default search action
Communications of the ACM (CACM), Volume 54, 2011
Volume 54, Number 1, January 2011 (EE)
- Moshe Y. Vardi:
Where have all the workshops gone? 5
- To change the world, take a chance. 6-7
- In the Virtual Extension. 8
- Wendy Hall:
ACM's annual report. 9-13
- Jack Rosenberger, Judy Robertson:
Smart career advice; laptops as a classroom distraction. 14-15
- David Roman:
Scholarly publishing model needs an update. 16-
- Gary Anthes:
Nonlinear systems made easy. 17-19 - Alex Wright:
The touchy subject of haptics. 20-22 - Marina Krakovsky:
India's elephantine effort. 23-24 - Jack Rosenberger:
EMET prize and other awards. 25
- Phillip G. Armour:
Don't bring me a good idea. 27-29
- Stefan Bechtold:
Google AdWords and European trademark law. 30-32
- Michael A. Cusumano:
Reflections on the Toyota debacle. 33-35
- Mark Dermot Ryan:
Cloud computing privacy concerns on our doorstep. 36-38
- Guy L. Steele Jr.:
An interview with Frances E. Allen. 39-45
- Eben M. Haber, Eser Kandogan, Paul P. Maglio:
Collaboration in system administration. 46-53 - UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). 54-60
- Evangelos Kotsovinos:
Virtualization: blessing or curse? 61-65
- Gio Wiederhold:
Follow the intellectual property. 66-74 - Uzi Vishkin:
Using simple abstraction to reinvent computing for parallelism. 75-85
- Cynthia Dwork:
A firm foundation for private data analysis. 86-95
- Dina Katabi:
Sora promises lasting impact: technical perspective. 98 - Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. 99-107 - Damon Wischik:
Multipath: a new control architecture for the internet: technical perspective. 108 - Peter B. Key, Laurent Massoulié, Donald F. Towsley:
Path selection and multipath congestion control. 109-116
- Dennis McCafferty:
Q&A. 128-
- Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou:
The ephemeral legion: producing an expert cyber-security work force from thin air. 129-131
- Peter Fröhlich, Antti Oulasvirta, Matthias Baldauf, Antti Nurminen:
On the move, wirelessly connected to the world. 132-138 - Matthias Häsel:
Opensocial: an enabler for social applications on the web. 139-144
Volume 54, Number 2, February 2011 (EE)
- Tom Rodden:
ICPS offers major research venue. 5
- Shine the light of computational complexity. 6-7
- In the Virtual Extension. 9
- Jason I. Hong:
Matters of design. 10-11
- David Roman:
End of days for Communications in print? 12
- Gregory Goth:
Chipping away at greenhouse gases. 13-15 - Neil Savage:
Information theory after Shannon. 16-18 - Leah Hoffmann:
Maurice Wilkes: the last pioneer. 19 - Samuel Greengard:
Following the crowd. 20-22 - Gary Anthes:
ACM launches new Digital Library. 23-24 - ACM Fellows honored. 25
- Maura Conway:
Against cyberterrorism. 26-28
- Gregory L. Rosston, Scott Savage, Donald Waldman:
Household demand for broadband internet service. 29-31
- George Ledin Jr.:
The growing harm of not teaching malware. 32-34
- George V. Neville-Neil:
Forest for the trees. 35-36
- Mark Guzdial:
From science to engineering. 37-39
- Jonathan Grudin:
Technology, conferences, and community. 41-43
- Julian Harty:
Finding usability bugs with automated tests. 44-49 - Thomas A. Limoncelli:
A plea from sysadmins to software vendors: 10 do's and don'ts. 50-51 - Christina Lear:
System administration soft skills. 52-58
- Juan P. Wachs, Mathias Kölsch, Helman Stern, Yael Edan:
Vision-based hand-gesture applications. 60-71 - Michael J. Cafarella, Alon Y. Halevy, Jayant Madhavan:
Structured data on the web. 72-79
- Stephen Davies:
Still building the memex. 80-88
- Fernando Pereira:
Markov meets Bayes: technical perspective. 90 - Frank D. Wood, Jan Gasthaus, Cédric Archambeau, Lancelot James, Yee Whye Teh:
The sequence memoizer. 91-98 - Norman P. Jouppi:
DRAM errors in the wild: technical perspective. 99 - Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber:
DRAM errors in the wild: a large-scale field study. 100-107
- Peter Winkler:
Puzzled. 112
- John K. Estell, Ken Christensen:
The need for a new graduation rite of passage. 113-115
- Qinping Zhao:
10 scientific problems in virtual reality. 116-118
- David Wright, Paul de Hert, Serge Gutwirth:
Are the OECD guidelines at 30 showing their age? 119-127
Volume 54, Number 3, March 2011 (EE)
- Moshe Y. Vardi:
Fumbling the future. 5
- Free speech for algorithms? 6-7
- In the Virtual Extension. 11
- Mark Guzdial, Greg Linden:
Scientists, engineers, and computer science; industry and research groups. 12-13
- David Roman:
Time to change. 14
- Kirk L. Kroeker:
Grid computing's future. 15-17 - Neil Savage:
Twitter as medium and message. 18-20 - Tom Geller:
Evaluating government funding. 21 - Gary Anthes:
Memristors: pass or fail? 22-24 - Samuel Greengard:
Gary Chapman, technologist: 1952-2010. 25
- Pamela Samuelson:
Do you own the software you buy? 26-28
- Kenneth D. Pimple:
Surrounded by machines. 29-31
- Peter J. Denning:
Managing time. 32-34
- Daryl E. Chubin, Roosevelt Y. Johnson:
A program greater than the sum of its parts: the BPC alliances. 35-37
- Marc Snir:
Computer and information science and engineering: one discipline, many specialties. 38-43
- Mark Burgess:
Testable system administration. 44-49 - Ross Stapleton-Gray, William Woodcock:
National internet defense - small states on the skirmish line. 50-55 - Poul-Henning Kamp:
B.Y.O.C (1, 342 times and counting). 56-58
- Katy Börner:
Plug-and-play macroscopes. 60-69 - Frank Stajano, Paul Wilson:
Understanding scam victims: seven principles for systems security. 70-75
- Nir Shavit:
Data structures in the multicore age. 76-84
- Juan Pablo Bello, Yann LeCun, Robert Rowe:
Concerto for violin and Markov model: technical perspective. 86 - Christopher Raphael:
The informatics philharmonic. 87-93 - Jennifer Rexford:
VL2: technical perspective. 94 - Albert G. Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta:
VL2: a scalable and flexible data center network. 95-104
- Peter Winkler:
Puzzled. 109 - Gregory Benford:
Future tense. 112-
- Frances A. Rosamond, Roswitha Bardohl, Stephan Diehl, Uwe Geisler, Gordon Bolduan, Annette Lessmöllmann, Andreas Schwill, Ulrike Stege:
Reaching out to the media: become a computer science ambassador. 113-116
- R. Kelly Garrett, James N. Danziger:
The Internet electorate. 117-123 - Steven De Hertogh, Stijn Viaene, Guido Dedene:
Governing Web 2.0. 124-130
Volume 54, Number 4, April 2011 (EE)
- Robert B. Schnabel:
Educating computing's next generation. 5 - In the Virtual Extension. 8
- I want a personal information pod. 9
- Jason I. Hong:
Matters of design, part II. 10-11
- Scott E. Delman:
ACM on the move. 12
- Gary Anthes:
The quest for randomness. 13-15 - Kirk L. Kroeker:
Engineering sensation in artificial limbs. 16-18 - Samuel Greengard:
Social games, virtual goods. 19-22 - Sarah Underwood:
British computer scientists reboot. 23
- Fred Niederman, Felix B. Tan:
Managing global IT teams: considering cultural dynamics. 24-27
- Nathan L. Ensmenger:
Building castles in the air. 28-30
- Michael A. Cusumano:
Platform wars come to social media. 31-33
- George V. Neville-Neil:
Coder's block. 34-35
- José Luis Gómez Barroso, Claudio Feijóo:
Asymmetries and shortages of the network neutrality principle. 36-37
- Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza:
Returning control to the programmer: SIMD intrinsics for virtual machines. 38-43 - Thomas A. Limoncelli, Vinton G. Cerf:
Successful strategies for IPv6 rollouts.: Really. 44-48 - Erik Meijer, Gavin M. Bierman:
A co-relational model of data for large shared data banks. 49-58
- Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz:
Design principles for visual communication. 60-69 - Aleksandar Dragojevic, Pascal Felber, Vincent Gramoli, Rachid Guerraoui:
Why STM can be more than a research toy. 70-77 - John C. Tang, Manuel Cebrián, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert:
Reflecting on the DARPA Red Balloon Challenge. 78-85
- AnHai Doan, Raghu Ramakrishnan, Alon Y. Halevy:
Crowdsourcing systems on the World-Wide Web. 86-96
- Daniel M. Berry:
Liability issues in software engineering: technical perspective. 98 - Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin:
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties. 99-106 - Madhu Sudan:
Patterns hidden from simple algorithms: technical perspective. 107 - Mark Braverman:
Poly-logarithmic independence fools bounded-depth boolean circuits. 108-115
- Leah Hoffmann:
Q&A. 120-
- Patricia Morreale, David A. Joiner:
Reaching future computer scientists. 121-124
- Ann Majchrzak, Philip H. B. More:
Emergency! Web 2.0 to the rescue! 125-132 - Fred Grossman, Charles C. Tappert, Joe Bergin, Susan M. Merritt:
A research doctorate for computing professionals. 133-141
- Gerardo Canfora, Massimiliano Di Penta, Luigi Cerulo:
Achievements and challenges in software reverse engineering. 142-151
Volume 54, Number 5, May 2011 (EE)
- Moshe Y. Vardi:
Technology has social consequences. 5
- Preserve privacy in statistical correlations. 6-7
- In the Virtual Extension. 9
- Michael Stonebraker:
Stonebraker on data warehouses. 10-11
- Scott E. Delman:
Let ACM help you find your next job 'online'. 12
- Neil Savage:
Sorting through photos. 13-15 - Gregory Goth:
I, domestic robot. 16-17 - Leah Hoffmann:
Data optimization in developing nations. 18-20 - Marina Krakovsky:
Deus ex machina. 22 - Alex Wright:
Web science meets network science. 23
- Avi Goldfarb, Catherine Tucker:
Online advertising, behavioral targeting, and privacy. 25-27
- Brian Dorn:
Reaching learners beyond our hallowed halls. 28-30
- Tim Wu:
Bell labs and centralized innovation. 31-33
- Jason Fitzpatrick:
An interview with Steve Furber. 34-39
- Juan A. Añel:
The importance of reviewing the code. 40-41
- Poul-Henning Kamp:
The one-second war. 44-48 - Andre Charland, Brian LeRoux:
Mobile application development: web vs. native. 49-53 - Patrick McKenzie:
Weapons of mass assignment. 54-59
- Dennis J. McFarland, Jonathan R. Wolpaw:
Brain-computer interfaces for communication and control. 60-66 - Shekhar Borkar, Andrew A. Chien:
The future of microprocessors. 67-77 - Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. 78-87
- Byron Cook, Andreas Podelski, Andrey Rybalchenko:
Proving program termination. 88-98
- David C. Parkes:
Complex financial products: caveat emptor: technical perspective. 100 - Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge:
Computational complexity and information asymmetry in financial products. 101-107 - Guillermo Sapiro:
Images everywhere: looking for models: technical perspective. 108 - Antoni Buades, Bartomeu Coll, Jean-Michel Morel:
Self-similarity-based image denoising. 109-117
- Peter Winkler:
Puzzled. 120
- Subhankar Dhar, Upkar Varshney:
Challenges and business models for mobile location-based services and advertising. 121-128 - Guido Schryen:
Is open source security a myth? 130-140 - Jacques Wainer, Siome Goldenstein, Cléo Zanella Billa:
Invisible work in standard bibliometric evaluation of computer science. 141-146
Volume 54, Number 6, June 2011 (EE)
- P. J. Narayanan, Anand Deshpanda:
Computing and India. 5
- Why concurrent objects are recurrently complicated. 6
- In the Virtual Extension. 7
- Daniel Reed, Mark Guzdial, Judy Robertson:
Simple design; research vs. teaching; and quest to learn. 8-9
- Scott E. Delman:
Say it with video. 10
- Kirk L. Kroeker:
Biology-inspired networking. 11-13 - Gary Anthes:
Beauty and elegance. 14-15 - Tom Geller:
The promise of flexible displays. 16-18 - Gregory Goth:
Unlimited possibilities. 19 - Marina Krakovsky:
All the news that's fit for you. 20-21
- Ari Schwartz:
Identity management and privacy: a rare opportunity to get it right. 22-24
- Peter J. Denning, Dennis J. Frailey:
Who are we - now? 25-27
- Phillip G. Armour:
Practical application of theoretical estimation. 28-30
- David Lorge Parnas:
The risks of stopping too soon. 31-33
- George V. Neville-Neil:
Think before you fork. 34-35
- Clayton T. Morrison, Richard T. Snodgrass:
Computer science can use more science. 36-38
- Pat Helland:
If you have too much data, then 'good enough' is good enough. 40-47 - Michael Rys:
Scalable SQL. 48-53 - Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling:
Does deterrence work in reducing information security policy abuse by employees? 54-60
- W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall:
Advancing the state of home networking. 62-71 - Michael Stonebraker, Rick Cattell:
10 rules for scalable performance in 'simple operation' datastores. 72-80 - Mike Barnett, Manuel Fähndrich, K. Rustan M. Leino, Peter Müller, Wolfram Schulte, Herman Venter:
Specification and verification: the Spec# experience. 81-91
- Massimo Franceschet:
PageRank: standing on the shoulders of giants. 92-101
- Phokion G. Kolaitis:
The quest for a logic for polynomial-time computation: technical perspective. 103 - Martin Grohe:
From polynomial time queries to graph structure theory. 104-112 - Michael J. Franklin:
Data analysis at astonishing speed: technical perspective. 113 - Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis:
Dremel: interactive analysis of web-scale datasets. 114-123
- Peter Winkler:
Puzzled. 126 - Leah Hoffmann:
Q&A. 128-
- Paolo Boldi, Francesco Bonchi, Carlos Castillo, Sebastiano Vigna:
Viscous democracy for social networks. 129-137 - Denise Johnson McManus, Houston Hume Carr, Benjamin Adams:
Wireless on the precipice: The 14th century revisited. 138-143
Volume 54, Number 7, July 2011 (EE)
- Moshe Y. Vardi:
Solving the unsolvable. 5
- Practical research yields fundamental insight, too. 6-7
- Jeannette M. Wing, Ed H. Chi:
Reviewing peer review. 10-11
- Scott E. Delman:
ACM aggregates publication statistics in the ACM Digital Library. 12
- Kirk L. Kroeker:
Weighing Watson's impact. 13-15 - Alex Wright:
Automotive autonomy. 16-18 - Dennis McCafferty:
Brave, new social world. 19-21 - ACM award recipients. 22
- Mari Sako:
Driving power in global supply chains. 23-25
- Cory P. Knobel, Geoffrey C. Bowker:
Values in design. 26-28
- Pamela Samuelson:
Too many copyrights? 29-31
- Maria (Mia) Ong:
The status of women of color in computer science. 32-34
- Mordechai Ben-Ari:
Non-myths about programming. 35-37
- Roberto Ierusalimschy, Luiz Henrique de Figueiredo, Waldemar Celes Filho:
Passing a language through the eye of a needle. 38-43 - Debasish Ghosh:
DSL for the uninitiated. 44-50 - Microsoft's protocol documentation program: interoperability testing at scale. 51-57
- Michael Edwards:
Algorithmic composition: computational thinking in music. 58-67 - Thomas Ball, Vladimir Levin, Sriram K. Rajamani:
A decade of software model checking with SLAM. 68-76 - Joseph M. Hellerstein, David L. Tennenhouse:
Searching for Jim Gray: a technical overview. 77-87
- Stephen B. Wicker:
Cellular telephony and the question of privacy. 88-98
- Luiz André Barroso:
FAWN: a fast array of wimpy nodes: technical perspective. 100 - David G. Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan:
FAWN: a fast array of wimpy nodes. 101-109 - John K. Ousterhout:
Is scale your enemy, or is scale your friend?: technical perspective. 110 - Kinshuman Kinshumann, Kirk Glerum, Steve Greenberg, Gabriel Aul, Vince R. Orgovan, Greg Nichols, David Grant, Gretchen Loihle, Galen C. Hunt:
Debugging in the (very) large: ten years of implementation and experience. 111-116
- Rudy Rucker:
Future tense. 120-
- John K. Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Diego Ongaro, Guru M. Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman:
The case for RAMCloud. 121-130
- Gargi Dasgupta, Amit Sharma, Akshat Verma, Anindya Neogi, Ravi Kothari:
Workload management for power efficiency in virtualized data centers. 131-141
Volume 54, Number 8, August 2011 (EE)
- Sorel Reisman, Alain Chesnais:
From the presidents of the IEEE Computer Society and ACM. 5
- A policy that deters violation of security policy. 7
- Michael Stonebraker:
Stonebraker on NoSQL and enterprises. 10-11
- Scott E. Delman:
Why you should be happy to sign in! 12
- Kirk L. Kroeker:
A new benchmark for artificial intelligence. 13-15 - Tom Geller:
Supercomputing's exaflop target. 16-18 - Samuel Greengard:
Life, translated. 19-21
- Jonathon N. Cummings:
Geography is alive and well in virtual teams. 24-26
- Betsy James DiSalvo, Amy S. Bruckman:
From interests to values. 27-29
- Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford:
As simple as possible - but not more so. 30-33
- George V. Neville-Neil:
Storage strife. 34-35
- Joseph Y. Halpern, David C. Parkes:
Journals for certification, conferences for rapid dissemination. 36-38
- Eric Allman:
The robustness principle reconsidered. 40-45 - Satnam Singh:
Computing without processors. 46-54 - Oren Eini:
The pain of implementing LINQ providers. 55-61
- Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony J. Sherbondy, Raghavendra Singh:
Cognitive computing. 62-71 - Joanne McGrath Cohoon, Sergey Nigai, Joseph Kaye:
Gender and computing conference papers. 72-80 - Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler:
Reputation systems for open collaboration. 81-87
- Surajit Chaudhuri, Umeshwar Dayal, Vivek R. Narasayya:
An overview of business intelligence technology. 88-98
- Peter J. Haas:
Sketches get sketchier. 100 - Ping Li, Arnd Christian König:
Theory and applications of b-bit minwise hashing. 101-109 - Scott R. Klemmer:
Skintroducing the future. 110 - Chris Harrison, Desney S. Tan, Dan Morris:
Skinput: appropriating the skin as an interactive canvas. 111-118
- Peter Winkler:
Puzzled. 120
- David Wright:
Should privacy impact assessments be mandatory? 121-131 - Sanjay Goel:
Cyberwarfare: connecting the dots in cyber intelligence. 132-140
Volume 54, Number 9, September 2011 (EE)
- Moshe Y. Vardi:
Are you talking to me? 5
- Solved, for all practical purposes. 7
- In the Virtual Extension. 9
- Jeannette M. Wing, Valerie Barr:
Jeannette M. Wing @ PCAST; Barbara Liskov keynote. 10-11
- Kirk L. Kroeker:
A breakthrough in algorithm design. 13-15 - Gary Anthes:
Invasion of the mobile apps. 16-18 - Neil Savage:
Remaking American medicine. 19-21
- Rebecca Tushnet:
Remix nation. 22-24
- Martin Campbell-Kelly:
In praise of 'Wilkes, Wheeler, and Gill'. 25-27
- Ron Babin, Steve Briggs, Brian Nicholson:
Corporate social responsibility and global IT outsourcing. 28-30
- Peter J. Denning, Ritu Raj:
Managing time, part 2. 31-33
- Ben Shneiderman, Jennifer Preece, Peter Pirolli:
Realizing the value of social media requires innovative computing research. 34-37
- Paul Vixie:
Arrogance in business planning. 38-41 - Poul-Henning Kamp:
The most expensive one-byte mistake. 42-44 - Mache Creeger:
ACM CTO roundtable on mobile devices in the enterprise. 45-53
- Stephen J. Lukasik:
Protecting users of the cyber commons. 54-61 - Craig Partridge:
Realizing the future of wireless data communications. 62-68 - Leonardo Mendonça de Moura, Nikolaj S. Bjørner:
Satisfiability modulo theories: introduction and applications. 69-77
- Patricia Bouyer, Uli Fahrenberg, Kim G. Larsen, Nicolas Markey:
Quantitative analysis of real-time systems using priced timed automata. 78-87
- Christopher Kruegel:
Making browser extensions secure: technical perspective. 90 - Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett:
Vetting browser extensions for security vulnerabilities with VEX. 91-99 - Olivier Danvy, Jan Midtgaard:
Abstracting abstract machines: technical perspective. 100 - David Van Horn, Matthew Might:
Abstracting abstract machines: a systematic approach to higher-order program analysis. 101-109
- Peter Winkler:
Puzzled. 110 - Leah Hoffmann:
Q&A. 112-
- Murray Cantor:
Calculating and improving ROI in software and system programs. 121-130
Volume 54, Number 10, October 2011 (EE)
- Ronald F. Boisvert, Jack W. Davidson:
ACM's copyright policy. 5-6 - In the Virtual Extension. 7
- Daniel Reed, Mark Guzdial:
From idea to product: how schools of education can help CS. 8-9
- Scott E. Delman:
ACM TechNews now available in the Android Market. 10
- Kirk L. Kroeker:
Improving brain-computer interfaces. 11-14 - Tom Geller:
Seeing is not enough. 15-16 - Samuel Greengard:
Living in a digital world. 17-19 - Marina Krakovsky:
Success at 16. 20
- Michael A. Cusumano:
The platform leader's dilemma. 21-24
- George V. Neville-Neil:
File-system litter. 25-26
- Carsten Schürmann:
Modernizing the Danish democratic process. 27-29
- Phillip G. Armour:
Testing: failing to succeed. 30-31
- Dan S. Wallach:
Rebooting the CS publication process. 32-35
- Rishiyur S. Nikhil:
Abstraction in hardware system design. 36-44 - Erik Meijer:
The world according to LINQ. 45-51 - B. Scott Andersen, George Romanski:
Verification of safety-critical software. 52-57
- John Arquilla:
From blitzkrieg to bitskrieg: the military encounter with computers. 58-65 - Sarah Cohen, James T. Hamilton, Fred Turner:
Computational journalism. 66-71
- Jasmin Fisher, David Harel, Thomas A. Henzinger:
Biology as reactivity. 72-82
- Charles R. Moore:
Power efficiency as the #1 design constraint: technical perspective. 84 - Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz:
Understanding sources of ineffciency in general-purpose chips. 85-93 - Geoffrey E. Hinton:
A better way to learn features: technical perspective. 94 - Honglak Lee, Roger B. Grosse, Rajesh Ranganath, Andrew Y. Ng:
Unsupervised learning of hierarchical representations with convolutional deep belief networks. 95-103 - Carlo Tomasi:
Visual reconstruction: technical perspective. 104 - Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski:
Building Rome in a day. 105-112
- Shumeet Baluja:
Future tense. 120-
- Daniel Gayo-Avello:
Don't turn social media into another 'Literary Digest' poll. 121-128 - Zhiwei Xu, Guojie Li:
Computing for the masses. 129-137
Volume 54, Number 11, November 2011 (EE)
- Moshe Y. Vardi:
Is Moore's Party over? 5
- Justice for Jahromi. 6-7
- In the Virtual Extension. 9
- Bertrand Meyer, Greg Linden:
In support of open reviews; better teaching through large-scale data mining. 12-13
- Scott E. Delman:
ACM offers a new approach to self-archiving. 14
- Kirk L. Kroeker:
Modeling chaotic storms. 15-17 - Alex Wright:
Hacking cars. 18-19 - Leah Hoffmann:
Risky business. 20-22
- Hannes Tschofenig:
Security risks in next-generation emergency services. 23-25
- Scott Wallsten:
What gets measured gets done. 26-28
- Pamela Samuelson:
Why the Google book settlement failed: and what comes next? 29-31
- Michael Davis:
Will software engineering ever be engineering? 32-34
- Teaching-oriented faculty at research universities. 35-37
- Douglas Baumann, Susanne E. Hambrusch, Jennifer Neville:
Gender demographics trends and changes in U.S. CS departments. 38-42
- Poul-Henning Kamp:
The software industry is the problem. 44-47 - Li Gong:
Java security architecture revisited. 48-52 - Yaron Minsky:
OCaml for the masses. 53-58
- Marti A. Hearst:
'Natural' search user interfaces. 60-67 - DongBack Seo, Albert Boonstra, Marjolein van Offenbeek:
Managing IS adoption in ambivalent groups. 68-73 - Ken Kennedy, Charles Koelbel, Hans P. Zima:
The rise and fall of high performance Fortran. 74-82
- Ian F. Akyildiz, Josep Miquel Jornet, Massimiliano Pierobon:
Nanonetworks: a new frontier in communications. 84-89
- Butler W. Lampson:
Making untrusted code useful: technical perspective. 92 - Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making information flow explicit in HiStar. 93-101 - William T. Freeman:
A perfect 'match': technical perspective. 102 - Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein:
The PatchMatch randomized matching algorithm for image manipulation. 103-110
- Peter Winkler:
Puzzled. 120
- Hector Garcia-Molina, Georgia Koutrika, Aditya G. Parameswaran:
Information seeking: convergence of search, recommendations, and advertising. 121-130
Volume 54, Number 12, December 2011 (EE)
- Moshe Y. Vardi:
Computing for humans. 5
- To boost presentation quality, ask questions. 7
- John Langford, Judy Robertson:
Conferences and video lectures; scientific educational games. 8-9 - Nominees for elections and report of the ACM Nominating Committee. 10
- Kirk L. Kroeker:
The rise of molecular machines. 11-13 - Gregory Goth:
Brave NUI world. 14-16 - Dennis McCafferty:
Activism vs. slacktivism. 17-19 - Samuel Greengard:
CSEdWeek takes hold. 20 - Paul Hyman:
Dennis Ritchie, 1941-2011. 21 - Jaron Lanier:
The most ancient marketing. 22-23 - Genevieve Bell:
Life, death, and the iPad: cultural symbols and Steve Jobs. 24-25
- Michael A. Cusumano:
The legacy of Steve Jobs. 26-28
- Kentaro Toyama:
On turbocharged, heat-seeking, robotic fishing poles. 29-31
- George V. Neville-Neil:
Debugging on live systems. 32-33
- Valerie E. Taylor, Richard E. Ladner:
Data trends on minorities and people with disabilities in computing. 34-37
- Peter J. Denning:
The grounding practice. 38-40
- Andrew P. Bernat, Eric Grimson:
Doctoral program rankings for U.S. computing programs: the national research council strikes out. 41-43
- David Pacheco:
Postmortem debugging in dynamic environments. 44-51 - G. Bruce Berriman, Steven L. Groom:
How will astronomy archives survive the data tsunami? 52-56 - Robert Green, Henry F. Ledgard:
Coding guidelines: finding the art in the science. 57-63
- Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah:
Visual crowd surveillance through a hydrodynamics lens. 64-73 - Manuel Sojer, Joachim Henkel:
License risks from ad hoc reuse of code from the internet. 74-81 - Ganesh Gopalakrishnan, Robert M. Kirby, Stephen F. Siegel, Rajeev Thakur, William Gropp, Ewing L. Lusk, Bronis R. de Supinski, Martin Schulz, Greg Bronevetsky:
Formal analysis of MPI-based parallel programs. 82-91
- Gerhard Brewka, Thomas Eiter, Miroslaw Truszczynski:
Answer set programming at a glance. 92-103
- Xavier Leroy:
Safety first!: technical perspective. 122 - Jean Yang, Chris Hawblitzel:
Safe to the last instruction: automated verification of a type-safe operating system. 123-131 - Vitaly Shmatikov:
Anonymity is not privacy: technical perspective. 132 - Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg:
Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. 133-141
- Peter Winkler:
Puzzled. 142 - Leah Hoffmann:
Q&A. 144-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.