwise, a spammer

40 COM MUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


practice

would be able to send multiple mes-


sages to the same recipient (or the
same message to multiple recipients)
for the cost of one message to one re-
Sybil-Resistant Networks
cipient. The second crucial property In his paper on Sybil attacks, John Douceur proposed that all nodes participating
in a BFT protocol be required to solve hashcash puzzles. If a node were
is that it should pose minimal com- masquerading as N nodes, it would be unable to solve N puzzles in time, and
putational burden on the recipient; the fake identities would be purged. Karma, an early peer-to-peer digital cash
puzzle solutions should be trivial to system, uses a hashcash-like puzzle to rate-limit nodes joining the Karma
network and receiving credits for file sharing.44 A malicious node, however, could
verify, regardless of how difficult they still obtain a moderate advantage over an honest node that claimed only a single
are to compute. Additionally, Dwork identity. A follow-up paper in 20051 suggested honest nodes should instead
and Naor considered functions with a mimic the behavior of malicious nodes and claim as many virtual identities as
trapdoor, a secret known to a central they computationally can afford to claim. With these virtual identities executing
a BFT protocol, the assumption, At most a fraction f of nodes are faulty can
authority that would allow the author- be replaced with the assumption The fraction of total computational power
ity to solve the puzzles without doing controlled by faulty nodes is at most f. Thus, it is no longer necessary to validate
the work. One possible application of identities, and open peer-to-peer networks can run a BFT protocol. Bitcoin
uses exactly this idea. But Nakamoto asks: What motivates nodes to perform
a trapdoor would be for the author- computationally expensive proof of work? The answer requires a further leap:
ity to approve posting to mailing lists digital currency.
without incurring a cost. Dwork and
Naors proposal consisted of three
candidate puzzles meeting their
properties, and it kicked off a whole
research field, to which we will return. Smart Contracts
Hashcash. A very similar idea called A smart contract takes the idea of putting data in a secure ledger and extends it to
hashcash was independently invented computation. In other words, it is a consensus protocol for the correct execution of
in 1997 by Adam Back, a postdoctoral a publicly specified program. Users can invoke functions in these smart-contract
programs, subject to any restrictions specified by the program, and the function
researcher at the time who was part of code is executed in tandem by the miners. Users can trust the output without
the cypherpunk community. Cypher- having to redo the computation and can write their own programs to act on the
punks were activists who opposed the output of other programs. Smart contracts are especially powerful when combined
with a cryptocurrency platform, because the programs in question can handle
power of governments and centralized moneyown it, transfer it, destroy it, and, in some cases, even print it.
institutions, and sought to create social Bitcoin implements a restrictive programming language for smart contracts.
and political change through cryptog- A standard transaction (that is, one that moves currency from one address to
raphy. Back was practically oriented: he another) is specified as a short script in this language. Ethereum offers a more
permissive and powerful language.
released hashcash first as software,2 The idea of smart contracts was proposed by Nick Szabo in 199442 and so
and five years later in 2002 released an named because he saw them as analogs of legal contracts, but with automated
Internet draft (a standardization docu- enforcement. (This view has been critiqued by Levy31 and Felten.16) Presciently,
ment) and a paper.4 Szabo presented smart contracts as extensions of digital-cash protocols and
recognized that Byzantine agreement and digital signatures (among others) could
Hashcash is much simpler than be used as building blocks. The success of cryptocurrencies has made smart
Dwork and Naors idea: it has no trap- contracts practical, and research on the topic has bloomed as well. For example,
door and no central authority, and it programming languages researchers have adapted their methods and tools to
automatically discover bugs in smart contracts and to write verifiably correct ones.
uses only hash functions instead of
digital signatures. It is based on a sim-
ple principle: a hash function behaves
as a random function for some practi-
cal purposes, which means the only
way to find an input that hashes to a Permissioned
particular output is to try various in-
puts until one produces the desired Blockchains
output. Further, the only way to find While this article has emphasized that private or permissioned blockchains
an input that hashes into an arbitrary omit most of bitcoins innovations, this is not meant to diminish the interesting
set of outputs is again to try hashing work happening in this space. A permissioned blockchain places restrictions
on who can join the network, write transactions, or mine blocks. In particular, if
different inputs one by one. So, if I miners are restricted to a list of trustworthy participants, the proof of work can be
challenged you to find an input whose dropped in favor of a more traditional BFT approach. Thus, much of the research
(binary) hash value begins with 10 ze- is a rebirth of BFT that asks questions such as: Can we use hash trees to simplify
consensus algorithms? What if the network can fail only in certain ways?
ros, you would have to try numerous Further, there are important considerations around identity and public-
inputs, and you would find that each key infrastructure, access control, and confidentiality of the data stored on the
output had a 1/210 chance of begin- blockchain. These issues largely do not arise in public blockchain settings, nor are
ning with 10 zeros, which means that they studied in the traditional BFT literature.
Finally, there is also the engineering work of scaling blockchains for high
you would have to try on the order of throughput and adapting them to various applications such as supply-chain
210 inputs, or approximately 1,000 management and financial technology.
hash computations.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 41


practice

As the name suggests, in hashcash More coherent approaches to chews puzzle solutions themselves
Back viewed proof of work as a form of treating puzzle solutions as cash are having value. In fact, puzzle solutions
cash. On his webpage he positioned it found in two essays that preceded bit- are twice decoupled from economic
as an alternative to David Chaums coin, describing ideas called b-mon- value: the amount of work required to
DigiCash, which was a system that is- ey13 and bit gold43 respectively. These produce a block is a floating parame-
sued untraceable digital cash from a proposals offer timestamping servic- ter (proportional to the global mining
bank to a user.3 He even made compro- es that sign off on the creation power), and further, the number of
mises to the technical design to make (through proof of work) of money, and bitcoins issued per block is not fixed
it appear more cashlike. Later, Back once money is created, they sign off either. The block reward (which is
made comments suggesting that bit- on transfers. If disagreement about how new bitcoins are minted) is set
coin was a straightforward extension of the ledger occurs among the servers or to halve every four years (in 2017,
hashcash. Hashcash is simply not nodes, however, there isnt a clear way the reward is 12.5 bitcoins/block,
cash, however, because it has no pro- to resolve it. Letting the majority de- down from 50 bitcoins/block). Bit-
tection against double spending. cide seems to be implicit in both au- coin incorporates an additional re-
Hashcash tokens cannot be exchanged thors writings, but because of the ward schemenamely, senders of
among peers. Sybil problem, these mechanisms are transactions paying miners for the
Meanwhile, in the academic scene, not very secure, unless there is a gate- service of including the transaction
researchers found many applications keeper who controls entry into the in their blocks. It is expected the mar-
for proof of work besides spam, such network or Sybil resistance is itself ket will determine transaction fees and
as preventing denial-of-service at- achieved with proof of work. miners rewards.
tacks,25 ensuring the integrity of Web Nakamotos genius, then, was not
analytics,17 and rate-limiting pass- Putting It All Together any of the individual components of
word guessing online.38 Incidentally, Understanding all these predecessors bitcoin, but rather the intricate way in
the term proof of work was coined only that contain pieces of bitcoins design which they fit together to breathe life
in 1999 in a paper by Markus Jako- leads to an appreciation of the true ge- into the system. The timestamping
bsson and Ari Juels, which also in- nius of Nakamotos innovation. In bit- and Byzantine agreement researchers
cludes a nice survey of the work up un- coin, for the first time, puzzle solutions didnt hit upon the idea of incentiviz-
til that point.24 It is worth noting that dont constitute cash by themselves. ing nodes to be honest, nor, until
these researchers seem to have been Instead, they are merely used to secure 2005, of using proof of work to do
unaware of hashcash but indepen- the ledger. Solving proof of work is per- away with identities. Conversely, the
dently started to converge on hash- formed by specialized entities called authors of hashcash, b-money, and
based proof of work, which was intro- miners (although Nakamoto underes- bit gold did not incorporate the idea
duced in papers by Eran Gabber et al.18 timated just how specialized mining of a consensus algorithm to prevent
and by Juels and Brainard.25 (Many of would become). double spending. In bitcoin, a secure
the terms used throughout this para- Miners are constantly in a race with ledger is necessary to prevent double
graph did not become standard termi- each other to find the next puzzle solu- spending and thus ensure that the
nology until long after the papers in tion; each miner solves a slightly differ- currency has value. A valuable curren-
question were published.) ent variant of the puzzle so that the cy is necessary to reward miners. In
Proof of work and digital cash: A chance of success is proportional to turn, strength of mining power is nec-
catch22. You may know that proof of the fraction of global mining power essary to secure the ledger. Without it,
work did not succeed in its original ap- that the miner controls. A miner who an adversary could amass more than
plication as an anti-spam measure. solves a puzzle gets to contribute the 50% of the global mining power and
One possible reason is the dramatic next batch, or block, of transactions to thereby be able to generate blocks
difference in the puzzle-solving speed the ledger, which is based on linked faster than the rest of the network,
of different devices. That means spam- timestamping. In exchange for the ser- double-spend transactions, and effec-
mers will be able to make a small in- vice of maintaining the ledger, a miner tively rewrite history, overrunning the
vestment in custom hardware to in- who contributes a block is rewarded system. Thus, bitcoin is bootstrapped,
crease their spam rate by orders of with newly minted units of the curren- with a circular dependence among
magnitude. In economics, the natural cy. With high likelihood, if a miner con- these three components. Nakamotos
response to an asymmetry in the cost of tributes an invalid transaction or challenge was not just the design, but
production is tradethat is, a market block, it will be rejected by the majority also convincing the initial communi-
for proof-of-work solutions. But this of other miners who contribute the fol- ty of users and miners to take a leap
presents a catch-22, because that lowing blocks, and this will also invali- together into the unknownback
would require a working digital cur- date the block reward for the bad block. when a pizza cost 10,000 bitcoins and
rency. Indeed, the lack of such a cur- In this way, because of the monetary the networks mining power was less
rency is a major part of the motivation incentives, miners ensure each others than a trillionth of what it is today.
for proof of work in the first place. One compliance with the protocol. Public keys as identities. This arti-
crude solution to this problem is to de- Bitcoin neatly avoids the double- cle began with the understanding that
clare puzzle solutions to be cash, as spending problem plaguing proof-of- a secure ledger makes creating digital
hashcash tries to do. work-as-cash schemes because it es- currency straightforward. Lets revisit

42 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


practice

this claim. When Alice wishes to pay way, and thus achieves pseudonymity
Bob, she broadcasts the transaction to (that is, public keys as identities) for
all bitcoin nodes. A transaction is sim- free. Chaum took these ideas much
ply a string: a statement encoding Al- further in a 1985 paper,11 where he
ices wish to pay Bob some value,
signed by her. The eventual inclusion The term presents a vision of privacy-preserving
e-commerce based on pervasive
of this signed statement into the led-
ger by miners is what makes the trans-
blockchain has no pseudonyms, as well as blind signa-
tures, the key technical idea behind
action real. Note that this doesnt re- standard technical his digital cash.
quire Bobs participation in any way.
But lets focus on whats not in the
definition but is a The public-keys-as-identities idea is
also seen in b-money and bit gold, the
transaction: conspicuously absent are loose umbrella term two precursor essays to bitcoin dis-
Alice and Bobs identities; instead, the
transaction contains only their re-
used by various cussed earlier. However, much of the
work that built on Chaums founda-
spective public keys. This is an impor- parties to refer tion, as well as Chaums own later
tant concept in bitcoin: public keys
are the only kinds of identities in the to systems that work on ecash, moved away from this
idea. The cypherpunks were keenly in-
system. Transactions transfer value bear varying levels terested in privacy-preserving commu-
from and to public keys, which are
called addresses. of resemblance nication and commerce, and they em-
braced pseudonyms, which they
In order to speak for an identity,
you must know the corresponding se-
to bitcoin and called nyms. But to them, nyms were
not mere cryptographic identities
cret key. You can create a new identity its ledger. (that is, public keys), but rather, usu-
at any time by generating a new key ally email addresses that were linked
pair, with no central authority or reg- to public keys. Similarly, Ian Gold-
istry. You do not need to obtain a user bergs dissertation, which became
name or inform others that you have the basis of much future work on
picked a particular name. This is the anonymous communication, recog-
notion of decentralized identity man- nizes Chaums idea but suggests
agement. Bitcoin does not specify how that nyms should be human-memo-
Alice tells Bob what her pseudonym rable nicknames with certificates to
isthat is external to the system. bind them.20 Thus Bitcoin proved to
Although radically different from be the most successful instantiation
most other payment systems today, of Chaums idea.
these ideas are quite old, dating back
to David Chaum, the father of digital The Blockchain
cash. In fact, Chaum also made semi- So far, this article has not addressed
nal contributions to anonymity net- the blockchain, which, if you believe
works, and it is in this context that he the hype, is bitcoins main invention.
invented this idea. In his 1981 paper, It might come as a surprise to you that
Untraceable Electronic Mail, Return Nakamoto doesnt mention that term
Addresses, and Digital Pseudonyms,9 at all. In fact, the term blockchain has
he states: A digital pseudonym is a no standard technical definition but
public key used to verify signatures is a loose umbrella term used by vari-
made by the anonymous holder of the ous parties to refer to systems that bear
corresponding private key. varying levels of resemblance to bit-
Now, having message recipients be coin and its ledger.
known only by a public key presents an Discussing example applications
obvious problem: there is no way to that benefit from a blockchain will
route the message to the right comput- help clarify the different uses of the
er. This leads to a massive inefficien- term. First, consider a database back-
cy in Chaums proposal, which can be end for transactions among a consor-
traded off against the level of ano- tium of banks, where transactions are
nymity but not eliminated. Bitcoin netted at the end of each day and ac-
is similarly exceedingly inefficient counts are settled by the central bank.
compared with centralized payment Such a system has a small number of
systems: the ledger containing every well-identified parties, so Nakamoto
transaction is maintained by every consensus would be overkill. An on-
node in the system. Bitcoin incurs this blockchain currency is not needed ei-
inefficiency for security reasons any- ther, as the accounts are denominated

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 43


practice

in traditional currency. Linked time- tionary technology. Instead, the buzz


stamping, on the other hand, would around blockchains has helped
clearly be useful, at least to ensure a banks initiate collective action to de-
consistent global ordering of transac- ploy shared-ledger technology, like
tions in the face of network latency.
State replication would also be useful: Blockchains the parable of stone soup. Bitcoin
has also served as a highly visible
a bank would know that its local copy
of the data is identical to what the cen-
are frequently proof of concept that the decentral-
ized ledger works, and the Bitcoin
tral bank will use to settle its account. presented as Core project has provided a conve-
This frees banks from the expensive
reconciliation process they must cur-
more secure nient code base that can be adapted
as necessary.
rently perform. than traditional Second, blockchains are frequent-
Second, consider an asset-manage-
ment application such as a registry of
registriesa ly presented as more secure than tra-
ditional registriesa misleading
documents that tracks ownership of misleading claim. claim. To see why, the overall stability
financial securities, or real estate, or of the system or platform must be
any other asset. Using a blockchain separated from endpoint security
would increase interoperability and that is, the security of users and de-
decrease barriers to entry. We want a vices. True, the systemic risk of block-
secure, global registry of documents, chains may be lower than that of
and ideally one that allows public many centralized institutions, but the
participation. This is essentially endpoint-security risk of blockchains
what the timestamping services of is far worse than the corresponding
the 1990s and 2000s sought to pro- risk of traditional institutions. Block-
vide. Public blockchains offer a par- chain transactions are near-instant,
ticularly effective way to achieve this irreversible, and, in public block-
today (the data itself may be stored chains, anonymous by design. With a
off-chain, with only the metadata blockchain-based stock registry, if a
stored on-chain). Other applications user (or broker or agent) loses control
also benefit from a timestamping or of his or her private keyswhich
public bulletin board abstraction, takes nothing more than losing a
most notably electronic voting. phone or getting malware on a com-
Lets build on the asset-manage- puterthe user loses his or her as-
ment example. Suppose you want to sets. The extraordinary history of bit-
execute trades of assets via the block- coin hacks, thefts, and scams does
chain, and not merely record them not inspire much confidenceac-
there. This is possible if the asset is is- cording to one estimate, at least 6% of
sued digitally on the blockchain itself, bitcoins in circulation have been sto-
and if the blockchain supports smart len at least once.39
contracts. In this instance, smart con-
tracts solve the fair exchange prob- Concluding Lessons
lem of ensuring that payment is made The history described here offers rich
if and only if the asset is transferred. (and complementary) lessons for prac-
More generally, smart contracts can titioners and academics. Practitioners
encode complex business logic, pro- should be skeptical of claims of revo-
vided that all necessary input data (as- lutionary technology. As shown here,
sets, their prices, and so on) are repre- most of the ideas in bitcoin that have
sented on the blockchain. generated excitement in the enter-
This mapping of blockchain prop- prise, such as distributed ledgers and
erties to applications allows us not Byzantine agreement, actually date
only to appreciate their potential, but back 20 years or more. Recognize that
also to inject a much-needed dose of your problem may not require any
skepticism. First, many proposed ap- breakthroughsthere may be long-
plications of blockchains, especially forgotten solutions in research papers.
in banking, dont use Nakamoto con- Academia seems to have the oppo-
sensus. Rather, they use the ledger site problem, at least in this instance: a
data structure and Byzantine agree- resistance to radical, extrinsic ideas.
ment, which, as shown, date to the The bitcoin white paper, despite the
1990s. This belies the claim that pedigree of many of its ideas, was
blockchains are a new and revolu- more novel than most academic re-

44 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


practice

search. Moreover, Nakamoto did not Grigg, Joseph Bonneau, Malte Mser, http://www.isoc.org/isoc/conferences/ndss/98/just.
pdf.
care for academic peer review and did Mike Just, Neha Narula, Steven Gold- 27. Lamport, L., et al. The Byzantine Generals Problem.
not fully connect it to its history. As a feder, and Stuart Haber for their valu- ACM Trans. Programming Languages and Systems
4, 3 (1982), 382401; https://dl.acm.org/citation.
result, academics essentially ignored able feedback. cfm?id=357176 .
bitcoin for several years. Many aca- 28. Lamport, L. The part-time parliament. Digital
Equipment Corp., 1989; https://computerarchive.org/
demic communities informally ar- References files/mirror/www.bitsavers.org/pdf/dec/tech_reports/
1. Aspnes, J., et al. Exposing computationally challenged SRC-RR-49.pdf.
gued that Bitcoin could not work, Byzantine imposters. Yale University Department 29. Lamport, L. Paxos made simple, 2001; http://lamport.
based on theoretical models or experi- of Computer Science, 2005; http://cs.yale.edu/ azurewebsites.net/pubs/paxos-simple.pdf.
publications/techreports/tr1332.pdf. 30. Laurie, B. Certificate transparency. acmqueue 12, 1
ences with past systems, despite the 2. Back, A. A partial hash collision based postage (2014); https://queue.acm.org/detail.cfm?id=2668154.
fact it was working in practice. scheme, 1997; http://www.hashcash.org/papers/ 31. Levy, K.E.C. Book-smart, not street-smart: blockchain-
announce.txt. based smart contracts and the social workings of law.
We have seen repeatedly that ideas 3. Back, A. Hash cash, 2001; https://web.archive.org/ Engaging Science, Technology, and Society 3 (2017),
in the research literature can be grad- web/20010614013848/http://cypherspace.org/ 115; http://estsjournal.org/article/view/107.
hashcash/. 32. Melara, M., et al. CONIKS: Bringing key transparency
ually forgotten or lie unappreciated, 4. Back, A. Hashcasha denial of service counter to end users. In Proceedings of the 24th Usenix
measure, 2002; http://www.hashcash.org/papers/
especially if they are ahead of their hashcash.pdf.
Security Symposium, 2015; https://www.usenix.org/
system/files/conference/usenixsecurity15/sec15-
time, even in popular areas of re- 5. Bayer, D., Haber, S. and Stornetta, W.S. Improving the paper-melara.pdf.
efficiency and reliability of digital time-stamping. In
search. Both practitioners and aca- Proceedings of Sequences (1991); https://link.springer.
33. Merkle, R.C. Protocols for public key cryptosystems.
In Proceedings of the IEEE Symposium on Security
demics would do well to revisit old com/chapter/10.1007/978-1-4613-9323-8_24. and Privacy, 1980; http://www.merkle.com/papers/
6. Benaloh, J., de Mare, M. Efficient broadcast
ideas to glean insights for present sys- timestamping, 1991; http://citeseerx.ist.psu.edu/
Protocols.pdf.
34. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash
tems. Bitcoin was unusual and suc- viewdoc/summary?doi=10.1.1.38.9199. system, 2008; https://bitcoin.org/bitcoin.pdf.
7. Boyle, T.F. GLT and GLR: Component architecture for
cessful not because it was on the cut- general ledgers, 1997;https://linas.org/mirrors/www.
35. Nakamoto, S. Re: Bitcoin P2P e-cash paper, 2008;
http://satoshi.nakamotoinstitute.org/emails/
ting edge of research on any of its gldialtone.com/2001.07.14/GLT-GLR.htm. cryptography/11/.
8. Castro, M. and Liskov, B. Practical Byzantine fault 36. Narayanan, A., et al. Bitcoin and Cryptocurrency
components, but because it combined tolerance. In Proceedings of the Third Symposium Technologies: A Comprehensive Introduction.
old ideas from many previously unre- on Operating Systems Design and Implementation Princeton University Press, 2016; http://bitcoinbook.
(1999); http://pmg.csail.mit.edu/papers/osdi99.pdf. cs.princeton.edu/.
lated fields. This is not easy to do, as it 9. Chaum, D. Untraceable electronic mail, return 37. Pass, R., et al. Analysis of the blockchain protocol
requires bridging disparate terminol- addresses, and digital pseudonyms. Commun. ACM in asynchronous networks. In Proceedings
24, 2 (Feb. 1981), 8490; https://dl.acm.org/citation. of the 2017 International Conference on the
ogy, assumptions, and so on, but it is a cfm?id=358563. Theory and Applications of Cryptographic
valuable blueprint for innovation. 10. Chaum, D. Blind signatures for untraceable payments. Techniques; https://link.springer.com/
Advances in Cryptology, 1983, 199-203. chapter/10.1007/978-3-319-56614-6_22.
Practitioners would benefit from 11. Chaum, D. Security without identification: transaction 38. Pinkas, B. and Sander, T. Securing passwords against
systems to make Big Brother obsolete. Commun ACM
being able to identify overhyped tech- 28, 10 (Oct. 1985), 10301044; https://dl.acm.org/
dictionary attacks. In Proceedings of the Ninth ACM
Conference on Computer and Communications
nology. Some indicators of hype: diffi- citation.cfm?id=4373. Security, 2002, 161170; https://dl.acm.org/citation.
12. Chaum, D., et al. Untraceable electronic cash.
culty identifying the technical innova- Advances in Cryptology, 1988, 319327; https://
cfm?id=586133.
39. Reuters. Mind your wallet: Why the underworld loves
tion; difficulty pinning down the dl.acm.org/citation.cfm?id=88969. bitcoin, 2014; http://www.cnbc.com/2014/03/14/mind-
13. Dai, W. 1998; http://www.weidai.com/bmoney.txt.
meaning of supposedly technical 14. Douceur, J.R. The Sybil attack, 2002; https://dl.acm.
your-wallet-why-the-underworld-loves-bitcoin.html.
40. Rivest, R.L. and Shamir, A. PayWord and MicroMint:
terms, because of companies eager to org/citation.cfm?id=687813. Two simple micropayment schemes. In Proceedings
15. Dwork, C. and Naor, M. Pricing via processing or
attach their own products to the combatting junk mail, 1992; https://dl.acm.org/
of the 1996 International Workshop on Security
Protocols.
bandwagon; difficulty identifying the citation.cfm?id=705669. 41. Sirer, E.G. Bitcoin guarantees strong, not eventual,
16. Felten, E. Smart contracts: neither smart nor consistency. Hacking, Distributed, 2016; http://
problem that is being solved; and fi- contracts? Freedom to tinker, 2017; https://freedom- hackingdistributed.com/2016/03/01/bitcoin-
nally, claims of technology solving so- to-tinker.com/2017/02/20/smart-contracts-neither- guarantees-strong-not-eventual-consistency/.
smart-not-contracts/. 42. Szabo, N. Smart contracts, 1994; http://www.fon.hum.
cial problems or creating economic/ 17. Franklin, M.K. and Malkhi, D. Auditable metering and uva.nl/rob/Courses/InformationInSpeech/CDROM/
political upheaval. lightweight security, 1997; http://www.hashcash.org/ Literature/LOTwinterschool2006/szabo.best.vwh.net/
papers/auditable-metering.pdf. smart.contracts.html.
In contrast, academia has difficul- 18. Gabber, E., et al. Curbing junk e-mail via secure 43. Szabo, N. Bit gold. Unenumerated, 2008; https://
ty selling its inventions. For example, classiffication, 1998; http://www.hashcash.org/papers/ unenumerated.blogspot.com/2005/12/bit-gold.html.
secure-classification.pdf. 44. Vishnumurthy, S., Chandrakumar, S. and Sirer, E.G.
its unfortunate that the original 19. Garay, J A., et al. The bitcoin backbone protocol: Karma: A secure economuc framework for P2P
analysis and applications. Advances in Cryptology,
proof-of-work researchers get no 2015, 281310; https://eprint.iacr.org/2014/765.pdf.
resource sharing. In Proceedings of the Workshop on
the Economics of Peer-to-Peer Systems (Berkeley, CA,
credit for bitcoin, possibly because 20. Goldberg, I. A pseudonymous communications June 2003).
infrastructure for the Internet. Ph.D. dissertation.
the work was not well known outside University of California Berkeley, 2000; http://moria.
45. Wattenhofer, R. The Science of the Blockchain.
Inverted Forest Publishing, 2016.
academic circles. Activities such as freehaven.net/anonbib/cache/ian-thesis.pdf.
21. Grigg, I. Triple entry accounting, 2005; http://iang.org/
releasing code and working with papers/triple_entry.html.
Arvind Narayanan is an assistant professor of computer
practitioners are not adequately re- 22. Haber, S. and Stornetta, W.S. How to
science at Princeton University. He leads the Princeton
timestamp a digital document. J. Cryptology
warded in academia. In fact, the orig- 3, 2 (1991), 99111; https://link.springer.com/
Web Transparency and Accountability Project to uncover
how companies collect and use our personal information.
inal branch of the academic proof-of- chapter/10.1007/3-540-38424-3_32.
Twitter @random_walker.
23. Haber, S. and Stornetta, W.S. Secure names for bit-
work literature continues today strings. In Proceedings of the 4th ACM Conference on Jeremy Clark is an assistant professor at the Concordia
without acknowledging the existence Computer and Communications Security, 1997, 2835; Institute for Information Systems Engineering.
http://dl.acm.org/citation.cfm?id=266430. He has also worked with several municipalities on voting
of bitcoin! Engaging with the real 24. Jakobsson, M. and Juels, A. Proofs of work and bread technology and testified to the Canadian Senate on bitcoin.
world not only helps get credit, but pudding protocols, 1999; http://www.hashcash.org/ Twitter @PulpSpy.
papers/bread-pudding.pdf.
will also reduce reinvention and is a 25. Juels, A. and Brainard, J. Client puzzles: a
source of fresh ideas. cryptographic countermeasure against connection
completion attacks. In Proceedings of Networks and
Acknowledgments. Thanks to Adam Distributed Security Systems, 1999, 151165; https://
www.isoc.org/isoc/conferences/ndss/99/proceedings/
Back, Andrew Miller, Edward Felten, papers/juels.pdf.
Harry Kalodner, Ian Goldberg, Ian 26. Just, M. Some timestamping protocol failures, 1998; Copyright held by owners/authors.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 45


practice
DOI:10.1145/ 3132269
JSON and XML are used to protect

Article development led by
queue.acm.org
data when it moves across trust bound-
aries. Semi-structured data wraps a
single message or a single item in a
Cardboard surrounds and protects stuff key-value store in a way that allows for
as it crosses boundaries. flexibility and extensibility. Inside an
application, relational data is more
BY PAT HELLAND tightly controlled and well formed.
Evolving your relational data inside the

XML and JSON


trust and management boundary of an
app is tractable.
SQL and relational data are easier
and better for processing data within

Are Like
a trust boundary. XML and JSON are
more flexible and dynamic as they cap-
ture the information and its metadata.
This makes it easy and flexible to squirt

Cardboard
data across trust boundaries.
Self-defining and self-identifying.
Cardboard is usually self-describing.
Your new TV has printing on the out-
side of the box telling you whats inside
the box. As you move your old TV to
your new home, you write TV on the
outside of the moving box.
JSON and XML are usually self-
describing. This can be done by refer-
encing a schema or by examining the
attributes expressed within the docu-
IN TODAYS WORLD, cardboard is an ever-important ment/file itself.
Generic vs. custom. The last time we
part of life. Given the major investment of resources moved to a new home, I bought a bunch
and money, you might question whether its worth it. It of boxes of varying sizes, tape, wrap-
ping paper, and padding, and a bunch
turns out the efficiencies and savings from cardboard of marking pens. Like most other folks
outstrip the costs to manufacture and later recycle it. in the throes of packing and moving, we
Semi-structured representations of data are not worked hard to describe the contents
of every box we filled, but we occasion-
the cheapest format. There is typically a lot of extra ally messed up and omitted some items
stuff like angle brackets contained in it. JSON, XML, from the list as everything went into a
box. Most things fit well into one of the
and other semi-structured representations allow for standard boxes, although some of our
wonderful flexibility and dynamic interpretation. The household items involved really cre-
efficiencies and savings gained from flexibility more ative uses of cardboard, tape, and pad-
ding as we worked to protect our stuff.
than make up for the overhead. Manufactured items frequently have
Cardboard surrounds and protects stuff as it custom-made cardboard protection.
My wife loves the vacuum cleaners from
moves across boundaries. No one uses cardboard one particular manufacturer. Indeed,
to move parts around within a factory. Instead, they the shape, form, and workings of the
use custom-designed containers that are specially vacuums can be fun and surprising. To
me, half the fun is disassembling the
purposed for the parts being produced. Cardboard is cardboard protection used inside the
used to protect the stuff as it leaves the factory. cardboard box. There are dozens of spe-

46 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


cial pieces of cardboard wedged into Crossing boundaries. In general, Large e-commerce sites ship tens of
every nook and cranny of the vacuum. semi-structured data is used to cross thousands of different things of dif-
Man, that vacuum is well protected! I boundaries in your computing en- ferent sizes. Still, they find it more ef-
suspect they have a factory just to cre- vironment. Documents containing ficient to use a relatively small number
ate the specialized pieces of cardboard. human-readable stuff are kept on web- of box sizes. Consequently, its com-
I also suspect the savings from avoiding sites. REST calls are made across ser- mon to open the box and find a tiny
damage are well worth it. vices that may or may not reside within thing and a whole bunch of padding.
XML grew out of the document the same company. Similarly, you shouldnt be too
markup world. It descended from The loose coupling of semi-struc- worried about the bulkiness of your
SGML (Standard Generalized Markup tured data allows the sending and re- files and documents. The embedded
Language), which was originally in- ceiving services to evolve separately metadata can take a lot of space. Lord
tended to separate the text of a docu- with much lower friction. Changing knows, an XML file has a lot of an-
ment from its formatting. XML is very tightly coupled stuff requires coordina- gle brackets! Still, the value accrued
strongly oriented around letting you tion that is just plain difficult. from the features of semi-structured
do your own thing with the format. Crossing boundaries with key-val- data is worth it. As long as the world
Yet, on top of the flexible do your own ue stores. Frequently, semi-structured doesnt run out of angle brackets, it
thing approach, there are mechanisms data in documents or files is stored in will be all right.
to impose rigor and constraints on XML a file system or a key-value store. It is Gotta take care of your stuff! In card-
documents. XML Schema came into be- valuable to have readers and writers board, the safety and care for stuff is
ing in the early 2000s as a means of en- of these docs/files decoupled in their the important reason for its existence.
suring consistency for a set of messages. metadata. To have the shape and form Similarly, in XML and JSON the safety
A document is validated if it conforms to of the data described in the contents of and care of the data, both in transit
an XML schema definition. In this way, the docs and files makes it possible to and in storage, are why we bother.
some usages of XML are constrained to evolve the various users with less fric- Now, if only we could figure out effi-
fit a particular shape and form. tion than you would see if the metadata cient recycling for used angle brackets,
One of the wonderful things about were strict and rigid. This is why we see we would be good to go
XML and JSON is their flexibility. In the success of semi-structured repre-
some applications, they support a sentations for stored stuff.
Related articles
tightly prescribed schema much like Its not the size that counts. It turns on queue.acm.org
the cardboard protecting the vacuum out the weight and size of the cardboard
cleaner. In other applications, they al- The Power of Babble
are not that big of a deal. You have surely
Pat Helland
low you to toss in all your family goods, had the experience of receiving some http://queue.acm.org/detail.cfm?id=3003188
including the kitchen sink. Sometimes, small item such as a computer chip pack-
Rules for Mobile Performance Optimization
there is a tightly prescribed schema of aged in a box that weighs a lot more than Tammy Everts
required data while the sender can toss the stuff being protected. It makes eco- http://queue.acm.org/detail.cfm?id=2510122
in extensions to its hearts content. nomic sense to protect the tiny thing well.
Schema.org: Evolution
of Structured Data on the Web
R.V. Guha, Dan Brickley, and Steve Macbeth
http://queue.acm.org/detail.cfm?id=2857276
IMAGES F ROM SH UTT ERSTOCK. CO M

Pat Helland has been implementing transaction systems,


databases, application platforms, distributed systems,
fault-tolerant systems, and messaging systems since
1978. He currently works at Salesforce.

Copyright held by author/owner.


Publications rights licensed to ACM. $15.00.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 47


practice
DOI:10.1145/ 3132257
Science is often por-

Article development led by
queue.acm.org
trayed as a world of cold
logic and hard facts, but
as human beings we have
Expert-curated guides to great difficulty keeping
the best of CS research. emotion and prejudice
out of the picturewhether the issue
BY JOHN REGEHR at hand is inconsequential (Is Pluto a
planet?) or threatening to our exis-

Research
tence (Can we stop global warm-
ing?). Historically, as Galileos en-
counters with the Roman Inquisition
showed, unorthodoxy could have very

for Practice:
serious consequences. Recent scien-
tific debates have tended to be calmer,
but being on the wrong side of an issue
can still have career-altering conse-

Vigorous
quences (http://bit.ly/2xzYddN). Com-
puter science, perhaps because it is
young and well funded, seems to have
been relatively free of real schisms, but

Public Debates
it still inspires energetic debates.
Computer science does not have a
culture of retraction, and in any case

in Academic
many of these debates are not about
the kinds of mistakes that lead to re-
tractions. The useful debates, the ones

Computer Science
we can learn from, are those where
both sides are publicly available in
writing. These are a valuable instruc-
tional resource, and I sometimes as-
sign them as reading to my students.
They show an important part of sci-
ence that often gets swept under the
rugstudents enjoy seeing that things
are not as cut-and-dried as teachers of-
ten try to make them sound. It is useful
Research for Practice features
T H I S I N S TA L L M E N T O F to try to figure out who is right and who
is wrong. Alternatively, some debates
a special curated selection from John Regehr, who are more about personalities, and still
takes us on a tour of great debates in academic others feature researchers talking past
each other based on their different as-
computer science research. In case you thought sumptions and perspectives.
flame wars were reserved for Usenet mailing lists Considered harmful. An early de-
and Twitter, think again: the academic literature is bate, which feels a bit quaint now, be-
gan when Edsger Dijkstra published
full of dramatic, spectacular, and vigorous debates Go-To Statement Considered Harmful
spanning file systems, operating system kernel (1968), which argued against unstruc-
tured control flow in programming
design, and formal verification. Please enjoy! languages. Follow-ups included Go-
Peter Bailis To Considered Harmful Considered
Harmful and Go-To Considered Harm-
Peter Bailis is an assistant professor of computer science at Stanford University. His research
in the Future Data Systems group (futuredata.stanford.edu) focuses on the design and implementation
ful Considered Harmful Considered
of next-generation data-intensive systems. Harmful (1987).

48 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


http://bit.ly/2wZp83l
http://bit.ly/1SbpgAr
https://dl.acm.org/citation.
cfm?doid=22899.315729
Multiple versions of the facts. One
of my favorite public debates concerns
N-version programming: a software-
development method where several
implementations of a specification
are run in parallel and voting is used
to determine the correct result. If in-
dependent implementations have
independent defects, this method
would lead to a substantial increase
in software reliability. John C. Knight
and Nancy G. Leveson wrote a paper
(1986) showing that the assumption
of independent faults is suspect. This
finding did not sit well with the pro-
ponents of N-version programming,
and while I cannot find online copies
of their rebuttals, Knight and Leve-
sons reply to the criticisms includes
plenty of quotes. This is great reading,
a classic of the genre.
http://sunnyday.mit.edu/papers/
nver-tse.pdf
http://sunnyday.mit.edu/critics.pdf
Can we at least agree that CATOCS
is a great acronym? Starting in the
late 1980s, Ken Birmans group was
advocating causal and totally ordered
multicast: A primitive for building dis-
tributed systems that provides strong
guarantees about internode commu-
nication in distributed systems. David
Cheriton and Dale Skeen were less than
impressed and wrote 15 pages to that
effect (1993). Birman wrote a long re-
sponse to the criticisms. Also see Neha Seltzer et al. published a paper describ- https://www.usenix.org/legacy/
Narulas later take on the debate (2013). ing and evaluating an implementation publications/library/proceedings/
http://www.cs.cornell.edu/cours- of a log-based file system, with a follow- sd93/seltzer.pdf
es/cs614/2003sp/papers/BSS91.pdf up in 1995. John Ousterhout, one of http://www.eecs.harvard.
https://www.cs.rice.edu/~alc/ the authors of the original paper, dis- edu/~margo/papers/usenix95-lfs/sup-
comp520/papers/Cheriton_Skeen.pdf agreed with the evaluation. Seltzer and plement/ouster_critique1.html
http://bit.ly/2hCDXCc her coauthors rebutted his critique, http://www.eecs.harvard.
http://dsrg.pdos.csail.mit. and Ousterhout had, as far as I know, edu/~margo/papers/usenix95-lfs/sup-
edu/2013/06/13/cheriton-and-skeen/ the last word. plement/rebuttal.html
File system performance evaluation http://citeseerx.ist.psu.edu/view- http://www.eecs.harvard.
is difficult. A 1991 paper introduced doc/download?doi=10.1.1.104.1363&a edu/~margo/papers/usenix95-lfs/sup-
IMAGES BY MEJ ORANA

log-based file systems, which increase mp;rep=rep1&type=pdf plement/ouster_critique2.html


the performance of writes to files by https://www.microsoft.com/ You would not get a high grade for
reducing the number of seeks needed en-us/research/wp-content/up- such a design. Another classic debate,
to perform a file update. In 1993 Margo loads/2016/07/usenix-winter95.pdf Torvalds vs. Tanenbaum (1992), was

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 49


practice

about how operating systems should magazines/2010/1/55739-more-de-


be structured: as a monolithic collec- bate-please/fulltext
tion of code running in kernel mode, This guys arrogance takes your
or instead as a group of independent breath away. Dijkstra and John Backus
subsystems isolated by the memory
management unit. Also see some Social Processes had an (only partially public) spat in
the late 1970s.
(one-sided) comments on a reincar-
nation of the debate. Related to this
and Proofs of https://medium.
com/%40acidflask/this-guys-ar-
discussion, in 2005, Steven Hand et Theorems and rogance-takes-your-breath-away-
al. published Are Virtual Machine
Monitors Microkernels Done Right?
Programs is a 5b903624ca5f
SWATT or be SWATTed. The com-
In response, Gernot Heiser et al. wrote provocative opinion puter security research community
a paper with the same title in 2006 but
coming to the opposite conclusion.
piece written in has an especially strong tradition of re-
futing published results. For example,
http://www.oreilly.com/openbook/ 1979 by De Millo SWATT (software-based attestation)
opensources/book/appa.html
https://www.usenix.org/legacy/ et al. about the role offers a protocol for checking that a
remote system has the memory image
event/hotos05/final_papers/full_pa- of formal methods it is supposed to have. A 2009 paper
pers/hand/hand.pdf
http://cgi.di.uoa.gr/%7Emema/ in software called On the Difficulty of Software-
based Attestation of Embedded De-
courses/mde518/papers/heiser.pdf
A very obnoxious paper? So-
development. vices presents concrete attacks on
SWATT. SWATT authors Adrian Perrig
cial Processes and Proofs of Theo- Dijkstra called and Leendert van Doorn did not agree
rems and Programs is a provoca-
tive opinion piece written in 1979
it a very that the attacks were valid, and, finally,
the papers authors, Aurelian Francil-
by Richard De Millo et al. about the obnoxious paper. lon et al., responded to the refutation.
role of formal methods in software http://www.netsec.ethz.ch/publi-
development. Dijkstra called it a cations/papers/swatt.pdf
very obnoxious paper (see p. 14 https://pdfs.semanticscholar.org/
of a transcript of an interview with fc14/909505a02a484811ff70ccb32690
Dijkstra from 2001) and wrote a re- 5f352d0a.pdf
sponse called A Political Pamphlet http://www.netsec.ethz.ch/publica-
from the Middle Ages. De Millo et al. tions/papers/perrig-ccs-refutation.pdf
replied: We must begin by refusing https://pdfs.semanticscholar.org/
to concede that our confidence in a 657a/7b4270581c655763df0f5a1ddb7
piece of real software has ever been in- 9cb7cb946.pdf
creased by a proof of its correctness ... See A matter of integrity. Code-pointer
also Communications Letters to the integrity (CPI) is a technique for avoid-
Editor responding to this article, Vic- ing control-flow hijacking caused by
tor Yodaikens take on the debate, and memory safety errors in C or C++ code.
three more shots fired in 2010two Missing the Point(er) (2015) presents
by Moshe Vardi and one by the origi- attacks against CPI, while Getting the
nal papers authors. Point(er) (2015) argues in favor of the
http://www.yodaiken.com/papers/ security of CPI.
p271-de_millo.pdf http://dslab.epfl.ch/pubs/cpi.pdf
http://conservancy.umn.edu/ https://people.csail.mit.edu/ri-
bitstream/handle/11299/107247/ nard/paper/oakland15.pdf
oh330ewd.pdf http://dslab.epfl.ch/pubs/cpi-get-
http://www.cs.utexas.edu/us- ting-the-pointer.pdf
ers/EWD/transcriptions/EWD06xx/ Acknowledgments. Id like to thank
EWD638.html many blog readers and Twitter users
https://conservancy.umn.edu/ for providing feedback on the origi-
bitstream/handle/11299/107247/ nal blog post from which this article
oh330ewd.pdf was derived.
http://research.microsoft.com/en-
us/um/people/lamport/pubs/letter-to- John Regehr is a computer science professor at the
University of Utah. He likes to create software tools for
editor.pdf making software better.
http://www.yodaiken.
com/2008/11/10/dijkstra-versus-perlis/ Copyright held by owner/author.
http://cacm.acm.org/ Publication rights licensed to ACM. $15.00.

50 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


Previous
A.M. Turing Award
Recipients

1966 A.J. Perlis


1967 Maurice Wilkes
1968 R.W. Hamming
1969 Marvin Minsky
1970 J.H. Wilkinson
1971 John McCarthy
1972 E.W. Dijkstra
1973 Charles Bachman
1974 Donald Knuth
1975 Allen Newell
1975 Herbert Simon
1976 Michael Rabin
1976 Dana Scott
1977 John Backus
1978 Robert Floyd
1979 Kenneth Iverson
1980 C.A.R Hoare ACM A.M. TURING AWARD
NOMINATIONS SOLICITED
1981 Edgar Codd
1982 Stephen Cook
1983 Ken Thompson
1983 Dennis Ritchie
1984 Niklaus Wirth Nominations are invited for the 2017 ACM A.M. Turing Award.
1985 Richard Karp
1986 John Hopcroft This is ACMs oldest and most prestigious award and is given
1986 Robert Tarjan to recognize contributions of a technical nature which are of
1987 John Cocke
1988 Ivan Sutherland lasting and major technical importance to the computing field.
1989 William Kahan The award is accompanied by a prize of $1,000,000.
1990 Fernando Corbat
1991 Robin Milner Financial support for the award is provided by Google Inc.
1992 Butler Lampson
1993 Juris Hartmanis
1993 Richard Stearns
Nomination information and the online submission form
1994 Edward Feigenbaum are available on:
1994 Raj Reddy http://amturing.acm.org/call_for_nominations.cfm
1995 Manuel Blum
1996 Amir Pnueli
1997 Douglas Engelbart Additional information on the Turing Laureates
1998 James Gray is available on:
1999 Frederick Brooks http://amturing.acm.org/byyear.cfm
2000 Andrew Yao
2001 Ole-Johan Dahl
2001 Kristen Nygaard The deadline for nominations/endorsements is
2002 Leonard Adleman
2002 Ronald Rivest
January 15, 2018.
2002 Adi Shamir
2003 Alan Kay For additional information on ACMs award program
2004 Vinton Cerf
2004 Robert Kahn please visit: www.acm.org/awards/
2005 Peter Naur
2006 Frances E. Allen
2007 Edmund Clarke
2007 E. Allen Emerson
2007 Joseph Sifakis
2008 Barbara Liskov
2009 Charles P. Thacker
2010 Leslie G. Valiant
2011 Judea Pearl
2012 Shafi Goldwasser
2012 Silvio Micali
2013 Leslie Lamport
2014 Michael Stonebraker
2015 Whitfield Diffie
2015 Martin Hellman
2016 Sir Tim Berners-Lee
turing lecture
DOI:10.1145/ 3104985
the National Institute of Standards and
Cyber deterrence, like nuclear deterrence, Technology (NIST), proposed a Data
Encryption Standard (DES) to protect
depends on our adversaries being rational unclassified but sensitive data. Whit-
enough to be deterred by our threats but us field Diffie, with whom I shared the
not by theirs. Award, and I quickly realized that DESs
56-bit key size was inadequate and
needed to be increased.
BY MARTIN E. HELLMAN
DES had 256, or approximately 1017,
keys. We estimated that the 1975 tech-

Cybersecurity,
nology would allow a single-chip search
engine to check 106 keys per second, so
106 such chips could search the entire
key space in 105 seconds. That is ap-

Nuclear
proximately one day, and we estimated
the equivalent cost to be on the order of
$5,000 per recovered key. We also noted
that the decreasing cost of computa-

Security,
tionroughly a factor of 10 every five
yearswould rapidly reduce this cost.
Even an order-of-magnitude error in
our estimate would thus be erased in a

Alan Turing,
short time.3
We initially thought the inadequate
key size was a mistake that would be
corrected once we pointed it out, but

and
NBS resisted, claiming our estimates
were off by four orders of magnitude.
Our initial estimate had been a rough
order-of-magnitude approximation

Illogical Logic
that was adequate to show the need for
an increased key size. But NBSs esti-
mate was clearly wrong, and we came to
realize we were indirectly battling the
National Security Agency (NSA), in addi-
tion to NBS.
A larger key size would allow foreign
governments, criminals, and terrorists
to hide their communications from
THE 2015 ACM A.M. Turing Award recognized work I did NSA, while 56 bits would not. What we
had thought was a technical problem
40 years ago, so it is understandable that my interests
have changed significantly, with my most recent project key insights
being a book, A New Map for Relationships: Creating While revolutionary, public key
True Love at Home & Peace on the Planet, co-authored cryptography can also be viewed as
a natural step in the evolution
with my wife Dorothie. While, at first glance, the book of the field of cryptography.
IMAGE BY AND RIJ BORYS ASSOCIAT ES

might seem to have nothing in common with my work There is greater risk than is generally
recognized that a major advance in
on cryptography, my Turing Lecture drew a number of factoring and discrete logarithms might
parallels I will bring out in what follows. break existing public key systems.

The story starts in March 1975, when the U.S. In making ethical decisions, we need to
zealously guard against fooling ourselves
National Bureau of Standards (NBS), now known as about our real motivations.

52 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 53
turing lecture

turned out to be political. If we wanted from TDCs to public key.4 TDCs oc-
to improve the security of the standard, curred to us because, in the military,
we would have to treat it as a political you want a highly secure cipher for use
battle by seeking media coverage and by your own troops but do not want it to
Congressional hearingswhich we
did. While Diffie and I be used to keep secrets from you if it is
captured by your adversary. We realized
The fight that followed was part of
the first crypto war. While the media
saw a 56-bit key that a solution was to build trapdoor in-
formation into the cryptosystem that
and several members of Congress sup- as small, would allow the designer to break it
ported Diffies and my position, we lost
this part of it. DES, including its 56-bit
we now know easily if it was used against him, but
without that information his adversary
key, was the official encryption stan- it looked large would be unable to cryptanalyze his en-
dard from 1977 until 2002 when it was
superseded by the Advanced Encryp-
from NSAs crypted messages. While we never de-
veloped a workable TDC, the concept
tion Standard, or AES, which has a min- perspective. figured prominently in a later analysis
imum key size of 128 bits. of DES Diffie and I undertook, with oth-
Diffie and I recommended triple- ers.8 We found structures within DES
DES3 as a simple, albeit more expen- that looked like they might constitute a
sive, way to improve DES security, but trapdoor, although later developments
most implementations used the less- indicate they were probably due to ef-
secure approach. forts to strengthen the algorithm
against differential cryptanalysis.1
Public Key Cryptography and It is also noteworthy that half of the
the DES Controversy public key conceptpublic key ex-
Within a year of DES being proposed in changeoccurred independently to
1975, a developmentthe invention of three different groups within a short
public key cryptography by Diffie and period of time.
me4 and independently by Ralph Merk- According to documents declassi-
le12exacerbated NSAs concerns. fied years later,5 variations occurred
While Diffie and I saw a 56-bit key as in 1970, 1973, and 1974 to researchers
small, we now know it looked large James Ellis, Clifford Cocks, and Mal-
from NSAs perspective. Prior to DES, colm Williamson of the Government
most commercial encryption systems Communications Headquarters (GCHQ),
could be broken much faster than DES, the British agency responsible for
and most data was sent unencrypted, providing signals intelligence and in-
allowing access at no cryptanalytic cost. formation assurance to that nation,
In comparison, even $5,000 per re- though none of their work envisioned
covered key was a huge impediment to digital signatures.
NSAs communications-intelligence Ralph Merkle, then a student at the
operation. But it appears to have rea- University of California at Berkeley, de-
soned that cost would limit the fre- veloped the concept of a public key dis-
quency of key changes so a recovered tribution system in the fall of 1974 and
key would be useful for months, per- published it, along with a proof of con-
haps years. The invention of public key cept (Merkle puzzles), in Communica-
cryptography allowed keys to be tions, April 1978.12
changed as frequently as desired, mak- Unaware of the still-secret GCHQ
ing $5,000 per key a much more daunt- work and Merkles budding ideas, Dif-
ing barrier for an adversary. fie and I proposed a more general
frameworka public key cryptosys-
Evolution of Public Key temin the Spring of 1975. This ap-
Cryptography proach included digital signatures, as
While public key cryptography is seen well as public key exchange, with digital
as revolutionarya characterization I signatures being an entirely new idea,
loveafter the following explanation, even within the classified community.
one might wonder why it took Diffie, In May 1976, Diffie and I developed
Merkle, and me so long to discover. the first practical, unclassified system
Diffie and I had been talking about for public key exchange, publishing
trapdoor cryptosystems (TDCs) for both it and the public key cryptosystem
some time before we devised the public concept in our paper New Directions
key concept, and it is but a small step in Cryptography in IEEE Transactions

54 COM MUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


turing lecture

on Information Theory, November 1976.4 Born Classified? Project, the consequences of fooling
That public key exchange system is wide- NSAs concerns led it to try to control myself would have been far more grave,
ly known as Diffie-Hellman Key Ex- dissemination of our work.2 In January I vowed never to fool myself again, al-
change, but somewhat ironically, it is an 1976, soon after Diffie and I realized the though implementing that decision
implementation of Merkles public key need to treat DESs inadequate key size proved tricky during Stanford Univer-
distribution system concept, not our as a political rather than a technical sitys patent fight with RSA Data Secu-
public key cryptosystem concept. I there- problem, two high-level NSA employ- rity. Space does not allow me to provide
fore refer to it as the Diffie-Hellman- ees flew out to California and tried to the details here, but the interested
Merkle Key Exchange. dissuade us from pursuing the matter. reader can find a description on pages
In light of the frequent interactions They basically told us, Youre wrong, 4654 of our book;7 a free .pdf file is
Diffie and I had, I regard everything in but please be quiet. If you keep talk- also available at http://tinyurl.com/
New Directions as joint work, though ing this way, you will cause grave harm HellmanBook, expanding to http://
some scholars have noted (correctly) to national security. But that did not www-ee.stanford.edu/%7Ehellman/
that Diffie devised the public key cryp- compute. What they were really saying publications/book3.pdf. Those same
tosystem concept, while I discovered was, Youre right, but please be quiet. pages explain why I believe the Man-
the Diffie-Hellman-Merkle Key Ex- If you keep talking this way, you will hattan Project scientists fooled them-
change algorithm. Because those indi- cause grave harm to national security. selves about their motivation for work-
vidual insights were based on long- I went home that evening to decide ing on the bomb.
term joint work, I tend not to separate the right thing to do. NSA was telling The fight Diffie and I were having
credit. me the right thing was to be quiet, while with NSA came to a head on July 7,
A full, working public key cryptosys- my intellect told me the opposite, even 1977, when one of its employees wrote
tem was not realized until April 1977 from a purely national perspective. The to the IEEE, claiming it was breaking
when Ron Rivest, Adi Shamir, and U.S. was the worlds most computer- the law by publishing our papers.14 He
Leonard Adleman published their MIT ized nation, with the most to lose from cited the International Traffic in Arms
report that, in slightly modified form, insecure encryption. The Soviet Union Regulations (ITAR), which, at the time,
became their famous 1978 RSA paper had much less to lose and much more defined anything cryptographic as an
in Communications.17 to gain from leaving the DES key at 56 implement of war, requiring an export
While Merkles 1978 publication bits. Also, NSAs request occurred soon license. An export license was re-
datetwo years after New Direc- after the Watergate revelations had quired not only for physical devices
tionsgives the impression that it fol- shown that claims of national security but also for technical data related to
lowed in our footsteps, he submitted could be misused to the detriment of them. He claimed our papers consti-
his paper earlier than we did, in Au- the nation. tuted such technical data and they
gust 1975. Its publication was delayed As I was trying to decide the right were, of course, exported when pub-
by an editor who initially rejected it, thing to do, an idea popped into my lished internationally.
writing, on October 22, 1975, I was head: Forget about what is right and The IEEE wrote back, telling the
particularly bothered by the fact that wrong. You have a tiger by the tail and NSA employee it was aware of ITAR, but
there are no references to the litera- will never have as much chance to influ- the burden of obtaining any Govern-
ture. Has anyone else ever investigated ence events. Run with it! ment approval for publication of tech-
this approach?6 Somehow, what would normally be nical data [was] on the person or com-
In the editors defense, Merkle was a an unconscious shadow motivation pany seeking publication, namely me
student unfamiliar with how to write had managed to bubble to the surface and Stanford University.14 A copy of this
and adequately reference a technical and become a devil on my shoulder, reply was sent to me, and I took it to
paper; the person who reviewed it (de- like in the movies. At the time, I thought Stanfords General Counsel John
scribed by the editor as an experienced I had brushed the devil off my shoulder Schwartz both because Stanford was
cryptography expert) recommended and made a rational decision to go pub- potentially liable and because I wanted
against publishing it, noting that it . . . lic with our analysis of the standards to ensure it would defend me if I was
is not in the mainstream of present weakness. But five years later, in trying prosecuted.
cryptography thinking, and no one to understand the motivation of the Schwartz took a few days to review
else at Berkeley, where Merkle was Manhattan Project scientists who de- the matter, after which we had a second
then a student, appreciated his work. veloped the atom bomb during World meeting. He believed that publishing
Earlier, in the fall of 1974, a Berkeley War II, I realized I had fooled myself. my papers was lawful but noted there
professor discouraged him from pur- Instead of doing what was right, I had was at least one contrary view (ex-
suing public key distribution as a figured out what I wanted to do, and pressed by the NSA employee) and
term project, telling him, Project 2 [a then had come up with the rationaliza- should such view be adopted by the
much more mundane proposal] looks tion for doing it. Federal Government you could be sub-
more reasonable, maybe because your I was fortunate that my decision to jected to prosecution. He went on to
description of Project 1 is muddled go public was the right one, even assure me that, should that occur, the
terribly. Merkle dropped the course though I had fooled myself about my University would defray the reasonable
and pursued public key distribution motivation. But that was sheer luck. If I costs of your defense . . . nevertheless,
on his own. had been working on the Manhattan there would always remain a risk to you

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 55


turing lecture

personally of fine or imprisonment if ence, but NSA was able to keep DESs into friendship as we came to appreci-
the government prevailed in such a key size at 56 bits. ate one anothers concerns.
case.19 Commercial encryption did not be- The real break came in the mid-
Schwartz also advised me to change come truly secure until some parties 1990s when Congress requested the
my plans for having two students, on both sides of the battle learned a National Research Council undertake
Ralph Merkle and Stephen Pohlig, de- lesson my wife and I later emphasized a study of national cryptographic poli-
liver joint papers at the upcoming 1977 in our book7the need to get curious, cy. The study committee represented
IEEE Symposium on Information The- not furious. Since the emphasis here is all major stakeholders, including law
ory. He explained that a long court case cybersecurity, I refer those interested enforcement, national security, in-
might kill the career of a newly minted in more personal details to the books dustry, health care, and privacy. By
Ph.D., whereas I had tenure. I relayed Chapter 3, also called Get Curious, talking to one anotherand, more
this to Merkle and Pohlig, telling them I Not Furious. That same shift started a important, listening to one another
had no qualms about delivering the pa- process that led to the strong encryp- we were able to reach unanimous con-
pers but would leave the decision to tion available on todays commercial clusions that encouraged a significant
them. Both said they would deliver the products. It started in 1978 when I re- loosening of the export restrictions on
papers anyway but later changed their ceived a call from NSA saying its Direc- encryption products. This further ex-
minds to assuage fears expressed by tor, Admiral Bobby Inman, would like ample of getting curious instead of fu-
their parents. to visit me and asking if I was open to rious laid the foundation for wide-
Wanting these students to get the the idea. spread availability of strong
credit they deserved, when it was time Up to that point, we had fought encryption in commercial products,
for each paper to be delivered, I had the these battles indirectly, with no direct with export restrictions being signifi-
student co-author stand next to me at interchange, so I jumped at the oppor- cantly relaxed soon thereafter.
the podium. I then told the audience tunity. When Admiral Inman came to The value of adversaries talking and
that, on the advice of Stanfords coun- my office, he told me he was meeting listening can also be seen in a 2014 in-
sel, I would be delivering the papers, with me against the advice of all the terview with Admiral Inman conducted
but to give the student the credit he de- other senior people at the Agency but by Stanford cryptography student Hen-
served, they should consider the words saw no harm in talking. He was curi- ry Corrigan-Gibbs. When asked if he
coming from my mouth as if they were ous, not furious. He also said it was now would make the same decision he
coming from his. This gave Merkle and nice to see I did not have hornswhich did 40 years ago to try to suppress our
Pohlig even more credit for their work must have been how I was being de- work, Inman replied, Rather than be-
than if they had delivered the talks picted at the Agency. I returned the ing careful to make sure they [were not]
without any threats. compliment, since I had seen myself as going to damage [NSAs intelligence op-
Luke Skywalker to NSAs Darth Vader. I erations] . . . I would have been inter-
Get Curious, Not Furious was in my early 30s at the time, so the ested in how quickly they were going to
This first round of the crypto wars had young-hero model was more appropri- be able to make [encryption widely]
mixed results. We established that in- ate than it would be today, when I am available. He cited the theft of por-
dependent researchers could publish 72 years old. My relationship with In- tions of the F-35 jet fighter design as
papers free of government interfer- man was cautious at first but it grew proof that strong commercial encryp-
tion was in the U.S.s broader national
security interests.2

How Logical Is Cyber-Deterrence?


Nuclear deterrence is viewed so posi-
tively that cyber-deterrence is frequent-
ly suggested as a promising analogous
next step. For example, the current Di-
rector of NSA and U.S. Cyber Command,
Admiral Michael S. Rogers, told a Sen-
ate committee in 2015, We also need
PHOTO C REDIT: CH UCK PA INTER/STA NFO RD NEW S SERVICE

to think about how can we increase our


capacity on the offensive side here, to
get to that point of deterrence.18
But how logical is cyber-deterrence?
The answer depends in part on a relat-
ed question treated in Chapter 8 of our
book7 (pages 243264): How logical is
nuclear deterrence? To summarize,
consider these key points:
We must behave irrationally. For de-
Cryptography pioneers Ralph Merkle, Martin E. Hellman, and Whitfield Diffie, 1977. terrence to work in a standoff between

56 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


turing lecture

the U.S. and another nuclear-armed with appropriate clearances and no


nation, that adversary must be rational evidence surfaced there either. I also
enough to be deterred by our threats, have discussed undertaking such stud-
but we must be irrational enough for ies with high-level personnel within the
its equally dire threats not to deter us.
This need for irrationality on our part . . . nevertheless, U.S. Strategic Command, the succes-
sor to the Strategic Air Command, and
is usually swept under the rug, but a
1995 U.S. Strategic Command report,
there would that, too, did not produce any claims of
studies, nor any real interest in investi-
Essentials of Post-Cold War Deterrence always remain gating the level of risk.
(http://www.nukestrat.com/us/strat-
com/SAGessentials.PDF), was unusu-
a risk to you This dearth of information on one
of the most important questions fac-
ally candid. After noting that instilling personally of fine ing humanity led me to spend much of
fear in our adversaries is the working
force of deterrence, it advised that
or imprisonment the past 10 years working to bring a
risk-informed framework to nuclear
the U.S. may become irrational and vin- if the government deterrence. As part of that effort, I
dictive if its vital interests are threat-
ened should be part of the national prevailed in published a simplified, preliminary
risk analysis9 indicating the level of
persona we project to all adversaries. such a case. risk is unacceptable.
Nuclear deterrence must be carefully To put such risk in perspective, even
defined. The U.S. has not carefully de- if nuclear deterrence could be expected
fined what it means by nuclear deter- to work for 500 years before it failed and
rence. For example, does it mean we destroyed civilizationa time horizon
have nuclear weapons solely for the that sounds optimistic to most peo-
purpose of deterring a nuclear attack pleit would be equivalent to playing
on us or our allies? That is the impres- Russian roulette with the life of a child
sion given by many statements from born today. That is because that childs
the U.S. government. But if that is the expected lifetime is roughly one-sixth
case, why do we use nuclear threats of 500 years. If the time horizon is more
when the stakes are far lower? like 100 years, the childs odds are
Impaired decision making. World worse than 50/50.
leaders have the power to start a nucle- My work applying risk analysis to
ar war even when they cannot legally nuclear deterrence led me to see an im-
drive a car. Documented examples of portant and largely overlooked ques-
persistent problems with alcohol7 (pag- tion in cryptography. There is much
es 250251) include Russian President talk today about the need for post-
Boris Yeltsin, U.S. President Richard quantum crypto, meaning systems
Nixon, and British Prime Minister Tony that would remain secure even if large
Blair. I suspect most leaders with fin- quantum computers20 could be built.
gers on the button are occasionally But there is much less concern about
similarly impaired. possible advances in algorithms that
Risk. No one knows how risky nuclear would render both RSA and the usual
deterrence isa subject discussed in Diffie-Hellman-Merkle Key Exchange
the next sectionthat then relates the insecure. There should be concern, as
problem to a critical issue in encryption. we will see. For simplicity in what fol-
lows, I talk only about factoring and
Nuclear Deterrence and RSA, but the same arguments apply
Cryptography equally to discrete logarithms and Dif-
Surprisingly, there is no evidence that fie-Hellman-Merkle Key Exchange.
the U.S. government has investigated Factoring algorithms took a major
the risk that nuclear deterrence might step forward in the 1970s when Morri-
fail and thereby destroy civilization. son and Brillhart15 used Lehmers and
(I strongly suspect the same is true of Powerss continued fraction meth-
other nuclear-armed nations but have od11 to factor the seventh Fermat num-
not investigated them as deeply.) No ber, which is 128 bits long.
unclassified information indicates that A second major advance occurred in
any such studies exist. While I currently the 1980s when American mathemati-
hold no clearances and could therefore cian Richard C. Schroeppel used siev-
be unaware of classified studies, I have ing to roughly double the size of the
discussed the possibility of such stud- numbers that could be factored. He
ies with sympathetic, high-level people never published his algorithm but cir-

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 57


turing lecture

culated it to many relevant researchers, Alan Turing and


and Carl Pomerance credits Shroep- My Illogical Use of Logic
pels algorithm as the forerunner of The section Illogical Logic in our
[Pomerances better known] quadratic book7 (pages 244251) describes how
sieve and also its inspiration.16
A third major advance in factoring Logic is just one supposedly highly logical people can
misuse logic. In keeping with the books
occurred in the 1990s with develop-
ment of the number field sieve, again
way of knowing aim to move from blame to responsi-
bility, the first story in the section de-
roughly doubling the size of numbers about the world, scribes how, years ago, I misused logic
that could be factored.
While major advances in factoring
and an incomplete as a weapon to win arguments with my
wife. While I may have been winning
occurred in the 1970s, 1980s, and one at that. arguments (at least in my mind), I was
1990s, no similar advances have oc- losing something much more impor-
curred in roughly the past 25 years, tantmy relationship with her. Illogi-
leading many mathematicians and cal logic loses every time.
cryptographers to believe that factoring That section also describes how I
has hit a brick wall. But I see the situa- felt like I was having a mental break-
tion quite differently as a result of my down when confronted with Gdels
work applying risk analysis to nuclear Incompleteness Theorem in my sec-
deterrence.10 ond year of graduate studies at Stan-
Think of each decade as a coin toss ford. I had based my whole life on log-
that shows heads if a major advance oc- icnot just my professional lifeand
curs in factoring and tails otherwise. logic was telling me it was literally in-
The 1970s gave us heads, as did the complete. Because it would have com-
1980s and 1990s, but the next decade plicated matters too much for the aver-
gave us tails, and the current decade is age reader, we purposely left out of that
more than half over without a major ad- section Alan Turings role in creating
vance, so it seems more likely than not my angst. But my ACM Turing Lecture
to also give us tails. Even under the opti- provided a wonderful opportunity to
mistic assumption that no major ad- highlight how Turing helped open my
vance occurs in the remaining years of mind to new possibilities.
this decade, the coin-toss sequence In that second-year graduate math
would be HHHTT. If a coin showed course, we studied the cardinality of in-
such a sequence in its first five tosses, it finite sets. The positive integers are
would be foolish to project tails into countably infinite because you can
even the next decade of the 2020s with count or enumerate them 1, 2, 3, . . . It
any reasonable degree of confidence. was easy to see that the set of all inte-
Given the impact another major ad- gers is also countably infinite, with one
vance in factoring would have on the enumeration being 0, 1, +1, 2, +2, and
global economy, I have argued that it so on. Every integer is eventually
would be prudent to already have reached in that enumeration.
backup systems for both key exchange It was slightly more difficult to see
and digital signatures in place and in that the set of rational numbers is
use. For key exchange, two keys could countably infinite. For simplicity, I
be generated and hashed or XORed. show only the argument for positive ra-
One key would be produced by public tional numbers, though it extends easi-
key exchange and the other by the ly to all rational numbers. The count-
backup system. Such a system would ably infinite sequence 1/1; 1/2, 2/1; 1/3,
provide seamless security even if one 2/2, 3/1; 1/4, 2/3, and so on includes all
of the methods of key exchange were positive rational numbers. (I use semi-
compromised. One possible backup colons to demark the end of subse-
system would be a key distribution quences in which numerators and de-
center that shares a master key with nominators have a common sum, as in
each user and distributes session keys 1/3, 2/2, and 3/1.)
on demand, encrypting the session Things became much more interest-
key in each relevant users master key. ing when the professor showed that the
Likewise, two digital signatures could real numbers were uncountably infi-
be used to sign each message, with a nite; that is, they form a larger infinite
possible backup system being Merk- set that cannot be enumerated. The
les tree signatures.13 proof was by contradiction, using Georg

58 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


turing lecture

Cantors diagonalization argument. FOR i=1, i++ 10, 6 (June 1977), 7484; http://www-ee.stanford.
edu/%7Ehellman/publications/27.pdf
Assume there is an enumeration of the  Compute bii the ith binary
{ 4. Diffie, W. and Hellman, M. New directions in
real numbers decimal place of the ith cryptography. IEEE Transactions on Information
Theory IT-22, 6 (Nov. 1976), 644654; http://www-ee.
c
 omputable real number, and stanford.edu/%7Ehellman/publications/24.pdf
R1 = I1 . b11 b12 b13 print ~bii} 5. Ellis, J. The history of non-secret encryption.
Cryptologia 23, 3 (1999), 267273.
R2 = I2 . b21 b22 b23 6. Graham, S. Letter to Ralph C. Merkle (Oct. 22, 1975);
R3 = I3 . b31 b32 b33 and so on This reasoning, drawn from Section http://www.merkle.com/1974/RejectionLetter.pdf
7. Hellman, D. and Hellman M. A New Map for Relationships:
8 of Turings paper, is almost exactly Creating True Love at Home & Peace on the Planet.
where Ri is the (assumed) ith real num- the same as was used to prove the real New Map Publishing, Stanford, CA, 2016; http://tinyurl.
com/HellmanBook, expanding to http://www-ee.
ber, Ii is its integer part, and bij is its jth numbers are not countable. But there is stanford.edu/%7Ehellman/publications/book3.pdf
8. Hellman, M., Merkle, R., Schroeppel, R., Washington,
binary decimal place . To complete the a difference, as there must be, since the L., Diffie, W., Pohlig, S., and Schweitzer, P. Results
proof, consider the real number proof here produced a contradiction of an Initial Attempt to Cryptanalyze the NBS Data
Encryption Standard. Technical Report SEL 76-042
to a known fact: The computable real (available from NTIS). Electrical Engineering
R = 0 . ~b11 ~b22 ~b33 numbers are countable. Department, Stanford University, Stanford, CA, Sept.
9, 1976 (revised Nov. 10, 1976); http://tinyurl.com/nbs-
This line of reasoning involves a very des-analysis, expanding to http://www-ee.stanford.
where ~bjj is the complement of bjj. subtle, hidden assumptionthat there edu/~hellman/resources/1976_sel_des_report.pdf
9. Hellman, M. Risk analysis of nuclear deterrence. The
This real number R is different from exists a computable enumeration of the Bent of Tau Beta Pi 99, 2 (Spring 2008), 1422; http://
R1 since they differ at least in their first computable real numbers. An enumer- tinyurl.com/hellman74, expanding to http://www-ee.
stanford.edu/%7Ehellman/publications/74.pdf
binary decimal places. It is different from ation exists, but we can never compute 10. Hellman, M. How risky is nuclear optimism? Bulletin of
R2, since they differ at least in their it. In a sense, only God knows it, while the Atomic Scientists 67, 2 (Mar. 2011), 4756; http://
tinyurl.com/HowRisky, expanding to http://www-ee.
second binary decimal places. Similar we mortal humans cannot. stanford.edu/~hellman/publications/75.pdf
arguments apply to each Ri in the as- I was dumbfounded. If an incorrect 11. Lehmer, D. and Powers, R. On factoring large numbers.
Bulletin of the American Mathematical Society 37, 10
sumed list. We had assumed the list assumption can be that subtle, what (1931), 770776.
included all the reals, but R is not in others might have been missed in oth- 12. Merkle, R. Secure communication over insecure
channels. Commun. 21, 4 (Apr. 1978), 294299.
the enumeration, so the reals are not er proofs? Is mathematics itself on a 13. Merkle, R. A digital signature based on a conventional
encryption function. In Advances in Cryptology,
countably infinite. firm foundation? Might Cantors proof CRYPTO 1987, Lecture Notes in Computer Science,
So far, I was not too perturbed. But that the reals are uncountably infinite Vol. 293 (Santa Barbara, CA, Aug. 1620). Springer-
Verlag, Berlin, Heidelberg, Germany, 1988, 369378.
then the professor defined the comput- have a similar flaw? (I still wonder 14. Meyer, J. Letter to IEEE (July 7, 1977); https://stacks.
able real numbers, a concept first in- about that.) stanford.edu/file/druid:wg115cn5068/1977%20
0707%20Meyer%20letter.pdf and https://purl.
troduced by Turing in his brilliant 1936 My world was shaken in that course, stanford.edu/wg115cn5068
paper. 21 A computable real number but not enough for me to give up logic 15. Morrison, M. and Brillhart, J. A method of factoring
and the factorization of F7. Mathematics of
is one that can be computed to as as the primary basis for my personal Computation 29, 129 (Jan. 1975), 183205.
many decimal places as desired in a and professional life. That took 10 16. Pomerance, C. A tale of two sieves. Notices of the AMS
43, 12 (Dec. 1996), 14731485.
finite (though indeterminate) time more years and almost ruining my mar- 17. Rivest, R., Shamir, A., and Adleman, L. A method for
by a finite-length program. While, at riage before I finally accepted what obtaining digital signatures and public-key cryptosystems.
Commun. ACM 21, 2 (Feb. 1978), 120126.
first, this set might seem to depend Gdel and Turing had been implicitly 18. Sanger, D. U.S. must step up capacity for cyberattacks,
on the machine being used, that problem telling me: Logic is just one way of chief argues. The New York Times (Mar. 20, 2015), A4.
19. Schwartz, J. Memo to Martin Hellman (Oct. 7, 1977);
was removed by using a Universal Turing knowing about the world, and an in- https://stacks.stanford.edu/file/druid:wg115cn5068/
Machine that can simulate any other complete one at that. 1977%201007%20Schwartz2MH.pdf
20. Shor, P. Polynomial-time algorithms for prime
physical computer with only a finite I learned the limits of logic in time to factorization and discrete logarithms on a quantum
computer. SIAM Journal on Computing 26, 5 (1997),
increase in program size and run save my marriage. Will humanity learn 14841509.
time over what would be needed on the limits of its current logic in time 21. Turing, A. On computable real numbers, with an
application to the Entscheidungsproblem. Proceedings
the machine being simulated. to save the world and itself? Dorothie of the London Mathematical Society, Series 2 42
The set of finite-length programs and I wrote our book partly to increase (1936), 230265; https://www.cs.virginia.edu/~robins/
Turing_Paper_1936.pdf
can clearly be enumerated, as in 0, 1, those odds, even if just a bit. That pro-
00, 01, 10, 11, 000, and so on. Since not vides yet one more connection between
every finite-length program produces a the work that won me the ACM A.M. Martin E. Hellman (martydevoe@gmail.com) is Professor
Emeritus of Electrical Engineering at Stanford University,
computable real numbersome get Turing Award and the book. What is the Stanford, CA.
hung up in infinite loops and provide point of developing elegant algorithms
Copyright held by author.
no outputthe set of computable real (such as Diffie-Hellman-Merkle Key Ex- Publication rights licensed to ACM, $15.00
numbers is also countably infinite. But change) if no one is around in 100 years
the professor then seemed to prove that to use them?
the computable real numbers were un-
countably infinite by writing the follow- References
ing program: 1. Coppersmith, D. The Data Encryption Standard (DES)
and its strength against attacks. IBM Journal of
Research and Development 38, 3 (May 1994), 243250.
Print 0 and a (binary) decimal 2. Corrigan-Gibbs, H. Keeping secrets. Stanford Magazine Watch the author discuss
(Nov./Dec. 2014), 5864; http://tinyurl.com/cyptowar1, his work in this exclusive
point, so that what follows expanding to https://alumni.stanford.edu/get/page/ Communications video.
magazine/article/?article_id=74801 https://cacm.acm.org/videos/
is the binary expansion of a 3. Diffie, W. and Hellman, M. Exhaustive cryptanalysis cybersecurity-nuclear-security-
computable real number. of the NBS data encryption standard. Computer alan-turing-and-illogical-logic

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 59


contributed articles
DOI:10.1145/ 3152422
Internet had not yet occurred. Academ-
Even when surrounded by ubiquitous ic literature, not only in business9,32,42
but also in medicine,15,38 engineer-
computing, humans should be encouraged ing,23,40 physical sciences,30 and social
to do what they do better than machines. sciences,21,37 echo these observations in
more recent times. To illustrate the ef-
BY RAMIRO MONTEALEGRE AND WAYNE F. CASCIO fects of the changes on organizations,
we consider their implications for the

Technology-
management of human talent.
The new wave of technological in-
novation features the emerging gen-
eral paradigm known as ubiquitous

Driven
computing,a or an environment
where computational technology per-
meates almost everything, enabling
new ways of connecting people, com-

Changes in
puters, and objects. Ever-cheaper
cost for computation has resulted in
the proliferation of computing de-
vices, including personal comput-

Work and
ers, embedded (enabled by micro-
miniaturization) and networked
industrial sensors and processors,
speech-recognition and eye-track-

Employment
ing devices, mobile devices, radio-
frequency-identification and near-
frequency-communication tags and
labels, global-positioning-systems-
enabled devices, smart televisions,
car navigation systems, drones, wear-
able sensors, robots, and 3D virtual
reality. The ubiquitous computing
infrastructure also enables collection

a The term ubiquitous computing was


WE LIVE IN a global society where technology, especially coined by Mark Weiser in 1988 at Xerox Palo
Alto Research Center; in Latin, ubiquitas
information and communication technology, is means being everywhere. See also Commu-
nications February 2002 special section on
changing the way businesses create and capture ubiquitous computing.25
value, how and where we work, and how we interact
and communicate. In her seminal 1988 book, In key insights
the Age of the Smart Machine: The Future of Work As technology keeps advancing, we
need to think beyond augmenting or
and Power,45 Shoshana Zuboff was among the automating jobs to how to manage the
first scholars to weave together the technological, messy process of the creative destruction
of jobs as we create the new ones.
sociological, and psychological processes that have What enables or constrains people in
converged to shape the modern workplace. Her the workplace is the way they use and
manage technology, not technology itself.
insights concerned the nature of information and Technology-driven changes demand from
its significance in restructuring and redefining the us an understanding of the technology
in relation to the entire work system, the
patterns and meanings of work, even though at the relational and non-relational roles and
interactions of human participants and/
time of her study the worldwide diffusion of the or machines.

60 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


of enormous quantities of structured overcome the limitations of the physi- effects in the workplace.b Work is de-
and unstructured data, requiring the cal space. Merging the physical and fined here as the application of human,
adjective big to distinguish this new the electronic also has implications informational, physical, and other re-
paradigm of development. Ubiqui- for privacy and security, as well as how sources to produce products and ser-
tous computing also blurs the bound- companies are organized and manage vices.5 If one accepts that work does
aries between industries, nations, human talent. not exist without people and execu-
companies, providers, partners, com- Given these rapid advances and our tives are inherently concerned with the
petitors, employees, freelancers, out- increased reliance on technology, the management of people within organi-
sourcers, volunteers, and customers. question of how to manage technology- zations, then they bear some responsi-
They also yield opportunities to unify enabled change in work and employ-
the physical space, which has always ment is highly salient for companies
used information to try to make an in- and their executives. General predic- b See, for example, Marc Andreessens Wall
IMAGE BY ZENZEN

Street Journal column Why Software Is Eat-


herently inefficient system more effi- tions anticipate significant changes in ing the World (Aug. 20, 2011); http://www.wsj.
cient, and the electronic space, which knowledge acquisition, sharing, and com/articles/SB1000142405311190348090457
enables information accessibility to distribution, as well as related ripple 6512250915629460

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 61


contributed articles

bility for understanding the effects of ductivity increases, any automation sources of energy become cheaper and
technology on work and employment. that reduces the need for labor will in- more readily available).
This article thus aims to interpret the crease business revenue and personal Unlike effective managers, how-
progress, direction, and managerial income. That will, in turn, generate ever, machines have not yet learned
implications of current research in demand for new products and services, to tolerate high levels of ambiguity or
work and employment. We begin with that will, likewise, create new jobs for to inspire people at every level in or-
three lessons for executives based on displaced workers. One explanation for ganizations. Consider ambiguity. The
our review of relevant literature. We this pattern is that advances in informa- bigger and broader the question to
then examine how technology affects tion and communications technology be addressed, the more likely human
six key areas of talent management as are destroying more jobs in developed synthesis will be required to address it
organizations move from traditional to economies than the advances are cre- because, although machines can pro-
ubiquitous computing. We conclude ating. Technological progress is thus vide many pieces of the solution, they
with a series of questions for managers eliminating the need for many types of cannot assemble the big picture.
in the six areas. jobs, leaving the typical worker worse The process of assembly entails dis-
off than before.10 According to one 2017 cerning why a company is doing what
Methodology study,18 approximately 47% of total U.S. it is doing, where it is trying to go, and
This article is part of a larger project employment is at risk of automation. how it proposes to get there. Success
aimed at examining how technology Not all researchers concur with this depends on the ability of executives to
is changing work and organizations.12 conclusion, however. Although labor tolerate ambiguity and synthesize and
Our conclusions are based on a com- economists generally agree that the integrate a variety of types and forms
prehensive review of the literature in digital revolution is opening a great of information. The big picture repre-
management, industrial/organization- divide between a skilled and wealthy sents the glue that holds a company
al psychology, labor economics, hu- few and everyone else, hollowing out together. Moreover, when it comes to
man-factors design, and information the middle class,7 it is not clear that engaging and inspiring people to move
and computer technology. all of it can be attributed to the effects in the same direction, empathizing
Lesson 1. The effect of ubiquitous of technology. The data is far from with customers, and developing talent,
computing on jobs is a process of creative conclusive. One result of the change humans will continue to enjoy a strong
destruction. Ubiquitous computing is the simultaneous increase in both comparative advantage over machines.
is not the first technology to affect job openings and unemployment rela- Even if todays information and
jobs. From steam engines to robotic tive to the early 2000s,17 suggesting the communication technologies limit the
welders to ATMs, technology has long types of skills in demand by employers potential growth of employment, his-
displaced human workers, often cre- today do not match up with those of the tory suggests it is a temporary, though
ating new and higher-skilled jobs in existing labor force. Other plausible painful, shock. As workers adjust their
its wake. Mass production of the au- explanations, including events related skills and entrepreneurs create oppor-
tomobile threw many blacksmiths to global trade and the financial crises tunities based on the new technolo-
out of work but also created far more of the early and late 2000s, could ac- gies, the number of jobs will rebound.
jobs building and selling cars. Over count for the relative slow pace of job At the same time, human ingenuity will
the past 30 years, the digital revolu- creation since the turn of the century. create new jobs, industries, and ways to
tion, coupled with global business The problem for researchers and ex- make a living, just has it has since the
markets, have displaced many of the ecutives is that it is difficult to separate dawn of the Industrial Revolution,41
middle-skill jobs behind 20th century the effects of technology from other following Joseph Schumpeters gale
middle-class life in Western indus- macroeconomic effects.39 of creative destruction.
trial countries. The number of typists, To be sure, the advent of machine Lesson 2. Ubiquitous computing can
cashiers, travel agents, bank tellers, learning, where computers teach be used to enable or constrain people
and production-line jobs has fallen themselves tasks and rules by analyz- at work. To illustrate how that works,
dramatically, particularly in the U.S. ing large datasets, will lead to large- consider electronic monitoring sys-
and Europe, but there are more com- scale worker dislocation, as automated tems, robots, and wearable computing
puter programmers and web design- areas (such as speech recognition, pat- devices. Each shares computer sci-
ers than ever before. Displaced work- tern recognition, and image classifica- ences expressed ubiquitous comput-
ers with obsolete skills are always tion) eliminate large numbers of white- ing vision of interweaving technology
hurt, but the total number of jobs has collar jobs.18 We agree that many jobs into everyday life, making technology
never declined over time.2 performed by humans today, notably pervasive, and facilitating physical and
Paradoxically, although productivity, bookkeepers, auditing clerks, finan- virtual interactions.
a key indicator of growth and wealth cre- cial analysts, graphic designers, and Electronic monitoring systems. Moni-
ation, is at record levels and technologi- medical transcribers, will be substan- toring refers to systems, people, and
cal innovation has never been greater, tially taken over by robots or digital processes used to collect, store, ana-
over the past several decades, median agents by 2025. Other jobs will disap- lyze, and report the actions or perfor-
wages in the U.S. have not risen.19 This pear as a result of structural changes mance of individuals or groups on the
pattern is inconsistent with economic in the economy (such as the long-term job.3,8 Our focus here is on electronic
theory, which holds that when pro- decline in demand for coal, as cleaner monitoring and surveillance systems.

62 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


contributed articles

Monitoring today may assume a vari- Conversely, when monitoring systems


ety of forms (such as telephone, video, are viewed as invasive or unfair, orga-
Internet, and Global Positioning Sys- nizations run the risk that employees
tems). In the past, U.S. courts generally may not comply with rules and proce-
sided with employers when choosing
to monitor their employees, arguing
Technological dures, slack off on the job, or engage in
deviant behavior.4
that because monitoring takes place progress is It is important to note an addition-
during work hours through organiza-
tional assets (such as corporate com-
eliminating the al factor that may be associated with
electronic monitoring systemswhen
puter networks and email systems), need for many organizations impose control they
monitoring is acceptable.22
Many organizations equip machin-
types of jobs, reduce autonomy and increase per-
ceived job demands, both contribut-
ery, shipments, infrastructure, devices, leaving the typical ing to employee burnout.31 Evidence
and even employees with networked
sensors and actuators that enable worker worse off from a variety of manufacturing con-
texts indicates that close supervision
them to monitor their environment, re- than before. is associated with increased stress.24
port their status, receive instructions, With electronic monitoring, a supervi-
and take action based on the informa- sor or higher-level manager need not
tion they receive. By monitoring these even be present to do the monitoring.
resources in real time, companies can As a result, the potential for constant
better control the flow of operations monitoring creates a type of control
and avoid disruptions by taking imme- employees often regard as particular-
diate action as problems arise. Organi- ly stressful. As a general conclusion,
zations are also developing policies on when electronic monitoring is seen
using blogs and social networks (such as control-based rather than develop-
as Facebook) outside of work, poten- mental, employees are likely to experi-
tially affecting employees perceptions ence more negative outcomes.13
of trust and loss of personal control.26 Robots. Robotsc have been on factory
Monitoring per se is neither good nor floors for decades. Years ago, they were
bad, depending instead on how it is im- mostly big, expensive machines that
plemented. To be sure, monitoring can had to be surrounded by cages to keep
be beneficial, as self-initiated systems them from smashing into humans.
demonstrate. Systems that enable em- They could typically perform only a
ployees to track their activities at work single task (such as spot welding) over
have led to increased productivity by and over, albeit extremely quickly and
helping them understand better how precisely. They were neither affordable
they allocate their time.33 Such under- nor practical for small businesses. To-
standing allows workers to reallocate day, however, so-called collaborative
their time, tasks, and activities to ac- machines are designed to work along-
complish work goals more effectively. side people in close settings. They cost
A comprehensive review of research as little as $20,000 and offer small busi-
in this area concluded that attitudes nesses incentives to automate in order
in general, and attitudes toward moni- to increase overall productivity and
toring in particular, will be more posi- lower labor costs.1 Moreover, advanc-
tive when organizations monitor their es in artificial intelligence, combined
employees within supportive organi- with improved sensors, are making it
zational cultures.4 Supportive cultures possible for robots to make more com-
welcome employee input into the mon- plex judgments and to learn to execute
itoring systems design, focusing on tasks on their own, enabling them to
groups of employees rather than sin- manage well in uncertain and fluid sit-
gling out individuals, and focusing on uations, many involving humans.
performance-related activities. Theo- Not only are robots being embed-
retical and empirical researchers have ded into organizational social systems,
identified three additional features of they are becoming social actors within
monitoring systems that contribute to
employee perceptions of fairness or in- c The Oxford Dictionary defines robot as A
vasiveness:6 consistency in how data is machine capable of carrying out a complex
series of actions automatically, especially one
collected and used; freedom from bias programmable by a computer; http://www.
(such as selective monitoring); and the oxforddictionaries.com/us/definition/ameri-
accuracy of the data being collected. can_english/robot

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 63


contributed articles

those systems. Historically, the terms to require teams of people, as software


co-worker and teammate implied automates many corporate bookkeep-
fellow humans, but this may no lon- ing and accounting tasks. Between
ger be the case, as co-worker robots, or 2004 and 2015, the median number of
co-bots, enter the workplace as team
members.14 As they evolve, robots are The potential for full-time employees in the finance de-
partment at big companies declined
likely to become more adaptable to the
work environment, with multimodal
constant monitoring 40%, from 119 to approximately 71
people for every $1 billion of revenue.29
interfaces enabling them to commu- creates a type of Jobs most in jeopardy include ac-
nicate more efficiently and effectively
with human teammates, receiving, as
control employees counts-payable clerks, inventory-con-
trol analysts, and accounts-receivable
well as transmitting, information.36 often regard clerks who send invoices to customers,
A key challenge to human-factors
specialists is how to design human-
as particularly track payments, and forecast customer
default rates.29
robot control interfaces that are simple stressful. Not all robots or robot makers will
and easy to use yet robust, because displace humans, however. For exam-
the connections that allow remote ro- ple, Kiva robots, owned and manufac-
bots to take action without a human tured by Amazon Robotics, is designed
operator could be subject to hacking. to scurry across large warehouses,
Social acceptance is critical. If robots fetching racks of ordered goods and de-
are truly to be team members, humans livering them to humans, who package
must accept them, communicate effec- the orders. A warehouse equipped with
tively with them, develop shared men- Kiva robots can handle up to four times
tal models with them, and perhaps, as many orders as a similar unautomat-
most important, trust them. As robots ed warehouse, where human workers
perform more and more autonomous might spend as much as 70% of their
tasks, operators workloads should, in time walking or transporting them-
theory, decrease, freeing them to per- selves to retrieve ordered goods. Most
form other tasks. Yet the allocation of of Kivas customers are e-commerce
functions between humans and robots retailers, some growing so quickly they
is an area that needs considerable at- cannot hire people fast enough. By
tention because automation has been making distribution operations cheap-
shown to create its own set of prob- er and more efficient, robotic technol-
lems, including decreased situational ogy has helped many of these retailers
awareness, distrust of automation, survive and even expand. Such advances
misuse, abuse, and disuse, compla- illustrate that while some aspects of
cency, decrements in vigilance, and work can be automated, humans still
negative effects on other facets of excel at certain tasks (such as packaging
human performance.36 Research and various items together). Kiva robots are
theory in work analysis, teams, selec- designed and built to work with people,
tion, training, motivation, and perfor- taking over tasks humans do not want
mance management can aid success- to do or are not very good at. While they
ful design and integration of robots can enhance the productivity of these
into work teams and organizations.14,28 workers, clerical and some profes-
There is an additional concern that sional jobs could be more vulnerable,
managers must addressthat work- as the marriage of artificial intelligence
ers view robots as competitors for jobs and big data gives machines more hu-
and resist their installation. For surviv- man-like abilities to reason and solve
ing workers, robots can indeed aug- new types of problems.39
ment their capabilities, but the fear of Wearable computing devices, or
job loss is real. At Fanuc Corporations wearables. Wearablesd generally
86,000-square-foot factory in Oshino, comprise three broad categories:44
Japan, which makes industrial robots, quantified self products that allow
only four people staff the entire factory. people to measure their activities (such
In another, robots can assemble an in-
dustrial motor in just 40 seconds.34 Ro- d The Oxford Dictionary defines wearable as
bots threaten the jobs of white-collar Denoting or relating to a computer or other
electronic device that is small or light enough
workers as well. As an example, consid- to be worn or carried on ones body; http://
er that robots now perform work in cor- www.oxforddictionaries.com/us/definition/
porate finance departments that used american_english/wearable

64 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


contributed articles

as physical activity and sleep, as with Through Bluetooth connections to Lesson 3. Ubiquitous computing is
Fitbit and Jawbone); enhancement their phones, the younger workers changing the nature of competition,
technologies (such as Google Glass, could then transmit live video feeds of work, and employment in ways that are
prosthetic devices, and exoskeletons their actions back to a ground-based profound and that need active manage-
that help elderly people or those with command center staffed by veteran ment. Before it was possible to access
disabilities); and virtual reality devices older workers monitoring the videos inexpensive computational support,
(such as headsets and telepresence sys- and offering further guidance.20 hoarding information was a source of
tems), as with architects using them to
see what their designs will look like in Figure 1. Six areas of talent management supported by traditional and ubiquitous
computing technologies.
practice. Telepresence systems enable
executives to experience the feeling
of being there, attending meetings Technology is part of the Context-aware technology delivers
without having to travel. These devices Strategic context in which work is job-relevant information; technology
Work Design performed. is an integral component and feature
are now possible thanks to four devel- of jobs.
opments: improved computing power, Supervisors rely on past Digitized inventories of talent permit
increased speed of broadband access, patterns and expected changes geographically distributed teams
Workforce
the spread of sensors, and cloud com- Planning
in the business to develop to pool their knowledge to develop
puting.44 Smart vending machines are forecasts of talent supply and talent supply/demand forecasts that
demand. support what-if scenario planning.
another example of how the nature of
Managers attract, select, and Managers attract, select, and retain
work is changing. Embedded sensors, retain employees through top talent through social media,
combined with broadband access and advertising, broadcast mobile devices, and electronic
Recruitment
cloud computing, make it possible to postings, on-site testing, job boards while inspiring mutual
and Staffing
face-to-face interviews, on- awareness through timely
monitor them remotely for items out boarding, and background information.
of stock, temperature changes, and checks.
pilferage. While the promise of wear- New employees learn from Technology-delivered instruction
able computing devices is obvious, their experienced peers (such as virtual reality simulations,
there are potential drawbacks as well. through in-house, face-to- asynchronous training, gamification,
Training and face instruction, lectures, and knowledge-management
The first is distraction, as people are Development simulations, and programmed systems) support on-demand
cognitively half present and half ab- instruction, as well as development of skills and intellectual
sent, constantly checking their smart- apprenticeship programs abilities.
focusing on on-the-job training.
phones as they walk along or stand
Annual performance Software-enabled micro-feedback
in line. How often? They check them
appraisals are based on permits on-demand appraisal,
an average of 3.1 hours a day, accord- behavior checklists or guidance, and support. Software
Performance
ing to one study by Meeker.27 This can and
graphic rating scales; pay also helps manage job evaluations,
wreak havoc on work/life integration, systems based on manual job pay surveys, bonus and commission
Compensation
evaluation; and pay surveys structures, reports, and analytics.
as there is no boundary by time or ge- Management
and spreadsheets that analyze
ography as to when or where people bonus and commission
work.43 Another drawback is that digi- structures.
tal devices make human interaction Employees and employers Internet and intranets allow
jointly strive to identify and untethered workers to engage in
more difficult as the devices compete
implement career goals career-development tasks anywhere,
constantly for peoples attention. Career through career-path planning, anytime.
Management
Despite the drawbacks, many uses of in-house libraries, intranets for
wearable technology are emerging be- career self-service, and online
self-assessment.
yond consumer applications, becom-
ing popular in industries as varied as
construction, building maintenance,
medicine, manufacturing, energy,
and oilfield services. As an example, Supported by Supported by
traditional technology ubiquitous computing
consider how a company in building
Interactions based on Human-computer interactions are
maintenance might use wearables to keyboard, mouse, joystick, based on sensors and devices
preserve and transmit institutional and monitor assume a fixed embedded in products, processes,
memory. Workers nearing retirement physical relationship between individuals, and buildings. Unlimited
employees and the work access to computing, data, and
are not always well-suited to climbing
environment. Mobile devices communication networks is available
ladders or scaffolding to significant are not context-aware, possibly from any location at any time.
heights where mechanical equipment creating distractions since Context-aware technology monitors
might be located. They leave that task employees are preoccupied employees physical surroundings
with walking, driving, or other and cognitive and social states,
to younger workers wearing special activities. and makes decisions proactively,
safety glasses equipped with cameras, anticipating employees needs.
microphones, speakers, detachable
flash drives, and wireless antennas.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 65


contributed articles

power, and information moved in one say, communicate instantaneously Technology and
direction onlyup the corporate hi- or asynchronously across time and Talent Management
erarchy. In todays business environ- space or access vast bodies of infor- The way technology is altering work
ment of ubiquitous computing, the mation without visiting a library or settings and the work people do, par-
contrast could not be starker. While other physical repository. ticularly in the new era of ubiquitous
the changes made possible by todays With the Internet, people have easy computing, affects the way organiza-
technology might be impressive, and access to information they previously tions manage their human talent and
digital innovation will continue for could not have found. Indeed, tech- raises compelling questions for man-
the foreseeable future, technology by nologies trigger change by altering agers. Consider pre-employment test-
itself does not ensure profitable busi- workers non-relational rolesthe ing. Traditionally, candidates would
ness performance. business-related tasks they perform take tests at an employers site, in a
A comprehensive 2014 review of and how they perform them. These quiet, distraction-free, comfortable
research at the junction of leader- changes may then lead to changes in place, where the employer could pre-
ship and technology concluded that the nature of the interactions work- vent breaches of security by checking
researchers tend to treat technology ers have with other members of their candidate identification, eliminat-
either as a contextual aspect of busi- role set, or fellow workers with whom ing opportunities for collusion, and
ness performance relevant to the they interact while doing their work, controlling test materials at all times.
leadership process or as a set of tools as well as others in their role set (such Now consider unproctored Internet
that leaders and followers can use to as co-bots). If role relations change testing, where candidates, not em-
communicate with each other.35 The in either way, then the social network ployers, decide what conditions are
complex, pliable, changing, and ever- is likely to change as well. If it does, best. Technology can deliver simu-
expanding portfolio of Internet tools, one can say technology has altered lations or pre-employment assess-
information, and media is altering the work system. Changes in role re- ments to any location at any time,
how consumers and businesses act lations are thus key to a broad range raising a number of other security
in situations where previously they of effects in work systems. To be sure, and trust issues that might influence
would have acted differently. Before technology is altering role relations in test outcomes of interest, including
the Internet, it was impossible to, profound ways. the reliability and validity of the mea-
sures, adverse impact, size of the ap-
Figure 2. Questions for managers when moving from traditional to ubiquitous computing in plicant pool, differences in means
six areas of talent management.
and standard deviations, applicant
reactions, and perceptions of proce-
dural justice.
How does unlimited access to computer-based resources change communication,
document sharing, knowledge exchange, and collaboration in work settings? There is certainly great potential
Work Design How can technology enable job design that advances, rather than threatens, for deepening managements under-
innovation, fulfilling work, and value creation? standing of and ability to predict be-
How might the design of work reduce stress associated with constant connectivity?
havior in the domain of technology
What are the desired and unintended effects of the increased ability to receive and
process rich streams of data about the organization and its environment?
and talent management. Figure 1 out-
Strategic How does ubiquitous computing affect workforce collaboration, cohesion, and lines how the shift from traditional
Workforce
Planning
performance? to ubiquitous computing technolo-
How might technology and ubiquitous computing help minimize risk in workforce
gies affects six conventional areas of
supply-and-demand forecasts?
talent management:11 work design,
Given the volume of digitized data, what legal, ethical, privacy, and fairness issues are
associated with screening and tracking individuals in and outside an organization? workforce planning, recruitment
Recruitment
How is the role of the recruiter changing in a world of constant connectivity? and staffing, training and develop-
and Staffing
What effect does technology-based staffing have on productivity at the individual and ment, performance management
the enterprise level?
and compensation management, and
How can technology-delivered instruction enhance employee and team training?
Just as there are smart cars and smart buildings, how can organizations enable
the management of careers. Figure
Training and and support smart workers? 2 outlines key questions for manag-
Development
How can new training technologies like virtual reality, e-learning, and gamification ers when moving from traditional to
enhance training outcomes? ubiquitous computing technology
What strategies promote sensible performance management and fair compensation in these areas. Note the relevance of
Performance in digital work environments?
and How do social ties and non-work-related communication affect performance in a
the lessons mentioned earlier, par-
Compensation world of unlimited connectivity? ticularly lesson 2that ubiquitous
Management What are the most effective ways to supervise employees in ubiquitous-technology computing can be used to enable or
work environments?
to constrain people at workas man-
What are the best ways to coach employees to self-manage their careers?
agers seek to address the questions in
What kinds of technology could enhance this process?
Career How might technology facilitate work/life fit? Figure 2.
Management
What roles do personal control, collaboration, and coordination of career
management play in the digital environment? Conclusion
Research on technology and organi-
zations provides valuable insight re-

66 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


contributed articles

garding what managers know about References


Ergonomics in Manufacturing 15, 3 (Summer 2005),
275291.
the effects of technology. Based on a 1. Aeppel, T. Robots work their way into small factories.
25. Lyytine, K. and Yoo, Y. Issues and challenges in
The Wall Street Journal (Sept. 18, 2014), B1B2;
review of this research, we identified https://www.wsj.com/articles/robots-work-their-way-
ubiquitous computing. Commun. ACM 45, 2 (Feb.
2002), 6365.
three main conclusions about how into-small-factories-1410979100
26. McNall, L.A. and Stanton, J.M. Private eyes are
2. Aeppel, T. What clever robots mean for jobs. The
ubiquitous computing affects work Wall Street Journal (Sept. 24, 2015); http://www.
watching you: Reactions to location-sensing
technologies. Journal of Business & Psychology 26, 3
and organizations: how the effect on wsj.com/articles/what-clever-robots-mean-for-
(Sept. 2011), 299309.
jobs-1424835002
jobs reflects a process of creative de- 27. Meeker, M. Internet Trends 2017. Kleiner, Perkins,
3. Alge, B.J. Effects of computer surveillance on
Caulfield, and Byers, May 31, 2017; http://dq756f9pzlyr3.
struction; how it can be used to enable perceptions of privacy and procedural justice. Journal
cloudfront.net/file/Internet+Trends+2017+Report.pdf
of Applied Psychology 86, 4 (Aug. 2001), 797804.
or constrain people at work; and how 28. Miles, J. and Hollenbeck, J.R. Teams and technology.
4. Alge, B.J. and Hansen, S.D. Workplace monitoring
In The Psychology of Workplace Technology, M.D.
it is changing the nature of competi- and surveillance research since 1984: A review and
Coovert and L.F. Thompson, Eds. Routledge, New York,
agenda. In The Psychology of Workplace Technology,
2014, 99117.
tion, work, and employment in ways M.D. Coovert and L.F. Thompson, Eds. Routledge, New
29. Monga, V. The new bookkeeper is a robot. The
that are profound and that need to be York, 2014, 209237.
Wall Street Journal (May 5, 2015), B1B7; https://
5. Alter, S. Work system theory: Overview of core
www.wsj.com/articles/the-new-bookkeeper-is-a-
actively managed. We explored the ef- concepts, extensions, and challenges for the future.
robot-1430776272
Journal of the Association for Information Systems
fects of ubiquitous computing on six 14, 2 (Feb. 2013), 72121.
30. National Research Council. Collaboratories: Improving
Research Capabilities in Chemical and Biomedical
key areas of talent management, iden- 6. Ambrose, M.L. and Alder, G.S. Designing,
Sciences. National Academies Press, Washington,
implementing, and utilizing computerized performance
tifying a series of questions to help monitoring: Enhancing organizational justice. In
D.C., 1999.
31. Nixon, A.E. and Spector, P.E. The impact of technology
guide decision making as managers Research in Personnel and Human Resources
on employee stress, health, and well-being. In The
Management, G.R. Ferris, Ed. JAI Press, Greenwich,
transition from traditional to ubiqui- CT, 2000, 187219.
Psychology of Workplace Technology, M.D. Coovert
and L.F. Thompson, Eds. Routledge, New York, 2014,
tous computing in these areas. 7. Autor, D.H. and Dorn, D. The growth of low-skill
238260.
service jobs and the polarization of the U.S. labor
Ultimately, the critical issue for market. American Economic Review 103, 5 (2013),
32. Orlikowski, W.J. and Scott, S.V. Sociomateriality:
Challenging the separation of technology, work, and
managers to consider is not technol- 15331597.
organization. Annals of the Academy of Management 2,
8. Ball, K. Workplace surveillance: An overview. Labor
ogy itself but that technology is fun- 1 (Jan. 2008), 433474.
History 51, 1 (Apr. 2010), 87106.
33. Osman, M. Controlling uncertainty: A review of
damentally social, grounded in spe- 9. Barley, S.R. Why the Internet makes buying a car less
human behavior in complex, dynamic environments.
loathsome: How technologies change role relations.
cific historical and cultural contexts. Psychological Bulletin 136, 1 (2010), 6586.
Academy of Management Discoveries 1, 1 (June 2015),
34. Pfanner, E. Japanese robot maker Fanuc reveals
As it becomes embedded in everyday 3160.
some of its secrets. The Wall Street Journal (Mar.
10. Brynjolfsson, E. and McAfee, D. The Second Machine
27, 2015), B1B2; https://www.wsj.com/articles/
activities and social relations, technol- Age: Work, Progress, and Prosperity in a Time of
japanese-robot-maker-fanuc-reveals-some-of-its-
Brilliant Technologies. W.W. Norton, New York, 2014.
ogy affects all manner of human and 11. Cascio, W.F. and Aguinis, H. Research in industrial
secrets-1427384420
35. Potosky, D. and Lomax, M.W. Leadership and technology:
organizational elements (such as gov- and organizational psychology from 1963 to 2007:
A love-hate relationship. In The Psychology of
Changes, choices, and trends. Journal of Applied
ernance structures, work routines, in- Psychology 93, 5 (2008), 10621081.
Workplace Technology, M.D. Coovert and L.F. Thompson,
Eds. Routledge, New York, 2014, 118146.
formation flow, decision making, hu- 12. Cascio, W.F. and Montealegre, R. How technology
36. Redden, E.S., Elliott, L.R., and Barnes, M.J. Robots:
is changing work and organizations. Annual Review
man interactions, and social actions). of Organizational Psychology and Organizational
The new teammates. In The Psychology of Workplace
Technology, M.D. Coovert and L.F. Thompson, Eds.
Fulfilling the potential of technology in Behavior 3, 6 (2016), 349375.
Routledge, New York, 2014, 185208.
13. Castanheira, F. and Chambel, M.J. Reducing burnout
work and employment will thus require in call centers through HR practices. Human Resource
37. Rosen, L.D., Cheever, N., and Carrier, M., Eds. The Wiley
Handbook of Psychology, Technology and Society. John
recreating the way organizations operate Management 49, 6 (Nov./Dec. 2010), 10471065.
Wiley & Sons, Inc., Hoboken, NJ, 2015.
14. Coovert, M.D. and Thompson, L.F., Eds. The Psychology
in a world of digital ubiquity to maximize of Workplace Technology. Routledge, New York, 2014.
38. Ross, P., Sepper, R., and Pohjonen, H. Cross-border
teleradiology: Experience from two international
positive consequences for individuals 15. Demaerschalk, B.M., Vargas, J.E., Channer, D.D., Noble,
teleradiology projects. European Journal of Radiology
B.N., Kiernan, T.J., Gleason, E.A., Vargas, B.B., Ingall,
and organizations and minimize the 73, 1 (Jan. 2010), 2025.
T.J., Aguilar, M.I., Dodick, D.W., and Bobrow, B.J.
39. Rotman, D. How technology is destroying jobs. MIT
negative. Managing in a manner that Smartphone teleradiology application is successfully
Technology Review (June 12, 2013); http://www.
incorporated into a telestroke network environment.
inspires human performance includes technologyreview.com/featuredstory/515926/how-
Stroke 43, 11 (Sept. 2012), 30983101.
technology-is-destroying-jobs/
framing the right questions, responding 16. Dewhurst, M., and Willmott, P. Manager and machine:
40. Smite, D., Moe, N.B., and Agerfalk, P.J., Eds. Agility Across
The new leadership equation. McKinsey Quarterly
Time and Space: Implementing Agile Methods in Global
to exceptional circumstances highlight- (Sept. 2014); http://www.mckinsey.com/insights/
Software Projects. Springer, Berlin, Germany, 2010.
leading_in_the_21st_century/manager_and_machine
ed by intelligent algorithms, and letting 17. Elsby. M., Hobijn, B., and Sahin, A. The labor market in
41. Smith, A. and Anderson, J. AI, Robotics, and the
Future of Jobs. Pew Research Center, Washington,
humans do things machines cannot.16 the Great Recession. In Brookings Papers on Economic
D.C., 2014; http://www.pewInternet.org/2014/08/06/
Activity, Spring 2010, D. Romer and J. Wolfers, Eds.
Each organizations leaders, along with The Brookings Institution, Washington, D.C., 2010.
future-of-jobs
42. Van Hoose, D.D. E-Commerce Economics. Routledge,
other stakeholders, must decide what 18. Frey, C.B. and Osborne, M.A. The future of employment:
Milton Park, U.K., 2011.
How susceptible are jobs to computerisation?
technologies are adopted, how they are Technological Forecasting and Social Change 114
43. Vanderkam, L. Work/life integration is the new normal.
Fortune (Mar. 15, 2015), 139.
implemented, and the extent to which (Jan. 2017), 254280.
44. Wooldridge, A. The Icarus syndrome meets the
19. Galston, W.A. Countering techs damaging effect on
they augment or detract from worker jobs. The Wall Street Journal (Oct. 14, 2014); http://
wearable revolution. Korn/Ferry Briefings on Talent and
Leadership (Feb. 2015), 2733; https://www.kornferry.
autonomy, personal competence and www.wsj.com/articles/william-galston-countering-
com/institute/icarus-syndrome-meets-wearable-
techs-damaging-effect-on-jobs-1413328435
control, and interpersonal connections 20. Griffith, E. Wearable technology. Fortune (Oct. 27, 2014),
revolution
45. Zuboff, S. In the Age of the Smart Machine: The Future
with other human workers. At a broader 5760; http://2v1p011c9d9y1a3zveg9dmu6.wpengine.
of Work and Power. Basic Books, New York, 1988.
netdna-cdn.com/wp-content/uploads/2015/04/84563.pdf
level, there is a strong need for respon- 21. Hertel, G., Stone, D., Johnson, R., and Passmore, J.,
sible public policies across institutions, Eds. The Wiley-Blackwell Handbook of the Psychology Ramiro Montealegre (Ramiro.Montealegre@colorado.
of the Internet at Work. John Wiley & Sons, Inc., edu) is an associate professor of management and
not only to enhance competition, maxi- Hoboken, NJ, 2017. entrepreneurship in the Leeds School of Business at the
mize economic surplus, and optimize 22. Kidwell, R.E. and Sprague, R. Electronic surveillance University of Colorado, Boulder.
in the global workplace: Laws, ethics, research, and
its allocation across stakeholders, but practice. New Technology, Work, and Employment 24, Wayne F. Cascio (wayne.cascio@ucdenver.edu) is a
also to minimize social and human 2 (July 2009), 194208. distinguished professor at the University of Colorado. He
23. Khnle, H., Ed. Distributed Manufacturing: Paradigm, holds the Robert H. Reynolds Chair in Global Leadership in
risks and abuses. Establishing such Concepts, Solutions and Examples. Springer, London, the Business School at the University of Colorado, Denver.
U.K., 2010.
policies will be an ongoing challenge 24. Lu, J.L. Perceived job stress of women workers in
for years to come. diverse manufacturing industries. Human Factors and 2017 ACM 0001-0782/17/12

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 67


review articles
DOI:10.1145/ 3154384
This concern, however, pertains
Development of energy-efficient software is not only to mobile platforms. Indeed,
big players in the software industry are
hindered by a lack of knowledge and a lack of tools. also reaching the same conclusion,
as stated in one of the very few energy-
BY GUSTAVO PINTO AND FERNANDO CASTOR efficient software development guides:
Even small inefficiencies in apps add

Energy
up across the system, significantly af-
fecting battery life, performance, re-
sponsiveness, and temperature.a Cor-
porations that maintain datacenters

Efficiency:
struggle with soaring energy costs.
These costs can be attributed in part to
overprovisioning with servers constant-
ly operating under their maximum ca-

A New Concern
pacity (for example, U.S. datacenters are
wasting huge amount of energy15), and
to the developers of the apps running

for Application
on these datacenters generally not tak-
ing energy into consideration.36
Unfortunately, during the last de-

Software
cades, little attention has been placed
on creating techniques, tools, and pro-
cesses to empower software developers
to better understand and use energy

Developers resources. As a consequence, software


developers still lack textbooks, guide-
lines, courses, and tools to reference
when dealing with energy consump-
tion issues.36,45 Moreover, most of the
research that connects computing and
energy efficiency has concentrated on
the lower levels of the hardware and
software stack. However, recent stud-

a https://developer.apple.com/library/content/
documentation/Performance/Conceptual/
T H E PR EVALENCE AND ubiquity of mobile computing powerefficiency guidelines osx/index.html#//
platforms, such as smartphones, tablets, smart apple ref/doc/fuid/TP40013929

watches, and smart glasses, have changed the way


people use and interact with software. In particular, key insights
Developers currently do not fully
these platforms share a common yet challenging
understand how to write, maintain,
requirement: they are battery-driven. As users interact and evolve energy-efficient software
applications.
with them, they tend to be less available, since even Two main problems are identified:
simple, well-optimized operations (for example, Developers lack knowledge on how to
measure, profile, and optimize energy
texting a friend) consume energy. At the same time, efficiency, and they lack tools to help
them in these tasks, in particular, tools
wasteful, poorly optimized software can deplete a that work with abstractions they are
familiar with.
devices battery much faster than necessary. Heavy Software energy consumption research
resource usage has been shown to be a reason leading is evolving to mitigate these problems
and this article highlights promising
to poor app reviews in online app stores.22 research avenues.

68 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


ies show these lower-level solutions
do not capture the whole picture2,9,25
when it comes to energy consumption.
Although software systems do not con-
sume energy themselves, they affect
hardware utilization, leading to indirect
energy consumption.
How is software related to energy
consumption? Energy consumption E
is an accumulation of power dissipation
P over time t, that is, E = P t. Power P
is measured in watts, whereas energy E
is measured in joules. As an example, if
one operation takes 10 seconds to com-
plete and dissipates five watts, it con-
sumes 50 joules of energy. In particular,
when taking about software energy con-
sumption, one should pay attention to:
a given software system under ex-
ecution,
on a given hardware platform,
on a given context, and
during a given time.
To understand the importance of a
hardware platform, consider an appli-
cation that uses the network. Any com- number of context switches. This, in pers in 2014. That shows the emerging
modity smartphone today supports, at turn, might increase the P of the equa- character of the field.
least, WiFi, 3G, and 4G. A recent study tion, impacting the resulting energy The need for studies that focus on
observed that 3G can consume about consumption. the higher levels of the software stack is
1.7x more energy than WiFi, whereas 4G Software engineering meets energy important from at least two important
can consume about 1.3x more energy consumption. While the strategy of perspectives:
than 3G, while performing the same leaving the energy consumption opti- Software engineers perspective. Bat-
task, on the same hardware platform.23 mization problem to the lower-level lay- tery usage is a key factor for adopting
Context also plays a key role, since ers has been successful, recent studies and evaluating mobile applications. Us-
the way software is built and used has show that even better energy savings ers of an energy-inefficient app might
a critical influence on energy consump- can be achieved by empowering and en- review it badly, encouraging other users
tion. For instance, software can stress couraging software developers to par- not to use it. This can negatively impact
energy consumption on CPUs, when ticipate in the process.9,23,34,42 However, the apps revenue.
performing CPU-intensive computa- the application level, which is the focus End users perspective. The last mile
tions,46 on DRAMs, when performing of most mainstream software being de- in energy efficiency comes from the
random accesses to data structures,34 veloped these days, has been the target choices of end users. To make better
on networks, when running several of few studies. choices, and further minimize energy
HTTP requests,9,28 and on displays, This lack of evaluation was observed consumption, end users should be
when using lighter backgrounds29,32 or in a recent paper,48 where the authors aware of the different energy character-
playing videos. surveyed the papers published dur- istics of software applications that serve
Finally, time plays a key role in this ing a period of 10 years in top software the same purpose.
equation. A common misconception engineering venues, and found only This article is a review of the most
among developers is that reducing ex- 20 research papers that have power prominent software engineering ap-
ecution time also reduces energy con- or energy on their titles or abstracts. proaches for writing, maintaining, and
IMAGE BY FRA NCO LUCATO

sumption,36,45 the t of the equation. More interestingly, however, the au- evolving energy-efficient software appli-
However, chances are this reduction thors observed that none of them were cations. We organize the contributions
in execution time might increase the published before 2012. In 2012, three according to the Guide to the Software
number of CPU cycles (for example, us- papers were published, whereas six pa- Engineering Body of Knowledge (SWE-
ing multi-core CPUs) and, therefore, the pers were published in 2013 and 11 pa- BOK),1 a common practice in software

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 69


review articles

engineering studies (for example, Mur- 37 respondents have already faced en- ers (radios, CPU, memory, storage, ev-
phy-Hill et al.39). When conducing such ergy-related problems, as a respondent erything). These results not only cor-
review, we found the literature does not said: We have a limited energy enve- roborate with the findings of Pang et
cover effectively certain areas of the lope for the whole system and we must al.,42 but also reinforce that application-
SWEBOK. For these cases, we share our make sure even our power hungry com- level energy management is in high
visions of possible research avenues ponents dont cause the system to go demand among application software
that energy-aware researchers can fol- beyond this limit. Also, some respon- developers, although better support is
low to reduce this gap. dents are aware that energy inefficien- urgently needed.
We unveil the perceptions of mobile cies can impact on app popularity and, We also asked five leading research-
developers when dealing with energy therefore, revenue: Users will leave bad ers in the area of software energy con-
consumption issues, scratching their reviews if you drain the battery. sumption to identify the most signifi-
problems and possible solutions. We When asked if they found the root cant contributions and biggest open
acknowledge that most of the energy- cause for the energy-related problems, challenges in this area. All the research-
related problems, in fact, can be re- 50% of the respondents did not answer. ers agreed that tool support is still lack-
duced to two main problems: the lack For those who answered, background ing when it comes to energy measure-
of knowledge and the lack of tools and activities, GPS, and unnecessary re- ment, reengineering, refactoring, and
present recent literature to understand source usage are among the recurring other related activities. Even though
how software engineering researchers answers. Interestingly, these problems there is a recent interest from IDE build-
are tackling these two problems. were also observed in other studies.36,45 ers to provide an energy consumption
However, 31.81% of the respondents perspective of the software systems un-
did not observe any significant im- der development,b this finding suggests
provement in energy consumption af- there is still much to do.
ter applying their solutions. For those
who observed an improvement, only Energy-Related Problems
five of them made use of specialized As observed in our formative study, soft-
tools. The majority of them have the ware developers currently have to rely
perception of an improvement, for ex- on Q&A websites, blog posts, or You-
ample: The battery is lasting longer, Tube videos when trying to optimize en-
Less heat from device, or I really do ergy consumption, which are anecdotal,
not measure before and after. Its just not supported by empirical evidence, or
a perception. When we asked where even incorrect.24,36 The consequence of
they find reliable information about the lack of appropriate textbooks, guide-
what solutions can be used to save en- lines, and cookbooks for green software
A Formative Study ergy, seven of them refer to the official development is the lack of knowledge on
Energy consumption issues are now documentation, five of them use Stack- how to write, maintain, and evolve ener-
knocking on the door of application Over flow, and five use other channels gy-efficient software applications. Fur-
software developers. To shed light on (blogs, YouTube, open source reposi- thermore, our respondents also men-
this matter, similarly to Pang et al.,42 we tories). Unfortunately, the solutions tioned they believe that energy-related
conducted a survey with software devel- described in such sources of documen- features are very important to have in
opers to understand their perceptions tation often are not supported by em- well-known IDEs. In particular, energy
about software energy consumption is- pirical evidence.38,45 To make the mat- profiling techniques can be very help-
sues. Compared to previous research, ter worse, two respondents rely on trial ful. This lack of energy-related features
which surveyed a wide range of software and error, which is far from accurate. incurs in the lack of tools to find, refac-
developers, our target population is Moreover, 67% of the respondents tor, and fix energy-inefficient code.
more focused and consists of 62 soft- said that energy-related features are The lack of knowledge and the lack
ware developers who have performed important or very important to of tools to write energy-efficient soft-
at least one commit to a mobile open have in well known IDEs. Only eight ware is also discussed in the literature.
source application. of the overall respondents have actu- For instance, Pinto et al.45 noticed that
Among the respondents, 68.75% ally used software energy consumption a common misconception is to confuse
have more than eight years of software tools. Respondents said that the most concepts such as power and energy.
development experience, 57.81% have important energy-related features to Manotas et al.36 observed that develop-
more than two years of mobile develop- have in well-known IDEs are profiling ers believe in panaceas, that is, solu-
ment experience, and 77.41% have more tools (16 answers), varying from CPU, tions that are presented as universal
than two years of open source develop- network, method, wake locks, thread, but, in fact, only work in specific con-
IMAGE F RO M SH UTT ERSTOCK.CO M

ment experience. The majority of them and live profile. Indeed, one respondent texts. For instance, while one developer
(57.8%) are source code contributors or synthesize that well-known IDEs, such
project owners (35.9%). More interest- as Android Studio, lack these features:
b https://developer.apple.com/library/ios/
ingly, 70.31% of the respondents agree Android Studio needs a good energy documentation/Performance/Conceptual/
that energy consumption could be an profiler to check the Android power EnergyGuide-iOS/-MonitorEnergyWithXcode.
issue in their mobile applications. Also, consumption from all power consum- html

70 COMMUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


review articles

suggested, offloading computation to consumption can be related to any soft-


the cloud as a way to improve energy ware engineering topic, we chose to
consumption, another developer men- focus only on topics directly related to
tioned, decreased radio use increases software coding, since it is one of the
battery life. As a result, developers
should consider the underlying thresh- Energy main activities of software developers,
and it is the target of most of the recent
olds to take proper advantage of each
solution. These are examples of lack of
consumption research contributions. Therefore, we
do not cover the following topics: soft-
knowledge. To further complicate mat- issues are now ware configuration management, soft-
ters, optimizing performance does not
always help to save energy.25,26,31,46 Thus,
knocking on the ware engineering management, soft-
ware engineering process, and software
the extensive performance textbooks door of application requirements.
and guidelines are not always useful.
The aforementioned lack of knowl-
software Software tools and methods. We or-
ganize our discussion of software engi-
edge is intrinsically connected to the developers. neering tools and methods in terms of
lack of tools. Moura et al.38 observed enhancement methods, measurement
that energy-aware developers often tools, and static analysis tools.
employ low-level solutions that some- Enhancement methods. These meth-
times result in hard-to-detect correct- ods refer to energy-saving techniques
ness problems. The following commit that developers can use, even though
message provides an example of a cor- they have no prior knowledge of the
rectness problem: Disable Auto Power application domain. For instance, soft-
Saving when resetting the modem. ware developers often leverage mod-
This can cause several bugs with serial ern CPUs to dynamically change their
communication.c High-level energy operating frequencies, thus reducing
saving tools might be useful in mitigat- power dissipation.38 However, when
ing this problem. In addition, Pang et applying this technique, software de-
al.42 found that 88% of the respondents velopers should use low-level system
of their survey do not know what tool interfaces that are error-prone and
they can use to measure the energy platform dependent. Notwithstanding,
consumption of their software. These blindly downscaling CPU frequency
are examples of lack of tools. Although might increase energy consumption
software energy consumption tools do while reducing performance.20,34 This
exist, they have yet-to-be-addressed lim- is an important example of the lack of
itations: tools. To mitigate this problem, novel
They require an in-depth knowl- approaches are based on dynamic ad-
edge of low-level implementation de- aptation through an energy profiler
tails and programmers under time module, energy policies, and energy
pressure have little chance to learn how adaptation APIs.49,50 The energy profiler
to use them; module can recognize the system states
They do not provide direct guidance and estimate the energy potentially de-
on energy optimization, that is, bridg- manded by an application.
ing the gap between understanding Another example is method reallo-
where energy is consumed and under- cation,10 which refers to the analysis of
standing how the code can be modified a software system considering all the
in order to reduce energy consumption. levels of the stack (for example, kernel,
Here, we discuss how current soft- library, and source code level), and re-
ware engineering research is address- organizing the classes and methods
ing these two key problems. through the levels of the stack, in a way
in which they can be placed in the level
Energy-Related Solutions where the energy consumption is mini-
Since there is no single solution for mal. As a limitation, this technique can
conserving energy, we organize the con- be utilized only if the operating system
tributions in terms of the topics of the and the software development envi-
SWEBOK,1 a common practice in soft- ronment allow application software
ware engineering studies (for example, developers to go through the different
Murphy-Hill et al.39). Although energy levels (for example, from source code
level to kernel level). In a similar strat-
c https://github.com/alobo/SerialGSM/commit/ egy, cloud offloading23 is a technique
c616b950 in which heavy computations are sent

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 71


review articles

to a remote computer; after the remote the surrounding environment, process-


execution the result is sent back to the ing the data, and sending it to another
local machine. This approach aims to collection point to be consumed. There-
re-organize the implementation of the fore, sampling techniques might im-
system at the source code level, thus
saving energy by minimizing process- Interestingly, pact energy consumption. This poses a
challenge, since a recent study provides
ing. Interestingly, when we asked the re-
spondents if they found any solution to
when we asked evidence that a high sampling rate is
necessary to obtain reliable informa-
overcome the energy-related problems, the respondents tion.51 Even though this problem can be
one of the respondents said: Offload
intensive work to workers in the cloud.
if they found circumvented by employing software-
based measurement approaches,34
However, this technique is only effective any solution to these approaches are often regarded
if the savings can compensate the extra
energy toll required to send a compu-
overcome the as less rigorous than hardware-based
ones.
tation through a network. Therefore, energy-related Second, hardware- and software-
trade-offs exist and, as discussed previ-
ously, different components have dif- problems, one said: based approaches often do not provide
the granularity level that application
ferent energy usage characteristics. Offload intensive software developers are interested
Measurement tools. Some measure-
ment tools include methods that use work to workers in.36,45 For instance, there is no tool sup-
port to measure energy consumption
data collected from different system in-
terfaces to assess the energy consump-
in the cloud. per thread per system module. It is dif-
ficult to link the energy measurements
tion at the application level. One exam- across the running threads with fine-
ple is the Running Average Power Limit grained events that happen during pro-
(RAPL). This module enables architec- gram execution, such as method calls.
tures monitor energy consumption and To make matters worse, the tail en-
store it in Machine-Specific Registers ergythat is, the high power state that
(MSRs).d Several energy-consumption remains long after the usage of a hard-
studies are based on this module (for ware component, such as the GPS26
example, Lima et al.,30 Liu et al.,34 Pinto should be taken into consideration,
et al.47). With such techniques, it is pos- even in the presence of context switch-
sible to profile a system and analyze, for es. As a result, there is a mismatch be-
instance, what are the system calls that tween the noise introduced by coarse-
have a major contribution to power dis- grained measurements and the tiny
sipation.10,34 System calls, in particular, energy impact of methods calls. Still, in
are being actively used for predicting our survey, 11 respondents mentioned
and estimating energy consumption of that measurement tools are among the
a software system.2,3,8 most important energy-related features
Other tools leverage energy models. to have available in well-known IDEs.
This strategy utilizes a model developed Static analysis tools. One of the main
by physically measuring the energy con- challenges of software energy con-
sumption of a device.17,23,26 Energy mod- sumption research is to bring analysis
els have a higher level of confidence to the static level. Currently, software
only when approximating the energy energy consumption instrumentation
consumption on the hardware based can only be conducted at runtime. This
on which the model was created. Other approach has several limitations; such
hardware architectures can only con- as sophisticated (and expensive) hard-
sider the model as a rough estimation. ware equipment46 or applicability only
Although there are already some to specific hardware configurations.34
software tools for energy measurement This fact has the potential of limiting
(for example, Hindle et al.17 and Li et the usability of software energy con-
al.26), such tools have well-known draw- sumption tools.
backs. First, energy measurement tools Although there are few studies in
may pay an additional overhead on en- this direction (for example, a static
ergy consumption, mostly due to the analysis technique for estimating the
sampling mechanism. Data acquisition energy consumption of embedded pro-
(that is, sampling) is the result of the grams33), these tools often combine
process of acquiring information from static analysis with dynamic analysis
techniques (for example, Li et al.26,28),
d https://01.org/msr-tools/overview which makes them hardware-depen-

72 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


review articles

dent, and do not exhibit maturity, nor sults have a clear implication: Tools to tion. With a better understanding of the
the breadth of scope necessary for use aid developers in quickly refactoring whole program energy behavior, such
in real software development. One of programs can be useful if energy is im- visualization techniques can be useful
the main challenges for deriving static portant. to mitigate both lack of knowledge and
analysis tools for energy consumption Reengineering. Compared to refac- lack of tools.
is the need for a body of knowledge on toring tools, which are more localized, Software design and construction. Re-
how language constructs and design reengineering efforts can be broader in searchers have been studying different
decisions impact energy consumption. scope and have a systemwide impact strategies for designing and construct-
Due to the emerging character of the on the structure of an application. As ing energy-efficient software.16,25,29,31,43
field,48 we believe that new empirical en- mentioned, method reallocation10 and These studies focus on understanding
ergy consumption studies will be con- method offloading23 are two common how a particular programming practice
ducted in the following years, which in strategies to implement reengineer- or design implementation might im-
turn will help researchers to create such ing energy-aware methods. This is cor- pact on energy consumption. To gain
static analysis tools. roborated by the work of Othman et further confidence in the results, these
Software maintenance. We organize al., which found that up to 20% energy studies often analyze dozens (for ex-
our discussion of software maintenance savings can be achieved by uploading ample, Kambadur20), or even hundreds
in terms of refactoring, reengineering, tasks from mobile devices to fixed serv- (for example, Li et al.25), of software ap-
and visualization. ers.41 Using a different strategy, Mano- plications, and they mitigate the lack
Refactoring. Refactoring tools can tas et al.37 proposed SEEDS, a general of knowledge by providing high-level
take advantage of cutting-edge research decision making framework for opti- guidelines for designing energy-effi-
and incorporate such knowledge into mizing software energy consumption. cient software. We organize our discus-
refactoring engines. However, as a re- The SEEDS framework can identify sions of software design and construc-
searcher respondent said, There is a lot energy-inefficient uses of Java collec- tion in terms of mobile, network, data
of work showing how different program- tions, and automate the process of se- structures, and parallel programming
ming styles, techniques, structures in- lecting more efficient ones. Similarly, techniques.
fluence the consumption, but there is Fernandes et al.13 developed a tool that Mobile development. Linares-
still no real cataloging ... based on these leverages static and dynamic analy- Vasquez et al.31 investigated API calls
concrete software practices. Although sis to recommend the most energy- that might cause high-energy con-
researchers have been speculating on efficient data structures. Search-based sumption. For example, they observed
this subject during the last years,14 to software engineering approaches were that the method Activity.findViewById,
the best of our knowledge, there is only used to reengineer a software system in which is commonly used, is one of the
a handful of studies that deals with the order to minimize energy usage,6 yield- most energy-consuming among the
problem of introducing novel refactor- ing an energy reduction of up to 25%. Android APIs. Similarly, Malik et al.35
ing tools for improving the energy effi- These approaches mitigate the prob- found that the BroadcastReceiver
ciency of a software system.5,12 In one of lem of lack of tools. and the Location APIs are the most
these studies, the authors present a set Visualization techniques are useful often discussed among Android energy
of energy efficiency guidelines that are to support the understanding of soft- questions on StackOver flow. Further-
specifically tailored for Android apps, ware systems in order to discover and more, since the display is one of the
such as location updates and resource analyze their anomalies. Li et al.26 pro- smartphones most energy-intensive
leaks. When applied, the authors ob- posed a technique that overlays energy components,7 Li et al.29 discussed how
served improvements of up to 29% of consumption information with appli- to improve energy efficiency by favor-
the overall energy consumption. cations source code. This technique ing darker colors instead of lighter
This lack of contributions is not colors different amount of energy con- ones for smartphones with OLED dis-
related to a lack of opportunities. As sumed in a given line of codeblue plays. Using a search-based multi-ob-
mentioned, there are several opportu- lines describe low energy consumption jective approach, Linares-Vasquez et
nities for application software develop- whereas red lines indicate high-energy al.32 automatically optimized energy
ers to save energy by refactoring exist- consumption. This visualization tech- consumption and contrast, while using
ing systems.19,48 For example, Pinto et nique is fine-grained and works at the consistent colors with respect to the
al.47 observed that just updating from source code level. On the other hand, original color palette. Oliveira Jr. et al.19
Hashtable to Concurrent HashMap in a the study of Couto et al.11 focuses on a analyzed the energy consumption of
Java program can yield a 3.5x energy sav- coarser granularity: It identifies the en- Android app development approaches,
ings. In particular, this transformation ergy consumption per method, and ag- Java, JavaScript, and Java + C++, in both
yields a 1.4x and a 9.2x energy savings in gregates this energy in terms of classes, benchmarks and real apps. In both
CPU and DRAM, respectively. As anoth- packages, and the whole software sys- scenarios it was observed that different
er example, Pathak et al.43 observed that tem. The result is presented in a sun- approaches have different impacts on
I/O operations consume more energy burst diagram that allows developers to energy. In particular, combining differ-
partly because of the tail energy phe- easily and quickly identify the most en- ent approaches can yield more than an
nomenon. According to the authors, ergy-inefficient parts of the code. These order of magnitude energy savings in
bundling I/O operations together can studies combine art and technology compute-intensive apps.
mitigate this tail energy leak. These re- as a way to represent energy consump- Network usage. Li et al.25 analyzed

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 73


review articles

more than 400 real-world Android niques can lead to increased energy
apps, and found that an HTTP request consumption and performance loss,34
is the most energy-consuming op- the authors showed that important
eration of the network. In a follow-up energy savings can be achieved. Baner-
study, the same authors observed that jee et al.4 proposed a technique that
bulking HTTP requests is a good prac- generates test inputs that are likely to
tice for energy saving.28 Also regarding capture energy bugs. This technique
HTTP usage, Chowdhury et al.9 ob- focuses on creating tests that use I/O
served that HTTP/2 is more energy ef- components, which are one of the pri-
ficient than its predecessor, HTTP/1.1, mary sources of energy consumption
for networks with higher Round Trip in a smartphone.7,43
time (RTTs). Since most mobile apps Followed by these promising ini-
use network,25 we expect more con- tial results, we believe that new testing
tributions on this direction. Besides techniques will be evaluated in terms
of bulking requests, researchers can of energy consumption. At best, energy
evaluate the benefits of, for instance, testing will become a research area.
reducing transactions, compressing Several possible areas of interest can be
data, and appropriately handling er- envisioned. One of them is what we call
rors to conserve energy. green assertions, that is, the possibil-
Data structures. The energy behavior ity to define an energy budget where the
of different data structures, one of the test case asserts whether the computa-
building blocks of computer program- tion satisfies that budget. The test fails
ming, have been extensively studied in so, the whole chain of programming if the energy consumed is greater than
the last few years.16,30,37,47 Hasan et al.16 languages, software systems, and end- the suggested budget. For instance, the
investigated data structures grouped users that rely on the JVM can benefit code snippet double max- Energy
with three interfaces (List, Set, and from these findings. = 200; assertTrue(render(), ex-
Map). Among the findings, they found Although these studies provide a pected, maxEnergy); defines that
that the position where an element is in- comprehensive set of findings with the render() method should con-
serted in a list can greatly impact energy practical and timely implications and sume, at most, 200 Joules. This tech-
consumption. Pinto et al.47 studied the can be useful to mitigate the problem of nique can be further improved to cover
same group of interfaces, but focused lack of knowledge, they are far from cov- additional hardware characteristics, for
on thread-safe data structures. They ering the whole spectrum of program- instance, asserting whether the compu-
also observed that using a newer ver- ming language constructs and libraries. tation consumes 100 Joules due to net-
sion of a thread-safe data structure can Software quality and testing. Here work communication or 50 Joules due
yield a 2.19x energy savings when com- we organize our discussions in terms to the CPU.
pared to the old associative implemen- of software testing and software debug- Software debugging. Practitioners
tation. Lima et al.30 studied the energy ging techniques. commonly use debugging tools to
consumption of data structures in con- Software testing. Although there are catch bugs in program formulation.
current functional programs. Although several studies aimed at characteriz- However, debugging an energy-ineffi-
they found that there is no clear univer- ing energy bugs (for example, Pathak cient piece of code is more challenging
sal winner, in certain circumstances, et al.44), there are relatively few stud- than traditional debugging because
choosing one data sharing primitive ies that propose new energy-aware such inefficiencies depend on the
(MVar) over another (TMVar) can yield testing techniques.18,21,27 Ding et al.27 contextual information about where a
60% energy savings. presented an energy-efficient testing program is running, such as the state
Parallel programming. Parallel pro- suite minimization technique that can of the hardware devices. In this regard,
gramming techniques have also been be used to perform post-deployment Banerjee and colleagues5 propose a
the subject of several studies. Pinto et testing on embedded systems. Results framework for debugging energy con-
al.46 observed that a high-level, work- suggest the approach can promote a sumption-related field failures in mo-
stealing parallel framework is more reduction of over 95% of the energy bile apps. The authors found that tool
energy-friendly when performing fine- consumed by the original test suite. support could localize energy bugs in
grained CPU intensive computations Similarly, Jabbarvand et al.18 present a short amount of time, even for non-
PHOTO C REDIT: S. BONA IME/SH UT TERSTOCK.COM

than a thread-based implementation. another test suite minimization ap- trivial Android apps. The authors ob-
Still, Ribic and Liu proposed a set of run- proach, but focusing on Android apps. served energy savings of up to 29% after
time systems for improving the energy The authors reported a reduction of, patching the energy bug. Pathak et al.43
efficiency of fine-grained CPU-intensive on average, 84%, while maintaining the propose eprof, a fine-grained profiling
computations.49,50 To better leverage the effectiveness for revealing bugs. Kan21 energy consumption technique for ap-
energy savings reported by these stud- proposes a similar approach: To use plications running on smartphones.
ies, we believe they can be integrated DVFS to scale frequency down when Similar to the work of Banerjee and col-
with well-known runtime systems, such running the test suites. Although some leagues,4 Pathak et al. focus on under-
as the Java Virtual Machine (JVM). If researchers argued that DVFS tech- standing and monitoring system calls

74 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


review articles

that are related to I/O operations. As a factoring of android apps to enhance energy-efficiency. 32. Linares-Vasquez, M., Bavota, G., Bernal-Cardenas, C.,
In Proceedings of MOBILESoft, 2016, 139150. Oliveto, R., Di Penta, M., and Poshyvanyk, D. Optimizing
results, they found that most of the en- 6. Bruce, B.R., Petke, J., and Harman, M. Reducing energy consumption of GUIs in android apps: A multi-
ergy consumed in free apps is related energy consumption using genetic improvement. In objective approach. In Proceedings of ESEC/FSE,
Proceedings of GECCO, 2015, 13271334. 2015, 143154.
to third-party advertisement modules 7. Carroll, A. and Heiser, G. An analysis of power 33. Liqat, U., et.al. Energy consumption analysis of
(which can be responsible for up to consumption in a smartphone. In Proceedings of programs based on XMOS isa-level models. In
USENIX, 2010. Proceedings of the 23rd International Symposium on
75% of the overall energy consumed by 8. Chowdhury, S.A. and Hindle, A. Greenoracle: Estimating Logic-Based Program Synthesis and Transformation,
an app). Using a collaborative black- software energy consumption with energy measurement 2013, 7290.
corpora. In Proceedings of MSR, 2016, 4960. 34. Liu, K., Pinto, G., and Liu, Y.D. Data-oriented
box approach, Oliner et al40 propose 9. Chowdhury, S.A., Sapra, V, and Hindle, A. Client-side characterization of application-level energy
a method for diagnosing anomalies, energy efficiency of HTTP/2 for web and mobile app optimization. In Proceedings of FASE, 2015.
developers. In Proceedings of SANER, 2016, 529540. 35. Malik, H., Zhao, P., and Godfrey, M.W. Going green: An
estimating their severity, and identi- 10. Corral, L., Georgiev, A.B., Sillitti, A., and Succi, G. exploratory analysis of energy-related questions. In
Method reallocation to reduce energy consumption: Proceedings of MSR, 2015, 418421.
fying the device features that lead to 36. Manotas, I., et al. An empirical study of practitioners
anan implementation in android OS. In Proceedings of
the anomaly. Using feedback received SAC, 2014, 12131218. perspectives on green software engineering. In
11. Couto, M., Carcao, T., Cunha, J., Fernandes, J.P., and Proceedings of ICSE, 2016, 237248.
by the proposed tool, end users im- Saraiva, J. Detecting anomalous energy consumption in 37. Manotas, I., Pollock, L., and Clause, J. Seeds: A
proved their battery life by 21%. android applications. In Proceedings of SBLP, 2014, 7791. software engineers energy-optimization decision
12. Cruz, L., Abreu, R., and Rouvignac, J.-N. Leafactor: support framework. In Proceedings of ICSE, 2014,
We believe that debugging tools Improving energy efficiency of android apps via 503514.
will have the capability of inspect- automatic refactoring. In Proceedings of MobileSoft, 38. Moura, I., Pinto, G., Ebert, F., and Castor, F. Mining energy-
(Buenos Aires, Argentina, 2017). aware commits. In Proceedings of MSR, (2015), 5667.
ing the energy consumption of fine- 13. Fernandes, B., Pinto, G., and Castor, F. Assisting 39. Murphy-Hill, E., Zimmermann, T., and Nagappan, N.
grained program constructs during non-specialist developers to build energy-efficient Cowboys, ankle sprains, and keepers of quality: How
software. In Proceedings of the Companion to the 39th is video game development different from software
runtime, as well as their common International Conference on Software Engineering, development? In Proceedings of ICSE, 2014, 111.
ability to identify which value was at- (Buenos Aires, Argentina, 2017). 40. Oliner, A.J., Iyer, A.P., Stoica, I., Lagerspetz, E., and
14. Fraser, S., Murphy-Hill, E., Wild, W., Yoder, J., and Tarkoma, S. Carat: Collaborative energy diagnosis
tributed to a given variable. Debug- Zhu, B.Q. Going green with refactoring: Sustaining for mobile devices. In Proceedings of the 11th ACM
ging tools can go further and highlight the worldwide virtual machine. In Proceedings of Conference on Embedded Networked Sensor Systems,
OOPSLA, 2011, 171174. 2013, 10:110:14.
the CPU intensive lines of code, or the 15. Gelenbe, E. and Caseau, Y. The impact of information 41. Othman, M. and Hailes, S. Power conservation strategy
memory-intensive methods, in a way technology on energy consumption and carbon for mobile computers using load sharing. SIGMOBILE
emissions. Ubiquity, (June 2015) 115. Mob. Comput. Commun. Rev. 2, 1 (Jan. 1998), 4451.
that developers can refactor them in 16. Hasan, S., King, Z., Hafiz, M., Sayagh, M., Adams, B., 42. Pang, C., Hindle, A., Adams, B., and Hassan, A.E.
What do programmers know about software energy
an energy-savvy manner. Novel ener- and Hindle, A. Energy profiles of Java collections
consumption? IEEE Software 33, 3 (2016), 8389.
classes. In Proceedings of ICSE, 2016, 225236.
gy-related testing and debugging tools 17. Hindle, A., Wilson, A., Rasmussen, K., Barlow, E.J., 43. Pathak, A., Hu, Y.C., and Zhang, M. Where is the energy
spent inside my app? Fine grained energy accounting
can mitigate the lack of tools. Campbell, J.C., and Romansky, S. Greenminer: A
on smartphones with eprof. In Proceedings of
hardware based mining software repositories software
energy consumption framework. In Proceedings of EuroSys, 2012, 2942.
44. Pathak, A., Jindal, A., Hu, Y.C., and Midkiff, S.P. What
Conclusion MSR, 2014, 1221.
is keeping my phone awake? Characterizing and
18. Jabbarvand, R., Sadeghi, A., Bagheri, H., and Malek,
Energy consumption is a ubiquitous S. Energy-aware test-suite minimization for android detecting no-sleep energy bugs in smartphone apps.
apps. In Proceedings of ISSTA, 2016, 425436. In Proceedings of MobiSys, 2012, 267280.
problem and the years to come will re- 45. Pinto, G., Castor, F., and Liu, Y.D. Mining questions
19. Oliveira Jr., W.O.R., and Castor, F. A study on the
quire developers to be even more aware energy consumption of android app development about software energy consumption. In Proceedings
approaches. In Proceedings of MSR (Buenos Aires, of MSR, 2014, 2231.
of it. However, developers currently do Argentina, 2017). 46. Pinto, G., Castor, F., and Liu, Y.D. Understanding energy
not fully understand how to write, main- 20. Kambadur, M. and Kim, M.A. An experimental behaviors of thread management constructs. In
survey of energy management across the stack. In Proceedings of OOPSLA, 2014, 345360.
tain, and evolve energy-efficient soft- Proceedings of OOPSLA, 2014, 329344. 47. Pinto, G., Liu, K., Castor, F., and Liu, Y.D. A comprehensive
ware systems. In this study we suggest 21. Kan, E.Y.Y. Energy efficiency in testing and regression study on the energy efficiency of Java thread-safe
testingA comparison of DVFS techniques. In collections. In Proceedings of ICSME, 2016.
this is primarily due to two problems: Proceedings of QSIC 13, 2013, 280283. 48. Pinto G., Soares-Neto, F., and Castor, F. Refactoring for
the lack of knowledge and the lack of 22. Khalid, H., Shihab, E., Nagappan, M., and Hassan, A.E. energy efficiency: A reflection on the state of the art.
What do mobile app users complain about? IEEE In Proceedings of GREENS, 2015.
tools. With these problems in mind, Software 32, 3 (2015), 7077. 49. Ribic, H. and Liu, Y.D. Energy-efficient work-stealing
language runtimes. In Proceedings of ASPLOS, 2014,
this article reviewed most of the recent 23. Kwon, Y. and Tilevich, E. Reducing the energy
513528.
consumption of mobile applications behind the scenes.
energy-related contributions in the soft- In Proceedings of ICSM, 2013, 170179. 50. Ribic, H. and Liu, Y.D. Aequitas: Coordinated energy
management across parallel applications. In
ware engineering community. We dis- 24. Li, D. and Halfond, W.G.J. An investigation into energy-
Proceedings of the 2016 International Conference on
saving programming practices for android smartphone app
cuss how software energy consumption development. In Proceedings of GREENS 2014, 4653. Supercomputing, 2016, 4:14:12.
51. Saborido, R., Arnaoudova, V., Beltrame, G., Khomh, F.,
research is evolving to mitigate these 25. Li, D., Hao, S., Gui, J., and Halfond, W.G.J. An
and Antoniol, G. On the impact of sampling frequency
empirical study of the energy consumption of Android
two problems and, when appropriate, applications. In Proceedings of ICSME, 2014, on software energy measurements. PeerJ PrePrints,
2015, 3:e1219.
we highlight key research gaps that 121130.
26. Li, D., Hao, S., Halfond, W.G.J., and Govindan, R. Calculating
need better attention. source line level energy information for android Gustavo Pinto (gpinto@ufpa.br) is an assistant professor
applications. In Proceedings of ISSTA, 2013, 7889. at the Federal University of Par, Brazil.
27. Li, D., Jin, Y., Sahin, C., Clause, J., and Halfond, W.G.J.
References Integrated energy-directed test suite optimization. In Fernando Castor (castor@cin.ufpe.br) is an associate
1. Abran, A., Bourque, P., Dupuis, R., and Moore, J.W., Proceedings of ISSTA, 2014, 339350. professor at the Federal University of Pernambuco, Brazil.
editors. Guide to the Software Engineering Body of 28. Li, D., Lyu, Y., Gui, J., and Halfond, W.G.J. Automated
Knowledge (SWEBOK), 2001. energy optimization of http requests for mobile
2. Aggarwal, K., Hindle, A., and Stroulia, E. GreenAdvisor: applications. In Proceedings of ICSE, 2016, 249260. 2017 ACM 0001-0782/17/12 $15.00.
A tool for analyzing the impact of software evolution 29. Li, D., Tran, A.H., and Halfond, W.G.J. Making
on energy consumption. In Proceedings of ICSME web applications more energy efficient for OLED
(Sept. 2015), 311320. smartphones. In Proceedings of ICSE, 2014, 527538.
3. Aggarwal, K., Zhang, C., Campbell, J.C., Hindle, A., 30. Lima, L.G., Soares-Neto, F., Lieuthier, P., Castor, F.,
and Stroulia, E. The power of system call traces: Melfe, G., and Fernandes, J.P. Haskell in green land: Watch the authors discuss
Predicting the software energy consumption impact of Analyzing the energy behavior of a purely functional their work in this exclusive
changes. In Proceedings of CASCON, 2014, 219233. language. In Proceedings of SANER, 2016, 517528. Communications video.
4. Banerjee A., Chong, L.K., Chattopadhyay, S., and 31. Linares-Vasquez, M., Bavota, G., Bernal-Cardenas, C., https://cacm.acm.org/videos/
Roychoudhury, A.. Detecting energy bugs and hotspots in Oliveto, R., Di Penta, M., and Poshyvanyk, D. Mining energy-efficiency-a-new-
mobile apps. In Proceedings of ESEC/FSE, 2014, 588598. energy-greedy api usage patterns in android apps: An concern-for-application-
5. Banerjee, A. and Roychoudhury, A. Automated re- empirical study. In Proceedings of MSR, 2014, 211. software-developers

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 75


Introducing ACM Transactions
on Human-Robot Interaction

Now accepting submissions to ACM THRI

In January 2018, the Journal of Human-Robot Interaction (JHRI) will become an ACM
publication and be rebranded as the ACM Transactions on Human-Robot Interaction (THRI).

Founded in 2012, the Journal of HRI has been serving as the


premier peer-reviewed interdisciplinary journal in the field.

Since that time, the human-robot interaction field has


experienced substantial growth. Research findings at the
intersection of robotics, human-computer interaction,
artificial intelligence, haptics, and natural language
processing have been responsible for important discoveries
and breakthrough technologies across many industries.

THRI now joins the ACM portfolio of highly respected


journals. It will continue to be open access, fostering the
widest possible readership of HRI research and information.
All issues will be available on the ACM Digital Library.

Editors-in-Chief Odest Chadwicke Jenkins of the University of Michigan and Selma


abanovi of Indiana University plan to expand the scope of the publication, adding a new
section on mechanical HRI to the existing sections on computational, social/behavioral,
and design-related scholarship in HRI.

The inaugural issue of the rebranded ACM Transactions on Human-Robot Interaction is


planned for March 2018.

To submit, go to https://mc.manuscriptcentral.com/thri
research highlights
P. 78 P. 79
Technical
Perspective A Theory of Pricing
Pricing Information Private Data
(and Its Implications) By Chao Li, Daniel Yang Li, Gerome Miklau, and Dan Suciu
By Aaron Roth

P. 87 P. 88
Technical
Perspective Automatically Accelerating
A Simple, Elegant Non-Numerical Programs
Approach to
Non-Numeric by Architecture-Compiler
Parallelization Co-Design
By James Larus By Simone Campanoni, Kevin Brownell, Svilen Kanev,
Timothy M. Jones, Gu-Yeon Wei, and David Brooks

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 77


research highlights
DOI:10.1145/ 3 1 3 9 45 5

Technical Perspective
To view the accompanying paper,
visit doi.acm.org/10.1145/3139457 rh

Pricing Information
(and Its Implications)
By Aaron Roth

SELLING PERSONAL INFORMATION is very authors are making the market safe a buyer can access the dataset by ask-
different from selling physical goods, for buyers. ing arbitrary statistical queries, and
and raises novel challenges. On the Reasoning about these arbitrage can run any learning algorithm in the
sell-side of the market, individuals opportunities can be complicated: SQ model to derive the answers to
own their own personal data and ex- if the values of the purchased linear other queries.5 Can the large litera-
perience costs based on the usage of functions were revealed exactly, then ture on SQ learning be used to give
their data insofar as that usage leads the answer to any other query in the arbitrage-free pricings for more gen-
to future quantifiable harm. On the span of the purchased queries would eral notions of arbitrage?
buy-side of the market, buyers are in- be derivable. But to guarantee the 3. Seller profit: Arbitrage-free pric-
terested in statistical information sellers differential privacy, it is nec- ings give a family of dominant-strat-
about the dataset, that is, aggregate essary to sell only noisy estimates of egy truthful mechanisms for selling
information, rather than informa- the data. This makes reasoning about information. Suppose we know some-
tion derived from a single individ- what is derivable complex. Sensi- thing about the distribution of buyer
ual. Differential privacy1 provides bly, since they are introducing a new demandscan we find the arbitrage-
a means to quantify the harm that problem, the authors opt to study a free pricing that maximizes seller
can come to individual data owners restricted notion of derivability and profit? This is particularly intriguing,
as the result of the use of their data. arbitrage. They give pricings that rule because it seems the seller can some-
This ability to quantify harm allows out arbitrage opportunities when the times increase her profit by selling
for data owners to be compensated buyer is only allowed to learn by tak- noisier queries, thereby reducing the
for the risk they incur. Past work ing linear combinations of observed complementarities among the goods
studying markets for private data queries, is interested only in un- she is selling. The opportunity to in-
focused on the simple case in which biased estimates of query values, and crease profit by degrading product
the buyer is interested in only the an- will attempt arbitrage only at the level quality rarely arises in markets for
swer to a single linear function of the of one query at a time. Because of the physical goods.
data,2,3,4,6 which makes the buy-side of richness of the authors problem, one This paper opens a rich research
the market particularly simple. of the most exciting aspects of this direction. I recommend that new Ph.D.
The following paper introduces work is the doors it opens for future students (or anyone looking for an
a fascinating and complicated is- exploration. Here, I will highlight attractive problem) read it.
sue that arises on the buy-side of the what I think are the most interesting
market when buyers are interested in problems coming out of this paper: References
1. Dwork, C., McSherry, F., Nissim, K. and Smith, A.
multiple linear functions of the same 1. Multi-query arbitrage: The paper Calibrating noise to sensitivity in private data analysis.
dataset. Information exhibits com- gives query pricings such that a buyer In Proceedings of the 3rd Theory of Cryptography
Conference, 2006, 265284.
plementarities: given some informa- can never more cheaply derive the 2. Fleischer, L. and Lyu, Y.-H. Approximately optimal
tion about a dataset, it is possible to answer to a single query by buying a auctions for selling privacy when costs are correlated
with data. In Proceedings of the ACM Conference on
learn other things about the dataset. different bundle of queries. However, Electronic Commerce, 2012, 568-585.
This means that when pricing infor- 3. Ghosh, A. and Roth, A. Selling privacy at auction.
the buyer can still sometimes more Games and Economic Behavior (2015), 334346.
mation, there might be opportuni- cheaply derive the answer to one bun- 4. Ghosh, A., Ligett, K., Roth, A. and Schoenebeck,
G. Buying private data without verification. In
ties for arbitrage: rather than directly dle of queries by buying the answers Proceedings of the ACM Conference on Economics and
buying the answer to the query he is to another bundle! Which pricings Computation, 2014, 931948.
5. Kearns, M. Efficient noise-tolerant learning from
interested in, the buyer might instead can prevent this? statistical queries. J. ACM (1998), 9831006.
more cheaply buy a bundle of que- 2. Arbitrage for biased estimators: 6. Nissim, K., Vadhan, S. and Xiao, D. Redrawing the
boundaries on purchasing data from privacy-sensitive
ries that lets him deduce the answer When buyers are only interested in individuals. Innovations in Theoretical Computer
he is interested in. The authors give unbiased estimates, the best linear Science (2014), 411422.
conditions under which a pricing is unbiased estimator is always given by
arbitrage free. This is a compelling least-squares linear regression. How- Aaron Roth (aaroth@cis.upenn.edu) is the Class of 1940
Bicentennial Term Associate Professor at the University of
condition to ask for: it means that it is ever, buyers can often improve the ac- Pennsylvania, Philadelphia, PA.
a dominant strategy for arriving buy- curacy of their derivations by trading
ers to faithfully request the answer to off a small amount of bias for a large
the query they are interested in, rath- reduction in variance. The space of
er than trying to game the system. By optimal estimators is much more
asking for arbitrage-free pricings, the complex when they do so. In general, Copyright held by author.

78 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


DOI:10.1145 / 3 1 3 9 45 7

A Theory of Pricing Private Data


By Chao Li, Daniel Yang Li, Gerome Miklau, and Dan Suciu

Abstract companies acquire personal data by offering a (purportedly)


When the analysis of individuals personal information has free service, attracting users who provide their data, and
value to an institution, but it compromises privacy, should then monetizing the personal data by selling it, or by selling
individuals be compensated? We describe the foundations information derived from it, to third parties.
of a market in which those seeking access to data must pay Even so, a technical foundation for a market for personal
for it and individuals are compensated for the loss of privacy information is lacking, particularly one that is consistent
they may suffer. with recent advances in the formal modeling of privacy. We
address this by proposing a formal framework for assign-
ing prices to queries in order to compensate data owners
1. INTRODUCTION for their loss of privacy. Our framework borrows from, and
The interests of individuals and institutions with respect extends, key principles from both differential privacy7, 8 and
to personal data are often at odds. Personal data has great data markets.17, 21
value to institutions: they eagerly collect it and monetize There are three types of actors in our setting: individu-
it by using it to model customer behavior, personalize ser- als, or data owners, contribute their personal data; a buyer
vices, target advertisements, or by selling the data directly. submits an aggregate query over many owners data; and a
Yet the inappropriate disclosure of personal data poses a market maker, trusted to answer queries on behalf of own-
risk to individuals. They may suffer a range of harms includ- ers, charges the buyer and compensates the owners.
ing elevated prices for goods or services, discrimination, or Our framework makes three important connections:
exclusion from employment opportunities.3
A rich literature on privacy-preserving data analysis4, 6, 11 1.1. Perturbation and price
has tried to devise technical means for negotiating these In response to a buyers query, the market maker computes
competing interests. The goal is to derive accurate aggre- the true query answer, adds random noise, and returns a
gate information from data collected from a group of perturbed result. Using differential privacy, perturbation
individuals while at the same time protecting each mem- is always necessary. Here query answers can be sold unper-
bers personal information. But this approach necessarily turbed, but the price would be high because each data
imposes restrictions on the use of data. A seminal result owner contributing to an aggregate query needs to be com-
from this line of work is that any mechanism providing pensated. By adding perturbation to the query answer, the
reasonable privacy must strictly limit the number of query price can be lowered: the more perturbation, the lower the
answers that can be accurately released.5 Nevertheless, price. When issuing the query, the buyer specifies the degree
recent research into differential privacy,7 a formal model of accuracy for which he is willing to pay. Unperturbed query
of privacy in which an individuals privacy loss is rigorously answers are very expensive, but at the other extreme, query
measured and bounded, has shown that, for some appli- answers are almost free if the noise added is the same as
cations, accurate aggregate analysis need not entail sig- required by differential privacy with conservative privacy
nificant disclosure about individuals. Practical adoption parameters. The relationship between the accuracy of a
of these techniques is slowing increasing: they have been query result and its cost depends on the query and the pref-
used in a U.S. Census product16 and for application moni- erences of contributing data owners. Formalizing this rela-
toring by Google9 and Apple.13 tionship is one of the goals of this article.
But there remain settings where strictly limiting privacy
loss degrades the utility of data and means the intended use 1.2. Arbitrage and perturbation
of data will be impossible. We therefore pursue an alterna- Arbitrage allows a buyer to obtain the answer to a query more
tive approach which allows a non-negligible degree of privacy cheaply than its advertised price by deriving the answer from
loss if that loss is compensated in accordance with users a less expensive alternative set of queries. Arbitrage is pos-
preferences. Compensating privacy loss is an improvement sible because of inconsistency in a set of priced queries. As
over the narrower view that mandates negligible privacy a simple example, suppose that a given query is sold with
loss because it empowers individuals to control their data two options for perturbation, measured by variance: $5 for
through financial means and permits more accurate data a variance of 10 and $200 for a variance of 1. A savvy buyer
analysis if end-users are willing to pay for it. seeking a variance of 1 would never pay $200. Instead, he
Considering personal information as a resource, one that would purchase the first query 10 times, receive 10 noisy
is valuable but also exchangeable, is not new. Twenty years answers, and compute their average. Since noise is added
ago, Laudon proposed that personal information be bought independently, the variance of the resulting average is 1,
and sold in a national market18 and there is a mature litera-
ture on economic aspects of privacy.1 And in todays online
The original version of this paper was published in ACM
services, one could argue that individuals are compensated
Transactions on Database Systems 39, 4 (Dec. 2014), 128.
indirectly for contributing their personal data. Many internet

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 79


research highlights

and the total cost is only $50. The pricing of queries should The market maker. The market maker is trusted by the
avoid arbitrage opportunities. While this has been consid- buyer and by each of the data owners. He collects data from
ered before for data markets,2, 17, 21 it has not been studied the owners and sells it in the form of queries. When a buyer
for perturbed query answers. Formalizing arbitrage for noisy decides to purchase a query, the market maker collects
queries is a second goal of this article. payment, computes the answer to the query, adds noise as
appropriate, returns the result to the buyer, and finally dis-
1.3. Privacy-loss and payments tributes individual payments to the data owners. The market
Given a randomized mechanism for answering a query q, a maker may retain a fraction of the price as profit.
common measure of privacy loss to an individual is defined by The owner and her data. Each owner contributes a single
differential privacy7: it is the maximum ratio between the prob- tuple conforming to a relational schema R(A), with attri-
ability of returning some fixed output with and without that butes A = {A1, A2, ..., Ak}. The crossproduct of the attribute
individuals data. Differential privacy imposes a bound of e on domains, written dom(A), is the set of all possible tuples that
this quantity, where is a small constant, presumed acceptable could occur. For a fixed k, its size, n = |dom(A)|, is polynomial
to all individuals. Our framework contrasts with this in several in the number of users; n grows exponentially with k. Having
ways. First, the privacy loss is not bounded, but depends on the collected tuples from each owner, the market maker forms a
buyers request. If the buyer asks for a query with low variance, relational table I, an instance of R(A).
then the privacy loss to individuals will be high. These data The buyer and his queries. The buyer is a data analyst
owners must be compensated for their privacy loss by the buy- who wishes to compute some queries over a data. We restrict
ers payment. In addition, we allow each data owner to value our attention to linear aggregation queries over instance I,
their privacy loss separately, by demanding greater or lesser a common class of queries that has received considerable
payments. Formalizing the relationship between privacy loss attention from the privacy community.8, 15, 19
and payments to data owners is a third goal of this article. To express linear queries, we first represent the instance
In our framework, the burden of the market maker is I by a finite data vector x consisting of non-negative integral
not to enforce a strict limit on the privacy loss of individu- counts. For each element t dom(A), the vector x has one
als. Instead, they must ensure that prices are set such that, entry that reports the number of individuals whose tuple
whatever disclosure is obtained by the buyer, all contribut- matches t. We assume that dom(A) is ordered, and denote
ing individuals are properly compensated. In particular, if xi the ith entry in the vector x. In other words, xi represents
a sequence of queries can indeed reveal the private data for the number of individuals whose attribute values match the
most individuals, its price must approach the total cost of ith entry in dom(A). Although the size n of the vector x can be
the entire database. large, in practice one avoids fully materializing x and retains
only the relational representation of I.
2. BACKGROUND
In this section we describe the basic architecture of the pri- Definition 1 (Linear Query). A linear query is a real-valued
vate data pricing framework, illustrated as shown in Figure 1. vector q = (q1, q2 ... qn). The answer q(x) to a linear query on x
isthe vector product qx = q1x1 + ... + qnxn.
2.1. The main actors
The main actors in our proposed marketplace are data own- The class of linear queries includes many common aggre-
ers, query buyers, and a market maker negotiating between gation queries including general predicate counting queries
the two. and familiar statistical queries such as histogram counts,

Figure 1: The pricing framework has 3 components: (A) Pricing and purchase: the buyer asks a query Q = (q, v) and must pay its price, (Q);
(B) Privacy loss: by answering Q, the market maker leaks some information about the private data of the data owners to the buyer; (C)
Compensation: the market maker must compensate each data owner for their privacy loss with micro-payments; i(Q) is the total of the
micro-payments for all users in bucket i. The pricing framework is balanced if the price (Q) is sufficient to cover all micro-payments i and
the micro-payments i compensate the owners for their privacy loss .

(B) Privacy loss:

Data records
1(Q) A1. Price request: Q=(q, v)
Owner 1 (a1,b1)
2(Q)
Owner 2 (a2,b2) A2. Price: o(Q)
3(Q) Market
Owner 3 (a3,b3) Buyer
maker A3. Payment: $
4(Q)
Owner 4 (a4,b4)
5(Q) A4. Query answer
Owner 5 (a5,b5) q(x)+noise
(C) Compensation (A) Pricing & purchase

80 COMM UNICATIO NS O F THE AC M | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


data cube queries, and marginals. Linear queries can wewill restrict the noise to the Laplace distribution, for
express differences, weighted counts, and averages over dis- which there exists an explicit formula connecting the pri-
crete domains. While the query vector q is large, in practice vacy loss to the variance. In that case the micro-payment
queries are expressed compactly, directly over the relational depends on the buyers query, i(Q). For the pricing frame-
representation of a data, in a query language like Structured work to be balanced, we must have . Note
Query Language (SQL). that i(Q) needs to be further split among all users partici-
pating in the ith bucket of the data x.
Example 2. Consider a competition between candidates A
and B that is decided by a population of voters. The ratings Example 3. Continuing Example 2, suppose that there are 1000
and descriptive fields of voters are sensitive and should be voters, and that Bob, the buyer, wants to compute the sum of
compensated properly if used in any way. Imagine that users ratings for candidate A. Assume that each voter requires $10 for
contribute their gender and age along with two numerical rat- each raw vote. For an accurate answer to the query, Bob needs
ings, each consisting of values from the domain {0, 1, 2, 3, 4, 5}. to pay $10, 000, which is, arguably, too expensive.
Thus Alices tuple may be (Female, 39, 0, 5) if she strongly Assume Bob is willing to buy the query perturbed with vari-
favors candidate B over candidate A. If the domain for the age ance v = 5, 000, which would give an error of 300 with 94% confi-
attribute is [1 ... 120], then the database vector will have size dence. The market maker should charge Bob a much lower price;
2 120 6 6 = 8640. to see how low, we need to consider how the market maker com-
Examples of linear queries include: the total of all ratings pensates the data owners. We assume that he uses Laplace noise
for candidate A; the number of female voters over 40 who gave for the perturbation, and therefore one can show that the answer
candidate A a rating of 5; the number of voters whose rating to the query is -differentially private with = 0.1, which offers
for candidate A exceeds that for candidate B. reasonably good privacy to all data owners: each will be happy to
accept only $0.001 for basically no loss of privacy, and Bob pays
We make two comments about our framework. First, only $1 for the entire query. The challenge is to design the prices
although the vector x removes personally identifiable infor- in between. For example, suppose the data owner wants to buy
mation (since xi is the total number of users with a particular more accuracy, say a variance v = 50, to reduce the error to 30.
combination of attribute values), queries can still leak infor- How should the price be set? For now, let us observe that the price
mation about individual users. Differential privacy is designed cannot exceed $100. If it did, then a savvy buyer would never pay
to limit such leaks. Second, we assume that the buyer is allowed that price, instead he would purchase the $1 query 100 times,
to issue multiple queries, which means that he can combine compute the average, and obtain the answer with a variance of
information derived from multiple queries to infer answers 5000/100 = 50. This is an example of arbitrage and the market
to other queries not explicitly requested. This presents a chal- maker should define a pricing function that avoids it.
lenge we must address: to ensure that the buyer pays for any
information that he might derive directly or indirectly. While in the contract with the buyer the price depends
only on the variance and not on the type of perturbation, the
2.2. Balanced pricing frameworks contract with the data owner is highly sensitive to the type
The market maker enters into two contracts: (1) they prom- of noise. For example, consider noise defined by the follow-
ise to answer a buyers queries according to an agreed price, ing probability distribution: P(0) = 1 2/m and P(m) = 1/m,
, (Section 3), and (2) they promise to compensate the data where m = 1064. This noise distribution has mean 0 and vari-
owners with a micro-payment i() whenever they suffer a ance 2m, but is a poor choice for this market. On the one
privacy loss in response to a buyers query (Section 5). hand, it has a high variance, which implies a low price . On
In the contract with the buyer, the market maker allows the other hand, it returns an accurate answer with extremely
the buyer to specify, for each linear query q, an amount of high probability, leading to huge privacy losses i, and, con-
noise v that he is willing to tolerate in the answer. Adding sequently, to huge micro-payments. The market maker will
noise reduces the price. Thus, the buyers query is a pair not be able to recover his costs. Thus, in order to design a
Q = (q, v), where q is a linear query and v 0 represents an balanced pricing framework, we need to have a perturbation
upper bound on the variance, and the price depends on both, mechanism where the privacy loss is given by an explicit
(Q) = (q, v) 0. The market maker answers by first comput- function in the variance; in Section 5.1 we will only consider
ing the exact answer q(x), then adding noise sampled from a the Laplace mechanism, where such a function exists.
distribution with mean 0 and variance at most v. This feature
gives the buyer more pricing options because, by increasing 3. PRICING QUERIES
v, he can lower his price. Notice that the price depends only In this section we describe the first component of the frame-
on the variance v, and not on the type of noise. work as shown in Figure 1: the pricing function (Q) = (q, v).
In the contract with the data owners, the market maker We denote R+ = [0, ) and .
promises to compensate her with a micro-payment. We
denote i() the sum of all micropayments to all users whose Definition 4. A pricing function is : .
attributes match the ith entry to the vector, where is the
privacy loss incurred by answering the query Q. The privacy In our framework, the buyer is allowed to issue multiple
loss depends both on the variance, and on the type of noise queries. As a consequence, an important concern is that
that the market maker uses to answer queries: in Section4 the buyer may combine answers from multiple queries and

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 81


research highlights

derive an answer to a new query, without paying the full price Then we can answer the query Q3 = ((q1 + q2)/2, (v1 + v2)/4)
for the latter, a situation we call arbitrage. A reasonable pric- by applying the function f (y1, y2) = (y1 + y2)/2. We pay only for
ing function must guarantee that no arbitrage is possible, in Q1, Q2, and do not pay again for Q3.
which case we call it arbitrage-free. Such a pricing function How do we check if a query can be answered from a given
ensures that the market maker receives proper payment for set of queries? In this paper we give a partial answer, by char-
each query by removing any incentive for the buyer to game acterizing when a query is linearly answerable.
the system by asking a set of cheaper queries in order to
obtain the desired answer. Here we formally define arbitrage- Proposition 7. Let S = {(q1, v1), ..., (qm, vm)} be a multi-set of
free pricing functions, study their properties, and discuss the queries, and Q = (q, v) be a query. Then the following conditions
construction of arbitrage-free pricing functions. are equivalent.

3.1. Queries and answers 1. S Q.


A randomized mechanism is a random function K, with some 2. There exists c1, ..., cm such that c1q1+...+cmqm = q and
input x, denoted K(x). For a given query Q = (q, v), the market .
maker answers it using a randomized mechanism KQ, with the
property that, for any x, E(KQ(x)) = q(x) and Var (KQ(x)) v. It follows that deciding determinacy can be done in poly-
In other words, when the buyer asks for a query Q, the mar- nomial time, by solving for the coefficients c1, ..., cm using a
ket maker samples one value from the distribution KQ and quadratic program.
returns it to the buyer, in exchange for payment (Q). We
abbreviate KQ with K when Q is clear from the context. 3.3. Arbitrage-free pricing functions: Definition
Arbitrage is possible when the answer to a query Q can
Definition 5. We say that a random function K(x) answers be obtained more cheaply than the advertised price (Q)
the query Q = (q, v) on the database x if its expectation is q(x) from an alternative set of priced queries. When arbitrage
and its variance is less than or equal to v. is possible it complicates the interface between the buyer
and market maker: the buyer may need to reason carefully
Other options for answering queries are possible, and we about his queries to achieve the lowest price, while at the
briefly discuss them in Section 6. same time the market maker may not achieve the revenue
To illustrate with a simple example, consider the mech- intended by some of his advertised prices. Thus, arbitrage
anism KQ which, on input x first computes the query q(x), is undesirable, and we want to design pricing functions that
then adds random noise with mean 0 and variance v. In this are arbitrage-free.
section we do not impose any restrictions on the type of per-
turbation used in answering the query. Definition 8 (Arbitrage-free). A pricing function is
We assume that the market maker is stateless: he does arbitrage-free if, whenever a multi-set of queries determines a
not keep a log of previous users, their queries, or of released query, the multi-set is at least as expensive as the query. That is,
answers. As a consequence, each query is answered using an S Q implies Q S (Q) (Q).
independent random variable. If the same buyer issues the
same query repeatedly, the market maker answers using inde- If does permit arbitrage, then a buyer would never pay
pendent samples from the random function K. Of course, full price for the determined query, but instead would pur-
the buyer would have to pay for each query separately. chase the multiset of queries that determine it.

3.2. Answerability Example 9. Consider a query (q, v) offered for price (q, v).
Before investigating arbitrage we establish the key concept of A buyer who wishes to improve the accuracy of the query may
query answerability. This notion is well studied for determinis- ask the same query n times, (q, v), (q, v), ..., (q, v), at a total
tic queries and views,14, 22 but, in our setting, the query answers cost of n (q, v). The buyer then computes the average of the
are random variables, and it requires a precise definition. query answers to get an estimated answer with a much lower
variance, namely v/n. The pricing function must ensure that
Definition 6 (Answerability). A query Q is answerable the total payment collected from the buyer covers the cost
from a multi-set of queries S = {Q1, ..., Qk} if there exists a func- ofthis lower variance, in other words n (q, v) (q, v/n).
tion f : Rk R such that, for any mechanisms K1, ..., Kk, that If is arbitrage free, then it is easy to check that this condi-
answer the queries Q1, ..., Qk, the composite mechanism defined tion holds. Indeed, {(q, v), ..., (q, v)} (nq, nv) (q, v/n),
as answers the query Q. and arbitrage-freeness implies (q, v/n) (q, v) + ... +
We say that Q is linearly answerable from S, and write S Q, (q, v) = n (q, v).
if the function f is linear; in that case, we will also say that S
determines Q. One can prove20 that any arbitrage-free pricing function
has the following properties:
In other words, if we have already computed some que-
ries, then we can compute a new query by applying a function (1) The zero query is free: (0, v) = 0.
to their results. For example, suppose we have computed (2)Higher variance is cheaper: v v implies (q, v)
Q1 = (q1, v1) and Q2 = (q2, v2), and obtained the answers y1, y2. (q, v).

82 COMMUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


(3)The zero-variance query is the most expensivea: (q, 0) By using these two propositions we can construct a large
(q, v) for all v 0. set of arbitrage-free pricing functions. We list here a few:
(4)Infinite noise is free: if is continuous at q = 0, then
(q, ) = 0. Corollary 12. All functions defined below are arbitrage-free,
(5)As v , (q, v) = (1/v). assuming 1, ..., k are arbitrage free:
L2-norm:
Arbitrage-free pricing functions have been studied
before,17, 21 but only in the context of deterministic (i.e. unper- L-norm:
turbed) query answers. Our definition extends those in17, 21 to
Weighted L2: where w1, ..., wn 0
queries with perturbed answers.
Linear comb.: c11 + ... + ckk where c1, ..., ck 0
3.4. Arbitrage-free pricing functions: Synthesis Maximum: max(1, ..., k)
Does an arbitrage-free pricing function exist? The zero-cost Cut-off: min(1, c) where c 0
function = 0, where every query is free, is arbitrage-free. Power: where 0 < c 1
A constant-price pricing function, which charges the same Logarithmic: log(1 + 1)
amount c > 0 for every query, is not arbitrage-free, because Geometric mean:
in that case the zero-query would also cost c, and by item (1) Bounded f: f(1) where
above must have arbitrage. In this section we prove that
non-trivial arbitrage-free pricing functions exist, and give The last entry defines bounded pricing functions, in
some sufficient rules for synthesizing such functions, and in particular they charge a finite price for the raw data.
Section 3.5 we show that general construction of arbitrage-
free pricing functions remains a difficult problem. 3.5. Deriving pricing functions from price points
Example 9 and item (5) suggest defining a pricing func- We discuss here a more flexible framework for defining an
tion that decreases linearly with the variance, 1/v. Recall arbitrage-free pricing function: the market maker sets the
that a semi-norm is a function f : Rn R+ that satisfies the price for a finite set of queries called views, then the system
following properties: automatically extrapolates this to a pricing function on all
queries.
For any c R and any q Rn, f (cq) = |c| f(q).
For any q1, q2 Rn, f(q1 + q2) f(q1) + f (q2). Definition 13. A price point is a pair (V, p), where V = (q, v) is
a query (called a view) and p R+ is a fixed price.
One can check that, q = 0 implies f (q) = 0; if the converse also Given a set of price points V = ((V1, p1), ..., (Vm, pm)), we say
holds, then f is called a norm. We prove: that a pricing function is valid w.r.t. V if it is arbitrage-free
and agrees with all price points, (Vi) = pi, for all (Vi, pi) V,
Proposition 10 (Basic pricing functions). Let be a pric-
ing function of the form (q, v) = f 2(q)/v, for some function f. This represents an ideal pricing framework because the
Then is arbitrage-free iff f is a semi-norm. market maker only needs to set prices for a small number
of queries and variances, and the system extrapolates it to
Thus, we can obtain an arbitrage-free pricing function a valid pricing function. However, the technical challenge
from a semi-norm. However, all these pricing functions set is: how do we compute a valid pricing function from a set of
an infinite price for the raw (unperturbed) data, because price points?
in that case the variance is v = 0. In some cases, the market In general, there may not exist a valid pricing function.
maker may be willing to sell the raw data for some high, but For example, the market maker may choose two views such
finite price. We describe next a method for synthesizing that the first determines the second, yet the price of the sec-
other arbitrage-free pricing functions, including ones that ond is set higher than that of the first view. No arbitrage-free
set a finite price for the raw data. pricing function can agree with both price points. If any
valid pricing function exists, then we say that the set of price
Proposition 11 (Composed pricing functions). Let points is consistent.
f : be a function that is sub-additive and non- The key to designing a valid pricing function is to com-
decreasing (meaning f (x + y) f (x) + f (y), and x y implies pute, for any given query, the cheapest plan to answer it from
f (x) f (y)). Then, for any arbitrage-free pricing functions the views in the set of price points. A procurement plan is a
1,..., k, the function = f (1, ..., k) is also arbitrage-free. plan for answering a query by purchasing views in the set of
price points.
A simple sufficient criterion for checking if a function f
satisfies the properties required by the proposition is the fol- Definition 14 (Procurement Plan). Consider an ordered
lowing: if f is continuous, twice differentiable, f (0) = 0, f/xi set of price points, V = {(V1, p1), (V2, p2), ..., (Vm, pm)}. A pro-
0, 2f/xixj 0 for all i, j = 1, k, then it is non-decreasing curement plan is an ordered multi-set of non-negative integers,
and sub-additive. B = {b1, b2, ..., bm}, such that the multiset
(where each query Vi occurs bi times) determines Q: V B Q. The
a
It is possible that (q, 0) = . cost of the procurement plan is cost(B) = i bi pi.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 83


research highlights

For a simple example, suppose there is a single price point,


V = {((q, 100), $5)}, which charges $5 for some query with
variance 100. The buyer wants to purchase Q = (q, 25). Then,
a procurement plan is {b1 = 4}. In other words, we must pur- where x ranges over all possible databases and S ranges over
chase the query 4 times, and compute the average, in order measurable sets of R.
to reduce the variance to 25 (since the random noise added
to different purchases is independent). Recall that in Section 3 we defined the price (Q) to
Procurement plans should not be confused with answer- depend only on the variance, and not on the mechanism
ability (Definition 6). There the queries were already pur- used to answer the query. But the definition of privacy loss
chased. Now we have to decide which views to purchase and, depends on the mechanism K, so now we need to choose
in particular, we may purchase a view several times. We call a particular mechanism. We will use the classical Laplace
the cost of the cheapest procurement plan the arbitrage pric- mechanism; in that case, the privacy loss can be given as
ing function. a function of the variance, and of a property that depends
only on the query, called query sensitivity.7 The sensitivity of
Definition 15. Given a set of price-points V, the arbitrage q, denoted sq, is the largest possible change to the answer
pricing function is: that can be caused by adding or removing one individuals
contribution:
Formally, the Laplace Mechanism, denoted L, answers
Note that, by this definition, if a query is not answerable a query Q = (q, v) by returning LQ(x) = q(x) + , where is
from a set of price points, then the arbitrage price is . noise drawn from a Laplace distribution, centered at zero,
Thearbitrage function has a simple interpretation. Once the with scale . The privacy loss of each individual is
views are offered for sale, a buyer can purchase any query and bounded by .6
pay only the arbitrage function, regardless of what the market
maker wants to charge for that query. The arbitrage function 5. BALANCED PRICING FRAMEWORKS
is thus an upper bound on any valid pricing function. Could In this section we define formally when a pricing frame-
the market maker choose the arbitrage function as the offi- work is balanced and we provide a general procedure for
cial price for all queries? We answer this positively, by prov- designing a balanced pricing framework. The concept of
ing that the arbitrage function is indeed arbitrage-free. balance brings together the three components as shown
in Figure 1: the query price , the privacy loss , and
Theorem 16. For any set of price points V, the arbitrage the micro-payments i. We begin with a description of
function V is arbitrage-free. V is consistent, if the arbitrage micro-payments.
price does not lower the price of any view: pi V (Vi) for all
(Vi, pi) V. 5.1. Micro-payments to data owners
By answering a buyers query Q, using some mechanism
Thus, one choice for the market maker is to set all prices KQ, the market maker leaks some of the private data of the
to be the arbitrage function. Unfortunately, it turns out that data owners. He must compensate each data owner with
computing the arbitrage function is NP-hard. some micro-payment. Recall that i(Q) denotes the sum
of all micro-payments due to the data owner whose attri-
Theorem 17. The following problem: Given a set of price butes match xi, the ith entry in the data vector. The micro-
points V, a query Q, and budget p > 0, decide whether Q is payments close the loop as shown in Figure 1: they must
answerable from V within a budget p (in other words, check be covered by the buyers payment , and must also be a
V(Q) p), is NP-complete. function of the degree of the privacy loss . We require the
micro-payment functions i to be arbitrage-free, in order
The proof if by reduction from the Exact Cover by 3-Sets to promise that the owners loss of privacy will be compen-
problem. Hardness holds even if all views in V have variance 0. sated, and that there is no way for the buyer to circumvent
the owed micro-payment by asking other queries and com-
4. PRIVACY LOSS bining their answers.
In this section we describe the second component of the pric-
ing framework as shown in Figure 1: the privacy loss for each 5.2. Balanced pricing frameworks: Definition
owner, denoted by . Our definition of privacy loss follows that The contract between data owners and the market-maker
of differential privacy. Given the database vector x, denote by consists of non-decreasing functions Wi : , i = 1, n,
x( j) the database vector that results from adding one count to s.t. Wi(0) = 0. Here : the market maker prom-
entry j and leaving all other values unchanged. An individuals ises to pay the data owners contributing to the i bucket a
privacy loss is measured by comparing the mechanism output micro-payment of at least i Wi() in the event of a pri-
on two data vectors that differ in any one entry. vacy loss . We denote W = (W1, ..., Wn) the set of contracts
between the market maker and all data owners.
Definition 18. Let K be any mechanism (meaning: for any The connection between the micro-payments i, the
database instance x, K(x) is a random variable). The privacy query price and the privacy loss i is captured by the follow-
loss to each user, in notation , is defined as: ing definition.

84 COMMUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


Definition 19. We say that the micro-payment functions i, was proposed by Ghosh et al., in which the budget is deter-
i = 1, ..., n are cost-recovering for a pricing function if, for any mined by the budget of the data analyst.12
query Q, (Q) i i(Q).
Fix a query answering mechanism K. We say that a micro- 5.3. Balanced pricing frameworks: Synthesis
payment function i is compensating for a contract function Call (, , W) semi-balanced if all micro-payment functions
Wi, if for any query Q, i(Q) Wi((KQ)). are arbitrage free and compensating w.r.t. K; that is, we leave
out the pricing function and the cost-recovering require-
The market maker will insist that the micro-payment ment. The first step is to design a semi-balanced set of
functions are cost-recovering: otherwise, he will not be micro-payment functions.
able to pay the data owners from the buyers payment. In
addition, a data owner will insist that the micro-payment Proposition 21. Let L be the Laplace Mechanism, and let the
function is compensating: this enforces the contract contract functions be linear, Wi() = ci , where ci > 0 is a fixed
between her and the market maker, guaranteeing that she constant, for i = 1, ..., n. Define the micro-payment functions
will be compensated at least Wi(), in the event of a privacy for i = 1, ..., n. Then (, , W) is semi-balanced.
loss .
Fix a query answering mechanism K. We denote a pricing
framework (, , , W), where (Q), i(Q) are the buyers price The proposition defines the micro-payment associated to
and the micro-payments, = (1, ..., n) where i(KQ) is the linear contracts Wi, which requires infinite payment for total
privacy loss corresponding to the mechanism K, and Wi() is loss of privacy. In practice, data owners are willing to sell their
the contract with the data owner i. raw data at some high (but finite) price. We show next how to
derive new semi-balanced micro-payments by applying sub-
Definition 20. A pricing framework (, , , W) is balanced additive functions to other micro-payments.
if (1) is arbitrage-free and (2) the micro-payment functions
are arbitrage-free, cost-recovering for , and compensating for W. Proposition 22. Fix k semi-balanced pricing frameworks,
(, j, Wj), j = 1, . .
., k. Define , and
We explain how the contract between the data owner and , for each i = 1, ..., n, where each function
the market maker differs from that in privacy-preserving fi : , i = 1, ..., n, is non-decreasing, sub-additive, and
mechanisms. Let > 0 be a small constant. A mechanism satisfies fi(0) = 0. Then, (, , W) is also semi-balanced, where
K is called differentially private7 if, for any measurable set S, = (1, ..., n) and W = (W1, ..., Wn).
any database vector x and for any entry j of x:
Finally, we choose a payment function such as to ensure
that the micro-payments are cost-recovering.

In differential privacy, the basic contract between the Proposition 23. Suppose that (, , W) is semi-balanced, and
mechanism and the data owner is the promise to every user define (Q) = i i(Q). Then, (, , , W) is balanced.
that her privacy loss is no larger than . In our framework
for pricing private data we turn this contract around. Now, To summarize, the synthesis procedure for a pricing
privacy is lost, and Definition 18 quantifies this loss. The framework proceeds as follows. Start with the simple micro-
contract requires that the users are compensated accord- payment functions given by Proposition 21, which ensure
ing to their privacy loss. At an extreme, if the mechanism is linear compensation for each user. Next, modify both the
-differentially private for a tiny , then each user will receive micro-payment and the contract functions using Proposi
only a tiny micro-payment Wi(); as her privacy loss increases, tion 22, as desired, in order to adjust to the preferences of
she will be compensated more. individual users (e.g. in order to allow a user to set a price for
The micro-payments circumvent a common limitation her true data). Finally, define the query price to be the sum
of differentially-private mechanisms. In differential privacy, of all micro-payments (Proposition 23), then increase this
the data analyst typically has a fixed budget, , granted by the price freely, by using any method in Section 3.4.
data curator, for all queries that he may ever ask. In order to
issue N queries, he needs to divide the privacy budget among 6. DISCUSSION
these queries, and, as a result, each query will be perturbed A number of issues deserve further attention if we are to
with greater noise. After issuing these N queries, he can no achieve a fully-functional marketplace for private data.
longer query the database, because otherwise the contract First, we have made two restrictions which limit the
with the data owner would be breached. prevention of arbitrage in our market. We require the mar-
In our pricing framework there is no such hard limita- ket maker to answer queries using an unbiased estimator
tion because the buyer simply pays for each query. The bud- (Definition 5) and therefore arbitrage-freeness only pre-
get is now a real financial quantity, and the buyer can ask as vents an adversary from deriving an unbiased estimator of
many query as he wants, with as high accuracy as he wants, a query using cheaper queries (Definition 6). In addition, we
as long as he has money to pay for them. As a consequence, have considered a restricted notion of answerability, limit-
it is the analyst-buyer, rather than the data owner, who ulti- ing our attention to adversaries who only consider queries
mately determines the actual privacy loss. A similar model computed by linear functions of other queries. Both of these

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 85


research highlights

assumptions limit the class of adversaries against which the micro-payments to the data owner and each micro-payment
arbitrage-free property is guaranteed to hold. compensates the users according to their privacy loss.
A more general approach would be to relax Definition 5 to An interesting open question is whether we can achieve
allow queries to be answered using either biased or unbiased both truthfulness (e.g. as discussed in Ghosh and Roth12)
estimators and to include answerability using non-linear and arbitrage-freeness (as discussed in the current paper)
functions. This would provide the market maker with a when pricing private data. Further, it remains to consider
stronger guarantee against arbitrage. However it would likely general notions of answerability that go beyond linear
make reasoning about determinacy and arbitrage-free pric- answerability, or to bound the impact non-linear estimation
ing significantly more difficult, and it would further restrict methods could have in the context of arbitrage.
the set of arbitrage-free pricing functions available to the
market maker. In other words, a more powerful notion of References
arbitrage would lead to more restrictive pricing functions, 1. Acquisti, A., Taylor, C.R., Wagman, L. 12. Ghosh, A., Roth, A. Selling privacy
The economics of privacy. Journal of at auction. In ACM Conference
potentially limiting the ability of the market maker to set Economic Literature 52, 2 (2016). on Electronic Commerce (2011),
prices. The tradeoff between completeness of the framework 2. Balazinska, M., Howe, B., Suciu, D. Data 199208.
markets in the cloud: An opportunity 13. Greenberg, A. Apples differential
and the feasibility of analyzing arbitrage is an important for the database community. PVLDB 4, privacy is about collecting your
topic for future research. 12 (2011), 14821485. databut not your data. Wired (Jun
3. Calo, R. The boundaries of privacy harm. 13 2016).
A second issue is the problem of incentivizing the data Indiana Law Journal 86, 3 (2011). 14. Halevy, A.Y. Answering queries using
4. Chen, B.-C., Kifer, D., LeFevre, K., views: A survey. VLDB J. 10, 4 (2001),
owner to participate in the database and truthfully report her Machanavajjhala, A. Privacy-preserving 270294.
privacy valuations. Currently, there is nothing stopping the data publishing. In Foundations and 15. Hardt, M., Ligett, K., McSherry, F. A
Trends in Databases (2010). simple and practical algorithm for
data owner from quoting an impossibly high price, for even 5. Dinur, I., Nissim, K. Revealing differentially private data release. In
a tiny loss of her privacy. In other words, she would choose information while preserving privacy. NIPS (2012).
In PODS (2003), 202210. 16. Kifer, D., Abowd, J., Gehrke, J. Vilhuber, L.
a contract function W() that is as close to as possible. 6. Dwork, C. A firm foundation for Privacy: Theory meets practice on the
Incentivizing users to report their true valuation is a goal private data analysis. Commun. ACM map. In ICDE (2008).
54, 1 (2011), 8695. 17. Koutris, P., Upadhyaya, P., Balazinska, M.,
of mechanism design. This has been studied for private data 7. Dwork, C., McSherry, F., Nissim, K., Howe, B., Suciu, D. Query-based data
only in the restricted case of a single query, and has been Smith, A. Calibrating noise to pricing. J. ACM 62, 5 (Nov. 2015),
sensitivity in private data analysis. In 43:143:44.
shown to be a difficult task.10, 12 In Ref. Li et al. 20 we make a TCC (2006), 265284. 18. Laudon, K.C. Markets and privacy.
preliminary attempt to address this issue by requiring that 8. Dwork, C., Roth, A. The Algorithmic Commun. ACM 39, 9 (1996), 92104.
Foundations of Differential Privacy. 19. Li, C., Hay, M., Rastogi, V., Miklau, G.,
users choose from a limited set of contract functions (e.g. Foundations and Trends in Theoretical McGregor, A. Optimizing linear
one appropriate for a risk-tolerant user and one appropriate Computer Science (2014) Now counting queries under differential
Publishers Inc., Hanover, MA, USA. privacy. In PODS (2010).
for a risk-averse user). 9. Erlingsson, U., Pihur, V., Korolova, A. 20. Li, C., Li, D.Y., Miklau, G. Suciu, D. A
A third issue is the protection of privacy valuations them- Rappor: Randomized aggregatable theory of pricing private data. ACM
privacy-preserving ordinal Trans. Database Syst. 39, 4 (Dec.
selves. When a user has sufficient freedom to choose their response. In Computer and 2014), 128.
privacy valuation, it may be strongly correlated with the data Communications Security (CCS) 21. Li, C., Miklau, G. Pricing aggregate
(2014), 10541067. queries in a data marketplace. In
xi itself. In that case, even releasing the price of a query may 10. Fleischer, L., Lyu, Y.-H. Approximately WebDB (2012).
optimal auctions for selling privacy 22. Nash, A., Segoufin, L., Vianu, V.
lead to privacy loss, a factor not considered in the framework when costs are correlated with data. Views and queries: Determinacy and
described above. Hiding the valuation itself is a difficult In ACM Conference on Electronic rewriting. TODS 35, 3 (2010).
Commerce (2012), 568585. 23. Nissim, K., Vadhan, S., Xiao, D.
problem which is still being actively investigated in mecha- 11. Fung, B.C.M., Wang, K., Chen, R., Redrawing the boundaries on
nism design.10, 12, 23 In, Ref. Li et al. 20 we describe a simple Yu, P.S. Privacy-preserving data purchasing data from privacy-
publishing: A survey of recent sensitive individuals. In Conference
approach that is based on perturbing the price itself, in the developments. ACM Comput. Surv. on Innovations in Theoretical
same way that we perturb the data. Thus both (Q) and i(Q) 42, 4 (2010). Computer Science (2014), 411422.
are perturbed in the same fashion as query answers, and are
therefore random variables. All three properties of arbitrage- Chao Li (chaoli@google.com), Google Inc. Daniel Yang Li and Dan Suciu
Gerome Miklau (miklau@cs.umass.edu), ({dyli,suciu}@cs.washington.edu),
freeness, cost-recovery, and compensation are then defined University of Massachusetts, Amherst, MA. University of Washington, Seattle, WA.
in terms of expected values. In addition, the privacy loss for
data item xi includes two parts: one is due to the release of the
query answer and the other is due to the release of the price.

7. CONCLUSION
We have introduced a framework for selling private data.
Buyers can purchase any linear query, with any amount of
perturbation, and need to pay accordingly. Data owners, in
turn, are compensated according to the privacy loss they
incur for each query. Buyers are allowed to ask an arbitrary Permission to make digital or hard copies of all or part of this work for personal
number of queries, and we have designed techniques for or classroom use is granted without fee provided that copies are not made
or distributed for profit or commercial advantage and that copies bear this
ensuring that the prices are arbitrage-free, according to
notice and the full citation on the first page. To copy otherwise, to republish,
a specific definition of arbitrage-freeness, meaning that to post on servers or to redistribute to lists, requires prior specific permission
buyers are guaranteed to pay for any information they may and/or a fee.
further extract from the queries. Our pricing framework
is balanced, in the sense that the buyers price covers the ACM 0001-0782/17/1200 $15.00.

86 COMMUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | NO. 1 2


DOI:10.1145 / 3 1 3 9 45 9

Technical Perspective
To view the accompanying paper,
visit doi.acm.org/10.1145/3139461 rh

A Simple, Elegant Approach to


Non-Numeric Parallelization
By James Larus

STAND A RD I Z ED I N T E RFACE S PLAY an sidered poor candidates for parallel tial. In a program with 50% of its time
important role in many industries; for execution. Each of their iterations typi- spent in sequential loops, even with
example, a processors instruction set cally runs for a short amount of time (in perfect parallelization of the other code,
architecture (ISA) defines the interface the benchmarks, 25 clock cycles on the the largest possible speedup is 2. Clearly
between hardware and software. A sta- average, 50% requiring 10 or few clock something must be done with these
ble, well-defined interface facilitates cycles). Moreover, non-numeric loops non-numeric loops.
independent innovation on both sides commonly execute conditional branch- The paper proposes a simple and
of the boundary. Unchanging (or slowly es, so their execution behavior is data elegant approach to non-numeric par-
changing) ISAs have meant that new dependent. Neither consideration is allelization. The HELEX compiler iden-
programming languages, compilers, fatal by itself, but these loops also pass tifies the sequential portions of a loop,
and applications can run on old com- values among iterations. It is difficult to which will run code tied to the loop-
puters. At the same time, new comput- analyze these loop-carried dependen- carried dependencies. These portions
ers, with improved microarchitectures, cies and to generate low-overhead code must execute in sequential order, and
can run existing programs faster. that respects them. values produced by one iteration must
Recently, however, processors have So, in general, these loops run se- be sent to subsequent iterations, even
been extended with a wide range of quentially. In the era when computer if they are running on another proces-
architecturally visible features that performance doubled every two years, sor. Normal shared-memory communi-
change their ISA, for example, support sequential execution was not a pressing cation can cost hundreds of cycles and
for vector processing, virtual memory, problem. But, CPU clock speed stopped so are too expensive for fine-grain itera-
cryptography, and secure execution. increasing over a decade ago, and mul- tions that may only run for a faction of
When does it make sense to extend ticore parallelism became the preferred that time. Parallel speedup comes from
an interface and introduce a new fea- approach to utilize the additional tran- executing the other portions of a loop
ture that breaks backward compatibil- sistors provided by Moores Law. But, to- those not involved in the loop-carried
ity? Clearly, with something as perva- day, this parallelism is not widely used dependenciesconcurrently.
sive as an ISA, change is not to be taken outside of datacenters. Mobile phones HELEX-RC is a simple hardware
lightly. Software that uses a new feature and laptops contain only 24 cores. extension that reduces or eliminates
will benefit only from new computers, Much of the software that runs on communication overhead. It introduc-
which initially are rare. This software these platforms is non-numeric and es a small amount of buffered memory
must also emulate the feature on older contains loops with short, data-depen- for loop-carried dependencies and syn-
machines, so changing the ISA increas- dent bodies. The authors argue that our chronization variables. These values
es the complexity of both hardware and inability to parallelize these loops is a are proactively sent to the processors
software and raises the cost of testing fundamental impediment to exploiting that will execute subsequent iterations,
and error diagnosis. parallel hardware. Amdahls Law relates so these values will be in local memory
The following paper proposes a mod- the parallel speedup of a program to the when an iteration starts, thereby ensur-
est hardware extension to support a fraction of its execution that is sequen- ing it is not delayed.
new parallel execution model for small, HELEX-RC is not a general-purpose
non-numeric loops. Under realistic as- hardware feature like a cache or regis-
sumptions, HELEX-RC increases the HELEX-RC is ter file. Its design is tightly tied to the
performance of a handful of well-known, HELEX execution model. Clever com-
non-numeric benchmarks by over a a simple hardware piler writers will no doubt find other
factor of 6. Many programs contain extension uses for it, but until then, it is a spe-
similar loops and might benefit as well. cialized solution to one problem. But,
Although the hardware is simple, it re- that reduces small improvements are sometimes
quires pervasive changes to the software or eliminates the key to unlock the value of much
stack because the feature is tied to a spe- larger architectural features such as
cific execution model. Existing compiled communication multicore parallelism.
programs will not benefit from HELEX. overhead. James Larus (james.larus@epfl.ch) is Dean of the
The authors, however, present a
School of Computer and Communications Science, EPFL,
powerful argument for paying this Lausanne, Switzerland.
price. Short, non-numeric loops are
very common, but have long been con- Copyright held by author.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 87


research highlights
DOI:10.1145/ 31 3 9 46 1

Automatically Accelerating
Non-Numerical Programs by
Architecture-Compiler Co-Design
By Simone Campanoni, Kevin Brownell, Svilen Kanev, Timothy M. Jones, Gu-Yeon Wei, and David Brooks

Abstract benefits of automatic loop parallelization therefore satu-


Because of the high cost of communication between proces- rate at small numbers of cores for commodity processors.
sors, compilers that parallelize loops automatically have Lowering the latency of inter-core communication would
been forced to skip a large class of loops that are both criti- help, but it can only go so far, if communication remains
cal to performance and rich in latent parallelism. HELIX-RC reactive. We therefore propose a proactive solution, in which
is a compiler/microprocessor co-design that opens those the compiler and an architectural extension called ring cache
loops to parallelization by decoupling communication from cooperate to overlap communication with computation and
thread execution in conventional multicore architecures. lower communication latency. The compiler identifies data
Simulations of HELIX-RC, applied to a processor with 16 that must be shared between cores, and the ring cache circu-
Intel Atom-like cores, show an average of 6.85 performance lates that data as soon as it is generated.
speedup for six SPEC CINT2000 benchmarks. To demonstrate this idea, we have developed HELIX-RC, a
co-design incorporating a parallelizing compiler and a
simulated chip multiprocessor extended with ring cache.
1. INTRODUCTION The HELIX-RC compiler builds on the original HELIX
On a multicore processor, the performance of a program code parallelizer for commodity multicore processors.5
depends largely on how well it exploits parallel threads. Because it relies on invariants of the code produced by the
Some computing problems are solved by numerical pro- compiler, ring cache is a lightweight, non-invasive exten-
grams that are either inherently parallel or easy to parallel- sion of conventional multicore architecture. Because it
ize. Historically, successful parallelization tools have been facilitates proactive, low-latency inter-core communica-
able to transform the sequential loops of such programs tion, ring cache allows HELIX-RC to outperform HELIX by
into parallel form, boosting performance significantly. a factor of 3.
Most software, however, is still sequentially designed and
largely non-numerical, with irregular control and data flow. 2. OPPORTUNITIES AND CHALLENGES
Because manual parallelization of such software is error- OF SMALL LOOPS
prone and time-consuming, automatic parallelization of 2.1. Opportunities
non-numerical programs remains an important open Prior loop parallelization techniques have avoided selecting
problem. loops with small bodies because communication would
The last decade has seen impressive steps toward a solu- slow down execution on conventional processors.5, 20 On
tion, but when targeting commodity processors, existing average, such techniques yield only about 60% coverage by
parallelizers still leave much of the latent parallelism in parallelized loops for non-numerical programs. Excluding
loops unrealized.5 The larger loops in a program can be so small loops limits overall speedup of such programs to less
hard to analyze accurately that apparent dependences often than 3 times no matter how many cores are available,
flood communication channels between cores. Smaller because by Amdahls law, coverage dictates the overall
loops are more amenable to accurate analysis, and our work speedup of a program through parallelization.
shows that there is a lot of parallelism between the itera- Because the intricacy of control and data flow scales
tions of small loops in non-numerical programs represented down with code size, small loops are easier than larger ones
by SPECint2000 benchmarks.4 But even after intense opti- for a compiler to analyze, which reduces the proportion of
mization, small loops typically include loop-carried depen- data dependences that must be accommodated at run time
dences, so their iterations cannot be entirely because of conservative assumptions about possible pointer
independentthey must communicate. Because the itera- aliases. As a result, the optimized bodies of small loops yield
tions of a small loop are short (25 clock cycles on average for relatively independent iteration threads.5 So there could be
SPECint2000), their communications are frequent.
On commodity processors, communication relies on the
The original paper, HELIX-RC: An Architecture-Compiler
memory system and is reactive, triggered only when one
Co-Design for Automatic Parallelization of Irregular
core asks for data from another. The resulting delay is lon-
Programs, was published in Proceedings of the International
ger than the average duration of an iteration, and it is hard
Symposium on Computer Architecture, June 1418, 2014,
to overlap with computation, especially when the variance
217228.
of durations is high, as in non-numerical workloads. The

88 COM MUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


a significant increase in core utilization, and concomitant of data and signals to all cores in the ring for a loop. Such
overall speedup, if the compiler were able to freely select proactive communication is the cornerstone of the
small hot loops for parallelization. Realizing that potential HELIX-RC approach, which allows the communication
requires understanding the characteristics of such loops needed for sharing data between cores to overlap with com-
and optimizing for them. putation that the cores carry out in parallel.

2.2. Low latency challenge 3. THE HELIX-RC SOLUTION


To illustrate the need for low-latency communication, To run the iterations of small hot loops efficiently in paral-
Figure 1a plots a cumulative distribution of average itera- lel, HELIX-RC replaces communication-on-demand with
tion execution times on a single Atom-like core (described in proactive communication. It decouples value forwarding
our work4) for the set of hot loops from SPECint2000 chosen between threads from value consumption by the receiving
for parallelization by HELIX-RC. The shaded portion of the thread. It also decouples transmission of synchronizing sig-
plot shows that more than half of the loop iterations com- nals from the code that enforces sequential semantics.
plete within 25 clock cycles. The figure also shows the mea- Extensions of conventional microprocessor architecture
sured core-to-core round trip communication latencies for 3 make this decoupling possible. Reliance on compiler-guan-
modern multicore processors. Even the shortest of these anteed machine code properties keeps those architectural
latencies, 75 cycles for Ivy Bridge, is too heavy a communica- extensions simple and efficient.
tion penalty for the majority of these short loops.
3.1. Approach
2.3. Broadcast challenge HELIX-RC is a co-design that binds its compiler (HCCv3) to a
Loops within non-numerical programs generate values that processor architecture enhancement called ring cache.
are consumed by later iterations, but the compiler cannot When the compiler generates a set of parallel threads to run
know which iterations will use which values. So when the on separate cores, they are rarely completely independent.
compiler distributes the iterations of a loop to separate While most of each threads code can run concurrently with
cores, shared values that result from loop-carried depen- other threads, there are segments of that code that must
dences need to be accessible to any of those cores soon after execute in strict sequence across the thread set. We call
being generated. these sequential segments. The main role of the ring cache is
For loops parallelized by HELIX-RC, most communica- to accelerate the communication of values and synchroniz-
tion of shared values is not between cores executing succes- ing signals needed to implement sequential segments
sive loop iterations, which HELIX-RC assigns to adjacent correctly.
cores. Figure 1b charts the distribution of value communica- The ring cache is a ring network linking ring nodes, each
tion distances (defined as the undirected distance between of which is attached to a core in the processor. During
the core that produces a value and the first one that con- sequential segments, this ring serves as a distributed first-
sumes it) on a platform with 16 cores organized in a ring. level cache preceding the private L1 cache (Figure 2). HCCv3
Only 15% of those transfers are between adjacent cores. marks the entry and exit points of sequential segments
Moreover, Figure 1c shows that most (86%) of the loop-car- using 2 instructions that extend the instruction set. As a
ried values in parallelized loops are consumed by multiple result, each core knows whether or not it is currently execut-
cores. Since consumers of shared values are not known at ing the sequential segment of a parallel thread, and it
compile time, especially for non-numerical workloads, broad- accesses the cache hierarchy accordingly.
casting is the most appropriate communication protocol.
It is well known that implementing low-latency broadcast Figure 2. The ring cache is a ring network that connects ring nodes
is challenging for a large set of cores. HELIX-RC uses a hard- attached to each core. It operates during sequential segments as
ware mechanism that achieves proactive delayed broadcast a distributed first-level cache that precedes the private L1 cache
(left side). Ring nodes propagate newly-generated values without
involving their attached cores (right side). In this example, data
Figure 1. Small hot loops have short iterations that send data over generated by the rightmost core is available at the leftmost core
multiple hops and to multiple cores. when needed, so wait A incurs no delay.
4
Percentage of loop iterations

12% 5
100 3
9%
39% 6% 6+
Data and
12%
22% 1 signals
Hop DL1 wait A
Atom 2 Cache Code within sequential segments
Nehalem
Measured cache
50 coherence latency (b) Distance store 0x00A, 5
Ring 5
Sandy 5
node signal A 5
Bridge 34% A
6+
Ivy 4 12%
9%
A
Bridge 16%
Haswell 21%
8%
1 Code outside sequential segments
0 3 Core
0 25 75 107 190 260 2 Core No delay wait A
Clock cycles load 0x00A
(a) Short loop iterations (c) Consumers Time

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 89


research highlights

Compiler. HCCv3 automatically generates parallel Synchronization. Given the difficulty of determining
threads from sequential programs by distributing succes- which iteration depends on which in non-numerical pro-
sive loop iterations across adjacent cores organized as a uni- grams, compilers typically make the conservative assump-
directional ring within a single multicore processor. HCCv3 tion that an iteration depends on all of its predecessor
parallelizes loops that are most likely to speed up perfor- iterations. Therefore, a core cannot execute sequential code
mance when their iterations execute in parallel. Only 1 loop until it is unblocked by its predecessor.5, 20 Moreover, an iter-
runs in parallel at a time. ation unblocks its successor only if both it and its predeces-
To preserve the sequential semantics of the original loop, sors have executed this sequential segment or if they are not
the code that implements a loop-carried data dependence, going to. This execution model leads to a chain of signal
that is, one spanning loop iterations, must run in a sequen- propagation across loop iterations that includes unneces-
tial segment whose instances in parallel threads execute in sary synchronization: even if an iteration is not going to exe-
iteration order. Variables and other data structures involved cute sequential code, it still needs to synchronize with its
in such dependenceseven those normally allocated to reg- predecessor before unblocking its successor.
isters in sequential codeare mapped to specially-allocated HELIX-RC removes this synchronization overhead by
memory locations shared between cores. HCCv3 guarantees enabling an iteration to detect the readiness of all predeces-
that accesses to those shared memory locations always sor iterations, not just one. Therefore, once an iteration for-
occur within sequential segments. goes executing the sequential segment, it immediately
ISA. We introduce a pair of instructionswait and sig- notifies its successor without waiting for its predecessor.
nalthat mark the beginning and end of a sequential seg- Unfortunately, while HELIX-RC removes unnecessary syn-
ment. Each has an integer operand that identifies the chronization, it increases the number of signals that can be
particular sequential segment. A wait 3 instruction, for in flight simultaneously.
example, blocks execution of the core that issues it until all HELIX-RC relies on the signal instruction to handle
other cores running earlier iterations have finished execut- synchronization signals efficiently. Synchronization
ing the sequential segment labeled 3, which they signify by between a producer core and a consumer includes genera-
executing signal 3. Figure 2 shows a sequential segment tion of a signal by the producer, a request for that signal by
with label A being executed by the core attached to the left- the consumer, and transmission of the signal between the
most ring node. Between wait A and signal A, a store two. On a conventional multicore processor that relies on a
instruction sends the new value 5 for the shared location at demand-driven memory system for communication, signal
address 0x00A to the ring node for caching and circulation transmission is inherently lazy, and signal request and
to its successor nodes. The signal A instruction that ends transmission become serialized. With HELIX-RC, on the
the segment also signals subsequent nodes that the value other hand, a signal instructs the ring cache to proactively
generated by segment A is ready. forward a signal to all other nodes in the ring without inter-
A core forwards all memory accesses within sequential rupting any of the cores, thereby decoupling signal trans-
segments to its local ring node. All other memory accesses mission from synchronization.
(not within a sequential segment) go through the private L1 Code example. The code in Figure 3(a), abstracted for
cache. clarity, represents a small hot loop from 175.vpr of SPEC
Memory. Each ring node has a cache array that satisfies CINT2000. It is responsible for 55% of the total execution
both loads and stores received from its attached core during time of that program. The loop body has 2 execution paths.
a sequential segment. HELIX-RC does not require other The left path entails a loop-carried data dependence because
changes to the existing memory hierarchy because the ring during a typical loop iteration, instruction 1 uses the value
cache orchestrates interactions with it. To avoid any changes of variable a produced by a previous iteration. The right path
to conventional cache coherence protocols, the ring cache does not depend on prior data. Owing to complex control
permanently maps each memory address to a unique ring flow, the compiler cannot predict the execution path taken
node. All accesses from the distributed ring cache to the during a particular iteration, so it must assume that instruc-
next cache level (L1) go through the associated node for a tion 1 may depend on the previous iteration.
corresponding address. In a conventional implementation coupling communica-
tion with computation, the compiler would add wait 1
3.2. Overlapping communication with computation and signal 1 instructions to the right path, as shown in
Because shared values produced by a sequential segment Figure 3(a), to synchronize each iteration with its predeces-
and the signal that marks its end are propagated through sor and successor iterations. If shared values and signals
the ring node as soon as they are generated, this communi- were communicated on demand, the resulting sequential
cation between iterations is decoupled from computation signal chain would look like that highlighted in red shown
taking place on the cores. in Figure 3(b). If we assume that only iterations 0 and 2, run-
Shared data communication. Once a ring node receives a ning on cores 0 and 2, respectively, take the left path and
store, it records the new value and proactively forwards its execute instruction 1, then the sequential signal chain
address and value to an adjacent node in the ring cache, all shown in Figure 3(b) is unnecessarily long, because iteration
without interrupting the execution of the attached core. The 1 only executes parallel code, so the wait instruction is
value then propagates from node to node through the rest of unnecessary in that iteration. It results in a signal stall.
the ring without interrupting the computation of any core. Iterations 0 and 2, in order to update a, must load its

90 COMMUNICATIO NS O F TH E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


Figure 3. Example illustrating benefits of decoupling communication from computation.

Core 1 Core 2 Core 1 Core 2


... Core 0
signal wait wait
Core 0
signal signal wait
Signal stall
wait 1; wait 1; Data forwarding signal load
a=load; signal 1; Sequential chain signal
1 a = a+1; Sequential code load
store a; Parallel code Data stall
Sequential
signal 1; segment
signal

...
Time
(a) Parallel code (b) Coupled communication (c) Decoupled communication

previous value first, using a regular load. So lazy forwarding wait instructions while keeping the architectural enhance-
of this shared data leads to data stalls, because the transfer ment simple. Eliminating waits allows a core to execute a
only begins when demanded by a load, rather than when later loop iteration than its successor (significantly boost-
generated by a store. ing parallelism). Future iterations, however, produce sig-
In HELIX-RC, however, a wait A unblocks when all pre- nals that must be buffered. The last code property prevents
decessor iterations have signaled that segment A is fin- a core from getting more than one lap ahead of its succes-
ished. That allows HCCv3 to omit the wait 1 on the right sor. So when buffering signals, each ring cache node only
path through the loop body. That optimization, combined needs to recognize 2 typesthose from the past and those
with HELIX-RCs proactive communication between from the future.
cores, leads to the more efficient scenario shown in Figure
3(c). The sequential chain in red now only includes the 4.2. Code optimizations
delay required to satisfy the dependencecommunica- In addition to conventional optimizations specifically tuned
tion updating a shared value. to extract Thread Level Parallelism (TLP) (e.g., code schedul-
ing, method inlining, loop unrolling), HCCv3 includes ones
4. COMPILER that are essential for best performance of non-numerical
The decoupled execution model of HELIX-RC described so programs on a ring-cache-enhanced architecture: aggres-
far is possible given the tight co-design of the compiler and sive splitting of sequential segments into smaller code
architecture. In this section, we focus on compiler-guaran- blocks; identification and selection of small hot loops; and
teed code properties that enable a lightweight ring cache elimination of unnecessary wait instructions.
design, and follow up with code optimizations that make Sizing sequential segments poses a tradeoff. Additional
use of the ring cache. segments created by splitting run in parallel with others, but
extra segments entail extra synchronization, which adds
4.1. Code properties communication overhead. Thanks to decoupling, HCCv3
can split aggressively to efficiently extract TLP. Note that seg-
Only 1 loop can run in parallel at a time. Apart from a dedi- ments cannot be split indefinitelyeach shared location
cated core responsible for executing code outside parallel must be accessed by only 1 segment.
loops, each core is either executing an iteration of the cur- To identify small hot loops that are most likely to speed
rent loop or waiting for the start of the next one. up when their iterations run in parallel, HCCv3 profiles the
Successive loop iterations are distributed to threads in program being compiled using representative inputs.
a round-robin manner. Since each thread is pinned to a Instrumentation code emulates execution with the ring
predefined core, and cores are organized in a unidirec- cache during profiling, which produces an estimate of time
tional ring, successive iterations form a logical ring. saved by parallelization. Finally, HCCv3 uses a loop nesting
Communication between cores executing a parallel- graph, annotated with the profiling results, to choose the
ized loop occurs only within sequential segments. most promising loops.
Different sequential segments always access different
shared data. HCCv3 only generates multiple sequential 5. ARCHITECTURE ENHANCEMENTS
segments when there is no intersection of shared data. Adding a ring cache to a multicore architecture enables the
Consequently, instances of distinct sequential seg- proactive circulation of data and signals that boost parallel-
ments may run in parallel. ization. This section describes the design of the ring cache
At most 2 signals per sequential segment emitted by a and its constituent ring nodes. The design is guided by the
given core can be in flight at any time. Hence, only 2 sig- following objectives:
nals per segment need to be tracked by the ring cache. Low-latency communication. HELIX-RC relies on fast
communication between cores in a multicore processor for
This last property allows the elimination of unnecessary synchronization and for data sharing between loop

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 91


research highlights

iterations. Since low-latency communication is possible In addition to these router-like elements, a ring node also
between physically adjacent cores in modern processors, contains structures more common to caches. A set associa-
the ring cache implements a simple unidirectional ring tive cache array stores all data values (and their tags) received
network. by the ring node, whether from a predecessor node or from
Caching shared values. A compiler cannot easily guaran- its associated core. The line size of this cache array is kept at
tee whether and when shared data generated by a loop itera- one machine word. While the small line is contrary to typical
tion will be consumed by other cores running subsequent cache designs, it ensures there will be no false data sharing
iterations. Hence, the ring cache must cache shared data. by independent values from the same line.
Keeping shared data on local ring nodes provides quick The final structural component of the ring node is the
access for the associated cores. As with data, it is also impor- signal buffer, which stores signals until they are consumed.
tant to buffer signals in each ring node for immediate Node-to-node connection. The main purpose of the ring
consumption. cache is to proactively provide many-to-many core commu-
Easy integration. The ring cache is a minimally-invasive nication in a scalable and low-latency manner. In the unidi-
extension to existing multicore systems, easy to adopt and rectional ring formed by the ring nodes, data propagates by
integrate. It does not require modifications to the existing value circulation. Once a ring node receives an (address,
memory hierarchy or to cache coherence protocols. value) pair, either from its predecessor, or from its associ-
With these objectives in mind, we now describe the inter- ated core, it stores a local copy in its cache array and propa-
nals of the ring cache and its interaction with the rest of the gates the same pair to its successor node. The pair eventually
architecture. propagates through the entire ring (stopping after a full
cycle) so that any core can consume the data value from its
5.1. Ring cache architecture local ring node, as needed.
The ring cache architecture relies on properties of compiled This value circulation mechanism allows the ring cache
code, which imply that the data involved in timing-critical to communicate between cores faster than reactive systems
dependences that potentially limit overall performance are (like most coherent cache hierarchies). In a reactive system,
both produced and consumed in the same order as loop iter- data transfer begins once the receiver requests the shared
ations. Furthermore, a ring network topology captures this data, which adds transfer latency to an already latency-criti-
data flow, as sketched in Figure 4. The following paragraphs cal code path. In contrast, a proactive scheme overlaps
describe the structure and purpose of each ring cache transfer latencies with computation to lower the receivers
component. perceived latency.
Ring node structure. The internal structure of a per-core The ring cache prioritizes the common case, where data
ring node is shown in the right half of Figure 4. Parts of this generated within sequential segments must propagate to all
structure resemble a simple network router. Unidirectional other nodes as quickly as possible. Assuming no contention
links connect a node to its two neighbors to form the ring over the network and single-cycle node-to-node latency, the
backbone. Bidirectional connections to the core and private design shown in Figure 4 allows us to bound the latency for
L1 cache allow injection of data into and extraction of data a full trip around the ring to N clock cycles, where N is the
from the ring. There are 3 separate sets of data links and buf- number of cores. Each ring node prioritizes data received
fers. A primary set forwards data and signals between cores. from the ring and stalls injection from its local core.
Two other sets manage infrequent traffic for integration To eliminate delays to forward data between ring nodes,
with the rest of the memory hierarchy (see Section 5.2). the number of write ports in each nodes cache array must
Separating these 3 traffic types simplifies the design and match the link bandwidth between two nodes. While this
avoids deadlock. Finally, signals move in lockstep with for- may seem like an onerous design constraint for the cache
warded data to ensure that a shared memory location is not array, Section 6 shows that just one write port is sufficient to
accessed before the data arrives. reap more than 99% of the ideal-case benefits.

Figure 4. Ring cache architecture overview. From left to right: overall system; single core slice; ring node internal structure.
L1 Cache reads/writes
Data and signals Remote L1
Request/reply

DL1 Loads
Cache ReadPort from core
Cache array Stores/signals
from core
WritePort
Ring
node Data and
signals Data and
Signal buffer signals
Signal S Signal 1
Past Credits
Core
...
Future
Core Link
Credits
buffers
Control

92 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


To ensure correctness under network contention, the cache meets this requirement by leveraging the unidirec-
ring cache is sometimes forced to stall all messages (data tional data flow guaranteed by the compiler. Sequential con-
and signals) traveling along the ring. The only events that sistency must be preserved when ring cache values reach
can cause contention and stalls are ring cache misses and lower-level caches, but the consistency model provided by
evictions, which may then need to fetch data from a remote conventional memory hierarchies is weaker. We resolve this
L1 cache. While these ring stalls are necessary to guarantee difference by introducing a single serialization point per
correctness, they are infrequent. memory location, namely a unique owner node responsible
The ring cache relies on credit-based flow control9 and is for all interactions with the rest of the memory hierarchy.
deadlock free. Each ring node has at least two buffers When a shared value is moved between the ring cache and
attached to the incoming links to guarantee forward prog- L1 caches (owing to occasional ring cache load misses and
ress. The network maintains the invariant that there is evictions), only its owner node can perform the required L1
always at least one empty buffer per set of links somewhere cache accesses. This solution preserves existing consistency
in the ring. That is why a node only injects new data from its models with minimal impact on performance.
associated core into the ring when there is no data from a Cache flush. Finally, to guarantee coherence between
predecessor node to forward. parallelized loops and serial code between loop invocations,
Node-core integration. Ring nodes are connected to their each ring node flushes the dirty values of memory locations
respective cores as the closest level in the cache hierarchy it owns to L1 once a parallel loop has finished execution.
(Figure 4). The cores interface to the ring cache is through This is equivalent to executing a distributed fence at the end
regular loads and stores for memory accesses in sequential of loops. In a multiprogram scenario, signal buffers must
segments. also be flushed/restored at program context switches.
As previously discussed, wait and signal instructions
delineate code within a sequential segment. A thread that 6. EVALUATIONb
needs to enter a sequential segment first executes a wait, By co-designing the compiler along with the architecture,
which only returns from the associated ring node when HELIX-RC more than triples the performance of parallelized
matching signals have been received from all other cores code when compared to a compiler-only solution. This sec-
executing prior loop iterations. The signal buffer within the tion investigates HELIX-RCs performance benefits and
ring node enforces this. Specialized core logic detects the their sensitivity to ring cache parameters. We confirm that
start of the sequential segment and routes memory opera- the majority of speedups come from decoupling all types of
tions to the ring cache. Finally, executing the corresponding communication and synchronization. We conclude by ana-
signal marks the end of the sequential segment. lyzing the remaining overheads of the execution model.
The wait and signal instructions require special treat-
ment in out-of-order cores. Since they may have system-wide 6.1. Experimental setup
side effects, these instructions must issue non-speculatively We ran experiments on 2 sets of architectures. The first
from the cores store queue and regular loads and stores relies on a conventional memory hierarchy to share data
cannot be reordered around them. Our implementation among the cores. The second relies on the ring cache.
reuses logic from load-store queues for memory disambigu- Simulated conventional hardware. We simulate a multi-
ation and holds a lightweight local fence in the load queue core in-order 86 processor by adding multiple-core support
until the wait returns to the senior store queue. This is not to the XIOSim simulator. We also simulate out-of-order
a concern for in-order cores. cores modeled after Intel Nehalem.
The simulated cache hierarchy has 2 levels: a per-core
5.2. Memory hierarchy integrationa 32KB, 8-way associative L1 cache and a shared 8MB 16-bank
The ring cache is a level within the cache hierarchy and as L2 cache. We vary the core count from 1 to 16, but do not vary
such must not break any consistency guarantees that the the amount of L2 cache with the number of cores, keeping it
hierarchy normally provides. Consistency between the ring at 8MB for all configurations. Also scaling cache size would
cache and the conventional memory hierarchy results from make it difficult to distinguish the benefits of parallelizing a
the following invariants: (i) shared memory can only be workload from the benefits of fitting its working set into the
accessed within sequential segments through the ring cache larger cache, causing misleading results. Finally, we use
(compiler-enforced); (ii) only a uniquely assigned owner node DRAMSim2 for cycle-accurate simulation of memory con-
can read or write a particular shared memory location trollers and DRAM.
through the L1 cache on a ring cache miss (ring cache- We extended XIOSim with a cache coherence protocol
enforced); and (iii) the cache coherence protocol preserves assuming an optimistic cache-to-cache latency of 10 clock
the order of stores to a memory location through a particular cycles. This 10-cycle latency is optimistically low even com-
L1 cache. pared to research prototypes of low-latency coherence.11 We
Sequential consistency. To preserve the semantics of a only use this low-latency model to simulate conventional
parallelized single-threaded program, memory operations hardware, and later (Section 6.2) shows that low latency
on shared values require sequential consistency. The ring alone is not enough to compensate for the lazy nature of its

a
This feature may add one multiplexer delay to the critical delay path from b
Most cache coherence protocols (including Intel, AMD, and ARM implemen-
the core to L1. tations) provide this minimum guarantee.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 93


research highlights

coherence protocol. but also increases the geometric mean of speedups for
Simulated ring cache. We extended XIOSim to simulate CFP2000 benchmarks from 11.4 to almost 12.
the ring cache as described in Section 5. We used the follow- We now turn our attention to understanding where the
ing configuration: a 1KB 8-way associative array size, one-word speedups come from.
data bandwidth, five-signal bandwidth, single-cycle adja- Communication. Speedups obtained by HELIX-RC come
cent core latency, and two cycles of core-to-ring-node injec- from decoupling both synchronization and data communi-
tion latency to minimally impact the already delay-critical cation from computation in loop iterations, which signifi-
path from the core to the L1 cache. A sensitiviy analysis of cantly reduces communication overhead, allows the
these parameters as well as the evaluation of the ring cache compiler to split sequential segments into smaller blocks,
in out-of-order cores can be found in.4 We use a simple bit and cuts down the critical path of the generated parallel
mask as the hash function to distribute memory addresses code. Figure 6 compares the speedups gained by multiple
to their owner nodes. To avoid triggering the cache coher- combinations of decoupling synchronization, register-, and
ence protocol, all words of a cache line have the same owner. memory-based communication. As expected, fast register
Lastly, XIOSim simulates changes made to the core to route transfers alone do not provide much speedup since most in-
memory accesses either to the attached ring node or to the register dependences can be satisfied by re-computing the
private L1. shared variables involved.4 Instead, most of the speedups
Benchmarks. We use 10 out of the 15 C benchmarks from come from decoupling communication for both synchroni-
the SPEC CPU2000 suite: 4 floating point (CFP2000) and 6 zation and memory-carried actual dependences. To the best
integer benchmarks (CINT2000). For engineering reasons, of our knowledge, HELIX-RC is the only solution that accel-
the data dependence analysis that HCCv3 relies on4 requires erates all 3 types of transfers for actual dependences.
either too much memory or too much time to handle the
rest. This limitation is orthogonal to the results described in
this paper. Figure 5. HELIX-RC triples the speedup obtained by a compiler-
only solution for SPEC INT benchmarks. Speedups are relative to
Compiler. We extended the Intermediate Language
sequential program execution.
Distributed Just-In-Time (ILDJIT) compilation framework,3
version 1.1, to use LLVM 3.0 for backend machine code gen- 16
Compiler-only
eration. We generated both single- and multi-threaded ver- 14 Numerical
HELIX-RC
sions of the benchmarks. The single-threaded programs are programs
12
the unmodified versions of benchmarks, optimized (O3) and Non-numerical
Program speedup

generated by LLVM. This code outperforms GCC 4.8.1 by 8% 10 programs


on average and under-performs ICC 14.0.0 by 1.9%. The
8
multi-threaded programs were generated by HCCv3 and the 6.9
HELIX compiler (i.e., compiler-only solution) to run on ring- 6
cache-enhanced and conventional architectures, respec-
4
tively. Both compilers produce code automatically and do
2.2
not require any human intervention. During compilation, 2
they use SPEC training inputs to select the loops to 0
parallelize.
ip

er

18 lf
cf

Ge p2

an

ke

rt

n
p
vp

s
m

ea

ea
o
gz

a
1.m
rs

ua

FP .me
i
tw

e
bz

9.
5.

am
om

om

om
pa
4.

Measuring performance. We compute speedups relative


eq

17
17

0.

6.
16

7
7.

8.
25
30

3.

17

Ge

Ge
19

18
18

to sequential simulation. Both single- and multi-threaded


T
IN

runs use reference inputs. To make simulation feasible, we


simulate multiple phases of 100M instructions as identified
by SimPoint.
Figure 6. Breakdown of benefits of decoupling communication from
computation.
6.2. Speedup analysis c
16
In our 16-core processor evaluation system, HELIX-RC Compiler-only
boosts the performance of sequentially-designed programs 14 decoupled reg. communication
memory communication

decoupled reg. comm. and synch.


(CINT2000), assumed not to be amenable to parallelization. 12
Benefit of decoupling

decoupled reg. and memory comm.


Figure 5 shows that HELIX-RC raises the geometric mean of
Program speedup

10 HELIX-RC (decoupled all communication)


speedups for these benchmarks from 2.2 for a compiler-
8
only solution to 6.85. Benefits of
6 decoupling
HELIX-RC not only maintains the performance of a com- synchronization
piler-only solution on numerical programs (SPEC CFP2000), 4

0
c
As an aside, automatic parallelization features of ICC led to a geomean
ip

cf

n
ol
vp

se

zip

ea
gz

1.m
tw

slowdown of 2.6% across SPEC CINT2000 benchmarks, suggesting ICC


ar
5.

m
4.

b
17

0.

6.
18
16

o
7.

25
30

Ge

cannot parallelize non-numerical programs.


19

T
IN

These speedups are possible even with a cache coherence latency of convention-
al processors (e.g., 75 cycles).

94 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


Sequential segments. While more splitting offers higher iteration count (ranging from 8 to 20) leads to idle cores.
TLP (more sequential segments can run in parallel), it also Other benchmarks such as 164.gzip, 197.parser, 181.mcf, and
requires more synchronization at run time. Hence, the high 188.ammp suffer from dependence waiting due to large
synchronization cost for conventional multicores discour- sequential segments. Finally, HCCv3 must sometimes add a
ages aggressive splitting of sequential segments. In con- large number of wait and signal instructions (i.e., many
trast, the ring cache enables aggressive splitting to maximize sequential segments) to increase TLP, as seen for 164.gzip,
TLP. 197.parser, 181.mcf, and 256.bzip2.
To analyze the relationship between splitting and TLP,
we computed the number of instructions that execute con- 7. RELATED WORK
currently for the following 2 scenarios: (i) conservative To compare HELIX-RC to a broad set of related work, Table 1
splitting constrained by a contemporary multicore proces- summarizes different parallelization schemes proposed for
sor with high synchronization penalty (100 cycles) and (ii) non-numerical programs organized with respect to the types
aggressive splitting for HELIX-RC with low-latency com- of communication decoupling implemented (register vs.
munication (<10 cycles) provided by the ring cache. In memory) and the types of dependences targeted (actual vs.
order to compute TLP independent of both the communi- false). HELIX-RC covers the entire design space and is the
cation overhead and core pipeline advantages, we used a only one to decouple memory accesses from computation
simple abstracted model of a multicore system that has no for actual dependences.
communication cost and is able to execute 1 instruction at
a time. Using the same set of loops chosen by HELIX-RC 7.1. Multiscalar register file
and used in Figure 5, TLP increased from 6.4 to 14.2 Multiscalar processors19 extract both Instruction Level
instructions with aggressive splitting. Moreover, the aver- Parallelism (ILP) and TLP from an ordinary application.
age number of instructions per sequential segment While a ring caches structure resembles a Multiscalar regis-
dropped from 8.5 to 3.2 instructions. ter file, there are fundamental differences. For the Multiscalar
Coverage. Despite all the loop-level speedups possible via register file, there is a fixed and relatively small number of
decoupling communication and aggressively splitting of shared elements that must be known at compile time.
sequential segments, Amdahls law states that program cov- Furthermore, the Multiscalar register file cannot handle
erage dictates the overall speedup of a program. Prior paral- memory updates by simply mapping memory to a fixed num-
lelization techniques have avoided selecting loops with small ber registers without a replacement mechanism. In contrast,
bodies because communication would slow down execution the ring cache does not require compile-time knowledge to
on conventional processors.5, 20 Since HELIX-RC does not suf- handle an arbitrary number of elements shared between
fer from this problem, the compiler can freely select small cores (i.e., memory locations allocated at runtime) and can
hot loops to cover almost the entirety of the original readily handle register updates by deallocating a register to a
program. memory location. In other words, HELIX-RC proposes to use
a distributed cache to handle both register and memory
6.3. Analysis of overhead updates.
To understand areas for improvement, we categorize every
overhead cycle preventing ideal speedup. Figure 7 shows the 7.2. Cache coherence protocols
results of this categorization for HELIX-RC, again imple- The ring cache addresses an entirely different set of commu-
mented on a 16-core processor. nication demands. Cache coherence protocols target rela-
Most importantly, the small fraction of communication tively small amounts of data shared infrequently between
overheads suggests that HELIX-RC successfully eliminates cores. Hence, cores can communicate lazily, but the result-
the core-to-core latency for data transfer in most bench- ing communication almost always lies in the critical sequen-
marks. For several benchmarks, notably 175.vpr, 300.twolf, tial chain. In contrast, the ring cache targets frequent and
256.bzip2, and 179.art, the major source of overhead is the time-critical data sharing between cores.
low number of iterations per parallelized loop (low trip
count). While many hot loops are frequently invoked, low 7.3. On-chip networks

Figure 7. Breakdown of overheads that prevent achieving ideal speedup.


164.gzip 40.8% 8.1% 9.6% 4.5% 0.0% 18.1% 18.8% 3.0x
175.vpr 11.9% 0.4% 74.2% 12.4% 0.0% 0.5% 0.5% 6.1x
197.parser 31.3% 24.3% 15.3% 5.0% 0.3% 11.6% 12.2% 7.3x
300.twolf 0.1% 0.2% 41.8% 1.4% 31.8% 0.0% 24.6% 7.6x
181.mcf 37.7% 10.4% 5.5% 1.2% 3.2% 20.9% 21.2% 8.7x
256.bzip2 3.4% 3.4% 51.6% 0.1% 1.1% 19.7% 20.7% 12.0x
183.equake 0.2% 0.0% 9.1% 1.5% 87.7% 0.0% 1.5% 10.1x
179.art 0.2% 0.0% 47.7% 24.8% 16.1% 0.0% 11.3% 10.5x
188.ammp 64.1% 8.0% 6.3% 7.4% 8.9% 2.2% 3.1% 12.5x
177.mesa 29.3% 0.9% 3.7% 58.4% 7.3% 0.0% 0.3% 15.1x
Dependence Communication Low trip Iteration Memory Wait/signal Additional HELIX-RC
waiting count imbalance instructions instructions speedup

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 95


research highlights

Table 1. Only HELIX-RC decouples communication for all types of


code can sometimes be slower than the original. Moreover,
dependences. DSWP faces the challenges of selecting appropriate loops to
parallelize and keeping the pipeline balanced at runtime.
Actual dependences False dependences While DSWP-based approaches focus more on restructuring
Register HELIX-RC, Multiscalar, HELIX-RC, Multiscalar, TRIPS, T3 loops to hide communication latency,8, 13 HELIX-RC pro-
TRIPS, T3 poses an architecture-compiler co-design strategy that
Memory HELIX-RC HELIX-RC, TLS-based approaches, selects the most appropriate loops for parallelization.
Multiscalar, TRIPS, T3
Combining DSWP with HELIX-RC has the potential to
yield significantly better performance than either alone.
DSWP cannot easily scale beyond 4 cores14 without being
While On-Chip-Networks (OCNs) can take several forms, combined with approaches that exploit parallelism among
they commonly implement reactive coherence protocols18, 21, loop iterations (e.g., DOALL).8 While DSWP + DOALL can scale
24, 25
that do not fulfill the low-latency communication beyond several cores, DOALL parallelism is not easy to find in
requirements of HELIX-RC. Scalar operand networks22 non-numerical code. Instead, DSWP + HELIX-RC presents an
somewhat resemble a ring cache to enable tight coupling opportunity to parallelize a much broader set of loops.
between known producers and consumers of specific oper- Several TLS-based techniques,7, 10, 20 including Stanford
ands, but they suffer from the same limitations as the Hydra, POSH, and STAMPede, combine hardware-assisted
Multiscalar register file. Hence, HELIX-RC implements a Thread Level Speculation (TLS) with compiler optimizations
relatively simple OCN, but supported by compiler guaran- to manage dependences between loop iterations executing
tees and additional logic to implement automatic in different threads. When the compiler identifies sources
forwarding. and destinations of frequent dependences, it synchronizes
using wait and signal primitives; otherwise, it uses specu-
7.4. Off-chip networks lation. HELIX-RC, on the other hand, optimizes code assum-
Networks that improve bandwidth between processors have ing all dependences are actual. While we believe adding
been studied extensively.17 While they work well for Cyclic speculation may help HELIX-RC, Figure 5 shows decoupled
Multithreading (CMT) parallelization techniques that communication already yields significant speedups without
require less frequent data sharing, there is less overall paral- misspeculation overheads.
lelism. Moreover, networks that target chip-to-chip commu-
nication do not meet the very different low-latency 8. CONCLUSION
core-to-core communication demands of HELIX-RC.9 Our HELIX-RC shows how to accelerate non-numerical programs
results show HELIX-RC is much more sensitive to latency by exploiting parallelism between the iterations of their
than to bandwidth. small loops. Successfully mapping the iterations of such
loops onto multiple cores of a single chip requires a low-
7.5. Non-commodity processors latency, broadcast interconnect between cores. This inter-
Multiscalar,19 TRIPS,16 and T3 (Ref. Robatmil et al.15) are connect needs to be proactive (so that communication starts
polymorphous architectures that target parallelism at dif- as soon as data is generated), and it must be able to update
ferent granularities. They differ from HELIX-RC in that (i) memory locations stored in each cores private cache.
they require a significantly larger design effort and (ii) they
only decouple register-to-register communication and/or 8.1. Accelerating non-numerical programs to
false memory dependence communication by speculating. catch up with hardware evolution
An iWarp system2 implements special-purpose arrays Adding multiple cores to a single chip has been proposed,
that execute fine- and coarse-grained parallel numerical studied, and realized in products since the 90s (Ref.
programs. However, without an efficient broadcast mecha- Olukotun et al.12), but the majority of these cores are still
nism, iWarps fast communication cannot reach the speed- under-utilized even after more than 15 years effort in both
ups offered by HELIX-RC. compiler and programming language research. Having
reached the ILP wall, industry now relies on these multi-
7.6. Automatic parallelization ple cores to gain performance from each system. However,
of non-numerical programs successful uses of multiple cores exist only when the goal is
Several automatic methods to extract TLP have demon- maximizing throughput combined with massive data paral-
strated respectable speedups on commodity multicore pro- lelism or parallelism among multiple programs, as is avail-
cessors for non-numerical programs.5, 8, 13, 23 All of these able in Graphics Processing Unit (GPU) computing or within
methods transform loops into parallel threads. Decoupled data centers. On the other hand, if single program perfor-
Software Pipelining (DSWP)13 reduces sensitivity to commu- mance is the target and there is little or no data parallelism
nication latency by restructuring a loop to create a pipeline available (e.g., non-numerical programs running on mobile
among the extracted threads with unidirectional communi- phones or client computers), then only a few cores are actu-
cation between pipeline stages. Demonstrated both on sim- ally used, leaving the majority of them under-utilized.1 Our
ulators and on real systems, DSWP performance is largely work shows how to actually take advantage of the cores that
insensitive to latency. However, significant restructuring of are available within a single chip when running non-numer-
the loop makes speedups difficult to predict and generated ical programs, highlighting the great potential of including

96 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


hardware support for a proactive, cache-based, low-latency 11. Martin, M.M.K. Token Coherence. 19. Sohi, G.S., Breach, S.E.,
PhD thesis, University of Vijaykumar, T.N. Multiscalar
core-to-core interconnect. Wisconsin-Madison, 2003. processors. In ISCA (1995).
12. Olukotun, K., Nayfeh, B.A., Hammond, 20. Steffan, J.G., Colohan, C., Zhai, A.,
L., Wilson, K., Chang, K. The case for Mowry, T.C. The STAMPede
8.2. Transforming parallelism into performance a single-chip multiprocessor. approach to thread-level
requires low-latency communication ASPLOS (1996). speculation. ACM Transactions on
13. Ottoni, G., Rangan, R., Stoler, A., Computer Systems (2005).
Our work demonstrates the fundamental value of having a August, D.I. Automatic thread 21. Taylor, M.B., Kim, J., Miller, J.,
low-latency interconnect to boost the performance of com- extraction with decoupled software Wentzlaff, D., Ghodrat, F.,
pipelining. In MICRO (2005). Greenwald, B., Hoffman, H.,
plex, non-numerical programs. The dependence between 14. Rangan, R., Vachharajani, N., Ottoni, Johnson, P., Lee, J.-W., Lee, W., Ma, A.,
communication latency and performance of a program has G., August, D.I. Performance Saraf, A., Seneski, M., Shnidman, N.,
scalability of decoupled software Strumpen, V., Frank, M.,
already been observed in high-performance computing pipelining. In ACM TACO (2008). Amarasinghe, S., Agarwal, A.
15. Robatmil, B., Li, D., Esmaeilzadeh, The RAW microprocessor: A
domains.17 Moreover, prior work on on-chip networks has H., Govindan, S., Smith, A., Putnam, computational fabric for software
shown the value of a low-latency interconnect both for pro- A., Burger, D., Keckler, S.W. How to circuits and general-purpose
Implement Effective Prediction and programs. IEEE Micro (2002).
grams with regular control and data flows22, 25 and for a novel Forwarding for Fusable Dynamic 22. Taylor, M.B., Lee, W., Amarasinghe, S.P.,
research architecture.6, 21 Our work is the first to demon- Multicore Architectures. In HPCA Agarwal, A. Scalar operand
(2013). networks. IEEE Transactions on
strate the value of a cache-based, low latency interconnect 16. Sankaralingam, K., Nagarajan, R., Parallel Distributed Systems
between cores of commodity processors for accelerating Liu, H., Kim, C., Huh, J., (2005).
Ranganathan, N., Burger, D., 23. Tournavitis, G., Wang, Z., Franke, B.,
complex, non-numerical programs running on a chip. Keckler, S.W., McDonald, R.G., OBoyle, M.F.P. Towards a holistic
Moore, C.R. TRIPS: A polymorphous approach to auto-parallelization. In
architecture for exploiting ILP, TLP, PLDI (2009).
8.3. From reactive hardware-driven to proactive and DLP. In ACM TACO (2004). 24. van der Wijngaart, R.F., Mattson, T.G.,
software-driven cache communication 17. Scott, S.L. Synchronization and Haas, W. Light-weight
Communication in the communications on Intels
HELIX-RC has the potential to influence the adoption of T3E Multiprocessor. In ASPLOS single-chip cloud computer
proactive, cache-based, and one-to-many interconnects in (1996). processor. SIGOPS Operating
18. Seiler, L., Carmean, D., Sprangle, E., Systems Review (2011).
commodity processors. To quantify the need for such solu- Forsyth, T., Abrash, M., Dubey, P., 25. Wentzlaff, D., Griffin, P., Hoffmann, H.,
tions, we measured the communication latency between Junkins, S., Lake, A., Sugerman, J., Bao, L., Edwards, B., Ramey, C.,
Cavin, R., Espasa, R., Grochowski, E., Mattina, M., Miao, C.-C., Brown, J.F.
adjacent cores in several generations of Intel commodity Juan, T., Hanrahan, P. Larrabee: a III, Agarwal, A. On-chip
many-core x86 architecture for interconnection architecture of the
processors. As highlighted in Figure 1a, conventional reac- visual computing. ACM tile processor. IEEE Micro (2007).
tive solutions have latencies of around 100 cycles. The figure Transactions on Graphics (2008).
shows that, among the five generations of Intel processors
we considered, adjacent core latency bounces around 100 Simone Campanoni, Northwestern
cycles without a monotonic trend over time. This suggests University, Evanston, IL.
Kevin Brownell, Svilen Kanev,
that there is no reason to expect conventional solutions Gu-Yeon Wei, and David Brooks, Harvard
(reactive hardware-driven) to improve in the future. University, Cambridge, MA.
Timothy M. Jones, University of
HELIX-RC motivates shifting inter-core communication Cambridge, England.
mechanisms towards alternative cache-based solutions, in
which a compiler identifies for the hardware the code that will
generate shared data. The architecture, for its part, will proac-
tively communicate modified values to make them locally
accessible by other cores. This allows a drastic cut in the
latency of remote data access, which, therefore, allows a par-
allelizing compiler to take advantage of the substantial latent
parallelism between the iterations of small loops.

References HELIX: Automatic Parallelization of


1. Blake, G., Dreslinski, R.G., Mudge, T., Irregular Programs for Chip
Flautner, K. Evolution of thread-level Multiprocessing. In CGO (2012).
parallelism in desktop applications. 6. Ceze, L., Tuck, J., Torrellas, J.,
In ISCA (2010). Cascaval, C. Bulk disambiguation of
2. Borkar, S., Cohn, R., Cox, G., Gleason, S., speculative threads in
Gross, T., Kung, H.T., Lam, M., Moore, B., multiprocessors. In ISCA (2006).
Peterson, C., Pieper, J., Rankin, L., 7. Hammond, L., Hubbert, B.A., Siu, M.,
Tseng, P.S., Sutton, J., Urbanski, J., Prabhu, M.K., Chen, M.K., Olukotun, K.
Webb, J. iWarp: An integrated solution The Stanford Hydra CMP. IEEE Micro
to high-speed parallel computing. (2000).
Supercomputing (1988). 8. Huang, J., Raman, A., Jablin, T.B.,
3. Campanoni, S., Agosta, G., Reghizzi, S.C., Zhang, Y., Hung, T.-H., August, D.I.
Biagio, A.D. A highly flexible, parallel Decoupled software pipelining
virtual machine: Design and creates parallelization opportunities.
experience of ILDJIT. Software: In CGO (2010).
Practice and Experience (2010). 9. Jerger N.E., Peh, L.-S. On-Chip
4. Campanoni, S., Brownell, K., Kanev, S., Networks. Synthesis Lectures on
Jones, T.M., Wei, G.-Y., Brooks, D. Computer Architecture. Morgan &
HELIX-RC: An architecture-compiler Claypool, 2009.
co-design for automatic 10. Liu, W., Tuck, J., Ceze, L., Ahn, W.,
parallelization of irregular programs. Strauss, K., Renau, J., Torrellas, J.
In ISCA (2014). POSH: A TLS compiler that
5. Campanoni, S., Jones, T., Holloway, G., exploits program structure. In PPoPP
Reddi, V.J., Wei, G.-Y., Brooks, D. (2006). Copyright held by authors/owners. Publishing rights licensed to ACM. $15.00

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 97


CAREERS

Auburn University the proposed term of employment. Auburn Uni- Barnard College is an Equal Opportunity
Department of Computer Science versity is an EEO/Vet/Disability Employer. Employer. Barnard does not discriminate
and Software Engineering (CSSE) due to race, color, creed, religion, sex, sexual
Multiple Faculty Positions in Cybersecurity orientation, gender and/or gender identity or
Barnard College expression, marital or parental status, national
CSSE invites applications for multiple tenure- Senior Endowed Chair and Director of origin, ethnicity, citizenship status, veteran or
track faculty positions to begin in Fall 2018 or the Center for Computational Science military status, age, disability, or any other legally
later. Candidates at the Assistant Professor level protected basis, and to the extent permitted by law.
will be given preference, however outstanding Barnard College, a premier liberal arts college in Qualified candidates of diverse ethnic and racial
candidates at senior levels will also be consid- the City of New York and the nations most selec- backgrounds are encouraged to apply for vacant
ered. A Ph.D. degree in computer science, soft- tive womens college, seeks a scholar and leader positions at all levels.
ware engineering or a closely related field must to serve as Inaugural Endowed Chair in Comput-
be completed by the start of appointment. Excel- er Science and Director of the Center for Compu-
lent communication skills are required. We are tational Science. This individual will build a de- Boston College
interested in candidates specializing in all areas partment of computer science at the College that Assistant Professor of the Practice or Lecturer
related to security, such as AI/machine learning works in close collaboration with the Department
applications to security, blockchain, cryptocurrency, of Computer Science in Columbia Universitys Fu The Computer Science Department of Boston
cyberidentity, cyberinfrastructure and critical infra- Foundation School of Engineering and Applied College aims to grow substantially over the next
structure protection, digital forensics, reverse engi- Science. In this newly-created role, the Chair several years, and will seek to fill faculty positions
neering, secure cloud, mobile systems, networks and and Director will have the opportunity to launch at all levels. We invite applications for a full-time,
operating systems, secure software engineering, and a new academic program in Computer Science non-tenure-track faculty position, beginning in
securing the Internet of Things. and frame programming and content for a new the 2018-2019 academic year. Candidates should
CSSE is home to the Auburn Cyber Research Center for Computational Science. The endowed be committed to excellence in undergraduate
Center (http://cyber.auburn.edu), and is affiliated chair position will be tenured in the Barnard De- education, and should be able to both teach a
with the McCrary Institute for Critical Infrastruc- partment of Mathematics until a department of broad variety of undergraduate computer science
ture Protection and Cyber Systems (http://mc- computer science is formally established. The courses, and to participate in the development of
crary.auburn.edu). The department has 21 full- Chair and Director is expected to be in place no new courses that reflect the evolving landscape of
time tenure-track faculty members and supports later than September 2018. the discipline.
strong M.S. and Ph.D. programs (with a new M.S. Barnard benefits from close collaborations Minimum requirements for the title of As-
in Cybersecurity Engineering projected to start with academic departments across Columbia sistant Professor of the Practice include a Ph.D.
in Fall 2018). Faculty research areas include ar- University, and it is expected that this individual in Computer Science or closely related disci-
tificial intelligence, architecture, computational will have an affiliate position and intellectual pline. Candidates who have only attained a
biology, computer science education, data sci- home in both the Computer Science Department Masters degree would be eligible for the title
ence, energy-efficient systems, human-computer and at the Data Sciences Institute at Columbia of Lecturer.
interaction, Internet of Things, learning science, University. In addition to curricular develop- Application review beings October 1, 2017.
machine learning, modeling and simulation, ment, the endowed chair position will have the re- See www.cs.bc.edu for more information.
multi-agent systems, networks, security, software sources to recruit junior faculty and post-doctoral To apply go to http://apply.interfolio.com/44984.
engineering and wireless engineering. scholars and stimulate interactions with units
Auburn University is one of the nations pre- across Barnard, many of which have quantita-
mier public land-grant institutions. It is ranked tively and computationally oriented components, Boston College
46th among public universities in the U.S. News and and with Columbia. Associate or Full Professor
World Report 2018 Rankings. It is nationally recog- Barnard seeks a leader in the field of comput- of Computer Science
nized for its commitment to academic excellence, er science with a distinguished record of scholar-
a positive work environment, student engagement, ship and is open to candidates from a variety of The Computer Science Department of Boston
and its beautiful campus. Auburn residents enjoy a research areas. The ability to develop curriculum, College aims to grow substantially over the next
thriving community, recognized as one of the best an understanding of the importance of collabora- several years, and will seek to fill faculty posi-
small towns in America. The city is located on the tion across disciplines, and a deep commitment tions at all levels. We invite applications for a
rapidly developing I-85 corridor between Atlanta, to the undergraduate experience, the importance senior-level (Associate or Full Professor) position,
GA, and Montgomery, AL. The Auburn City school of womens colleges, and excellent communica- starting in the 2018-2019 academic year. The suc-
system is ranked as one of the top school systems tion skills are required. cessful candidate is expected to play a leadership
in the nation and the state. A nationally recognized Applications should be submitted electroni- role in the creation of a Data Science program in
hospital, East Alabama Medical Center, is located cally and include the following: curriculum-vitae conjunction with the new interdisciplinary Insti-
close by in Opelika. The Auburn-Opelika metropol- including a publication list, a description of re- tute for Integrated Science and Society, recently
itan area has a population of over 150,000. search accomplishments, a statement of research announced at Boston College, and will also par-
Applicants should submit a cover letter, cur- and teaching interests and plans, contact infor- ticipate in shaping the future of our growing de-
riculum vita, research vision, teaching philoso- mation for three experts who can provide letters partment.
phy, and the names of references through the of recommendation, and up to three pre/reprints Applicants must have a Ph.D. in Computer
faculty hiring link on the department home page of scholarly work. Science or closely related discipline, a record of
http://www.eng.auburn.edu/csse. There is no ap- Inquiries, nominations, and applications strong research accomplishment and external
plication deadline. Application review will begin should be sent in strict confidence to: funding, and a commitment to quality in under-
in November. Selected candidates must be able Jane McMahon, Managing Associate graduate and graduate education. Preference will
to meet eligibility requirements to work legally in Isaacson, Miller be given to candidates whose research is in the ar-
the United States at the time of appointment for www.imsearch.com/6376 eas of high-performance data mining / machine

98 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


learning or data visualization, particularly those a commitment to quality in undergraduate and Carnegie Mellon University
with a history of interdisciplinary collaboration, graduate education. Faculty Hiring
but outstanding candidates in all research areas Application review begins October 1, 2017.
will be considered. See www.cs.bc.edu for more information. The School of Computer Science consists of seven
Application review begins October 1, 2017. To apply go to http://apply.interfolio.com/44980 departments, spanning a wide range of topics in
See www.cs.bc.edu for more information. computer science and the application of comput-
To apply go to http://apply.interfolio.com/44982 ers to real-world systems. Faculty positions are
Bowling Green State University specific to each department, though in certain
Assistant Professor - Computer Science - cases, joint positions are also possible.
Boston College Cyber Security & Digital Forensics We are seeking tenure, research, and systems
Tenure Track Assistant Professor track faculty candidates with a strong interest in
in Computer Science Department of Computer Science: Assistant Pro- research, an earned Ph.D., and outstanding aca-
fessor, Bowling Green State University. Tenure- demic credentials. Candidates for tenure track
The Computer Science Department of Boston track faculty position available August 2018. appointments should also have a strong interest
College aims to grow substantially over the next Responsibilities: Candidates must have po- in graduate and undergraduate education.
several years and will seek to fill faculty positions tential for excellence in research and a strong We are also seeking teaching track faculty
at all levels. We invite applications for one or commitment to teaching at both the undergradu- candidates. You should have a Ph.D. in Computer
more tenure-track faculty positions at the rank of ate and graduate levels. Science or a related computing discipline, a back-
Assistant Professor, beginning in the 2018-2019 Minimum Qualifications: Area of specializa- ground of demonstrated excellence and dedica-
academic year. Successful candidates will be ex- tion within Cyber Security and Digital Forensics tion to teaching, the ability to collaborate with oth-
pected to develop strong research programs that are open. A Ph.D. in Computer Science or related er faculty in a fast-paced environment, and must
can attract external research funding. The search field is required; advanced ABD candidates will be prepared to teach in a wide variety of settings,
will focus on candidates who can participate in be considered but must complete requirements including large undergraduate lecture courses and
cross-disciplinary research in conjunction with for the Ph.D. prior to employment. classes delivered in non-traditional formats.
the new Institute for Integrated Science and So- For a complete job description & instructions Candidates with a commitment toward build-
ciety recently announced at Boston College, in on how to apply for this position visit https:// ing an equitable and diverse scholarly community
the areas of high-performance data mining / ma- bgsu.hiretouch.com/ or contact the Office of Hu- are particularly encouraged to apply. We are very in-
chine learning, systems / networks, data visual- man Resources, BGSU. Application deadline is terested in applications from candidates who have
ization, and human-computer interaction. How- January 5, 2018. a demonstrated track record in mentoring and nur-
ever, outstanding candidates in all research areas Background check is required for employment. turing women and students from groups tradition-
will be considered. BGSU is an AA/EEO/Vet employer. We encour- ally underrepresented in computer science.
Minimum requirements for all positions in- age applications from women, minorities, veter- To ensure full consideration of your applica-
clude a Ph.D. in Computer Science or closely re- ans, and persons with disabilities regardless of tion, please submit all materials no later than
lated discipline, an energetic research program age, gender identity, genetic information, reli- December 15, 2017. In your cover letter, please in-
that promises to attract external funding, and gion, or sexual orientation. dicate clearly the department(s) you are applying

ROCHESTER INSTITUTE OF TECHNOLOGY


Rochester, New York
Computing and Information Sciences - Multiple Openings for Fall 2018
The B. Thomas Golisano College of Computing and Information Sciences at the Rochester Institute
of Technology invites applications and nominations for the following faculty positions:
Tenure-track assistant professors (2) in Computer Science: all areas (#3444BR)
MULTIPLE FACULTY POSITIONS Tenure-track assistant professor in Computing Science: cybersecurity including
cryptography (#3442BR)
Department of Electrical and Tenure-track assistant professor in Computing Security (#3213BR)
Systems Engineering Tenure-track assistant professor in Graduate Studies and Research: machine learning, data
analytics, and their applications (BR#3463)
The School of Engineering and Applied Science at the University of Pennsylvania is growing its Tenure-track assistant professor Interactive Games and Media: game artificial intelligence,
faculty by 33% over the next five years. As part of this initiative, the Department of Electrical real-time game graphics programming, game architecture and systems, virtual reality/
and Systems Engineering is engaged in an aggressive, multi-year hiring effort for multiple augmented reality in games (#3414BR)
tenure-track positions at all levels. Candidates must hold a Ph.D. in Electrical Engineering, Lecturer in Computer Science to teach in the areas of introductory and core Computer
Computer Engineering, Systems Engineering, or related area. The department seeks individuals Science (#3445BR)
Lecturer in Computing Security to teach introductory computer science, fundamentals of
with exceptional promise for, or proven record of, research achievement, who will take a
computing security, cryptography, systems and network security (#3418BR)
position of international leadership in defining their field of study, and excel in undergraduate Lecturer and Visiting Lecturers in Interactive Games and Media: game artificial intelligence,
and graduate education. Leadership in cross-disciplinary and multi-disciplinary collaborations real-time game graphics programming, introductory game programming, data structures
is of particular interest. We are interested in candidates in all areas that enhance our research and algorithms, game development environments such as Unity or Unreal (#3413BR)
strengths in Lecturer in Software Engineering (BR#3374)
1. Nanodevices and nanosystems (nanoelectronics,MEMS/NEMS, powerelectronics, Candidates should visit http://careers.rit.edu/faculty and refer to the BR numbers listed above
nanophotonics, integrated devices and systems atnanoscale), for specific information about the positions and the application process. Refer to www.rit.edu for
information about RIT and the B. Thomas Golisano College of Computing and Information Sciences.
2. Circuits and computer engineering (analog, RF, mm-wave, digital circuits,emerging The B. Thomas Golisano College of Computing and Information Sciences is the largest of RITs
circuit design, computer engineering, IoT, embedded and cyber-physical systems), and nine colleges and has an enrollment of over 3100 undergraduate students and 850 graduate
3. Information and decision systems (control, optimization, robotics, data science, students. The college, with over 140 faculty members, is housed in a modern facility equipped with
network science, communications, information theory, signal processing, markets and numerous teaching and research laboratories. The college is home to the departments of Computer
social systems). Science, Computing Security, Information Sciences and Technologies, Software Engineering,
the School of Interactive Games and Media, and a college-wide PhD program, providing many
Prospective candidates in all areas are strongly encouraged to address large-scale societal opportunities for cooperation and research collaboration within and beyond the college.
problems in energy, transportation, health, food and water, economic and financial networks, RIT has been honored by The Chronicle of Higher Education as one of the Great Colleges to Work
critical infrastructure, and national security. We are especially interested in candidates For for four years. RIT is a National Science Foundation ADVANCE Institutional Transformation site.
whose interests are aligned with the schools strategic plan, http://www.seas.upenn.edu/ RIT is responsive to the needs of dual-career couples by our membership in the Upstate NY HERC.
PennEngineering2020/ RIT does not discriminate. RIT is an equal opportunity employer that promotes and values
Diversity candidates are strongly encouraged to apply. Interested persons should submit an diversity, pluralism, and inclusion. For more information or inquiries, please visit RIT/TitleIX or the
U.S. Department of Education at ED.Gov
online application at http://www.ese.upenn.edu/faculty-positions and include curriculum
vitae, statement of research and teaching interests, and at least three references. Review of
applications will begin on December 1, 2017.
The University of Pennsylvania is an Equal Opportunity Employer.
Minorities/Women/Individuals with Disabilities/Veterans are encouraged to apply.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 99


CAREERS

FACULTY POSITIONS
Department of Computer Science
The Department of Computer Science at Virginia Tech (www.cs.vt.edu) seeks applicants for five faculty positions, including two tenure-track
Assistant Professor positions in data analytics, a tenure-track assistant professor position in human-centered computing, and two open rank
positions in cybersecurity. Candidates must have a Ph.D. in computer science or related field at the time of appointment and a rank-appropriate
record of scholarship and collaboration in computing research, broadly defined. Successful candidates should give evidence of commitment to
issues of diversity in the campus community. Tenured and tenure-track faculty will be expected to teach graduate and undergraduate courses,
mentor graduate students, and develop a high quality research program.
ASSISTANT PROFESSOR IN DATA ANALYTICS - Blacksburg, VA. Candidates with research depth and breadth in data
analytics, data mining, machine learning, deep learning, artificial intelligence, text mining, natural language processing, information
retrieval, interactive visual analytics, data visualization, high-performance analysis, social informatics, or data science are encouraged to
apply. Candidates working at the intersection of data analytics and other computing or application domains - such as cyber-security, urban
computing, health analytics, bioinformatics, and distributed and IoT systems - are also encouraged to apply. Successful candidates should be
able to demonstrate an interest in initiating and sustaining collaborations within computing as well as with data domain scientists. Successful
candidates will have the opportunity to engage in transdisciplinary research, curriculum, and outreach initiatives with other university
faculty working in the Data & Decisions destination area, one of several new university-wide initiatives at Virginia Tech (provost.vt.edu/
destination-areas). Data & Decisions is focused on advancing the human condition and society with better decisions through data. Faculty
collaborating in this area integrate data analytics and decision sciences across transdisciplinary research and curriculum efforts at Virginia
Tech. Candidates with demonstrated experience in interdisciplinary teaching or research that aligns with the Data and Decisions vision
(provost.vt.edu/destination-areas/da-overview/da-data.html) are especially encouraged to apply. Successful candidates will also have
opportunities to collaborate with numerous reseach centers on campus, including the Discovery Analytics Center (dac.cs.vt.edu), which
leads big-data analytics research at Virginia Tech. Applications must be submitted online to jobs.vt.edu for posting #TR0170153. Applicant
screening will begin on December 1, 2017. Inquiries should be directed to Dr. Chris North, Search Committee Chair, north@cs.vt.edu.
ASSISTANT PROFESSOR IN HUMAN-CENTERED COMPUTING - Blacksburg, VA. Candidates from any area related
to human-computer interaction, user experience, or interactive computing are encouraged to apply. We especially encourage applicants
with interests in novel interactive experiences and technologiesincluding immersive environments (virtual reality and augmented reality),
multi-sensory displays, multi-modal input, visualization, visual analytics, human-robot interaction, game design, and creative technologies.
The successful candidate will have the opportunity to engage in transdisciplinary research, curriculum, and outreach initiatives with other
university faculty working in the Creativity & Innovation (C&I) Strategic Growth Area, one of several new university-wide initiatives at
Virginia Tech (see provost.vt.edu/destination-areas). The C&I Strategic Growth Area is focused on empowering partners and stakeholders
to collaborate on creativity, innovation, and entrepreneurship efforts that transcend disciplinary boundaries. Faculty working together
in this area comprise a vibrant ecosystem that melds the exploration of innovative technologies and the design of creative experiences
with best practices for developing impact-driven and meaningful outcomes and solutions. Candidates with demonstrated experience in
interdisciplinary teaching or research that aligns with the C&I vision (provost.vt.edu/destination-areas/sga-overview/sga-creativity.html)
are especially encouraged to apply. The successful candidate will also have opportunities for collaboration in the interdisciplinary Center for
Human-Computer Interaction (www.hci.vt.edu); the Institute for Creativity, Arts, and Technology (icat.vt.edu); and the Discovery Analytics
Center (dac.cs.vt.edu). Applications must be submitted online to jobs.vt.edu for posting #TR0170152. Applicant screening will begin on
December 1, 2017. Inquiries should be directed to Dr. Doug Bowman, Search Committee Chair, dbowman@vt.edu.
FACULTY POSITIONS IN CYBERSECURITY - Blacksburg, VA and National Capital Region (NCR). Candidates are sought
for two positions, at any rank, with expertise in a broad range of cybersecurity topics, including but not limited to systems and software
security, security analytics, human-centric security, formal methods, trustworthy computing, network security, cloud security, data security,
and security issues in cyber-physical, IoT, or autonomous systems. Applicants interested in either the main campus in Blacksburg, VA, or in
Virginia Techs National Capital Region campus, with facilities in Falls Church and Arlington, VA, are encouraged to apply. These positions
are part of a broad university initiative in integrated security (provost.vt.edu/destination-areas/da-overview/da-security.html). Virginia
Techs Integrated Security Destination Area (ISDA) is focused on understanding and fostering a world in which individuals, institutions, and
nations are secured by technology and social systems that follow ethical principles and promote values of social justice. Faculty working
together in this area are bringing a transdisciplinary approach to the complex range of human and systems security challenges. Successful
candidates will have the opportunity to engage in transdisciplinary research, curriculum, and outreach with other faculty working in the
ISDA. Candidates with demonstrated experience in interdisciplinary teaching or research that aligns with the ISDA vision are particularly
encouraged to apply. In addition to ISDA collaboratorations, successful candidates will have the opportunity to work with a large group of
cybersecurity faculty in CS and ECE (www.cyber.vt.edu). Applications must be submitted online to jobs.vt.edu for posting #TR0170145.
Candidates interested in the National Capital Region (Northern Virginia) campus should clearly indicate that in an application cover letter.
The Department of Computer Science has 47 teaching faculty, including 42 tenured or tenure-track faculty, over 840 undergraduate majors,
and more than 250 graduate students. Department annual research expenditures over the last four years average $13 million. The department is
in the College of Engineering, whose undergraduate program ranks 14th and graduate program ranks 27th among all U.S. engineering schools
(USN&WR, 2017). Most of these positions are located at the main campus of Virginia Tech in Blacksburg, VA, in a region consistently ranked
among the countrys best places to live. One of the cybersecurity faculty positions may be at the universitys Northern Virginia campus, with
facilities in Falls Church and Arlington, VA.
These positions require occasional travel to professional meetings. Selected candidates must pass a criminal background check prior to employment.
Virginia Tech is an AA/EEO employer, committed to building a culturally diverse faculty; we strongly encourage applications from women and minorities.

100 CO MM UNICATIO NS O F T H E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


to. You can learn more about our hiring plans and The College at Brockport Trustworthy Computing include Formal Methods
application instructions by visiting http://www. Tenure Track Assistant Professor and Verification, Embedded and Cyber-Physical
cs.cmu.edu/employment-scs. Systems, Digital Forensics, Compilers, and Com-
For more information about the hiring pri- Applications are invited for a tenure track puter Architecture. Applicants should hold a PhD
orities in a particular department, please visit a Assistant Professor position in the Department of in Computer Science or closely related field at the
department site below:Computational Biology Computing Sciences (home of ABET accredited time of appointment, and have excellent research
Department: http://www.cbd.cmu.edu/tenure- programs) beginning Fall 2018. Doctoral degree and teaching accomplishments or potential. The
track-faculty-positions/ in Computer Science, or in a closely related department offers degrees at the BS, MS, and PhD
Computer Science Department: https://www. field is required. ABD candidates considered. levels. The department is an NSA Center of Aca-
csd.cs.cmu.edu/careers/faculty-hiring Hired faculty will be expected to teach, engage in demic Excellence in Information Assurance Educa-
Human-Computer Interaction Institute: research, and participate in service appropriate tion (CAE/IAE) and Research (CAE-R).
https://hcii.cmu.edu/careers/list to rank. Preference will be given to candidates FSU is classified as a Carnegie Research I
Institute for Software Research: http://www. with expertise in software security, mobile app university. Its primary role is to serve as a center
isri.cmu.edu/jobs/index.html development, software engineering, or operating for advanced graduate and professional studies
Language Technologies Institute: http://lti. systems, although candidates with expertise in any while emphasizing research and providing excel-
cs.cmu.edu/news/lti-hiring area of Computer Science will be considered. All lence in undergraduate education. Further infor-
Machine Learning Department: http://www. positions are subject to final budgetary approval. mation can be found at: http://www.cs.fsu.edu
ml.cmu.edu/Faculty_Hiring.html Apply online at http://www.brockportrecruit.org by Screening will begin December 1, 2017 and
Robotics Institute: http://ri.cmu.edu/about/ January 18, 2018. EOE/AA employer: M/F/DIS/VET will continue until the positions are filled. Please
hiring-faculty-positions/ apply online with curriculum vitae, statements
Please send email to faculty-search@cs.cmu. of teaching and research philosophy, and the
edu with any questions. Florida State University names of three references, at: http://www.cs.fsu.
Carnegie Mellon University shall abide by the Tenure-Track Assistant Professors edu/positions/apply.html
requirements of 41 CFR 60-1.4(a), 60-300.5(a) Questions can be e-mailed to Prof. Xiuwen
and 60-741.5(a). These regulations prohibit dis- The Department of Computer Science at the Flor- Liu, Faculty Search Committee Chair, recruit-
crimination against qualified individuals based ida State University invites applications for two ment@cs.fsu.edu.
on their status as protected veterans or individu- tenure-track Assistant Professor positions to begin
als with disabilities, and prohibit discrimination August 2018. The positions are 9-month, full-time, Requirements: PhD in Computer Science or
against all individuals based on their race, color, tenure-track, and benefits eligible. We are seeking closely related field at the time of appointment,
religion, sex, or national origin. Moreover, these outstanding applicants with strengths in the broad and have excellent research and teaching accom-
regulations require that covered prime contrac- areas of Data Sciences or Trustworthy Computing. plishments or potential.
tors and subcontractors take affirmative action to While strong candidates in all related areas will be
employ and advance in employment individuals considered, the focused areas in Data Sciences are Equal Employment Opportunity
without regard to race, color, religion, sex, nation- Computer Graphics, Visualization, Machine Learn- An Equal Opportunity/Access/Affirmative Action/
al origin, protected veteran status or disability. ing, and Data Analytics; and the focused areas in Pro Disabled & Veteran Employer committed

TENURE-TRACK AND TENURED POSITIONS


ShanghaiTech University invites highly qualified
candidates to fill multiple tenure-track/tenured
ADVERTISING faculty positions as its core founding team in the School of Information Science and
Technology (SIST). We seek candidates with exceptional academic records or demonstrated
IN CAREER strong potentials in all cutting-edge research areas of information science and technology.
They must be fluent in English. English-based overseas academic training or background
OPPORTUNITIES is highly desired.
ShanghaiTech is founded as a world-class research university for training future generations
How to Submit a Classified Line Ad: Send an e-mail to of scientists, entrepreneurs, and technical leaders. Boasting a new modern campus in
Zhangjiang Hightech Park of cosmopolitan Shanghai, ShanghaiTech shall trail-blaze a new
acmmediasales@acm.org. Please include text, and indicate education system in China. Besides establishing and maintaining a world-class research
the issue/or issues where the ad will appear, and a contact profile, faculty candidates are also expected to contribute substantially to both graduate
and undergraduate educations.
name and number.
Academic Disciplines: Candidates in all areas of information science and technology shall
Estimates: An insertion order will then be e-mailed back to be considered. Our recruitment focus includes, but is not limited to: computer architecture,
you. The ad will by typeset according to CACM guidelines. software engineering, database, computer security, VLSI, solid state and nano electronics, RF
electronics, information and signal processing, networking, security, computational foundations,
NO PROOFS can be sent. Classified line ads are NOT big data analytics, data mining, visualization, computer vision, bio-inspired computing systems,
commissionable. power electronics, power systems, machine and motor drive, power management IC as well as
inter-disciplinary areas involving information science and technology.
Deadlines: 20th of the month/2 months prior to issue date. Compensation and Benefits: Salary and startup funds are highly competitive,
For latest deadline info, please contact: commensurate with experience and academic accomplishment. We also offer a
comprehensive benefit package to employees and eligible dependents, including on-
acmmediasales@acm.org campus housing. All regular ShanghaiTech faculty members will join its new tenure-track
Career Opportunities Online: Classified and recruitment system in accordance with international practice for progress evaluation and promotion.
Qualifications:
display ads receive a free duplicate listing on our website at: Strong research productivity and demonstrated potentials;
http://jobs.acm.org Ph.D. (Electrical Engineering, Computer Engineering, Computer Science, Statistics,
Applied Math, or related field);
Ads are listed for a period of 30 days. A minimum relevant (including PhD) research experience of 4 years.
For More Information Contact: Applications: Submit (in English, PDF version) a cover letter, a 2-page
research plan, a CV plus copies of 3 most significant publications, and names
ACM Media Sales of three referees to: sist@shanghaitech.edu.cn. For more information, visit
at 212-626-0686 or http://sist.shanghaitech.edu.cn/NewsDetail.asp?id=373
acmmediasales@acm.org Deadline: The positions will be open until they are filled by appropriate candidates.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 101


CAREERS

to enhancing the diversity of its faculty and stu- computer engineering, and systems security en- services. All qualified applicants will receive con-
dents. Individuals from traditionally underrepre- gineering to address important problems in any sideration for employment without regard to age,
sented groups are encouraged to apply. of these areas. ethnicity, color, race, religion, sex, sexual orienta-
FSUs Equal Opportunity Statement can be The department offers BS and Ph.D. degrees tion or identity, national origin, disability status or
viewed at: http://www.hr.fsu.edu/PDF/Publica- which started in fall 2016, and an MS degree has protected veteran status.
tions/diversity/EEO_Statement.pdf just been approved. The engineering program
draws upon IU Bloomingtons considerable edu-
cation and research strengths such as biology, Max Planck Institute for
Indiana University business, chemistry, computer science, environ- Software Systems (MPI-SWS)
Faculty Positions in Intelligent Systems mental science, informatics, law, medicine, mu- Tenure-Track Openings
Engineering sic, physics, network science, optometry, psycho-
logical and brain sciences, speech and hearing Applications are invited for faculty positions at all
The School of Informatics, Computing, and Engi- sciences, and statistics. New faculty will have con- career stages in computer science, with a particular
neering (SICE) at Indiana University (IU) Bloom- siderable opportunity and responsibility to shape emphasis on systems (broadly construed). We ex-
ington invites applications for multiple open rank the development of curricula and research. There pect multiple positions to be filled in systems, but
tenured/tenure track faculty positions to begin in is a strong emphasis on world-class research, exceptional candidates in other areas of computer
Fall 2018 in Intelligent Systems Engineering (ISE). built around focused laboratories and proactively science are also strongly encouraged to apply.
Duties include research, teaching, and service. involving undergraduates. More information can A doctoral degree in computer science or re-
ISE is an innovative new program, currently be found at https://www.engineering.indiana.edu lated areas and an outstanding research record
with 19 faculty, that focuses on the intersection of Applicants should have an established record (commensurate for the applicants career stage)
sophisticated computing methods and informa- (for senior level) or demonstrable potential for are required. Successful candidates are expected
tion technology with critical engineering prob- excellence (for junior level) in research and teach- to build a team and pursue a highly visible re-
lems. Current foci include bioengineering, com- ing, and a PhD in a related field expected before search agenda, both independently and in col-
puter engineering, robotics and cyberphysical August 2018. laboration with other groups.
systems, molecular and nanoscale engineering, Interested candidates should review the ap- MPI-SWS is part of a network of over 80 Max
environmental engineering, neuro-engineering, plication requirements and submit their applica- Planck Institutes, Germanys premier basic-re-
and intelligent systems. ISE reflects a top prior- tion at: https://indiana.peopleadmin.com/post- search organisations. MPIs have an established
ity for Indiana University, with an expected $120 ings/4613 record of world-class, foundational research in
million investment and search under way for an For full consideration, applications are due by the sciences, technology, and the humanities.
Associate Dean for Engineering. We are particu- January 1, 2018, but applications will be consid- The institute offers a unique environment that
larly interested in hiring faculty whose research ered until the positions are filled. combines the best aspects of a university depart-
develops and applies advanced computational Questions may be sent to isechair@indiana.edu ment and a research laboratory: Faculty enjoy
approaches, especially intelligent systems, ap- full academic freedom, lead a team of doctoral
plied machine learning and artificial intelli- Indiana University is an equal employment and students and post-docs, and have the opportunity
gence, cloud computing, cyberphysical systems, affirmative action employer and a provider of ADA to teach university courses; at the same time, they

Faculty Positions in
Computer and Communication Sciences
cole polytechnique fdrale de Lausanne (EPFL)

The School of Computer and Communication Sciences (IC) at To apply, please follow the application procedure at
EPFL invites applications for faculty positions in computer and
communication sciences. We are seeking candidates for tenure https://facultyrecruiting.epfl.ch/position/6848514
track assistant professor as well as, in exceptional cases, for
senior positions. The following documents are requested in PDF format: cover
letter, curriculum vitae including publications list, brief state-
Successful candidates will develop an independent and crea- ments of research and teaching interests, and contact infor-
tive research program, will participate and be committed to mation (name, postal address, and email) of 3 references for
excellence in undergraduate and graduate teaching, and will junior positions or 5 for senior positions. Screening will start
supervise PhD students. on December 15th, 2017.

The school is seeking candidates in the fields of: data science Further questions may be addressed to:
and machine learning including applications in bioinfor-
matics, natural language processing, and speech recognition Prof. Anastasia Ailamaki
security and privacy, and verification and formal methods. Chair of the Recruiting Committee
Candidates in other areas will also be considered. Email: recruiting.ic@epfl.ch

EPFL offers internationally competitive salaries, generous re- For additional information on EPFL and IC, please consult:
search support, significant start-up resources, and outstanding http://www.epfl.ch and http://ic.epfl.ch
research infrastructure. Academics in Switzerland enjoy many
research funding opportunities, as well as an exceptionally EPFL is an equal opportunity employer and a family friendly
high standard of living. university.

102 COMM UNICATIO NS O F T H E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


enjoy ongoing institutional funding in addition tity), national origin, disability status, age, sexual W
to third-party funds, a technical infrastructure orientation, genetic information, protected veteran
unrivaled for an academic institution, as well as status, or any other characteristic protected by law.

Professor (Open Rank)


internationally competitive compensation. We always welcome nominations and applications
The institute is located in the German cit- from women, members of any minority group, and
ies of Saarbruecken and Kaiserslautern, in the others who share our passion for building a diverse
tri-border area of Germany, France, and Luxem- community that reflects the diversity in our student
Looking for faculty colleagues who engage
deeply in both research and teaching within
bourg. We maintain an international and diverse population.
a curriculum that embraces student projects
work environment and seek applications from
and independent learning? Consider joining
outstanding researchers worldwide. The working
the faculty at WPI.
language is English; knowledge of the German Oakland University
language is not required for a successful career at Tenure-Track Faculty Positions The Computer Science Department anticipates
the institute. hiring multiple tenure-track faculty for the Fall of
Qualified candidates should apply on our ap- The Department of Computer Science and 2018 whose expertise is in the following areas:
plication website (apply.mpi-sws.org). To receive Engineering needs to fill four tenure-track as- 1) Human-Computer Interaction;
full consideration, applications should be re- sistant professor positions. One position is in
ceived by December 1st, 2017. Cybersecurity area. The areas for other three 2) Visualization and Visual Analytics;
The institute is committed to increasing the positions include Human Computer Interac- 3) Dependable Software Systems;
representation of minorities, women, and indi- tion, High Performance Computing, Database
viduals with physical disabilities. We particularly Systems, and Computer Networking. All posi- GREATparticularly
4) Algorithms, MINDS at WORK
with expertise that
may be complementary to interdisciplinary
encourage such individuals to apply. The initial tions will begin on August 15, 2018. Applicants
programs in Bioinformatics, Data Science and
tenure-track appointment is for five years; it can must have completed a Ph.D. in Computer
Learning Science;
be extended to seven years based on a midterm Science, Information Technology, or a closely
evaluation in the fourth year. A permanent con- related field by the appointment date. Candi- 5) Robotics, joining faculty in our interdisciplinary
tract can be awarded upon a successful tenure dates must show exceptional promise in both Robotics Engineering program,
evaluation in the sixth year. research and teaching. Candidates should have 6) Interactive Media and Game Development,
an appreciation of and commitment to the val- joining faculty in our interdisciplinary
ue of diversity and working with a diverse fac- Interactive Media & Game Development
Mississippi State University ulty and student body. program, and
Professor and HeadDepartment of Applications should be submitted by Novem-
Computer Science and Engineering ber 30, 2017. Applicants should submit a letter 7) Computational Neuroscience, working with
of intent, a statement of research, a statement faculty in Biology and our interdisciplinary
Applications and nominations are being sought of teaching, resume, and list of three references. Bioinformatics and Computational Biology
for the Professor and Head of the Department The candidates for cybersecurity position should program.
of Computer Science and Engineering (www.cse. upload their application at http://jobs.oakland. In addition to these specific areas, outstanding
msstate.edu) at Mississippi State University. The edu/postings/12218. The candidates for other candidates in any area will receive full
Head is responsible for the overall administra- three positions should upload their application consideration. Candidates should have a PhD
tion of the department and this is a 12- month at http://jobs.oakland.edu/postings/12177. The in Computer Science or a closely related field,
tenured position. teaching statement should include a list of un- and the potential for excellence in research
The successful Head will provide vision and dergraduate and graduate courses that the ap- and teaching.
leadership for nationally recognized computing plicant will be willing to teach as well as outlines WPIs reputation as a rigorous and innovative
education and research programs; exceptional of two courses that the applicant would like to university rests on the shoulders of its faculty.
academic and administrative skills; a strong introduce. Information about the current courses A highly selective, private technological
commitment to faculty recruitment and develop- offered by the department is available onW depart- university and one of the nations first, WPI
ment; and a strong commitment to promoting mental website at http://www.cse.secs.oakland. believes that when great minds work together,
diversity. edu. great advances follow. At WPI the boundaries
Applicants must have a Ph.D. in computer The department is currently offering BSc. De- to multidisciplinary collaboration are low---
science, software engineering, computer engi- grees in Computer Science and in Information faculty members, students, and other partners
neering, or a closely related field. The successful Technology, MSc. degrees in Computer Science, work together on the real-world projects and
candidate must have earned national recognition Cyber Security and in Software Engineering and purposeful research that are hallmarks of the
by a distinguished record of accomplishments in Information Technology, and a Ph.D. in Com- WPI experience. We are most proud of a recent
computer science education and research. Dem- puter Science and Informatics. For information No. 1 ranking for faculty who best combine
onstrated administrative experience is desired, about the department and Oakland University, research and teaching. (Wall Street Journal/
as is teaching experience at both the undergradu- please visit the respective homepages. Times Higher Ed, 2016). Located one hour
ate and graduate levels. The successful candidate Oakland University is an ADVANCE institu- west of Boston, the universitys campus is in
must qualify for the rank of professor. tion, one of a limited number of universities in re- Worcester, Massachusetts, a thriving 21st
Applicants must apply online by submitting ceipt of NSF funds in support of our commitment century college city recognized as a growing
a cover letter outlining your experience and vi- to increase diversity and the participation and hub of scientific and technological innovation.
sion for this position, a curriculum vitae, and the advancement of women and underrepresented Questions about the hiring process should be
names and contact information of at least three minorities in the STEM fields. Oakland University sent to recruit@cs.wpi.edu. More information
professional references. The online applicant is an equal opportunity employer. about the positions and instructions for applying
site can be accessed by going to www.msujobs. are available at http://web.cs.wpi.edu/facultyhire/
msstate.edu. Screening of candidates will begin Oakland University is a nationally recognized You will need to include detailed research
November 1, 2017 and will continue until the po- doctoral research institution located on 1,443 acres and teaching statements, vitae and contact
sition is filled. Inquiries and nominations should of scenic land in the cities of Rochester Hills and information for at least three references.
be directed to Dr. Nick Younan, Department Auburn Hills in Oakland County, Michigan. The
The deadline for applications is December 15, 2017
Head of Electrical and Computer Engineering University has 132 bachelors degree programs and
with applications continuing to be considered after
and Search Committee Chair (younan@ece.ms- 138 graduate degree and certificate programs. Aca-
that date until the positions are filled.
state.edu or 662-325-3912). demics include programs in the College of Arts and
MSU is an equal opportunity employer, and all Sciences, School of Business Administration, School WPI is an Equal Opportunity Employer

GREAT MINDS at WORK


qualified applicants will receive consideration for of Education and Human Services, School of Engi-
employment without regard to race, color, religion, neering and Computer Science, School of Health
ethnicity, sex (including pregnancy and gender iden- Sciences, School of Medicine and School of Nursing.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 103


CAREERS

Southern University of Science


and Technology
Multiple Tenure-Track Faculty Positions

The Department of Computer Science and Engi-


neering (CSE, http://cse.sustc.edu.cn/en/), South-
ern University of Science and Technology (SUS-
Tech) has multiple Tenure-track faculty openings
at all ranks, including Professor/Associate Profes-

COLLEGIATE ASSISTANT
sor/Assistant Professor. We are looking for out-
standing candidates with demonstrated research
achievements and keen interest in teaching, in
PROFESSOR the following areas (but are not restricted to):

Data Science
Department of Computer Science Artificial Intelligence
Computer Systems (including Networks, Cloud
Computing, IoT, Software Engineering, etc.)
The Department of Computer Science at Virginia Tech (www.cs.vt.edu) seeks Cognitive Robotics and Autonomous Systems
applicants for a collegiate faculty position at the Assistant Professor level. Cybersecurity (including Cryptography)
Candidates must have a Ph.D. in computer science or related field at the time
of appointment. Collegiate faculty members have a primary commitment Applicants should have an earned Ph.D. de-
to the instructional mission of the department, including graduate and gree and demonstrated achievements in both
undergraduate teaching, curricular and program development, and the design research and teaching. The teaching language at
and integration of innovative and inclusive pedagogy. Successful candidates SUSTech is bilingual, either English or Putong-
should give evidence of potential to take a lead role in enhancing curricula hua. It is perfectly acceptable to use English in all
and promoting teaching excellence. In addition to teaching, candidates will be lectures, assignments, exams. In fact, our exist-
expected to participate in research and scholarship, whether on teaching and ing faculty members include several non-Chinese
speaking professors.
learning or on other computer science research topics of interest. Candidates
As a State-level innovative city, Shenzhen has
will have the opportunity to collaborate with a wide range of research groups
identified innovation as the key strategy for its
in the department, including a thriving group in CS education research. development. It is home to some of Chinas most
Candidates with demonstrated knowledge of CS education research topics successful high-tech companies, such as Huawei
such as education-related software systems, analysis of student data analytics, and Tencent. SUSTech considers entrepreneur-
CS education for non-majors or at the K-12 level, cybersecurity education, ship as one of the main directions of the univer-
distance education, or diversity in CS are encouraged to apply. sity. SUSTech encourages candidates with experi-
ence in entrepreneurship to apply.
The department has 47 teaching faculty including 42 tenured and tenure- The Department of Computer Science and En-
track faculty, over 800 undergraduate majors, and more than 250 graduate gineering at SUSTech was founded in 2016. It has
students. The department is in the College of Engineering, whose 12 professors, all of whom hold doctoral degrees
undergraduate program ranks 14th and graduate program ranks 27th among or have years of experience in overseas universi-
U.S. engineering schools (USN&WR, 2017). The department plays a central ties. Among them, two were elected into the 1000
role in several university-wide initiatives (see provost.vt.edu/destination- Talents Program in China; three are IEEE fellows;
areas). Successful candidates will have the opportunity to participate in new one IET fellow.
transdisciplinary research programs and curricula in Data and Decisions, Established in 2012, the Southern University
Integrated Security, Intelligent Infrastructure for Human-Centered of Science and Technology (SUSTech) is a public
Communities, and Creativity & Innovation. institution funded by the municipal of Shenzhen,
a special economic zone city in China. Shenzhen
The collegiate faculty rank is a non-tenure-track position that offers a clear is a major city located in Southern China, situated
promotion path with increasingly long-term contracts. Collegiate faculty immediately north to Hong Kong Special Admin-
are full members of the department faculty, and are expected to participate istrative Region. As one of Chinas major gateways
to the world, Shenzhen is the countrys fastest-
in sponsored research, mentor graduate students, participate in department
growing city in the past two decades.
and professional service, etc. This position is located at the main campus in
SUSTech is committed to increase the diversi-
Blacksburg, VA, a region consistently ranked among the countrys best places ty of its faculty, and has a range of family-friendly
to live. The position requires occasional travel to professional meetings. policies in place. The university offers competi-
Successful candidates should give evidence of commitment to issues of tive salaries and fringe benefits including medi-
diversity in a campus community. Virginia Tech is committed to building a cal insurance, retirement and housing subsidy,
culturally diverse faculty and strongly encourages applications from women which are among the best in China. Salary and
and minorities. The selected candidate must pass a criminal background check rank will commensurate with qualifications and
prior to employment. experience. More information can be found at
http://talent.sustc.edu.cn/en.
Applications must be submitted online to jobs.vt.edu for posting #TR0170132. We provide some of the best start-up packages
Applicant screening will begin on November 27, 2017 and continue until the in the sector to our faculty members, including
position is filled. Inquiries should be directed to Dr. Dennis Kafura, Search one PhD studentship per year and two postdoc-
Committee Chair, kafura@cs.vt.edu. toral fellowships, in addition to a significant
amount of start-up funding (which can be used
to fund additional PhD students and postdocs,
Virginia Tech is an AA/EEO employer, committed to building a research travels, and research equipment).
culturally diverse faculty; we strongly encourage applications from To apply, please provide a cover letter iden-
women and minorities. tifying the primary area of research, curriculum
vitae, and research and teaching statements, and
forward them to cshire@sustc.edu.cn.

104 COMM UNICATIO NS O F T H E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


Texas Christian University dossier service to: hrtalentacquisition@tcu.edu. at the department, college, university, and profes-
Assistant Professor Faculty Positions Do not send documents directly to the Department. sional levels.
Review of applications will begin immediately 2. One non-tenure track Senior Lecturer posi-
The Department of Computer Science at Texas and continue until both positions are filled. tion to start on January 16, 2018. Review date is
Christian University (TCU) invites applications TCU (www.tcu.edu) is a private, coeducational October 15, 2017. The candidate is expected to
for two tenure-track assistant professor positions university within easy reach of many centers of teach a variety of courses primarily at the under-
beginning Fall 2018. Applicants should have an business and research located in the Dallas-Fort graduate level and serve at the department, col-
earned Ph.D. in Computer Science from an ac- Worth Metroplex (DFW). As an AA/EEO employ- lege, and university levels. This non-tenure-line,
credited institution, must have excellent verbal er, TCU recruits, hires, and promotes qualified nine-month faculty position will have a contract
and written communication skills, and a strong persons in all job classifications without regard term not to exceed five years, subject to annual re-
commitment to both teaching and research. to age, race, color, religion, sex, sexual orienta- appointment review, and renewable upon expira-
Qualified applications are invited from candi- tion, gender, gender identity, gender expression, tion of the initial term.
dates with specializations in all areas in comput- national origin, ethnic origin, disability, genetic As a non-tenure line faculty member, the
er science with a specialization in data analytics information, covered veteran status, or any other candidate is not expected to engage in research,
being preferred for one of the positions. basis protected by law. external funding, or publications. However, col-
Applicants for either position will be expected laborative participation with colleagues in such
to teach a wide variety of courses at the undergradu- activities as well as service, curriculum initiatives,
ate level and should be willing to supervise under- Texas State University and conducting learning outcomes assessment,
graduate research projects. Responsibilities in- Department of Computer Science can be considered in the annual evaluation.
clude teaching undergraduate computing courses Consult the departments page at www.
in the Departments programs in Computer Science The Department of Computer Science invites ap- cs.txstate.edu/employment/faculty/ for required
(COSC) and Computer Information Technology plications for three faculty positions: and preferred qualifications, application proce-
(CITE) and advising and mentoring majors; con- 1. Two tenure-track Assistant Professor posi- dures, and information about the university and
ducting research and engagement in scholarship in tions to start on September 1, 2018. Review date the department.
the applicants area of specialization. Salary is com- is January 8, 2018. We are seeking candidates Texas State University is committed to an
mensurate with qualifications and experience. to complement and enhance our research in inclusive education and work environment that
TCU uses an online application protocol ad- data analytics, human-computer interactions, provides equal opportunity and access to all qual-
ministered by Human Resources. All application artificial intelligence, computer security and ified persons. Texas State, to the extent not in con-
materials: cover letter, curriculum vitae, representa- networks, high-performance computing and flict with federal or state law, prohibits discrimi-
tive publications, detailed research plans, a state- software engineering. Outstanding candidates nation or harassment on the basis of race, color,
ment of teaching philosophy and interests must be in other areas will also be considered. Job duties national origin, age, sex, religion, disability, vet-
submitted electronically at https://tcu.igreentree. include conducting research that results in refer- erans status, sexual orientation, gender identity
com/CSS_Faculty/CSSPage_Welcome.asp . eed publications and external funding, teaching or expression. Texas State University is a member
Three confidential letters of recommendation effectively at the graduate and undergraduate of The Texas State University System. Texas State
should be emailed directly from the reviewer or levels, supervising student research, and serving University is an EOE.

CARNEGIE MELLON UNIVERSITY


COLLEGE OF ENGINEERING | FACULTY POSITIONS IN ELECTRICAL AND COMPUTER ENGINEERING IN AFRICA
The College of Engineering at Carnegie Mellon University, a world leader in information and communication technology, has extended its global reach into Africa.
Offering masters degrees to full-time resident students from across Africa at our base in Kigali, Rwanda, CMU-Africa is educating future leaders who will create
the technology and business innovations that will transform Africa.

We are seeking highly qualified faculty candidates at all levels, from new PhDs to senior personnel, to join our dynamic, world-class faculty in contributing to
the emerging knowledge-based economies across the continent. CMU-Africa faculty members collaborate with industry and deliver innovative, interdisciplinary
graduate teaching and research programs in the African context.

Carnegie Mellon is seeking exceptional candidates who can deliver innovative, interdisciplinary graduate programs in the following areas:

Software engineering Cyber-security and privacy Energy systems Applications in healthcare,


agriculture, finance and
infrastructure
Mobile and cloud computing Embedded systems Data analytics
Innovation, entrepreneurship
and technology management
Communications and Internet of things Machine learning
wireless networking

Candidates should possess a Ph.D. from a leading research university with a serious interest in both teaching and research in the context of opportunities in
Africa. We are particularly interested in applicants who have passion for a culturally diverse environment and who demonstrate a willingness to nurture the
inclusive Carnegie Mellon environment. We are actively committed to considering a diverse applicant pool in terms of gender, race, veteran status, and disability.
Carnegie Mellon University seeks to meet the needs of dual-career couples and is a member of the Higher Education Recruitment Consortium (HERC) that assists
with dual-career searches.

Applications should include a comprehensive resume including a complete list of publications, 3-5 professional references, a statement of research and teaching
interests (less than 2 pages each), and copies of 2 research papers (journal or conference papers). We invite you to learn more about our program and the
exciting opportunities in the new Africa at www.cmu.edu/africa.

APPLICATIONS SHOULD BE SENT TO: Director, Carnegie Mellon University-Africa, email: director@africa.cmu.edu

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 105


CAREERS

U.S. Naval Academy the NASA Marshall Space Flight Center, the Armys
Distinguished Visiting Professors Redstone Arsenal, Fortune 500 companies, and
numerous high tech enterprises. UAH also has an

ACM Transactions The U.S. Naval Academys Computer Science De-


partment invites applications for one or more
array of research centers, including information
technology and cybersecurity. In short, collab-

on Spatial Algorithms Distinguished Visiting Professors. The visiting


professor is expected to have a strong reputation
orative research opportunities are abundant, and
many well-educated and highly technically skilled

and Systems and technical expertise in Computer Science, In-


formation Technology, or a closely related field.
people are in the area. There is also access to excel-
lent public schools and inexpensive housing.
The start date of this position is flexible but UAH has an enrollment of approximately
August 2018 is preferred. We have provisions for 9,100 students. The Computer Science depart-
either full-time financial support or supplemen- ment offers BS, MS, and PhD degrees in Com-
ACM TSAS is a new tal support for a professor on sabbatical. The puter Science. Approximately 554 undergraduate

scholarly journal that position duration could vary from one to several
years. Responsibilities may vary and may include
majors and 151 graduate students are associated
with the unit. Faculty research interests are many
publishes high-quality teaching, collaborating with faculty and/or men-
toring student research.
and include cybersecurity, mobile computing,
data science, software engineering, visualization,
papers on all aspects of The Computer Science Department offers graphics and game computing, multimedia, AI,

spatial algorithms and


majors in Computer Science and Information image processing, pattern recognition, and dis-
Technology, and contributes to a new major in tributed systems. Recent NSF figures indicate the
systems and closely Cyber Operations. The department is housed in
a state of the art building overlooking the scenic
department ranks 30th in the nation in overall
federal research funding.
related disciplines. It Severn River. Our spaces provide outstanding of- Interested parties must submit a detailed
fice, laboratory, and research facilities for both resume with references to info@cs.uah.edu or
has a multi-disciplinary students and faculty. Chair, Search Committee, Dept. of Computer

perspective spanning The Naval Academy is an undergraduate in-


stitution located in historic downtown Annapo-
Science The University of Alabama in Huntsville,
Huntsville, AL 35899. Qualified female and mi-
a large number of lis, Maryland on the Chesapeake Bay. Over half
of the faculty are tenured or tenure track civilian
nority candidates are encouraged to apply. Initial
review of applicants will begin as they are received
areas where spatial professors with Ph.D.s who balance teaching ex- and continue until a suitable candidate is found.

data is manipulated or cellence with internationally recognized research


programs. The remaining faculty are active duty
The University of Alabama in Huntsville is an
affirmative action/equal opportunity employer/mi-
visualized. military officers with Masters or Doctoral de-
grees. Each year the academy graduates roughly
norities/ females/ veterans/ disabled.
Please refer to log number: 18/19-530
1000 undergraduate students with majors in the

The journal is sciences, engineering, and humanities. More in-


formation about the department and the Acad- University of California, Irvine
committed to the emy can be found at http://www.usna.edu/cs/ and
http://www.usna.edu/.
Donald Bren School of Information
and Computer Sciences
timely dissemination For more information on the position, and to Professor and Professor of Teaching Series
apply, go to https://www.usna.edu/HRO/jobinfo/ Positions
of research results DistinguishedVisitingProf-CompSci.php.

in the area of spatial The Donald Bren School of Information and


Computer Sciences (ICS) at the University of Cali-
algorithms and systems. The University of Alabama in Huntsville
Assistant Professor
fornia, Irvine (UCI) is seeking exceptional candi-
dates for multiple tenured/tenure-track positions
in the Professor and Professor of Teaching series.
The Department of Computer Science at The Uni- Professor Series
versity of Alabama in Huntsville (UAH) invites ap- Cybersecurity
plicants for a tenure-track faculty position at the Data Science
Assistant Professor level beginning August 2018 Computer Systems
in the area of cybersecurity; however, outstanding Human-Computer Interaction
candidates in other areas such as cloud comput- Software Engineering
ing and mobile computing may be considered
if they are qualified to teach undergraduate and Professor of Teaching Series
graduate courses in cybersecurity. Computer Science
A Ph.D. in computer science or a closely relat- Informatics
ed area is required. The successful candidate will Statistics
have a strong academic background and be able
to secure and perform funded research in areas Professor of Teaching positions are full-time
typical for publication in well-regarded academic faculty positions with an emphasis on teaching
conference and journal venues. In addition, the that parallel the Professor series and include an
candidate should embrace the opportunity to expectation of research and service contributing
provide undergraduate education. to instruction and pedagogy. They are designed

For further information The department has a strong commitment


to excellence in teaching, research, and service;
for individuals who wish to focus their careers
on teaching, professional activities, and Univer-
or to submit your the candidate should have good communication
skills, strong teaching potential, and research ac-
sity and public service. A detailed description of
each position, and application instructions, can
manuscript, complishments.
UAH is located in an expanding, high technolo-
be found on the ICS website at http://ics.uci.edu.
ICS is comprised of three departments (Com-
visit tsas.acm.org gy area, in close proximity to Cummings Research puter Science, Informatics, and Statistics), and
Park, the second largest research park in the na- it is one of only five computing-focused schools
tion and the fourth largest in the world. Nearby are among the Association of American Universities

106 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


(AAU) members. The U.S. News and World Report UCR is a world-class research university with national origin, age, disability, protected veteran
2017 Best Global Universities ranking identifies an exceptionally diverse undergraduate student status, or any other characteristic protected by law.
UCI as a top 50 university in computer science body. Its mission is explicitly linked to providing
and one of the top 15 universities for computer routes to educational success for underrepre-
science in the United States. The Schools 70+ sented and first-generation college students. A University of Illinois at Chicago
faculty members include 1 NAE Member, 14 ACM commitment to this mission is a preferred quali- Department of Computer Science
Fellows, 9 IEEE Fellows, 7 AAAS Fellows and many fication. Open-Rank Tenure-Track Faculty Positions
other national award winners. The University of California, Riverside is an
The University of California, Irvine is ranked as Equal Opportunity/Affirmative Action Employer. Located in the heart of Chicago, the Computer
a top ten public university by U.S. News and World All qualified applicants will receive consideration Science Department at the University of Illinois
Report, and has been identified by the New York for employment without regard to race, color, reli- at Chicago (UIC) invites applications for many
Times as No. 1 among U.S. universities that do the gion, sex, sexual orientation, gender identity, na- full-time tenure-track positions at all ranks.
most for low-income students. UCI has done what tional origin, age, disability, protected veteran sta- All candidates must have a doctorate in Com-
no other school has donerank among Sierras tus, or any other characteristic protected by law. puter Science or a closely related field by the
Top 10 most sustainable colleges for eight years EEO/AA/ADA/Vets Employer appointments starting date. Candidates will be
in a row. UCI is located in Orange County, 4 miles expected to demonstrate excellence in research
from the Pacific Ocean and 45 miles south of Los and teach effectively at the undergraduate and
Angeles. Irvine is one of the safest communities University of California, Riverside graduate levels.
in the U.S. and offers a very pleasant year-round Assistant Teaching Professor We seek candidates in all areas of comput-
climate, numerous recreational and cultural op- ing, at all levels, with special but not exclusive
portunities, and one of the highest-ranked public The Department of Computer Science and Engi- interest in fields related to speech and/or natural
school systems in the nation. neering (CSE) at the University of California, Riv- language processing, computer vision, program-
The University of California, Irvine is an Equal erside invites applications for an Assistant Teach- ming languages and compilers, machine learn-
Opportunity/Affirmative Action Employer advanc- ing Professor position beginning in July 2018. At ing, human-computer interaction, data science,
ing inclusive excellence. All qualified applicants will UCR, teaching professors are responsible mainly and computer systems. Over the next few years,
receive consideration for employment without re- for undergraduate instruction and curriculum we expect to hire multiple faculty in all of those
gard to race, color, religion, sex, sexual orientation, development. Successful candidates will need to areas and many others. Applicants working at the
gender identity, national origin, disability, age, pro- exhibit dedication to teaching and appropriate intersection of computer science and related dis-
tected veteran status, or other protected categories pedagogical knowledge and skills. Priority will ciplines are also encouraged to apply.
covered by the UC nondiscrimination policy. be given to candidates with expertise and prior Applications must be submitted at https://
experience in teaching courses on topics related jobs.uic.edu/, and must include a curriculum
to computer organization and architecture, logic vitae, teaching and research statements, and
University of California, Riverside design, and high-level synthesis. Highly quali- names and addresses of at least three references
Assistant Teaching Professor fied candidates with background in other areas in the online application. Links to a professional
will also be given consideration. Besides teach- website and Google Scholar, ResearchGate, or
The Department of Computer Science and En- ing, teaching professors are also expected to be similar profiles are recommended, but not re-
gineering (CSE) at the University of California, actively engaged in service (e.g., development of quired. Applicants may contact the Faculty Search
Riverside invites applications for an Assistant undergraduate curricula, pedagogical innova- Chair at search-chair@cs.uic.edu for additional
Teaching Professor position beginning in Janu- tion, TA training, program accreditation, student information. For fullest consideration, apply by
ary 2018. At UCR, teaching professors are respon- advising) and scholarly activity in the area of com- November 15, 2017. Applications will be accepted
sible mainly for undergraduate instruction and puter science education. until the positions are filled.
curriculum development. Successful candidates An assistant teaching professor appointment The rapidly growing department of Computer
will need to exhibit dedication to teaching and is similar to a regular tenure-track assistant pro- Science at UIC has 33 tenure-system faculty - 13
appropriate pedagogical knowledge and skills. fessor appointment and follows a parallel track, of whom are NSF CAREER award recipients - with
Priority will be given to candidates with expertise including a tenure process that, if successful, strong and broad research agendas. The depart-
and prior experience in teaching courses on data leads to a tenured appointment. Advancement ment is committed to building a diverse faculty
structures, software engineering, discrete mathe- through the faculty ranks at the University of preeminent in its missions of research, teaching,
matics, and algorithms, but highly qualified can- California is through a series of structured, merit- and service to the community. Candidates who
didates with background in other areas will also based evaluations, occurring every 2-3 years, each have experience engaging with a diverse range of
be given consideration. Besides teaching, teach- of which includes substantial peer input. faculty, staff, and students, and contributing to a
ing professors are also expected to be actively en- A Ph.D. in Computer Science or a related climate of inclusivity are encouraged to discuss
gaged in development of undergraduate curricu- field is required at the time of employment. Sal- their perspectives on these subjects in their appli-
la, pedagogical innovation, TA training, program ary will be competitive and commensurate with cation materials.
accreditation, student advising, and scholarly ac- qualifications and experience. Full consideration UIC is a major public research university (R1,
tivity in the area of computer science education. will be given to applications received by January according to the Carnegie Classification of Insti-
An assistant teaching professor appointment 30, 2018. The search will continue until the po- tutions of Higher Education) with over 1,900 fac-
is similar to a regular tenure-track assistant pro- sition is filled. To apply, please register through ulty and over 30,000 students. UIC is committed
fessor appointment and follows a parallel track, the weblink at https://aprecruit.ucr.edu/apply/ to increasing access to education, employment,
including regular, rigorous performance reviews JPF00853 or http://www.engr.ucr.edu/about/em- programs and services for all. The University of Il-
and a tenure process that, if successful, leads to a ployment.html. Inquiries should be directed to linois is an Equal Opportunity, Affirmative Action
tenured appointment. lsoesearch@cs.ucr.edu. employer. Minorities, women, veterans, and indi-
A Ph.D. in Computer Science or a related field UCR is a world-class research university with viduals with disabilities are encouraged to apply.
is required at the time of employment. Salary will an exceptionally diverse undergraduate student UIC is responsive to the concerns of dual-career
be competitive and commensurate with qualifi- body. Its mission is explicitly linked to providing couples.
cations and experience. Full consideration will routes to educational success for underrepre- Chicago epitomizes the modern, livable, vi-
be given to applications received by October 30, sented and first-generation college students. A brant, and diverse city. World-class amenities like
2017. The search will continue until the position commitment to this mission is a preferred quali- the lakefront, arts and culture venues, festivals,
is filled. fication. and two international airports make Chicago a
To apply, please register through the weblink The University of California, Riverside is an singularly enjoyable place to live. Yet the cost of
at https://aprecruit.ucr.edu/apply/JPF00798 or at Equal Opportunity/Affirmative Action Employer. living, whether in an 88th floor condominium
http://www.engr.ucr.edu/about/employment.html. All qualified applicants will receive consideration downtown or on a tree-lined street in one of the
Inquiries should be directed to lsoesearch@ for employment without regard to race, color, re- nations finest school districts, is remarkably af-
cs.ucr.edu. ligion, sex, sexual orientation, gender identity, fordable.

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 107


CAREERS

University of Maryland, placing seventh in Most Innovative National Uni- The CSEE department is energetic, research-
Baltimore County versities and 13th in Best Undergraduate Teach- oriented and multi-disciplinary with programs in
An Honors University in Maryland ing. Princeton Review features UMBC as one of Computer Science, Computer Engineering, Elec-
Tenure Track position in Health Information the nations top universities, and one of the Col- trical Engineering and Cybersecurity. Our faculty
Technology (Health IT) leges that Pay You Back. The Chronicle of Higher (35 tenure-track, 11 teaching and 17 research)
Education has listed UMBC in the honor roll of enjoy collaboration, working across our special-
The Department of Information Systems (IS) at Great Colleges to Work For for eight consecutive izations as well as with colleagues from other
UMBC invites applications for a tenure-track years; it is the only Maryland four-year institution STEM, humanities and the arts departments and
faculty position at the Assistant Professor level to be so recognized. Our strategic location in the external partners. We have 1650 undergraduate
starting August 2018. We are searching for can- Baltimore-Washington corridor puts us close to and 500 M.S. and Ph.D. students in our programs.
didates with research interests and experience many important federal laboratories, agencies, UMBC is a dynamic public research university
in Health IT, a research area with high growth and high-tech companies. UMBCs campus is lo- integrating teaching, research and service. The
and impact in healthcare and related fields. The cated on 500 acres just off I-95 between Baltimore 2018 US News and World Report Best Colleges re-
ideal candidate will have expertise in conducting and Washington DC, less than 10 minutes from port placed UMBC 7th in the Most Innovative Na-
research that impacts healthcare outcomes, qual- the BWI airport and Amtrak station. The campus tional Universities category and 13th in Best Un-
ity, and costs, and intersects with active research includes a center for entrepreneurship, and the dergraduate Teaching, National Universities. Our
areas in the IS department: Artificial Intelligence/ bwtech@UMBC research and technology park, strategic location in the Baltimore-Washington
Knowledge Management, Data Science, Human which has special programs for startups focused corridor is close to many federal laboratories and
Centered Computing, Software Engineering, and on cybersecurity, clean energy, life sciences, and agencies and high-tech companies, facilitating
Health Information Technology. Strong candi- training. We are surrounded by one of the greatest interactions, collaboration, and opportunities for
dates with research emphases in other areas may concentrations of commercial, cultural, and sci- sabbaticals and visiting appointments.
also be considered. Candidates must have earned entific activity in the nation. Located at the head of Applicants should submit a cover letter, state-
a PhD in Information Systems or a related field no the Chesapeake Bay, Baltimore has all the advan- ment of teaching and research experience and in-
later than August 2018. tages of modern, urban living, including profes- terests, CV, and three letters of recommendation
Preference will be given to those who can col- sional sports, major art galleries, theaters, and a at http://apply.interfolio.com/45784. Applica-
laborate with current faculty within and across symphony orchestra. The citys famous Inner Har- tions received by December 15, 2017 are assured
departments at UMBC, fostering interdisciplin- bor area is an exciting center for entertainment full consideration. Send questions to jobsTT@
ary research. Candidates are expected to establish and commerce. The nations capital, Washington, csee.umbc.edu and see http://csee.umbc.edu/
a collaborative, externally funded, and nationally DC, is a great tourist attraction with its histori- jobs for more information. UMBC is an affirma-
recognized research program as well as contrib- cal monuments and museums. Just ten minutes tive action/equal opportunity employer.
ute to graduate and undergraduate teaching, from downtown Baltimore and 30 minutes from
advising, and mentoring. We especially welcome the D.C. Beltway, UMBC offers easy access to the
applications from candidates who are willing to regions resources by car or public transportation. University of Nevada, Las Vegas
contribute to the diversity mission of the universi- Electronic submission of application is re- Big Data/Health Disparities,
ty. The IS Department is committed to increasing quired at http://apply.interfolio.com/45260. All Associate/Full Professor
the diversity of our community. The Department applications must be submitted as PDF files,
offers undergraduate degrees in Information Sys- including a cover letter, CV, one-page statement The University of Nevada, Las Vegas invites ap-
tems and Business Technology Administration. of teaching interests, one-page statement of re- plications for Big Data/Health Disparities, Associ-
Graduate degree programs, MS and PhD, are of- search interests, and names and contact infor- ate/Full Professor [18533]
fered in both Information Systems and Human- mation of at least three references. For inquiries, PROFILE of the UNIVERSITY
Centered Computing, including an innovative please contact Dr. Aryya Gangopadhyay at (410) UNLV is a doctoral-degree-granting institution
online MS program in IS ranked among the top 455-2620 or gangopad@umbc.edu. Review of ap- of approximately 29,000 students and more than
20 in the nation by US News & World Report. Con- plications will begin in November 2017 and will 3,000 faculty and staff that is classified by the
sistent with UMBCs vision and mission, the De- continue until the position is filled, subject to the Carnegie Foundation for the Advancement of
partment has excellent teaching facilities, state- availability of funds. Teaching as a research university with high re-
of-the-art laboratories, and outstanding technical UMBC is an Affirmative Action/Equal Oppor- search activity. For more information, visit us on
support. Further details on our research, academ- tunity Employer and welcomes applications from line at: http://www.unlv.edu
ic programs, and faculty can be found at http:// minorities, women, veterans, and individuals
www.is.umbc.edu. with disabilities. COMMITTMENT to DIVERSITY
UMBC is a dynamic public research university The successful candidate will demonstrate sup-
integrating teaching, research, and service. As an port for diversity, equity and inclusiveness as well
Honors University, the campus offers academical- University of Maryland, as participate in maintaining a respectful, posi-
ly talented students a strong undergraduate liber- Baltimore County tive work environment.
al arts foundation that prepares them for graduate Computer Science and Electrical Engineering
and professional study, entry into the workforce, Tenure-Track Assistant Professor ROLE of the POSITION
and community service and leadership. UMBC The Department of Computer Science at the Uni-
emphasizes science, engineering, information UMBCs Department of Computer Science and versity of Nevada, Las Vegas (UNLV) invites ap-
technology, human services, and public policy at Electrical Engineering invites applications for a plications for a full-time tenure-track/tenured,
the graduate level. UMBC contributes to the eco- tenure-track Assistant Professor position to begin Associate/Full Professor position in Big Data
nomic development of the State and the region in Fall 2018. Exceptionally strong candidates for commencing Fall 2018. A distinguished record
through health equity, entrepreneurial initiatives, higher ranks may be considered. Applicants must in undergraduate and graduate computer science
workforce training, K-16 partnerships, and tech- have or be completing a Ph.D. in a relevant dis- education, well-funded scholarly research, and
nology commercialization in collaboration with cipline, have demonstrated the ability to pursue service qualifications to the Big Data community
public agencies and the corporate community. Di- a research program, and have a strong commit- will be required for appointment as a tenured As-
versity is a core value of UMBC and we believe that ment to undergraduate and graduate teaching. sociate/Full Professor.
the educational environment is enhanced when We welcome candidates in all areas of special-
diverse groups of people with diverse ideas come ization. Some areas of particular interest include, QUALIFICATIONS
together to learn. Therefore, members of under- (but are not limited to): information assurance This position requires a Ph.D. in Computer Sci-
represented groups including women, minorities, and cybersecurity; mobile, wearable, and IoT ence from a regionally accredited college or uni-
veterans, and individuals with disabilities are es- systems; big data with an emphasis on machine versity. The applicants are expected to have an
pecially encouraged to apply. learning, data science, and high-performance extensive research and funding in Big Data ap-
UMBC continues to be recognized in U.S. News computing; knowledge and database systems, plications in health/bioinformatics. In addition,
and World Reports national university rankings, and visualization. the applicants should have established research

108 COMM UNICATIO NS O F T H E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


records in one or more areas of Big Data includ- ranks in USNWR as a top-twenty national univer- tors that contribute to change. In 2017, women
ing data mining, data analytics, data visualiza- sity. The CSE Department offers the Ph.D. degree constituted 33% of our BA/BS graduates, and we
tion, database modeling, machine learning, scal- and undergraduate Computer Science and Com- are actively working to improve the environment
able computing, software and hardware systems puter Engineering degrees. More information for other underrepresented groups.
for big data processing, and distributed/parallel about the department can be found at: http://cse. The University of Rochester is a private, Tier I
computing. nd.edu/ research institution with approximately 5,000 un-
Applicants must submit a CV, cover letter, dergraduates and a comparable number of grad-
SALARY RANGE statement of teaching experience and philoso- uate students. It has recently committed $50M to
Salary competitive with those at similarly situ- phy, and contact information for three profes- the multidisciplinary Goergen Institute for Data
ated institutions. Position is contingent upon sional references, at least two of whom must be Science (GIDS), of which Computer Science is the
funding. able to comment on the applicants teaching ex- leading departmental member and with which
perience. Teaching evaluations may be submit- it shares a newly constructed state-of-the-art facil-
APPLICATION DETAILS ted, if available. Applications must be submitted ity. Ongoing hiring in GIDS provides exciting op-
Submit a letter of interest, a detailed resume at http://apply.interfolio.com/45448. portunities for collaboration between computing
listing qualifications and experience, and the To guarantee full consideration, applications and other disciplines.
names, addresses, and telephone numbers of at must be received by January 1, 2018, however, re- Anchoring the Finger Lakes region of west-
least three professional references who may be view of applications will continue until the posi- ern New York State, the greater Rochester area is
contacted. Applicants should fully describe their tion has been filled. home to over a million people, and offers unsur-
qualifications and experience, with specific ref- The University is an Equal Opportunity and passed quality of life, with a thriving arts scene,
erence to each of the minimum and preferred Affirmative Action employer; we strongly encour- outstanding public schools, affordable housing,
qualifications because this is the information age applications from women, minorities, veter- and a huge range of cultural and recreational
on which the initial review of materials will be ans, individuals with a disability and those can- opportunities. Traditionally strong in optics re-
based. didates attracted to a university with a Catholic search and manufacturing, the area was recently
Although this position will remain open until identity. selected by the Department of Defense as the hub
filled, review of candidates materials will begin of a $600M Integrated Photonics Institute for
on January 16, 2018 and best consideration will Manufacturing Innovation.
be gained for materials submitted prior to that University of Rochester The University of Rochester, an Equal
date. Materials should be addressed to Dr. Ka- Faculty Positions in Computer Science Opportunity Employer, has a strong commitment to
zem Taghva, Search Committee Chair, and are diversity and actively encourages applications from
to be submitted via on-line application at https:// The Computer Science Department at the Univer- candidates from groups underrepresented in higher
hrsearch.unlv.edu. For assistance with UNLVs sity of Rochester seeks applicants for two tenure- education.
on-line applicant portal, contact UNLV Employ- track positions. Outstanding candidates will be EOE Minorities/Females/
ment Services at (702) 895-3504 or applicant.in- considered in any area of computer science and Protected Veterans/Disabled
quiry@unlv.edu. at any level of seniority. We are particularly eager
For further inquiries, please contact Dr. Ka- to grow our strength in human-computer interac-
zem Taghva at Kazem.Taghva@unlv.edu tion and in the theory and practice of security and University of South Carolina
EEO/AA/Vet/Disability Employer privacy. Faculty Position in Cybersecurity
Candidates must have (or be about to receive)
a doctorate in computer science or a related dis- The University of South Carolina invites applica-
University of Notre Dame cipline. Applications should be submitted online tions for a tenure-track faculty position at open
Special Professional Faculty (at https://www.rochester.edu/faculty-recruiting/ rank in the Department of Computer Science and
login) no later than January 1, 2018, for full con- Engineering (http://www.cse.sc.edu) starting Fall
The Department of Computer Science and En- sideration; submissions beyond this date risk be- 2018. The department will consider exceptional
gineering at the University of Notre Dame seeks ing overlooked due to limited interview slots. candidates in any cybersecurity areas, but is par-
candidates for a full-time (2-3 courses per se- The Department of Computer Science ticularly interested in candidates whose primary
mester) Special Professional Faculty (SPF) posi- (https://www.cs.rochester.edu) has a distin- research expertise is in trustworthy embedded
tion to teach courses primarily in the CSE under- guished history of research in artificial intelli- systems; secure wireless networks; safety, secu-
graduate curricula. Initial appointment will be gence, HCI, systems, and theory. We nurture a rity, & reliability of cyber-physical systems and
made for a term of three years at the Assistant highly collaborative and interdisciplinary cul- Internet of Things.
Teaching Professor, Associate Teaching Profes- ture, with exceptionally strong external funding Applicants should possess a Ph.D. degree in
sor, or Teaching Professor level depending on and with active ties to numerous allied depart- computer science, computer engineering, or a
seniority and experience. Appointments are re- ments, including brain and cognitive science, closely-related field, and a demonstrated record
newable for five-year terms and promotions to linguistics, biomedical engineering, electrical of research accomplishments in the area of cy-
more senior ranks are available, depending on and computer engineering, and several depart- bersecurity. Prior teaching experience is prefer-
performance. ments in the medical center. Recent faculty able, but not required. The successful candidate
Competitive candidates will have the training hires have received a host of national honors, will be expected to develop internationally-rec-
and experience necessary to teach effectively in a including the NSF CAREER award, the MIT TR35 ognized, externally-funded research programs
range of courses in accredited degree programs award, honorable mention in the ACM disser- that complement existing strengths in the Col-
in Computer Science and Computer Engineer- tation competition, multiple Google research lege and University, and to participate in col-
ing. Candidates with backgrounds in all areas of awards, and best paper designations at top-tier lege-wide, cross-cutting projects. For details on
Computer Science and Computer Engineering conferences. In 2015 we were one of only two these initiatives, please visit: http://cec.sc.edu/
will be considered and relevant industry experi- CS departments nationwide to secure three NSF employment.
ence is also valued. Qualified candidates should CRII awards for junior faculty. USC is designated by the National Security
have at least a masters degree, and preferably a The department is deeply committed to build- Agency (NSA) and the Department of Homeland
doctoral degree, in Computer Science, Computer ing a more diverse and representative faculty, and Security (DHS) as a National Center of Academic
Engineering, or a related area. The Department strongly encourages applications from groups Excellence in Information Assurance and Cyber
is especially interested in candidates who will underrepresented in higher education. We have Defense Education and Research. Cybersecurity
contribute to the diversity and excellence of the a vibrant Women in Computing community, and education and research activities are centered
Universitys academic community through their are a charter member of the ABI/HMC BRAID in the Department of Computer Science and
teaching and service. Initiative. With funding from the NSF, the CRA, Engineering in the College of Engineering and
The University of Notre Dame is a private, and major industrial sponsors, BRAID works to Computing. The Department aims to build and
Catholic university with a doctoral research ex- increase diversity and inclusivity in the under- expand on its ongoing initiatives to develop a
tensive Carnegie classification, and consistently graduate program and to rigorously evaluate fac- strong, federally-funded cybersecurity research

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 109


CAREERS

center. Applicants with existing or pending proj- high-performance computing, computer archi- sion computer science courses as needed may be
ects funded by NSA, DHS, or other federal agen- tecture, artificial intelligence, cyber-physical sys- considered for a non-tenure-track appointment
cies are encouraged to apply. tems, wireless networking, mobile computing, at the rank of Instructor. An Instructor will nor-
The Department of Computer Science and software engineering, and human-computer in- mally teach twelve credit hours per semester or
Engineering offers B.S. degrees in Computer Sci- teraction. its equivalent, including evening and distributed
ence, in Computer Information Systems, and in The Department of Computer Science and learning courses through Palmetto College as
Computer Engineering; M.S. and Ph.D. degrees Engineering offers B.S. degrees in Computer Sci- needed, as well as a commitment to university/
in Computer Science and in Computer Engineer- ence, in Computer Information Systems, and in community service.
ing; M.S. degrees in Software Engineering and in Computer Engineering; M.S. and Ph.D. degrees Preference will be given to candidates with
Information Security; and a Graduate Certificate in Computer Science and in Computer Engineer- experience teaching at the university level. This
in Cyber Security Studies. The Department has 23 ing; M.S. degrees in Software Engineering and in experience could have been gained during the
full-time faculty members (11 of whom are NSF Information Security; and a Graduate Certificate course of pursuing a graduate degree.
CAREER Award recipients), an undergraduate en- in Cyber Security Studies. The Department has 23 Application materials are accepted on-
rollment of 921 students, and a graduate enroll- full-time faculty members (11 of whom are NSF line https://uscjobs.sc.edu/ (Posting Number
ment of 168 students. CAREER Award recipients), an undergraduate en- FAC00122). Applicants must complete an ap-
Review of applications will begin on Novem- rollment of 921 students, and a graduate enroll- plication, upload a cover letter that specifi-
ber 1, 2017 and continue until positions are filled. ment of 168 students. cally addresses the applicants qualifications,
Expected start date is August 16, 2018. Interested Review of applications will begin on Novem- provide a curriculum vitae, and share graduate
applicants will apply online at http://cec.sc.edu/ ber 1, 2017 and continue until positions are filled. transcripts online. Applicants must also pro-
jobs/CYBER with: (1) a letter of intent, (2) curricu- Expected start date is August 16, 2018. Interested vide contact information, to include an email
lum vitae, (3) a concise description of research applicants will apply online at http://cec.sc.edu/ address, for a minimum of three professional
plans, (4) a teaching plan, and (5) names & con- jobs/CSE with: (1) a letter of intent, (2) curriculum references. Only applications and materials
tact information of 3-5 references. vitae, (3) a concise description of research plans, submitted through the online application pro-
Questions may be directed to: (4) a teaching plan, and (5) names & contact infor- cess will be considered.
Department of Computer Science and Engi- mation of 3-5 references. The University of South Carolina Lancaster,
neering Questions about the departmental search through the State of South Carolina and Public
Dr. John Rose, Professor and Faculty Search may be directed to: Employee Benefit Authority (PEBA), offers state
Committee Chair Department of Computer Science and Engi- employees a valuable benefits package, includ-
rose@cse.sc.edu neering ing health and life insurance, generous paid leave
(803) 777-2405 Dr. John Rose, Professor and Faculty Search and retirement programs.
Committee Chair The University of South Carolina Lancaster
The University of South Carolina is an affirma- rose@cse.sc.edu does not discriminate in educational or employ-
tive action, equal opportunity employer, and does (803) 777-2405 ment opportunities on the basis of race, color,
not discriminate in educational or employment religion, national origin, sex, sexual orientation,
opportunities or decisions for qualified persons on The University of South Carolina is an affirma- gender, age, disability, veteran status or genetics.
the basis of race, sex, gender, age, color, religion, na- tive action, equal opportunity employer, and does
tional origin, disability, genetics, sexual orientation not discriminate in educational or employment
or veteran status. Minorities and women are encour- opportunities or decisions for qualified persons on The University of Texas at San Antonio
aged to apply. USC is responsive to the needs of dual the basis of race, sex, gender, age, color, religion, na- Faculty Position in Computer Science
career couples. tional origin, disability, genetics, sexual orientation
or veteran status. Minorities and women are encour- The Department of Computer Science at The Uni-
aged to apply. USC is responsive to the needs of dual versity of Texas at San Antonio (UTSA) invites ap-
University of South Carolina career couples. plications for two tenured/tenure-track positions,
Multiple Open-Rank, Tenured starting in Fall 2018. The first position is for a
or Tenure-Track Faculty Positions tenure-track Assistant or tenured/tenure-track
University of South Carolina Lancaster Associate Professor in Game-related areas. The
The College of Engineering and Computing at the Assistant Professor or Instructor focus is on Computer Graphics, especially 3D ani-
University of South Carolina is in the process of of Computer Science mation, 3D modeling, and real-time rendering;
expanding its tenured and tenure-track ranks by and/or Human Computer Interaction, especially
over 40 faculty members. As part of this growth, The University of South Carolina Lancaster, a Pal- human computer interfaces, virtual reality, aug-
the Department of Computer Science and Engi- metto College campus of the University of South mented reality, and game analytics. The second
neering (http://cse.sc.edu) seeks dynamic new Carolina located approximately thirty-five (35) position is for a tenured/tenure-track Associate
tenured and tenure-track faculty members (at all miles south of Charlotte, NC seeks candidates for Professor in Data Science and Artificial Intel-
ranks) for Fall 2018. Applicants should possess a a faculty position in Computer Science beginning ligence, focusing on cyber security, Internet of
Ph.D. degree in computer science, computer en- August 16, 2018. things, bioinformatics, natural language process-
gineering, or a closely-related field, and a demon- Applicants who hold the Ph.D. in Computer ing, speech recognition, language understand-
strated record of research accomplishments. The Science including credentials necessary for de- ing, computer vision, or machine learning. This
successful candidate will be expected to develop partmental approval to teach introductory com- position is part of UTSAs focused cluster hiring
internationally-recognized, externally-funded puter science courses, as well as upper-division plan under the Gold Star Initiative to recruit top-
research programs that complement existing de- computer science courses as needed may be tier researchers over a four-year period.
partmental strengths. We also desire candidates considered for a tenure-track appointment at See http://www.cs.utsa.edu/fsearch for infor-
whose expertise aligns with vital cross-cutting the rank of Assistant Professor. An Assistant Pro- mation on the Department and application in-
initiatives identified by the College. For details fessor will normally teach twelve credit hours structions. Screening of applications will begin
on these initiatives, please visit: http://cec.sc.edu/ per semester or its equivalent, including eve- immediately. The search will continue until the
employment. ning and distributed learning courses through positions are filled or the search is closed.
In alignment with these initiatives, research Palmetto College as needed, as well as a commit- The University of Texas at San Antonio is an
themes of particular interest to the Department ment to scholarship and university/community Affirmative Action/Equal Opportunity Employer.
are those related to Smart & Connected Commu- service. Department of Computer Science
nities, Transformational Computing, Healthcare Applicants who hold a Master of Science or RE: Faculty Search
Transformation, and Smart & Agile Manufac- other appropriate degree in computer science or The University of Texas at San Antonio
turing. Areas of special interest include: smart a related field, including credentials necessary One UTSA Circle
technologies, deep learning, adaptive & resilient for departmental approval to teach introductory San Antonio, TX 78249-0667
cybersecurity, computational science methods, computer science courses, as well as upper-divi- Phone: 210-458-4436

110 CO MM UNICATIO NS O F T H E AC M | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


last byte

challenges
[ C ONTI N U E D FRO M P. 112]
interdisciplinary education presents.
I think the solution is not to say, You have to assume
we need to teach everybody every- that computer
thing. It simply isnt going to work.
Instead, I sometimes say that were science will continue Distinguished
trying to educate people who will be to grow and Speakers Program
T-shaped, so theyll have depth in a
fieldthats the vertical bar of the T. transform, and so,
But theyll also be able to engage with you have to be willing http://dsp.acm.org
other people, perhaps to learn some
part of a new vocabulary from other to learn new things.
fields, so at least the conversation will
be on common ground.

These days, its difficult enough to keep whatever theyre going to do will make a
up with all the changes in a single field, positive contribution and why its wor-
let alone across multiple disciplines. thy of their philanthropic attention. So
Certainly now, in the field of com- we spend a lot of time thinking about
puting, you have to. When I was a how to shape a vision for the university,
graduate student, I felt like I could go what we could do, why it would be dis-
to anybodys job interview talk or thesis tinctive, and why it would make a dif-
defense and understand what was go- ference. Once you shape that vision, its
ing on. But the field has grown so much a lot easier to talk to people about how Students and faculty
now that its hard for a systems person they might support it personally.
to understand a thesis in theory, or for can take advantage of
an AI person to understand a systems What do you make of the debate that
thesis. You have to assume that com- the Knight-Hennessy program inadver- ACMs Distinguished
puter science will continue to grow and tently sparked about funding institu-
transform, and so, you have to be will- tions that are already well endowed?
Speakers Program
ing to learn new things. I think theres two parts to it. One to invite renowned
is ensuring people believe youll be a
What made you inclined to get in- good steward. Most philanthropists thought leaders in
volved with the administrative side of I know have worked really hard to
academia? acquire the ability to give to a cause, academia, industry
Im probably the frog in the proverbi- and they want to know that youre go-
al pot of water, where you raise the tem- ing to be a good steward of their do-
and government
perature slowly and the frog doesnt re- nation. The other part is the vision. to deliver compelling
alize its being cooked until its too late. I found that its very compelling to
I think what I found is that Im just an people when you can actually say, and insightful talks
intellectually curious person. I enjoyed Youre contributing to the scholar-
talking to my colleagues in other fields ship of a deserving student who oth- on the most important
and finding out what was the cutting erwise couldnt afford to come to this
edge of thought in their field; what were institution.
topics in computing
the interesting questions they were try- I think the real challenge were fac- and IT today.
ing to focus on. When the chance came ing in the U.S. is that our public insti-
to become president, I jumped on that. tutions are suffering under cutbacks ACM covers the cost
in state funding. Philanthropy is going
Nowadays, most people assume that be- to have to fill in, so well need to ar- of transportation
ing the president of a major university ticulate a message to potential donors
is less about satisfying intellectual curi- so that they understand the need and
for the speaker
osity and more about raising money why its important. And then were go- to travel to your event.
which youve undoubtedly been good at. ing to have to develop compelling op-
In fact, more of my time and more of portunities, whether its hiring faculty
my staffs time is devoted to developing members in a key area or supporting
why we want to ask someone for money students on scholarship.
rather than actually doing the ask.
Most people who are philanthropic Leah Hoffmann is a technology writer based in Piermont, NY.
want to do something that has a good
social return. They want a vision of how 2017 ACM 0001-0782/17/12 $15.00

DEC E MB E R 2 0 1 7 | VO L. 6 0 | N O. 1 2 | C OM M U N IC AT ION S OF T H E ACM 111


last byte

DOI:10.1145/3148854 Leah Hoffmann

Q&A
Grooming the Leaders
of Tomorrow
Former Stanford University president John Hennessy is the academic
architect behind the Knight-Hennessy Scholars Program.

accuse Stanford Univer-


N O O N E WO U L D Inventions in Computer Science. Its
sitys John Hennessyco-founder of an opportunity to expose students to
one of the first companies to commer- what is intellectually deep and beauti-
cialize RISC microprocessors, co-au- ful about computer science as a field,
thor of two widely used computer archi- and to go beyond programming to ev-
tecture textbooks, and the universitys erything from computability to com-
10th presidentof being an under- plexity theory to cryptography to AI.
achiever. Yet the man Marc Andreessen
called the godfather of Silicon Valley How have your experiences as presi-
stepped down from his administrative dent of the university shaped your
duties last year to focus on an ambi- views coming back to the classroom?
tious fourth act: a multidisciplinary Do you think they have given you a
scholarship program aimed at groom- broader perspective?
ing leaders who can solve the worlds I think so. Computing is in a phe-
most challenging problems. nomenally interesting place, because
despite everything thats already
Its been just over a year since you happened with the World Wide Web
stepped down as president of Stanford formation technology will change the and the Internet, the rise of machine
University, and it was surprisingly easy workplaceand the leadership we were learning and the use of big data are
to schedule this call. Im guessing that getting. I think its a widely held view going to transform the world we live
wouldnt have been true in 2016. that things have gotten worse around in. And that means computing is
Im certainly traveling less, and my the world in the last few years, and the at the root of so many disciplines.
calendar has a lot of free time by com- challenges we face are more difficult. In the social sciences, the use of
parison. At the moment, Im on sabbat- This is true not just in government, but complex, deep analysis of big data
ical, which my wife says I always fail at. in the corporate and non-profit settings. is completely changing the way we
think about creating and evaluating
For one thing, youre still deeply in- So you decided to build the program. theories about societal change and
volved with the ambitious Knight-Hen- The first thing we did is outreach improvement. In medicine, the rise
nessy Scholars Program, which aims to going around the world, talking to of big data provides an incredible
PHOTO BY LINDA A . CICERO/STA NFORD NEW S SERVICE

build a multidisciplinary community potential future scholars about the opportunity to improve the quality
of Stanford graduate students dedicat- program. Many, many students have of health while freeing up doctors to
ed to finding creative solutions to the indicated an interest, and were hoping spend more time on the human side
worlds greatest challenges. we can create a program that will make of helping their patients.
When we began to think about this a real contribution toward closing this
program, in late 2014, we saw a growing leadership void. You have been involved with a num-
disconnect between the kind of leader- ber of interdisciplinary initiatives
ship that is needed to address the re- You also have returned to teaching. throughout your presidency. Lets talk
ally big problemswhether its climate Im teaching a freshman seminar about some of the intellectual and
change or social inequality or how in- thats called Great Discoveries and pedagogical [C O NTINUED O N P. 111]

112 COMM UNICATIO NS O F T H E ACM | D EC EM BER 201 7 | VO L . 60 | N O. 1 2


ACM Books.
In-depth.
Innovative.
Insightful.
ACM and Morgan & Claypool Publishers present ACM Books: an all-new series
of educational , research and reference works for the computing
community. Inspired by the need for high-quality computer
science publishing at the graduate, faculty and
professional levels, ACM Books is affordable,
current, and comprehensive in scope.
ACM Books collections are available
under an ownership model with
archival rights included. We
invite you to learn more about
this exciting new program.
For more info please visit
http://books.acm.org
or contact ACM at
ACMbooks-Info@acm.org

M
Association for
Computing Machinery

&C
2 Penn Plaza, Suite 701
New York, NY 10121-0701, USA
Phone: +1-212-626-0658
Email: acmbooks-info@acm.org

M
Morgan & Claypool
Publishers

&C
1210 Fifth Avenue, Suite 250
San Rafael, CA 94901, USA
Phone: +1-415-462-0004
Email: info@morganclaypool.com
The Art, Science, and Engineering of Programming

Programming
2018 April 912, 2018 Nice, France
The International Conference on the Art, Science, and Engineering
of Programming is a new conference focused on everything to do
with programming, including the experience of programming.
We call it Programming for short. Programming 2018 is the
second edition of the conference. Papers are welcome from any
part of the programming research lifecycle, as are papers on
programming practice and experience.
The Art, Science, and Engineering of Programming Journal accepts
scholarly papers including essays that advance knowledge of
programming. Anything about programming is in scope, if the
relevance to the act and experience of programming is clearly
stated. Accepted journal papers must be presented at the conference.

Paper Submission (issue #3)


December 1, 2017
Student Research Competition
January 1, 2018
https://2018.programming-conference.org
General Chair Program Committee
Manuel Serrano, Inria Guido Salvaneschi, Davide Ancona, Alberto In-Cooperation
Local Organizing Chair Bacchelli, Shigeru Chiba, Yvonne Coady,
Tamara Rezk, Inria Susan Eisenbach, Patrick Eugster, Antonio SIGPLAN
Program Chair Filieri, Matthew Flatt, Lidia Fuentes, Richard
Guido Salvaneschi, TUD P. Gabriel, Jeremy Gibbons, Yossi Gil, Elisa
Workshops Chairs Gonzalez Boix, Philipp Haller, Matthew
Stefan Marr, U. Kent Hammer, Felienne Hermans, Robert Hirschfeld,
Jennifer Sartor, VUB Roberto Ierusalimschy, Jun Kato, Jrg Kienzle,
Poster Chair Neelakantan R. Krishnaswami, Ralf Lmmel, INITIATIVE DEXCELLENCE

Yves Roudier, U. Nice Hidehiko Masuhara, Mira Mezini, Emerson


SRC Chair Murphy-Hill, Mario Sdholt, Sam Tobin-
Philipp Haller, KTH Hochstadt, Eelco Visser, Tijs van der Storm AOSA

Potrebbero piacerti anche