


default search action
Communications of the ACM (CACM), Volume 53, 2010
Volume 53, Number 1, January 2010 (EE)
- Moshe Y. Vardi:

More debate, please! 5
- Software still as much an art as science. 7

- In the Virtual Extension. 8

- Wendy Hall:

ACM's annual report. 9-13
- Greg Linden, Ruben Ortega, Jason I. Hong:

Software engineering, smartphones and health systems, and security warnings. 16-17
- David Roman:

The corollary of empowerment. 18
- Tom Geller:

Rebuilding for eternity. 19-21 - Leah Hoffmann:

Amir Pnueli: ahead of his time. 22-23 - Gary Anthes:

Automated translation of Indian languages. 24-26 - Neil Savage

:
New search challenges and opportunities. 27-28 - Kirk L. Kroeker:

Future Internet design summit. 29 - Karen A. Frenkel:

Robert Lovett Ashenhurst: 1929--2009. 30 - Samuel Greengard:

ACM and India. 31
- Michael A. Cusumano:

Technology strategy and management - The evolution of platform thinking. 32-34 - Phillip G. Armour:

The business of software - In praise of bad programmers. 35-36 - Arti Rai:

Law and technology - Unstandard standardization: the case of biology. 37-39 - Bjarne Stroustrup:

Viewpoint - What should we teach new software developers? Why? 40-42 - William Aspray, Len Shustek, Norbert Ryska:

Computer museum series - Great computing museums of the world, part one. 43-46
- Julian Hyde:

Data in flight. 48-52 - Stephen Petschulat:

Other people's data. 53-57 - Adam Leventhal:

Triple-parity RAID and beyond. 58-63
- Michael Stonebraker, Daniel J. Abadi

, David J. DeWitt, Samuel Madden, Erik Paulson, Andrew Pavlo
, Alexander Rasin:
MapReduce and parallel DBMSs: friends or foes? 64-71 - Jeffrey Dean, Sanjay Ghemawat:

MapReduce: a flexible data processing tool. 72-77
- Raz Lin, Sarit Kraus:

Can automated agents proficiently negotiate with humans? 78-88
- Dan S. Wallach:

Technical perspective - Native Client: a clever alternative. 90 - Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:

Native Client: a sandbox for portable, untrusted x86 native code. 91-99 - Alon Y. Halevy:

Technical perspective - Schema mappings: rules for mixing data. 100 - Balder ten Cate, Phokion G. Kolaitis:

Structural characterizations of schema-mapping languages. 101-110
- Leah Hoffmann:

Q&A - HP's running man. 120-
- Dongback Seo, King-Tim Mak:

Using the thread-fabric perspective to analyze industry dynamics. 121-125 - Randal C. Burns

, Zachary N. J. Peterson:
Security constructs for regulatory-compliant storage. 126-130 - Wonchang Hur, Dongsoo Kim:

The future of digital imaging. 131-135 - Seongwoon Kim, Inseong Lee, Kiho Lee, Seungki Jung, Joonah Park, Yeun-Bae Kim, Sang Ryong Kim, Jinwoo Kim:

Mobile Web 2.0 with multi-display buttons. 136-141 - Paul D. Witman, Terry Ryan:

Think big for reuse. 142-147 - Vijay Khatri, Carol V. Brown:

Designing data governance. 148-152 - Vittorio Miori, Dario Russo

, Massimo Aliberti:
Domotic technologies incompatibility becomes user transparent. 153-157 - Zvi Drezner:

Technical opinion - Random selection from a stream of events. 158-159
Volume 53, Number 2, February 2010 (EE)
- Diane Crawford:

An issue of teamwork. 5 - In the Virtual Extension. 9

- Valerie Barr:

Connecting women and technology. 10-11
- David Roman:

Where the data is. 12
- Kirk L. Kroeker:

Alternate interface technologies emerge. 13-15 - Alex Wright:

Type theory comes of age. 16-17 - Sarah Underwood:

Improving disaster management. 18-20 - ACM Fellows honored. 21

- Martina Angela Sasse

:
Not seeing the crime for the cameras? 22-25
- Dennis P. Groth, Jeffrey K. MacKie-Mason

:
Why an informatics degree? 26-28
- W. Douglas Maughan:

The need for a national cybersecurity research and development agenda. 29-31 - Michel Beaudouin-Lafon:

Open access to scientific publications. 32-34
- George V. Neville-Neil

:
Taking your network's temperature. 35-36
- Dennis E. Shasha:

An interview with Michael Rabin. 37-42 - Eric Saxe:

Power-efficient software. 44-48 - Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev:

Managing contention for shared resources on multicore processors. 49-57 - Steven P. Miller, Michael W. Whalen, Darren D. Cofer:

Software model checking takes off. 58-64 - Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler:

A few billion lines of code later: using static analysis to find bugs in the real world. 66-75 - Eric Benhamou, Jon Eisenberg

, Randy H. Katz:
Assessing the changing U.S. IT R&D ecosystem. 76-83 - Dave Bacon, Wim van Dam:

Recent progress in quantum algorithms. 84-93 - Sanjoy Dasgupta:

Strange effects in high dimension. 96 - Nir Ailon, Bernard Chazelle:

Faster dimension reduction. 97-104 - Shekhar Y. Borkar:

Want to be a bug buster? 105 - Sung-Boem Park, Subhasish Mitra

:
Post-silicon bug localization for processors using IFRA. 106-113
- Peter Winkler:

Breaking chocolate bars. 120
- Dongmin Kim, Izak Benbasat:

Designs for effective implementation of trust assurances in internet stores. 121-126 - Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons:

Reversing the landslide in computer-related degree programs. 127-133 - Tim Chenoweth, Robert P. Minch, Sharon W. Tabor:

Wireless insecurity: examining user security behavior on public networks. 134-138 - Farheen Altaf, David Schuff:

Taking a flexible approach to ASPs. 139-143 - John Minor Ross:

Informatics creativity: a role for abductive reasoning? 144-148 - Damien Joseph

, Soon Ang, Roger H. L. Chang, Sandra Slaughter:
Practical intelligence in IT: assessing soft skills of IT professionals. 149-154 - Vijay K. Gurbani, Anita Garvert, James D. Herbsleb

:
Managing a corporate open source software asset. 155-159 - Nikhil Mehta, Anju Mehta:

It takes two to tango: how relational investments improve IT outsourcing partnerships. 160-164
Volume 53, Number 3, March 2010 (EE)
- Moshe Y. Vardi:

Revisiting the publication culture in computing research. 5
- Too much debate? 6-7

- In the Virtual Extension. 8

- Mark Guzdial

, Judy Robertson
:
Too much programming too soon? 10-11
- David Roman:

Granting a second life. 12
- Gregory Goth:

CS and biology's growing pains. 13-15 - Kirk L. Kroeker:

Engineering the web's third decade. 16-18 - Samuel Greengard:

Tracking garbage. 19-20 - Katayanagi prizes and other CS awards. 21

- Tim Chang:

Gaming will save us all. 22-24
- Pamela Samuelson:

Only technological processes are patentable. 25-27
- Rachelle Hollander:

The ethics beat. 28-29
- Peter J. Denning, Fernando Flores, Peter Luzmore:

Orchestrating coordination in pluralistic networks. 30-32
- Richard A. Tapia:

Hiring and developing minority faculty at research universities. 33-35
- Cameron Wilson, Peter Harsha:

Making the case for computing. 36-38
- Kieron O'Hara

, Nigel Shadbolt:
Privacy on the data web. 39-41
- Kirk McKusick, Sean Quinlan:

GFS: evolution on fast-forward. 42-49 - David J. Brown, Charles Reams:

Toward energy-efficient computing. 50-58 - Sia Siew Kien, Christina Soh, Peter Weill:

Global IT management: structuring for scale, responsiveness, and innovation. 59-64
- Thomas Lengauer, André Altmann

, Alexander Thielen, Rolf Kaiser:
Chasing the AIDS virus. 66-74 - Cameron Seay, Gary Tucker:

Virtual computing initiative at a small public university. 75-83
- Vincent Conitzer:

Making decisions based on the preferences of multiple agents. 84-94
- Daniele Micciancio

:
A first glimpse of cryptography's Holy Grail. 96 - Craig Gentry:

Computing arbitrary functions of encrypted data. 97-105 - Pietro Perona:

Seeing the trees, the forest, and much more. 106 - Antonio Torralba, Kevin P. Murphy, William T. Freeman:

Using the forest to see the trees: exploiting context for visual object detection and localization. 107-114
- Peter Winkler

:
Puzzled. 118 - Ari Juels:

Future tense. 120-
- Fabio Arduini, Vincenzo Morabito:

Business continuity and the banking industry. 121-125 - Sherrie Drye Cannoy, Al F. Salam:

A framework for health care information assurance policy and compliance. 126-131 - Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Jiung-Yee Lee:

Is stickiness profitable for electronic retailers? 132-136 - Ramanath Subramanyam

, Fei Lee Weisstein, Mayuram S. Krishnan:
User participation in software development projects. 137-141 - S. T. Parkinson, Robert M. Hierons

, Mark Lycett
, M. Norman:
Practitioner-based measurement: a collaborative approach. 142-147 - Del Nagy, Areej M. Yassin, Anol Bhattacherjee:

Organizational adoption of open source software: barriers and remedies. 148-151 - John H. Benamati, Zafer D. Ozdemir

, H. Jeff Smith:
Aligning undergraduate IS curricula with industry needs. 152-156 - Hing Kai Chan

:
Agent-oriented embedded electronic measuring systems. 157-162
Volume 53, Number 4, April 2010 (EE)
- Calvin C. Gotlieb, James J. Horning:

The work of ACM's awards committee. 5
- Computing paradigm not a branch of science. 6-7

- In the Virtual Extension. 8

- Michael Stonebraker:

SQL databases v. NoSQL databases. 10-11
- David Roman:

Going mobile. 12
- Alex Wright:

Data streaming 2.0. 13-14 - Gary Anthes:

Robots gear up for disaster response. 15-16 - Samuel Greengard:

Spies among us? 17-19
- Richard Heeks

:
Development 2.0: the IT-enabled transformation of international development. 22-24
- Martin Campbell-Kelly:

Be careful what you wish for. 25-26
- Michael A. Cusumano:

Cloud computing and SaaS as new computing platforms. 27-29
- Paul Ohm:

When network neutrality met privacy. 30-32
- George V. Neville-Neil

:
The data-structure canon. 33-34
- Andy Woods:

Cooling the data center. 36-42 - Mache Creeger:

CTO roundtable: malware defense. 43-49 - Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph

, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia
:
A view of cloud computing. 50-58
- Parthasarathy Ranganathan:

Recipe for efficiency: principles of power-aware computing. 60-67 - Sergey Yekhanin:

Private information retrieval. 68-73
- Sergio Antoy, Michael Hanus

:
Functional logic programming. 74-85
- Padhraic Smyth

, Charles Elkan:
Technical perspective - Creativity helps influence prediction precision. 88 - Yehuda Koren:

Collaborative filtering with temporal dynamics. 89-97 - Leslie Pack Kaelbling:

Technical perspective - New bar set for intelligent vehicles. 98 - Sebastian Thrun:

Toward robotic cars. 99-106
- Leah Hoffmann:

Q&A. 112
- Pak-Lok Poon

, Sau-Fun Tang, T. H. Tse
, Tsong Yueh Chen
:
CHOC'LATE: a framework for specification-based testing. 113-118 - Robert J. Aalberts, Percy Poon, Paul D. Thistle:

A tale of two internet service providers. 119-123 - Keith Wright:

Capstone programming courses considered harmful. 124-127 - Surya Rebbapragada, Amit Basu, John Semple:

Data mining and revenue management methodologies in college admissions. 128-133 - Dawn G. Gregg

:
Designing for collective intelligence. 134-138 - Stefano Ferretti

, Marco Furini
, Claudio E. Palazzi
, Marco Roccetti
, Paola Salomoni:
WWW recycling for a better world. 139-143 - Rhoda C. Joseph:

Individual resistance to IT innovations. 144-146
Volume 53, Number 5, May 2010 (EE)
- Moshe Y. Vardi:

Globalization and Offshoring of Software revisited. 5
- Roots of publication delay. 6-7

- In the Virtual Extension. 8

- Jeannette M. Wing, Daniel Reed:

NSF funding advice: 21st century innovation. 10-11
- David Roman:

Looking for control. 12
- Jeff Kanipe:

Modeling the astronomical. 13-15 - Gary Anthes:

Happy Birthday, RDBMS! 16-17 - Samuel Greengard:

Cloud computing and developing nations. 18-20 - Jack Rosenberger:

Thacker wins Turing Award. 21
- ACM's 2010 general election. 23-31

- Erik Brynjolfsson, Paul Hofmann, John Jordan:

Cloud computing and electricity: beyond the utility model. 32-34
- Cameron Wilson, Mark Guzdial

:
How to make progress in computing education. 35-37
- Roman Beck:

Can IT lean against the wind? 38-40 - Ofir Turel

, Alexander Serenko
:
Is mobile email addiction overlooked? 41-43
- William Aspray:

Great computing museums of the world, part two. 45-49
- Peter Phillips:

Enhanced debugging with traces. 50-53 - Julien Ridoux, Darryl Veitch:

Principles of robust timing over the internet. 54-61 - Dave Durkee:

Why cloud computing will never be free. 62-69
- Abigail Sellen, Steve Whittaker:

Beyond total capture: a constructive critique of lifelogging. 70-77 - Clayton H. Lewis, Michele H. Jackson

, William M. Waite
:
Student and faculty attitudes and beliefs about computer science. 78-85
- Susanne Albers:

Energy-efficient algorithms. 86-96
- Peter L. Bartlett

:
Learning to act in uncertain environments: technical perspective. 98 - Kuzman Ganchev, Yuriy Nevmyvaka, Michael J. Kearns, Jennifer Wortman Vaughan:

Censored exploration and the dark pool problem. 99-107 - Mark Harman

:
Automated patching techniques: the fix is in: technical perspective. 108 - Westley Weimer, Stephanie Forrest

, Claire Le Goues
, ThanhVu Nguyen:
Automatic program repair with evolutionary computation. 109-116
- Peter Winkler:

Puzzled. 120
- Paul P. Tallon

:
Understanding the dynamics of information management costs. 121-125 - Blaize Horner Reich, Chris Sauer:

Roles of the external IT project manager. 126-129 - Wonil Hwang, Gavriel Salvendy:

Number of people required for usability evaluation: the 10+/-2 rule. 130-133 - Charles E. Downing:

Is web-based supply chain integration right for your company? 134-137 - Demin Wang, Dharma P. Agrawal, Wassana Toruksa, Chaichana Chaiwatpongsakorn, Mingming Lu, Tim C. Keener:

Monitoring ambient air quality with carbon monoxide sensor-based wireless network. 138-141 - Theophanis C. Stratopoulos

, Jee-Hae Lim:
IT innovation persistence: an oxymoron? 142-146 - E. Vance Wilson

, Bengisu Tulu:
The rise of a health-IT academic focus. 147-150 - Hyeyoung Kim, Jae-Nam Lee, Jaemin Han:

The role of IT in business ecosystems. 151-156
Volume 53, Number 6, June 2010 (EE)
- Patricia Ryan:

A tour of ACM's HQ. 5
- Workflow tools for distributed teams? 6-7

- In the Virtual Extension. 8

- Greg Linden, Ed H. Chi, Mark Guzdial

:
The chaos of the internet as an external brain; and more. 10-11
- David Roman:

Interact naturally. 12
- Neil Savage

:
Straightening out heavy tails. 13-15 - Tom Geller:

Beyond the smart grid. 16-17 - Leah Hoffmann:

Mine your business. 18-19 - Leah Hoffmann:

Robin Milner: the elegant pragmatist. 20-21 - Jack Rosenberger:

CS and technology leaders honored. 22
- Arvind Narayanan, Vitaly Shmatikov:

Myths and fallacies of "personally identifiable information". 24-26
- Stuart S. Shapiro:

Privacy by design: moving from art to practice. 27-29
- Peter J. Denning, Jack B. Dennis:

The resurgence of parallelism. 30-32
- George V. Neville-Neil

:
Plotting away. 33-34
- François Lévêque:

Intel's rebates: above board or below the belt? 35-37
- Simson L. Garfinkel

, Lorrie Faith Cranor
:
Institutional review boards and your research. 38-40
- Len Shustek:

An interview with Ed Feigenbaum. 41-45
- Dustin Owens:

Securing elasticity in the cloud. 46-51 - George Phillips:

Simplicity betrayed. 52-58 - Jeffrey Heer, Michael Bostock, Vadim Ogievetsky:

A tour through the visualization zoo. 59-67
- Anastasia Ailamaki, Verena Kantere, Debabrata Dash:

Managing scientific data. 68-78 - Jilin Chen, Joseph A. Konstan

:
Conference paper selectivity and impact. 79-83
- Kristen Grauman:

Efficiently searching for similar images. 84-94
- Vivek Sarkar:

Building confidence in multicore software. 96 - Jacob Burnim, Koushik Sen:

Asserting and checking determinism for multithreaded programs. 97-105 - K. Rustan M. Leino:

Learning to do program verification. 106 - Gerwin Klein

, June Andronick, Kevin Elphinstone, Gernot Heiser, David A. Cock
, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish
, Thomas Sewell, Harvey Tuch, Simon Winwood:
seL4: formal verification of an operating-system kernel. 107-115
- Peter Winkler:

Puzzled. 118 - David Brin:

Future tense. 120-
- Jun Sun

, Marshall Scott Poole:
Beyond connection: situated wireless communities. 121-125 - Sergio de Cesare, Mark Lycett

, Robert D. Macredie
, Chaitali Patel, Ray J. Paul:
Examining perceptions of agility in software development practice. 126-130 - Alexander Nill, John Schibrowsky, James W. Peltier:

Factors that influence software piracy: a view from Germany. 131-134 - Jan Kietzmann

, Ian O. Angell:
Panopticon revisited. 135-138 - Benoit Baudry, Sudipto Ghosh, Franck Fleurey, Robert B. France, Yves Le Traon

, Jean-Marie Mottu:
Barriers to systematic model transformation testing. 139-143 - Kevin P. Gallagher, Kate M. Kaiser, Judith C. Simon, Cynthia Mathis Beath, Tim Goles:

The requisite variety of skills for IT professionals. 144-148 - Sandra A. Vannoy, Prashant Palvia:

The social influence model of technology adoption. 149-153 - Cheul Rhee

, G. Lawrence Sanders, Natalie C. Simpson
:
I, myself and e-myself. 154-157
Volume 53, Number 7, July 2010 (EE)
- Moshe Y. Vardi:

Hypercriticality. 5
- Don't ignore security offshore, or in the cloud. 6-7

- In the Virtual Extension. 9

- Ruben Ortega, Mark Guzdial

, Daniel Reed:
Software development and crunch time; and more. 10-11
- David Roman:

In case you missed it. 12
- David Lindley:

Sharing computational perspectives. 13-15 - Samuel Greengard:

Censored! 16-18 - Kirk L. Kroeker:

Mainstreaming augmented reality. 19-21 - Gary Anthes:

Committed to success. 22-23 - Gregory Goth:

Eric Brewer: change agent. 24 - Sarah Underwood:

Visions of the future. 25
- Mari Sako:

Outsourcing versus shared services. 27-29
- Jason Borenstein:

Work life in the robotic age. 30-31
- Pamela Samuelson:

Should the Google book settlement be approved? 32-34
- Valerie E. Taylor:

Cultivating cultural diversity in information technology. 35-36
- Gonzalo Génova

:
Is computer science truly scientific? 37-39
- Marc Snir, Telle Whitney:

Advice to members seeking ACM distinction. 40-41
- Eugene Loh:

The ideal HPC programming language. 42-47 - Brendan Gregg:

Visualizing system latency. 48-54 - Poul-Henning Kamp:

You're doing it wrong. 55-59
- Gary Lewandowski, Dennis J. Bouvier

, Tzu-Yi Chen, Robert McCartney, Kate Sanders, Beth Simon, Tammy VanDeGrift:
Commonsense understanding of concurrency: computing students and concert tickets. 60-70 - Takeo Igarashi:

Computer graphics for all. 71-77
- Tim Roughgarden:

Algorithmic game theory. 78-86
- Hans-Juergen Boehm:

A solid foundation for x86 shared memory: technical perspective. 88 - Peter Sewell

, Susmit Sarkar
, Scott Owens
, Francesco Zappa Nardelli, Magnus O. Myreen:
x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors. 89-97 - Mary Jane Irwin:

Technology scaling redirects main memories: technical perspective. 98 - Benjamin C. Lee, Engin Ipek, Onur Mutlu, Doug Burger:

Phase change memory architecture and the quest for scalability. 99-106
- Leah Hoffmann:

Q&A. 112-
- Yurong Yao, Edward F. Watson, Beverly K. Kahn:

Application service providers: market and adoption decisions. 113-117 - Jorge A. Romero, Nirup M. Menon

, Rajiv D. Banker, Mark C. Anderson:
ERP: drilling for profit in the oil and gas industry. 118-121 - Wei-Lun Chang

, Soe-Tsyr Yuan, Carol W. Hsu:
Creating the experience economy in e-commerce. 122-127 - Oded Nov, Chen Ye:

Why do people tag?: motivations for photo tagging. 128-131 - Domenico Talia

, Paolo Trunfio
:
How distributed data mining tasks can thrive as knowledge services. 132-137 - Alan R. Dennis, Thomas M. Duffy, Hasan Çakir:

IT programs in high schools: lessons from the Cisco Networking Academy program. 138-141 - John C. Ruhnka, John W. Bagby:

Using ESI discovery teams to manage electronic data discovery. 142-144
Volume 53, Number 8, August 2010 (EE)
- Victor Vianu:

JACM at the start of a new decade. 5 - In the Virtual Extension. 6

- CS expertise for institutional review boards. 7

- Greg Linden, Michael S. Bernstein, Erika Shehan Poole:

The war against spam: and more. 8-9
- David Roman:

Print is not just ink anymore. 10
- Gary Anthes:

Mechanism design meets computer science. 11-13 - Kirk L. Kroeker:

Looking beyond stereoscopic 3D's revival. 14-16 - Sarah Underwood:

Making sense of real-time behavior. 17-18 - Kirk L. Kroeker:

Celebrating the legacy of PLATO. 19-20 - Jack Rosenberger:

Gödel Prize and other CS awards. 21
- Christopher S. Yoo:

Is the Internet a maturing market? 24-26
- David S. Touretzky

:
Preparing computer science students for the robotics revolution. 27-29
- George V. Neville-Neil

:
Presenting your project. 33-34
- Eugene H. Spafford

:
Remembrances of things pest. 35-37
- Samir Chopra:

Rights for autonomous artificial agents? 38-40
- Thomas J. Misa:

An interview with Edsger W. Dijkstra. 41-47
- Robert DeLine, Gina Venolia, Kael Rowan:

Software development with code maps. 48-54 - Mache Creeger:

Moving to the edge: a CTO roundtable on network virtualization. 55-62 - Jan Damsgaard, Jan Karlsbjerg:

Seven principles for selecting software packages. 63-71
- James R. Larus, Galen C. Hunt:

The Singularity system. 72-79 - Gábor Szabó, Bernardo A. Huberman:

Predicting the popularity of online content. 80-88
- Sarita V. Adve, Hans-Juergen Boehm:

Memory models: a case for rethinking parallel languages and hardware. 90-101
- Helen J. Wang:

Attacks target Web server logic and prey on XCS weaknesses: technical persepctive. 104 - Hristo Bojinov, Elie Bursztein, Dan Boneh:

The emergence of cross channel scripting. 105-113 - Fritz Henglein:

Large-scale sound and precise program analysis: technical persepctive. 114 - Isil Dillig, Thomas Dillig, Alex Aiken

:
Reasoning about the unknown in static analysis. 115-123
- Peter Winkler:

Puzzled. 128
- Wei-Fung Tung, Soe-Tsyr Yuan:

Intelligent service machine. 129-134 - Marc N. Haines, Marcus A. Rothenberger:

How a service-oriented architecture may change the software development process. 135-140 - Eugenio Tisselli:

thinkflickrthink: a case study on strategic tagging. 141-145 - Lutz Prechelt

:
Plat_Forms: is there one best web development technology? 146-149
Volume 53, Number 9, September 2010 (EE)
- Moshe Y. Vardi:

Science has only two legs. 5
- More than one way to annotate metadata. 7

- Ed H. Chi, Ruben Ortega:

Expanding CS education; improving software development. 8-9
- David Roman:

More Communications. 12
- David Lindley:

Brains and bytes. 13-15 - Neil Savage

:
Cycling through data. 16-17 - Marina Krakovsky:

Degrees, distance, and dollars. 18-19 - Tom Geller:

ACM China nearing launch. 20 - Jack Rosenberger:

Kyoto prize and other CS awards. 21
- Phillip G. Armour:

Return at risk. 23-25
- Robert A. Hillman, Maureen A. O'Rourke

:
Principles of the law of software contracts. 26-28
- Peter J. Denning, Dorothy E. Denning:

Discussing cyber attack. 29-31
- Mordechai Ben-Ari:

Objects never?: well, hardly ever! 32-35
- Jennifer Rexford

, Constantine Dovrolis:
Future Internet architecture: clean-slate versus evolutionary research. 36-40
- Stephen V. Cantrill:

Computers in patient care: the promise and the challenge. 42-47 - Steve Chessin:

Injecting errors for fun and profit. 48-54 - Cary V. Millsap:

Thinking clearly about performance, part 1. 55-60
- Dag I. K. Sjøberg:

Confronting the myth of rapid obsolescence in computing research. 62-67 - Joe Armstrong:

Erlang. 68-75
- Christel Baier, Boudewijn R. Haverkort

, Holger Hermanns
, Joost-Pieter Katoen
:
Performance evaluation and model checking join forces. 76-85
- Johannes Gehrke

:
Programming with differential privacy: technical persepctive. 88 - Frank McSherry:

Privacy integrated queries: an extensible platform for privacy-preserving data analysis. 89-97 - Mark Jerrum:

Constraint satisfaction problems and computational complexity: technical persepctive. 98 - Andrei A. Bulatov, Dániel Marx

:
Constraint satisfaction problems and global cardinality constraints. 99-106
- Peter Winkler

:
Puzzled. 110 - Greg Bear:

Future tense. 112-
Volume 53, Number 10, October 2010 (EE)
- Alain Chesnais:

ACM is built on volunteers' shoulders. 5
- How to celebrate Codd's RDBMS vision. 7

- Michael Stonebraker:

In search of database consistency. 8-9
- David Roman:

The mobile road ahead. 10
- Alex Wright:

Linear logic. 11-13 - Graeme Stemp-Morlock:

Personal fabrication. 14-15 - Dennis McCafferty:

Should code be released? 16-17
- Martin Campbell-Kelly:

Victorian data processing. 19-21
- Michael A. Cusumano:

Platforms and services: understanding the resurgence of Apple. 22-24
- David Lorge Parnas:

Risks of undisciplined development. 25-27
- George V. Neville-Neil

:
Version aversion. 28-29
- Michael W. Hicks, Jeffrey S. Foster:

SCORE: agile research group management. 30-31
- Photoshop scalability: keeping it simple. 32-38

- Cary V. Millsap:

Thinking clearly about performance, part 2. 39-45 - Kevin Montagne:

Tackling architectural complexity with modeling. 46-52
- Thomas Serre, Tomaso A. Poggio:

A neuromorphic approach to computer vision. 54-61 - Prasanna Tambe, Lorin M. Hitt:

How offshoring affects IT workers. 62-70
- Rodrigo Rodrigues

, Peter Druschel:
Peer-to-peer systems. 72-82
- Carl A. Waldspurger:

A VM 'Engine' that makes a difference: technical perspective. 84 - Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:

Difference engine: harnessing memory redundancy in virtual machines. 85-93 - Yair Weiss, Judea Pearl:

Belief propagation: technical perspective. 94 - Erik B. Sudderth

, Alexander T. Ihler
, Michael Isard, William T. Freeman, Alan S. Willsky:
Nonparametric belief propagation. 95-103
- Leah Hoffmann:

Q&A. 112-
Volume 53, Number 11, November 2010 (EE)
- Moshe Y. Vardi:

On P, NP, and computational complexity. 5
- How to think about objects. 6-7

- In the Virtual Extension. 9

- Tessa Lau:

Rethinking the systems review process. 10-11
- David Roman:

A preference for PDF. 12
- Gregory Goth:

Turning data into knowledge. 13-15 - Gary Anthes:

Security in the cloud. 16-18 - Leah Hoffmann:

Career opportunities. 19-21 - Neil Savage

:
Wide open spaces. 23
- Pablo Boczkowski:

The divergent online news preferences of journalists and readers. 24-25
- Stephen Cooper, Lance C. Pérez

, Daphne Rainey:
K--12 computational learning. 27-29
- Pamela Samuelson:

Why do software startups patent (or not)? 30-32
- Joel F. Brenner:

Why isn't cyberspace more secure? 33-35
- Matt Welsh:

Sensor networks for the sciences. 36-39
- Brian W. Fitzpatrick, J. J. Lueck:

The case against data lock-in. 42-46 - David S. H. Rosenthal:

Keeping bits safe: how hard can it be? 47-55 - Poul-Henning Kamp:

Sir, please step away from the ASR-33! 56-57
- Michael Garland, David Blair Kirk:

Understanding throughput-oriented architectures. 58-66 - Patrick Vogl, Michael I. Barrett:

Regulating the information gatekeepers. 67-72
- Piotr Faliszewski

, Edith Hemaspaandra, Lane A. Hemaspaandra
:
Using complexity to protect elections. 74-82
- Sarita V. Adve:

Data races are evil with no exceptions: technical perspective. 84 - Tayfun Elmas, Shaz Qadeer, Serdar Tasiran:

Goldilocks: a race-aware Java runtime. 85-92 - Cormac Flanagan, Stephen N. Freund

:
FastTrack: efficient and precise dynamic race detection. 93-101
- Peter Winkler

:
Puzzled. 112
- Duncan A. Buell

:
In support of computer science teachers and the CSTA. 113-115
- Massimo Ficco, Roberto Pietrantuono

, Stefano Russo
:
Supporting ubiquitous location information in interworking 3G and wireless networks. 116-123 - Jill Freyne, Lorcan Coyle, Barry Smyth, Padraig Cunningham

:
Relative status of journal and conference publications in computer science. 124-132
Volume 53, Number 12, December 2010 (EE)
- David A. Patterson:

Diverse connections. 5
- Science has four legs. 6-7

- In the Virtual Extension. 9

- Greg Linden, Jason I. Hong

, Mark Guzdial
:
Security advice; malvertisements; and CS education in Qatar. 10-11
- David Roman:

School grades need improvement. 12
- Gregory Goth:

The eyes have it. 13-15 - Gary Anthes:

Topic models vs. unstructured data. 16-18 - Marina Krakovsky:

CSEdWeek expands its reach. 19 - Samuel Greengard:

The new face of war. 20-22 - David Lindley:

A matter of privacy. 23
- Seymour E. Goodman, Andrew Harris:

The coming African Tsunami of information insecurity. 24-27
- Mark Smotherman, Dag Spicer

:
IBM's single-processor supercomputer efforts. 28-30
- Ann Q. Gates:

The role of Hispanic-serving institutions in contributing to an educated work force. 31-33
- Peter J. Denning, Robert E. Kahn:

The long quest for universal information access. 34-36
- George V. Neville-Neil

:
Literate coding. 37-38
- Francine Berman:

We need a research data census. 39-41
- A conversation with Ed Catmull. 42-47

- Mache Creeger:

The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness. 48-55
- Zhong Shao

:
Certified software. 56-66 - Stephen J. Andriole:

Business impact of Web 2.0 technologies. 67-79
- Adnan Darwiche:

Bayesian networks. 80-90
- Michael Elad

, Raja Giryes
:
Iterative signal recovery from incomplete samples: technical perspective. 92 - Deanna Needell, Joel A. Tropp

:
CoSaMP: iterative signal recovery from incomplete and inaccurate samples. 93-100 - Scott Aaronson:

QIP = PSPACE breakthrough: technical perspective. 101 - Rahul Jain

, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous:
QIP = PSPACE. 102-109
- Peter Winkler

:
Puzzled: Solutions and sources. 126 - Rumilisoun:

Future tense: Rebirth of worlds. 128-
- Massimo Franceschet:

The role of conference publications in CS. 129-132 - Barry M. Lunt, Joseph J. Ekstrom, Han Reichgelt

, Michael Bailey, Richard J. LeBlanc:
IT 2008: the history of a new computing discipline. 133-141 - Ralph A. Morelli, Chamindra de Silva, Trishan R. de Lanerolle, Rebecca Curzon, Xin Sheng Mao:

A global collaboration to deploy help to China. 142-149

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














