default search action
Communications of the ACM (CACM), Volume 53, 2010
Volume 53, Number 1, January 2010 (EE)
- Moshe Y. Vardi:
More debate, please! 5
- Software still as much an art as science. 7
- In the Virtual Extension. 8
- Wendy Hall:
ACM's annual report. 9-13
- Greg Linden, Ruben Ortega, Jason I. Hong:
Software engineering, smartphones and health systems, and security warnings. 16-17
- David Roman:
The corollary of empowerment. 18
- Tom Geller:
Rebuilding for eternity. 19-21 - Leah Hoffmann:
Amir Pnueli: ahead of his time. 22-23 - Gary Anthes:
Automated translation of Indian languages. 24-26 - Neil Savage:
New search challenges and opportunities. 27-28 - Kirk L. Kroeker:
Future Internet design summit. 29 - Karen A. Frenkel:
Robert Lovett Ashenhurst: 1929--2009. 30 - Samuel Greengard:
ACM and India. 31
- Michael A. Cusumano:
Technology strategy and management - The evolution of platform thinking. 32-34 - Phillip G. Armour:
The business of software - In praise of bad programmers. 35-36 - Arti Rai:
Law and technology - Unstandard standardization: the case of biology. 37-39 - Bjarne Stroustrup:
Viewpoint - What should we teach new software developers? Why? 40-42 - William Aspray, Len Shustek, Norbert Ryska:
Computer museum series - Great computing museums of the world, part one. 43-46
- Julian Hyde:
Data in flight. 48-52 - Stephen Petschulat:
Other people's data. 53-57 - Adam Leventhal:
Triple-parity RAID and beyond. 58-63
- Michael Stonebraker, Daniel J. Abadi, David J. DeWitt, Samuel Madden, Erik Paulson, Andrew Pavlo, Alexander Rasin:
MapReduce and parallel DBMSs: friends or foes? 64-71 - Jeffrey Dean, Sanjay Ghemawat:
MapReduce: a flexible data processing tool. 72-77
- Raz Lin, Sarit Kraus:
Can automated agents proficiently negotiate with humans? 78-88
- Dan S. Wallach:
Technical perspective - Native Client: a clever alternative. 90 - Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:
Native Client: a sandbox for portable, untrusted x86 native code. 91-99 - Alon Y. Halevy:
Technical perspective - Schema mappings: rules for mixing data. 100 - Balder ten Cate, Phokion G. Kolaitis:
Structural characterizations of schema-mapping languages. 101-110
- Leah Hoffmann:
Q&A - HP's running man. 120-
- Dongback Seo, King-Tim Mak:
Using the thread-fabric perspective to analyze industry dynamics. 121-125 - Randal C. Burns, Zachary N. J. Peterson:
Security constructs for regulatory-compliant storage. 126-130 - Wonchang Hur, Dongsoo Kim:
The future of digital imaging. 131-135 - Seongwoon Kim, Inseong Lee, Kiho Lee, Seungki Jung, Joonah Park, Yeun-Bae Kim, Sang Ryong Kim, Jinwoo Kim:
Mobile Web 2.0 with multi-display buttons. 136-141 - Paul D. Witman, Terry Ryan:
Think big for reuse. 142-147 - Vijay Khatri, Carol V. Brown:
Designing data governance. 148-152 - Vittorio Miori, Dario Russo, Massimo Aliberti:
Domotic technologies incompatibility becomes user transparent. 153-157 - Zvi Drezner:
Technical opinion - Random selection from a stream of events. 158-159
Volume 53, Number 2, February 2010 (EE)
- Diane Crawford:
An issue of teamwork. 5 - In the Virtual Extension. 9
- Valerie Barr:
Connecting women and technology. 10-11
- David Roman:
Where the data is. 12
- Kirk L. Kroeker:
Alternate interface technologies emerge. 13-15 - Alex Wright:
Type theory comes of age. 16-17 - Sarah Underwood:
Improving disaster management. 18-20 - ACM Fellows honored. 21
- Martina Angela Sasse:
Not seeing the crime for the cameras? 22-25
- Dennis P. Groth, Jeffrey K. MacKie-Mason:
Why an informatics degree? 26-28
- W. Douglas Maughan:
The need for a national cybersecurity research and development agenda. 29-31 - Michel Beaudouin-Lafon:
Open access to scientific publications. 32-34
- George V. Neville-Neil:
Taking your network's temperature. 35-36
- Dennis E. Shasha:
An interview with Michael Rabin. 37-42 - Eric Saxe:
Power-efficient software. 44-48 - Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev:
Managing contention for shared resources on multicore processors. 49-57 - Steven P. Miller, Michael W. Whalen, Darren D. Cofer:
Software model checking takes off. 58-64 - Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler:
A few billion lines of code later: using static analysis to find bugs in the real world. 66-75 - Eric Benhamou, Jon Eisenberg, Randy H. Katz:
Assessing the changing U.S. IT R&D ecosystem. 76-83 - Dave Bacon, Wim van Dam:
Recent progress in quantum algorithms. 84-93 - Sanjoy Dasgupta:
Strange effects in high dimension. 96 - Nir Ailon, Bernard Chazelle:
Faster dimension reduction. 97-104 - Shekhar Y. Borkar:
Want to be a bug buster? 105 - Sung-Boem Park, Subhasish Mitra:
Post-silicon bug localization for processors using IFRA. 106-113
- Peter Winkler:
Breaking chocolate bars. 120
- Dongmin Kim, Izak Benbasat:
Designs for effective implementation of trust assurances in internet stores. 121-126 - Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons:
Reversing the landslide in computer-related degree programs. 127-133 - Tim Chenoweth, Robert P. Minch, Sharon W. Tabor:
Wireless insecurity: examining user security behavior on public networks. 134-138 - Farheen Altaf, David Schuff:
Taking a flexible approach to ASPs. 139-143 - John Minor Ross:
Informatics creativity: a role for abductive reasoning? 144-148 - Damien Joseph, Soon Ang, Roger H. L. Chang, Sandra Slaughter:
Practical intelligence in IT: assessing soft skills of IT professionals. 149-154 - Vijay K. Gurbani, Anita Garvert, James D. Herbsleb:
Managing a corporate open source software asset. 155-159 - Nikhil Mehta, Anju Mehta:
It takes two to tango: how relational investments improve IT outsourcing partnerships. 160-164
Volume 53, Number 3, March 2010 (EE)
- Moshe Y. Vardi:
Revisiting the publication culture in computing research. 5
- Too much debate? 6-7
- In the Virtual Extension. 8
- Mark Guzdial, Judy Robertson:
Too much programming too soon? 10-11
- David Roman:
Granting a second life. 12
- Gregory Goth:
CS and biology's growing pains. 13-15 - Kirk L. Kroeker:
Engineering the web's third decade. 16-18 - Samuel Greengard:
Tracking garbage. 19-20 - Katayanagi prizes and other CS awards. 21
- Tim Chang:
Gaming will save us all. 22-24
- Pamela Samuelson:
Only technological processes are patentable. 25-27
- Rachelle Hollander:
The ethics beat. 28-29
- Peter J. Denning, Fernando Flores, Peter Luzmore:
Orchestrating coordination in pluralistic networks. 30-32
- Richard A. Tapia:
Hiring and developing minority faculty at research universities. 33-35
- Cameron Wilson, Peter Harsha:
Making the case for computing. 36-38
- Kieron O'Hara, Nigel Shadbolt:
Privacy on the data web. 39-41
- Kirk McKusick, Sean Quinlan:
GFS: evolution on fast-forward. 42-49 - David J. Brown, Charles Reams:
Toward energy-efficient computing. 50-58 - Sia Siew Kien, Christina Soh, Peter Weill:
Global IT management: structuring for scale, responsiveness, and innovation. 59-64
- Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser:
Chasing the AIDS virus. 66-74 - Cameron Seay, Gary Tucker:
Virtual computing initiative at a small public university. 75-83
- Vincent Conitzer:
Making decisions based on the preferences of multiple agents. 84-94
- Daniele Micciancio:
A first glimpse of cryptography's Holy Grail. 96 - Craig Gentry:
Computing arbitrary functions of encrypted data. 97-105 - Pietro Perona:
Seeing the trees, the forest, and much more. 106 - Antonio Torralba, Kevin P. Murphy, William T. Freeman:
Using the forest to see the trees: exploiting context for visual object detection and localization. 107-114
- Peter Winkler:
Puzzled. 118 - Ari Juels:
Future tense. 120-
- Fabio Arduini, Vincenzo Morabito:
Business continuity and the banking industry. 121-125 - Sherrie Drye Cannoy, Al F. Salam:
A framework for health care information assurance policy and compliance. 126-131 - Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Jiung-Yee Lee:
Is stickiness profitable for electronic retailers? 132-136 - Ramanath Subramanyam, Fei Lee Weisstein, Mayuram S. Krishnan:
User participation in software development projects. 137-141 - S. T. Parkinson, Robert M. Hierons, Mark Lycett, M. Norman:
Practitioner-based measurement: a collaborative approach. 142-147 - Del Nagy, Areej M. Yassin, Anol Bhattacherjee:
Organizational adoption of open source software: barriers and remedies. 148-151 - John H. Benamati, Zafer D. Ozdemir, H. Jeff Smith:
Aligning undergraduate IS curricula with industry needs. 152-156 - Hing Kai Chan:
Agent-oriented embedded electronic measuring systems. 157-162
Volume 53, Number 4, April 2010 (EE)
- Calvin C. Gotlieb, James J. Horning:
The work of ACM's awards committee. 5
- Computing paradigm not a branch of science. 6-7
- In the Virtual Extension. 8
- Michael Stonebraker:
SQL databases v. NoSQL databases. 10-11
- David Roman:
Going mobile. 12
- Alex Wright:
Data streaming 2.0. 13-14 - Gary Anthes:
Robots gear up for disaster response. 15-16 - Samuel Greengard:
Spies among us? 17-19
- Richard Heeks:
Development 2.0: the IT-enabled transformation of international development. 22-24
- Martin Campbell-Kelly:
Be careful what you wish for. 25-26
- Michael A. Cusumano:
Cloud computing and SaaS as new computing platforms. 27-29
- Paul Ohm:
When network neutrality met privacy. 30-32
- George V. Neville-Neil:
The data-structure canon. 33-34
- Andy Woods:
Cooling the data center. 36-42 - Mache Creeger:
CTO roundtable: malware defense. 43-49 - Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia:
A view of cloud computing. 50-58
- Parthasarathy Ranganathan:
Recipe for efficiency: principles of power-aware computing. 60-67 - Sergey Yekhanin:
Private information retrieval. 68-73
- Sergio Antoy, Michael Hanus:
Functional logic programming. 74-85
- Padhraic Smyth, Charles Elkan:
Technical perspective - Creativity helps influence prediction precision. 88 - Yehuda Koren:
Collaborative filtering with temporal dynamics. 89-97 - Leslie Pack Kaelbling:
Technical perspective - New bar set for intelligent vehicles. 98 - Sebastian Thrun:
Toward robotic cars. 99-106
- Leah Hoffmann:
Q&A. 112
- Pak-Lok Poon, Sau-Fun Tang, T. H. Tse, Tsong Yueh Chen:
CHOC'LATE: a framework for specification-based testing. 113-118 - Robert J. Aalberts, Percy Poon, Paul D. Thistle:
A tale of two internet service providers. 119-123 - Keith Wright:
Capstone programming courses considered harmful. 124-127 - Surya Rebbapragada, Amit Basu, John Semple:
Data mining and revenue management methodologies in college admissions. 128-133 - Dawn G. Gregg:
Designing for collective intelligence. 134-138 - Stefano Ferretti, Marco Furini, Claudio E. Palazzi, Marco Roccetti, Paola Salomoni:
WWW recycling for a better world. 139-143 - Rhoda C. Joseph:
Individual resistance to IT innovations. 144-146
Volume 53, Number 5, May 2010 (EE)
- Moshe Y. Vardi:
Globalization and Offshoring of Software revisited. 5
- Roots of publication delay. 6-7
- In the Virtual Extension. 8
- Jeannette M. Wing, Daniel Reed:
NSF funding advice: 21st century innovation. 10-11
- David Roman:
Looking for control. 12
- Jeff Kanipe:
Modeling the astronomical. 13-15 - Gary Anthes:
Happy Birthday, RDBMS! 16-17 - Samuel Greengard:
Cloud computing and developing nations. 18-20 - Jack Rosenberger:
Thacker wins Turing Award. 21
- ACM's 2010 general election. 23-31
- Erik Brynjolfsson, Paul Hofmann, John Jordan:
Cloud computing and electricity: beyond the utility model. 32-34
- Cameron Wilson, Mark Guzdial:
How to make progress in computing education. 35-37
- Roman Beck:
Can IT lean against the wind? 38-40 - Ofir Turel, Alexander Serenko:
Is mobile email addiction overlooked? 41-43
- William Aspray:
Great computing museums of the world, part two. 45-49
- Peter Phillips:
Enhanced debugging with traces. 50-53 - Julien Ridoux, Darryl Veitch:
Principles of robust timing over the internet. 54-61 - Dave Durkee:
Why cloud computing will never be free. 62-69
- Abigail Sellen, Steve Whittaker:
Beyond total capture: a constructive critique of lifelogging. 70-77 - Clayton H. Lewis, Michele H. Jackson, William M. Waite:
Student and faculty attitudes and beliefs about computer science. 78-85
- Susanne Albers:
Energy-efficient algorithms. 86-96
- Peter L. Bartlett:
Learning to act in uncertain environments: technical perspective. 98 - Kuzman Ganchev, Yuriy Nevmyvaka, Michael J. Kearns, Jennifer Wortman Vaughan:
Censored exploration and the dark pool problem. 99-107 - Mark Harman:
Automated patching techniques: the fix is in: technical perspective. 108 - Westley Weimer, Stephanie Forrest, Claire Le Goues, ThanhVu Nguyen:
Automatic program repair with evolutionary computation. 109-116
- Peter Winkler:
Puzzled. 120
- Paul P. Tallon:
Understanding the dynamics of information management costs. 121-125 - Blaize Horner Reich, Chris Sauer:
Roles of the external IT project manager. 126-129 - Wonil Hwang, Gavriel Salvendy:
Number of people required for usability evaluation: the 10+/-2 rule. 130-133 - Charles E. Downing:
Is web-based supply chain integration right for your company? 134-137 - Demin Wang, Dharma P. Agrawal, Wassana Toruksa, Chaichana Chaiwatpongsakorn, Mingming Lu, Tim C. Keener:
Monitoring ambient air quality with carbon monoxide sensor-based wireless network. 138-141 - Theophanis C. Stratopoulos, Jee-Hae Lim:
IT innovation persistence: an oxymoron? 142-146 - E. Vance Wilson, Bengisu Tulu:
The rise of a health-IT academic focus. 147-150 - Hyeyoung Kim, Jae-Nam Lee, Jaemin Han:
The role of IT in business ecosystems. 151-156
Volume 53, Number 6, June 2010 (EE)
- Patricia Ryan:
A tour of ACM's HQ. 5
- Workflow tools for distributed teams? 6-7
- In the Virtual Extension. 8
- Greg Linden, Ed H. Chi, Mark Guzdial:
The chaos of the internet as an external brain; and more. 10-11
- David Roman:
Interact naturally. 12
- Neil Savage:
Straightening out heavy tails. 13-15 - Tom Geller:
Beyond the smart grid. 16-17 - Leah Hoffmann:
Mine your business. 18-19 - Leah Hoffmann:
Robin Milner: the elegant pragmatist. 20-21 - Jack Rosenberger:
CS and technology leaders honored. 22
- Arvind Narayanan, Vitaly Shmatikov:
Myths and fallacies of "personally identifiable information". 24-26
- Stuart S. Shapiro:
Privacy by design: moving from art to practice. 27-29
- Peter J. Denning, Jack B. Dennis:
The resurgence of parallelism. 30-32
- George V. Neville-Neil:
Plotting away. 33-34
- François Lévêque:
Intel's rebates: above board or below the belt? 35-37
- Simson L. Garfinkel, Lorrie Faith Cranor:
Institutional review boards and your research. 38-40
- Len Shustek:
An interview with Ed Feigenbaum. 41-45
- Dustin Owens:
Securing elasticity in the cloud. 46-51 - George Phillips:
Simplicity betrayed. 52-58 - Jeffrey Heer, Michael Bostock, Vadim Ogievetsky:
A tour through the visualization zoo. 59-67
- Anastasia Ailamaki, Verena Kantere, Debabrata Dash:
Managing scientific data. 68-78 - Jilin Chen, Joseph A. Konstan:
Conference paper selectivity and impact. 79-83
- Kristen Grauman:
Efficiently searching for similar images. 84-94
- Vivek Sarkar:
Building confidence in multicore software. 96 - Jacob Burnim, Koushik Sen:
Asserting and checking determinism for multithreaded programs. 97-105 - K. Rustan M. Leino:
Learning to do program verification. 106 - Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David A. Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood:
seL4: formal verification of an operating-system kernel. 107-115
- Peter Winkler:
Puzzled. 118 - David Brin:
Future tense. 120-
- Jun Sun, Marshall Scott Poole:
Beyond connection: situated wireless communities. 121-125 - Sergio de Cesare, Mark Lycett, Robert D. Macredie, Chaitali Patel, Ray J. Paul:
Examining perceptions of agility in software development practice. 126-130 - Alexander Nill, John Schibrowsky, James W. Peltier:
Factors that influence software piracy: a view from Germany. 131-134 - Jan Kietzmann, Ian O. Angell:
Panopticon revisited. 135-138 - Benoit Baudry, Sudipto Ghosh, Franck Fleurey, Robert B. France, Yves Le Traon, Jean-Marie Mottu:
Barriers to systematic model transformation testing. 139-143 - Kevin P. Gallagher, Kate M. Kaiser, Judith C. Simon, Cynthia Mathis Beath, Tim Goles:
The requisite variety of skills for IT professionals. 144-148 - Sandra A. Vannoy, Prashant Palvia:
The social influence model of technology adoption. 149-153 - Cheul Rhee, G. Lawrence Sanders, Natalie C. Simpson:
I, myself and e-myself. 154-157
Volume 53, Number 7, July 2010 (EE)
- Moshe Y. Vardi:
Hypercriticality. 5
- Don't ignore security offshore, or in the cloud. 6-7
- In the Virtual Extension. 9
- Ruben Ortega, Mark Guzdial, Daniel Reed:
Software development and crunch time; and more. 10-11
- David Roman:
In case you missed it. 12
- David Lindley:
Sharing computational perspectives. 13-15 - Samuel Greengard:
Censored! 16-18 - Kirk L. Kroeker:
Mainstreaming augmented reality. 19-21 - Gary Anthes:
Committed to success. 22-23 - Gregory Goth:
Eric Brewer: change agent. 24 - Sarah Underwood:
Visions of the future. 25
- Mari Sako:
Outsourcing versus shared services. 27-29
- Jason Borenstein:
Work life in the robotic age. 30-31
- Pamela Samuelson:
Should the Google book settlement be approved? 32-34
- Valerie E. Taylor:
Cultivating cultural diversity in information technology. 35-36
- Gonzalo Génova:
Is computer science truly scientific? 37-39
- Marc Snir, Telle Whitney:
Advice to members seeking ACM distinction. 40-41
- Eugene Loh:
The ideal HPC programming language. 42-47 - Brendan Gregg:
Visualizing system latency. 48-54 - Poul-Henning Kamp:
You're doing it wrong. 55-59
- Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert McCartney, Kate Sanders, Beth Simon, Tammy VanDeGrift:
Commonsense understanding of concurrency: computing students and concert tickets. 60-70 - Takeo Igarashi:
Computer graphics for all. 71-77
- Tim Roughgarden:
Algorithmic game theory. 78-86
- Hans-Juergen Boehm:
A solid foundation for x86 shared memory: technical perspective. 88 - Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa Nardelli, Magnus O. Myreen:
x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors. 89-97 - Mary Jane Irwin:
Technology scaling redirects main memories: technical perspective. 98 - Benjamin C. Lee, Engin Ipek, Onur Mutlu, Doug Burger:
Phase change memory architecture and the quest for scalability. 99-106
- Leah Hoffmann:
Q&A. 112-
- Yurong Yao, Edward F. Watson, Beverly K. Kahn:
Application service providers: market and adoption decisions. 113-117 - Jorge A. Romero, Nirup M. Menon, Rajiv D. Banker, Mark C. Anderson:
ERP: drilling for profit in the oil and gas industry. 118-121 - Wei-Lun Chang, Soe-Tsyr Yuan, Carol W. Hsu:
Creating the experience economy in e-commerce. 122-127 - Oded Nov, Chen Ye:
Why do people tag?: motivations for photo tagging. 128-131 - Domenico Talia, Paolo Trunfio:
How distributed data mining tasks can thrive as knowledge services. 132-137 - Alan R. Dennis, Thomas M. Duffy, Hasan Çakir:
IT programs in high schools: lessons from the Cisco Networking Academy program. 138-141 - John C. Ruhnka, John W. Bagby:
Using ESI discovery teams to manage electronic data discovery. 142-144
Volume 53, Number 8, August 2010 (EE)
- Victor Vianu:
JACM at the start of a new decade. 5 - In the Virtual Extension. 6
- CS expertise for institutional review boards. 7
- Greg Linden, Michael S. Bernstein, Erika Shehan Poole:
The war against spam: and more. 8-9
- David Roman:
Print is not just ink anymore. 10
- Gary Anthes:
Mechanism design meets computer science. 11-13 - Kirk L. Kroeker:
Looking beyond stereoscopic 3D's revival. 14-16 - Sarah Underwood:
Making sense of real-time behavior. 17-18 - Kirk L. Kroeker:
Celebrating the legacy of PLATO. 19-20 - Jack Rosenberger:
Gödel Prize and other CS awards. 21
- Christopher S. Yoo:
Is the Internet a maturing market? 24-26
- David S. Touretzky:
Preparing computer science students for the robotics revolution. 27-29
- George V. Neville-Neil:
Presenting your project. 33-34
- Eugene H. Spafford:
Remembrances of things pest. 35-37
- Samir Chopra:
Rights for autonomous artificial agents? 38-40
- Thomas J. Misa:
An interview with Edsger W. Dijkstra. 41-47
- Robert DeLine, Gina Venolia, Kael Rowan:
Software development with code maps. 48-54 - Mache Creeger:
Moving to the edge: a CTO roundtable on network virtualization. 55-62 - Jan Damsgaard, Jan Karlsbjerg:
Seven principles for selecting software packages. 63-71
- James R. Larus, Galen C. Hunt:
The Singularity system. 72-79 - Gábor Szabó, Bernardo A. Huberman:
Predicting the popularity of online content. 80-88
- Sarita V. Adve, Hans-Juergen Boehm:
Memory models: a case for rethinking parallel languages and hardware. 90-101
- Helen J. Wang:
Attacks target Web server logic and prey on XCS weaknesses: technical persepctive. 104 - Hristo Bojinov, Elie Bursztein, Dan Boneh:
The emergence of cross channel scripting. 105-113 - Fritz Henglein:
Large-scale sound and precise program analysis: technical persepctive. 114 - Isil Dillig, Thomas Dillig, Alex Aiken:
Reasoning about the unknown in static analysis. 115-123
- Peter Winkler:
Puzzled. 128
- Wei-Fung Tung, Soe-Tsyr Yuan:
Intelligent service machine. 129-134 - Marc N. Haines, Marcus A. Rothenberger:
How a service-oriented architecture may change the software development process. 135-140 - Eugenio Tisselli:
thinkflickrthink: a case study on strategic tagging. 141-145 - Lutz Prechelt:
Plat_Forms: is there one best web development technology? 146-149
Volume 53, Number 9, September 2010 (EE)
- Moshe Y. Vardi:
Science has only two legs. 5
- More than one way to annotate metadata. 7
- Ed H. Chi, Ruben Ortega:
Expanding CS education; improving software development. 8-9
- David Roman:
More Communications. 12
- David Lindley:
Brains and bytes. 13-15 - Neil Savage:
Cycling through data. 16-17 - Marina Krakovsky:
Degrees, distance, and dollars. 18-19 - Tom Geller:
ACM China nearing launch. 20 - Jack Rosenberger:
Kyoto prize and other CS awards. 21
- Phillip G. Armour:
Return at risk. 23-25
- Robert A. Hillman, Maureen A. O'Rourke:
Principles of the law of software contracts. 26-28
- Peter J. Denning, Dorothy E. Denning:
Discussing cyber attack. 29-31
- Mordechai Ben-Ari:
Objects never?: well, hardly ever! 32-35
- Jennifer Rexford, Constantine Dovrolis:
Future Internet architecture: clean-slate versus evolutionary research. 36-40
- Stephen V. Cantrill:
Computers in patient care: the promise and the challenge. 42-47 - Steve Chessin:
Injecting errors for fun and profit. 48-54 - Cary V. Millsap:
Thinking clearly about performance, part 1. 55-60
- Dag I. K. Sjøberg:
Confronting the myth of rapid obsolescence in computing research. 62-67 - Joe Armstrong:
Erlang. 68-75
- Christel Baier, Boudewijn R. Haverkort, Holger Hermanns, Joost-Pieter Katoen:
Performance evaluation and model checking join forces. 76-85
- Johannes Gehrke:
Programming with differential privacy: technical persepctive. 88 - Frank McSherry:
Privacy integrated queries: an extensible platform for privacy-preserving data analysis. 89-97 - Mark Jerrum:
Constraint satisfaction problems and computational complexity: technical persepctive. 98 - Andrei A. Bulatov, Dániel Marx:
Constraint satisfaction problems and global cardinality constraints. 99-106
- Peter Winkler:
Puzzled. 110 - Greg Bear:
Future tense. 112-
Volume 53, Number 10, October 2010 (EE)
- Alain Chesnais:
ACM is built on volunteers' shoulders. 5
- How to celebrate Codd's RDBMS vision. 7
- Michael Stonebraker:
In search of database consistency. 8-9
- David Roman:
The mobile road ahead. 10
- Alex Wright:
Linear logic. 11-13 - Graeme Stemp-Morlock:
Personal fabrication. 14-15 - Dennis McCafferty:
Should code be released? 16-17
- Martin Campbell-Kelly:
Victorian data processing. 19-21
- Michael A. Cusumano:
Platforms and services: understanding the resurgence of Apple. 22-24
- David Lorge Parnas:
Risks of undisciplined development. 25-27
- George V. Neville-Neil:
Version aversion. 28-29
- Michael W. Hicks, Jeffrey S. Foster:
SCORE: agile research group management. 30-31
- Photoshop scalability: keeping it simple. 32-38
- Cary V. Millsap:
Thinking clearly about performance, part 2. 39-45 - Kevin Montagne:
Tackling architectural complexity with modeling. 46-52
- Thomas Serre, Tomaso A. Poggio:
A neuromorphic approach to computer vision. 54-61 - Prasanna Tambe, Lorin M. Hitt:
How offshoring affects IT workers. 62-70
- Rodrigo Rodrigues, Peter Druschel:
Peer-to-peer systems. 72-82
- Carl A. Waldspurger:
A VM 'Engine' that makes a difference: technical perspective. 84 - Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. 85-93 - Yair Weiss, Judea Pearl:
Belief propagation: technical perspective. 94 - Erik B. Sudderth, Alexander T. Ihler, Michael Isard, William T. Freeman, Alan S. Willsky:
Nonparametric belief propagation. 95-103
- Leah Hoffmann:
Q&A. 112-
Volume 53, Number 11, November 2010 (EE)
- Moshe Y. Vardi:
On P, NP, and computational complexity. 5
- How to think about objects. 6-7
- In the Virtual Extension. 9
- Tessa Lau:
Rethinking the systems review process. 10-11
- David Roman:
A preference for PDF. 12
- Gregory Goth:
Turning data into knowledge. 13-15 - Gary Anthes:
Security in the cloud. 16-18 - Leah Hoffmann:
Career opportunities. 19-21 - Neil Savage:
Wide open spaces. 23
- Pablo Boczkowski:
The divergent online news preferences of journalists and readers. 24-25
- Stephen Cooper, Lance C. Pérez, Daphne Rainey:
K--12 computational learning. 27-29
- Pamela Samuelson:
Why do software startups patent (or not)? 30-32
- Joel F. Brenner:
Why isn't cyberspace more secure? 33-35
- Matt Welsh:
Sensor networks for the sciences. 36-39
- Brian W. Fitzpatrick, J. J. Lueck:
The case against data lock-in. 42-46 - David S. H. Rosenthal:
Keeping bits safe: how hard can it be? 47-55 - Poul-Henning Kamp:
Sir, please step away from the ASR-33! 56-57
- Michael Garland, David Blair Kirk:
Understanding throughput-oriented architectures. 58-66 - Patrick Vogl, Michael I. Barrett:
Regulating the information gatekeepers. 67-72
- Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra:
Using complexity to protect elections. 74-82
- Sarita V. Adve:
Data races are evil with no exceptions: technical perspective. 84 - Tayfun Elmas, Shaz Qadeer, Serdar Tasiran:
Goldilocks: a race-aware Java runtime. 85-92 - Cormac Flanagan, Stephen N. Freund:
FastTrack: efficient and precise dynamic race detection. 93-101
- Peter Winkler:
Puzzled. 112
- Duncan A. Buell:
In support of computer science teachers and the CSTA. 113-115
- Massimo Ficco, Roberto Pietrantuono, Stefano Russo:
Supporting ubiquitous location information in interworking 3G and wireless networks. 116-123 - Jill Freyne, Lorcan Coyle, Barry Smyth, Padraig Cunningham:
Relative status of journal and conference publications in computer science. 124-132
Volume 53, Number 12, December 2010 (EE)
- David A. Patterson:
Diverse connections. 5
- Science has four legs. 6-7
- In the Virtual Extension. 9
- Greg Linden, Jason I. Hong, Mark Guzdial:
Security advice; malvertisements; and CS education in Qatar. 10-11
- David Roman:
School grades need improvement. 12
- Gregory Goth:
The eyes have it. 13-15 - Gary Anthes:
Topic models vs. unstructured data. 16-18 - Marina Krakovsky:
CSEdWeek expands its reach. 19 - Samuel Greengard:
The new face of war. 20-22 - David Lindley:
A matter of privacy. 23
- Seymour E. Goodman, Andrew Harris:
The coming African Tsunami of information insecurity. 24-27
- Mark Smotherman, Dag Spicer:
IBM's single-processor supercomputer efforts. 28-30
- Ann Q. Gates:
The role of Hispanic-serving institutions in contributing to an educated work force. 31-33
- Peter J. Denning, Robert E. Kahn:
The long quest for universal information access. 34-36
- George V. Neville-Neil:
Literate coding. 37-38
- Francine Berman:
We need a research data census. 39-41
- A conversation with Ed Catmull. 42-47
- Mache Creeger:
The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness. 48-55
- Zhong Shao:
Certified software. 56-66 - Stephen J. Andriole:
Business impact of Web 2.0 technologies. 67-79
- Adnan Darwiche:
Bayesian networks. 80-90
- Michael Elad, Raja Giryes:
Iterative signal recovery from incomplete samples: technical perspective. 92 - Deanna Needell, Joel A. Tropp:
CoSaMP: iterative signal recovery from incomplete and inaccurate samples. 93-100 - Scott Aaronson:
QIP = PSPACE breakthrough: technical perspective. 101 - Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous:
QIP = PSPACE. 102-109
- Peter Winkler:
Puzzled: Solutions and sources. 126 - Rumilisoun:
Future tense: Rebirth of worlds. 128-
- Massimo Franceschet:
The role of conference publications in CS. 129-132 - Barry M. Lunt, Joseph J. Ekstrom, Han Reichgelt, Michael Bailey, Richard J. LeBlanc:
IT 2008: the history of a new computing discipline. 133-141 - Ralph A. Morelli, Chamindra de Silva, Trishan R. de Lanerolle, Rebecca Curzon, Xin Sheng Mao:
A global collaboration to deploy help to China. 142-149
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.