default search action
Communications of the ACM (CACM), Volume 52, 2009
Volume 52, Number 1, January 2009 (EE)
- Moshe Y. Vardi:
How are we doing? 5
- True seeds of open source software. 6
- David Roman:
Communications preps web-enhanced articles. 8
- David Lindley:
Calculating the future. 9-11 - Jeff Kanipe:
The universe in your computer. 12-14 - Alex Wright:
Get smart. 15-16 - Michael Ross:
A pioneer woman. 17
- Jonathan Zittrain:
Law and technology: The end of the generative internet. 18-20 - Alex E. Bell:
From the front lines: Ground control to Architect Tom…. 21-22 - Phillip G. Armour:
The business of software: The ontology of paper. 23-24 - Michael A. Cusumano:
Technology strategy and management: The legacy of Bill Gates. 25-26 - Jon Crowcroft, Srinivasan Keshav, Nick McKeown:
Viewpoint: Scaling the academic publication process to internet scale. 27-30
- Stuart I. Feldman:
ACM's annual report. 33-37
- Werner Vogels:
Eventually consistent. 40-44 - John R. Mashey:
The long road to 64 bits. 45-53
- Tapan S. Parikh:
Engineering rural development. 54-63 - Dawn N. Jutla, Dimitri Kanevsky:
wisePad services for vision-, hearing-, and speech-impaired users. 64-69
- Joan Feigenbaum, David C. Parkes, David M. Pennock:
Computational challenges in e-commerce. 70-74
- Harry Shum:
Technical perspective: Customizing media to displays. 76 - Ariel Shamir, Shai Avidan:
Seam carving for media retargeting. 77-85 - Jeffrey Heer, Fernanda B. Viégas, Martin Wattenberg:
Voyagers and voyeurs: Supporting asynchronous collaborative visualization. 87-97
- Erik T. Mueller:
Automating commonsense reasoning using the event calculus. 113-117 - Nanda Kumar, Roumen Vragov:
Active citizen participation using ICT tools. 118-121 - Yogesh Kumar Dwivedi, Zahir Irani:
Understanding the adopters and non-adopters of broadband. 122-125 - Allen C. Johnston, Ron Hale:
Improved security through information security governance. 126-129 - Judith Gebauer, Mark Ginsburg:
Exploring the black box of task-technology fit. 130-135 - Hillol Bala, Viswanath Venkatesh, Srinivasan Venkatraman, Jack Bates, Steven H. Brown:
Disaster response in health care: A design extension for enterprise data warehouse. 136-140 - Parag C. Pendharkar, James A. Rodger:
The relationship between software development team size and software development cost. 141-144 - Carol Xiaojuan Ou, Robert M. Davison:
Technical opinion: Why eBay lost to TaoBao in China: the global advantage. 145-148
Volume 52, Number 2, February 2009 (EE)
- Eugene H. Spafford:
USACM's policy role. 5
- Seven principles for secure e-voting. 8-9
- David Roman:
The dot-org difference. 10
- Kirk L. Kroeker:
Photography's bright future. 11-13 - Alex Wright:
Making sense of sensors. 14-15 - Samuel Greengard:
The first internet president. 16-18 - Kirk L. Kroeker:
SIGGRAPH debuts in Asia. 19
- Ashish Arora, Matej Drev, Chris Forman:
Economic and business dimensions - The extent of globalization of software innovation. 20-22 - George H. L. Fletcher, James J. Lu:
Education - Human computing skills: rethinking the K-12 experience. 23-25 - Kristina Irion:
Privacy and security - International communications surveillance. 26-28 - Peter G. Neumann:
Inside risks - U.S. election after-math. 29 - Barbara van Schewick, David Farber:
Point/Counterpoint - Network neutrality nuances. 31-37
- Ulrich Drepper:
Parallel programming with transactional memory. 38-43 - Tom Leighton:
Improving performance on the internet. 44-51
- T. V. Raman:
Toward 2W, beyond web 2.0. 52-59 - Mary W. Hall, David A. Padua, Keshav Pingali:
Compiler research: the next 50 years. 60-67
- Maria M. Klawe, Telle Whitney, Caroline Simard:
Women in computing - take 2. 68-76
- Dan S. Wallach:
Technical perspective - Tools for information to flow securely and Swift-ly. 78 - Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng:
Building secure web applications with automatic partitioning. 79-87 - Ehud Kalai:
Technical perspective - The complexity of computing Nash equilibrium. 88 - Constantinos Daskalakis, Paul W. Goldberg, Christos H. Papadimitriou:
The complexity of computing a Nash equilibrium. 89-97
- Peter Winkler:
Puzzled - Will my algorithm terminate? 104
- Pamela E. Carter, Gina Green:
Networks of contextualized data: a framework for cyberinfrastructure data management. 105-109 - Xiao-Bai Li, Luvai F. Motiwalla:
For sale by owner online: who gets the saved commission? 110-114 - Ergin Elmacioglu, Dongwon Lee:
Oracle, where shall I submit my papers? 115-118 - Shlomo Argamon, Moshe Koppel, James W. Pennebaker, Jonathan Schler:
Automatically profiling the author of an anonymous text. 119-123 - Sandy Behrens:
Shadow systems: the good, the bad and the ugly. 124-129 - Arik Ragowsky, David Gefen:
Why IS management is in trouble and how to save it: lessons learned in the automotive industry. 130-133 - M. Eric Johnson, Dan McGuire, Nicholas D. Willey:
Why file sharing networks are dangerous? 134-138 - Raquel Benbunan-Fich, Gregory E. Truman:
Technical opinion - Multitasking with laptops during meetings. 139-141
Volume 52, Number 3, March 2009 (EE)
- Moshe Y. Vardi:
"Yes, it can be done". 5
- Scott E. Delman:
Communications' web site to launch in March. 7
- Children's magic won't deliver the semantic web. 8-9
- David Roman:
Prepare for launch. 12
- Gregory Goth:
Betting on ideas. 13-15 - Leah Hoffmann:
Crowd control. 16-17 - Kirk L. Kroeker:
The evolution of virtualization. 18-20 - Karen A. Frenkel:
A difficult, unforgettable idea. 21 - ACM Fellows honored. 22
- Peter J. Denning, Richard D. Riehle:
The profession of IT - Is software engineering engineering? 24-26 - Pamela Samuelson:
Legally speaking - When is a "license" really a sale? 27-29 - David A. Patterson:
Viewpoint - Your students are your legacy. 30-33 - Jeffrey D. Ullman:
Viewpoint - Advising students for success. 34-37 - Len Shustek:
Interview - An interview with C.A.R. Hoare. 38-41
- Walker M. White, Christoph Koch, Johannes Gehrke, Alan J. Demers:
Better scripts, better games. 42-47 - Jim Larson:
Erlang for concurrent programming. 48-56
- Abigail Sellen, Yvonne Rogers, Richard H. R. Harper, Tom Rodden:
Reflecting human values in the digital age. 58-66 - David Harel:
Statecharts in the making: a personal account. 67-75
- Madhu Sudan:
Probabilistically checkable proofs. 76-84
- Daniel A. Spielman:
Technical perspective - The beauty of error-correcting codes. 86 - Venkatesan Guruswami, Atri Rudra:
Error correction up to the information-theoretic limit. 87-95 - Bud Mishra:
Technical perspective - Where biology meets computing. 96 - Radu Grosu, Scott A. Smolka, Flavio Corradini, Anita Wasilewska, Emilia Entcheva, Ezio Bartocci:
Learning and detecting emergent behavior in networks of cardiac myocytes. 97-105
- Peter Winkler:
Puzzled - Solutions and sources. 111 - Joel Garreau:
Future tense - Radical evolution. 112-
- Alexandre Sacchi, Emerson Giannini, Regiane Bochic, Nicolau Reinhard, Alexandre B. Lopes:
Digital inclusion with the McInternet: would you like fries with that? 113-116 - Clyde W. Holsapple:
A new map for knowledge dissemination channels. 117-125 - Mary J. Culnan, Thomas J. Carlin:
Online privacy practices in higher education: making the grade? 126-130 - Kenneth R. Fleischmann, William A. Wallace:
Ensuring transparency in computational modeling. 131-134 - Florian Mann, Benedikt von Walter, Thomas Hess, Rolf T. Wigand:
Open access publishing in science. 135-139 - Greg Linden, Kenneth L. Kraemer, Jason L. Dedrick:
Who captures value in a global innovation network?: the case of Apple's iPod. 140-144 - Anna Formica:
Concept similarity by evaluating information contents and feature vectors: a combined approach. 145-149 - Alfred Loo:
Technical opinion - Security threats of smart phones and Bluetooth. 150-152
Volume 52, Number 4, April 2009 (EE)
- Andrew D. McGettrick:
Computing education matters. 5
- What role for computer science in the war on terror? 9
- David Roman:
An ongoing study in usability. 10
- Graeme Stemp-Morlock:
Learning more about active learning. 11-13 - Alex Wright:
Our sentiments, exactly. 14-15 - David Essex:
Did somebody say virtual colonoscopy? 16-18 - Bob Violino:
Time to reboot. 19 - Alan Joch:
IT ecosystem in peril. 20
- Richard Heeks:
Emerging markets - IT and the world's "bottom billion". 22-24 - George V. Neville-Neil:
Kode vicious - System changes and side effects. 25-26 - Michael A. Cusumano:
Technology strategy and management - Strategies for difficult (and Darwinian) economic times. 27-28 - Michael Buckley:
Viewpoint - Computing as social science. 29-30 - Bertrand Meyer, Christine Choppy, Jørgen Staunstrup, Jan van Leeuwen:
Viewpoint - Research evaluation for computer science. 31-34
- Mike Shapiro:
Purpose-built languages. 36-41 - Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis:
Cybercrime 2.0: when the cloud turns dark. 42-47 - Chris Richardson:
ORM in dynamic languages. 48-55
- Gerhard Weikum, Gjergji Kasneci, Maya Ramanath, Fabian M. Suchanek:
Database and information-retrieval methods for knowledge discovery. 56-64 - Samuel Williams, Andrew Waterman, David A. Patterson:
Roofline: an insightful visual performance model for multicore architectures. 65-76
- Daniel Jackson:
A direct path to dependable software. 78-88
- Arif Merchant:
Technical perspective - Disk array models for automating storage management. 90 - Michael P. Mesnier, Matthew Wachs, Raja R. Sambasivan, Alice X. Zheng, Gregory R. Ganger:
Relative fitness modeling. 91-96 - Goetz Graefe:
Technical perspective - Integrating flash devices. 97 - David Roberts, Taeho Kgil, Trevor N. Mudge:
Integrating NAND flash devices onto servers. 98-103
- Leah Hofmann:
Q&A - Our dame commander. 112-
- Jay F. Nunamaker Jr., Bruce A. Reinig, Robert O. Briggs:
Principles for effective virtual teamwork. 113-117 - Maris G. Martinsons, Robert M. Davison, Valdis Martinsons:
How culture influences IT-enabled organizational change and information systems. 118-123 - Gee-Woo Bock, Swee Ling Ho:
Non-work related computing (NWRC). 124-128 - Kevin P. Scheibe, James C. McElroy, Paula C. Morrow:
Object language and impression management. 129-131 - France Bélanger, Lemuria D. Carter:
The impact of the digital divide on e-government use. 132-135 - Zeinab Karake Shalhoub:
Analysis of industry-specific concentration of CPOs in Fortune 500 companies. 136-141 - Paulo B. Góes, Yanbin Tu, Y. Alex Tung:
Technical opinion - Online auctions hidden metrics. 147-149
Volume 52, Number 5, May 2009 (EE)
- Moshe Y. Vardi:
Conferences vs. journals in computing research. 5
- Logic of lemmings in compiler innovation. 7-9
- Recommendation algorithms, online privacy, and more. 10-11
- David Roman:
The print-web partnership turns the page. 12
- Kirk L. Kroeker:
Rethinking signal processing. 13-15 - David Essex:
Matchmaker, matchmaker. 16-17 - Samuel Greengard:
Learning goes global. 18-19 - Liskov wins Turing award. 21
- Pierre Larouche:
Law and technology - The network neutrality debate hits Europe. 22-24 - LeAnne Coder, Joshua L. Rosenbloom, Ronald A. Ash, Brandon R. Dupont:
Economic and business dimensions - Increasing gender diversity in the IT work force. 25-27 - Martin Campbell-Kelly:
Historical reflections - The rise, fall, and resurrection of software as a service. 28-30 - Mark Guzdial:
Education - Teaching computing to everyone. 31-33 - Ken Birman, Fred B. Schneider:
Viewpoint - Program committee overload in systems. 34-37
- Thomas Wadlow, Vlad Gorelik:
Security in the browser. 40-45 - Michi Henning:
API design matters. 46-56 - Eric Schrock:
Debugging AJAX in production. 57-60
- James R. Larus:
Spending Moore's dividend. 62-69 - Edward A. Lee:
Computing needs time. 70-79
- Corrado Priami:
Algorithmic systems biology. 80-88
- Ross J. Anderson:
Technical perspective - A chilly sense of security. 90 - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest we remember: cold-boot attacks on encryption keys. 91-98 - Maurice Herlihy:
Technical perspective - Highly concurrent data structures. 99 - William N. Scherer III, Doug Lea, Michael L. Scott:
Scalable synchronous queues. 100-111
- Peter Winkler:
Puzzled - Understanding relationships among numbers. 112
- J. Drew Procaccino, June M. Verner:
Software developers' views of end-users and project success. 113-116 - Karlene Cousins, Upkar Varshney:
Designing ubiquitous computing environments to support work life balance. 117-123 - Stuart Diaz Galup, Ronald Dattero, Jim J. Quan, Sue A. Conger:
An overview of IT service management. 124-127 - Robert K. Plice, Nigel P. Melville, Oleg V. Pavlov:
Toward an information-compatible anti-spam strategy. 128-130 - James A. McCart, Varol O. Kayhan, Anol Bhattacherjee:
Cross-bidding in simultaneous online auctions. 131-134 - Carol Xiaojuan Ou, Choon-Ling Sia:
To trust or to distrust, that is the question: investigating the trust-distrust paradox. 135-139 - Gary W. Brock, Denise Johnson McManus, Joanne E. Hale:
Reflections today prevent failures tomorrow. 140-144 - Michael Rebstock:
Technical opinion - Semantic ambiguity: Babylon, Rosetta or beyond? 145-146
Volume 52, Number 6, June 2009 (EE)
- Elaine J. Weyuker:
ACM-W celebrates women in computing. 5
- Share the threats. 9
- Tessa Lau, Daniel Reed:
Speech-activated user interfaces and climbing Mt. Exascale. 10-11
- David Roman:
Making that connection. 12
- Don Monroe:
Micromedicine to the rescue. 13-15 - Leah Hoffmann:
Content control. 16-17 - Gregory Goth:
Autonomous helicopters. 18-20 - Bob Violino:
Looking backward and forward. 21
- Eugene H. Spafford:
Privacy and security - Answering the wrong questions is no answer. 22-24 - Kevin Fu:
Inside risks - Reducing risks of implantable medical devices. 25-27 - Peter J. Denning:
The profession of IT - Beyond computational thinking. 28-30 - Richard M. Stallman:
Viewpoint - Why "open source" misses the point of free software. 31-33 - George V. Neville-Neil:
Kode vicious - Obvious truths. 34-35
- Jon G. Elerath:
Hard-disk drives: the good, the bad, and the ugly. 38-45 - Mike O'Dell:
Network front-end processors, yet again. 46-50 - George V. Neville-Neil:
Whither sockets? 51-55
- Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, AnHai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Henry F. Korth, Donald Kossmann, Samuel Madden, Roger Magoulas, Beng Chin Ooi, Tim O'Reilly, Raghu Ramakrishnan, Sunita Sarawagi, Michael Stonebraker, Alexander S. Szalay, Gerhard Weikum:
The Claremont report on database research. 56-65 - Kenneth L. Kraemer, Jason L. Dedrick, Prakul Sharma:
One laptop per child: vision vs. reality. 66-73
- M. Bernardine Dias, Eric A. Brewer:
How computer science serves the developing world. 74-80
- Andrew C. Myers:
Technical perspective - Reframing security for the web. 82 - Adam Barth, Collin Jackson, John C. Mitchell:
Securing frame communication in browsers. 83-91 - Norman P. Jouppi:
Technical perspective - Software and hardware support for deterministic replay of parallel programs. 92 - Derek Hower, Pablo Montesinos, Luis Ceze, Mark D. Hill, Josep Torrellas:
Two hardware-based approaches for deterministic multiprocessor replay. 93-100
- Peter Winkler:
Puzzled - Solutions and sources. 103 - Robert J. Sawyer:
Future tense - Webmind says hello. 104
- Jonghun Park, Kwanho Kim:
Hyperlinking the work for self-management of flexible workflows. 113-117 - Steven M. Thompson, Matthew D. Dean:
Advancing information technology in health care. 118-121 - Amar Gupta:
Deriving mutual benefits from offshore outsourcing. 122-126 - Mark Lycett, Christopher Partridge:
The challenge of epistemic divergence in IS development. 127-131 - Nena Lim, Anne Khoo:
Forensics of computers and handheld devices: identical or fraternal twins? 132-135 - Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan:
Re-tuning the music industry: can they re-attain business resonance? 136-140 - Dursun Delen, Suliman Al-Hawamdeh:
A holistic framework for knowledge discovery and management. 141-145 - Ting-Peng Liang, Andrew J. Czaplewski, Gary Klein, James J. Jiang:
Technical opinion - Leveraging first-mover advantages in internet-based consumer services. 146-148
Volume 52, Number 7, July 2009 (EE)
- Moshe Y. Vardi:
Open, closed, or clopen access? 5
- Scott E. Delman:
Communications' annual report card. 6-7
- Inspire with introductory computer science. 8-9
- Mark Guzdial, Greg Linden, Tessa Lau:
Sharing ideas, writing apps, and creating a professional web presence. 10-11
- David Roman:
Moving forward and backward. 12
- Alex Wright:
Contemporary approaches to fault tolerance. 13-15 - Kirk L. Kroeker:
Toward native web execution. 16-17 - Samuel Greengard:
Are we losing our ability to think critically? 18-19 - Karen A. Frenkel:
Liskov's creative joy. 20-22 - Alan Joch:
Master of connections. 23 - ACM award winners. 25
- Pamela Samuelson:
Legally speaking - The dead souls of the Google book search settlement. 28-30 - Mari Sako:
Technology strategy and management - Globalization of knowledge-intensive professional services. 31-33 - Phillip G. Armour:
The business of software - The cliché defense. 34-36 - Matthias Felleisen, Shriram Krishnamurthi:
Viewpoint - Why computer science doesn't matter. 37-40 - Robert Dewar, Owen L. Astrachan:
Point/counterpoint - CS education in the U.S.: heading in the wrong direction? 41-45
- Goetz Graefe:
The five-minute rule 20 years later (and how flash memory changes the rules). 48-59 - Jonathan M. Smith:
Fighting physics: a tough battle. 60-65
- Erol Gelenbe:
Steps toward self-aware networks. 66-75 - Rick Kazman, Hong-Mei Chen:
The metropolis model a new logic for development of crowdsourced systems. 76-84
- Nilesh N. Dalvi, Christopher Ré, Dan Suciu:
Probabilistic databases: diamonds in the dirt. 86-94
- Stuart Russell, Lawrence K. Saul:
Technical perspective - The ultimate pilot program. 96 - Adam Coates, Pieter Abbeel, Andrew Y. Ng:
Apprenticeship learning for helicopter control. 97-105 - Greg Morrisett:
Technical perspective - A compiler's story. 106 - Xavier Leroy:
Formal verification of a realistic compiler. 107-115
- Leah Hoffmann:
Q&A - Liskov on Liskov. 120-
- Benjamin Fabian, Oliver Günther:
Security challenges of the EPCglobal network. 121-125 - James L. Parrish Jr., James F. Courtney Jr.:
Churchman's inquirers as design templates for knowledge management systems. 126-129 - Arvind Malhotra, Claudia Kubowicz Malhotra:
A relevancy-based services view for driving adoption of wireless web services in the U.S. 130-134 - Johann Rost, Robert L. Glass:
The impact of subversive stakeholders on software projects. 135-138 - Sandip C. Patel, Ganesh D. Bhatt, James H. Graham:
Improving the cyber security of SCADA communication networks. 139-142 - Anat Hovav, Ciprian P. Popoviciu:
Adoption leadership and early planners: Comcast's IP upgrade strategy. 143-146 - Richard W. Woolridge, David P. Hale, Joanne E. Hale, Shane Sharpe:
Software project scope alignment: an outcome-based approach. 147-152 - Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li:
Technical opinion - The ethics of IT professionals in China. 153-155
Volume 52, Number 8, August 2009 (EE)
- Steve Bourne, Bryan Cantrill:
Communications and the practitioner. 5
- Scott E. Delman:
Responding to the blogosphere. 7
- Why invention and innovation diverge. 8-9
- In the virtual extension. 10
- Jeannette M. Wing, Daniel Reed, Mark Guzdial:
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing. 12-13
- David Roman:
The new searchers. 14
- Don Monroe:
Just for you. 15-17 - Kirk L. Kroeker:
Face recognition breakthrough. 18-19 - Tom Geller:
IT drives policy---and vice versa. 20 - Leah Hoffmann:
Learning through games. 21-22 - Gregory Goth:
U.S. unveils cybersecurity plan. 23
- Tim Draper:
Economic and business dimensions - Entrepreneurship during a slump. 24-26 - Wanda P. Dann, Stephen Cooper:
Education - Alice 3: concrete to abstract. 27-29 - Brian D. Snow, Clinton Brooks:
Privacy and security - An ethics code for U.S. intelligence officers. 30-32 - Lance Fortnow:
Viewpoint - Time for computer science to grow up. 33-35
- Adam Jacobs:
The pathologies of big data. 36-44 - Charles Reis, Adam Barth, Carlos Pizano:
Browser security: lessons from Google Chrome. 45-49 - Mache Creeger:
CTO roundtable: cloud computing. 50-56
- Kristen Shinohara, Josh Tenenberg:
A blind person's interactions with technology. 58-66 - Ralph A. Morelli, Allen B. Tucker, Norman Danner, Trishan R. de Lanerolle, Heidi J. C. Ellis, Özgür Izmirli, Danny Krizanc, Gary Parker:
Revitalizing computing education through free and open source software for humanity. 67-75
- Sharad Malik, Lintao Zhang:
Boolean satisfiability from theoretical hardness to practical success. 76-82
- James D. Herbsleb:
Technical perspective - Maintaining quality in the face of distributed development. 84 - Christian Bird, Nachiappan Nagappan, Premkumar T. Devanbu, Harald C. Gall, Brendan Murphy:
Does distributed development affect software quality?: an empirical case study of Windows Vista. 85-93 - Sachin S. Sapatnekar:
Technical perspective - Where the chips may fall. 94 - Michael Orshansky, Wei-Shen Wang:
Statistical analysis of circuit timing using majorization. 95-100
- Peter Winkler:
Puzzled - Probability and intuition. 104
- Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
What determines IT spending priorities? 105-110 - Andrew Lim, Hong Ma, Qi Wen, Zhou Xu, Brenda Cheang:
Distinguishing citation quality for journal impact assessment. 111-116 - Thomas A. Gerace, Huseyin Cavusoglu:
The critical elements of the patch management process. 117-121 - Rajiv Kohli, Nigel P. Melville:
Learning to build an IT innovation platform. 122-126 - Eoin Ó Conchúir, Pär J. Ågerfalk, Helena Holmström Olsson, Brian Fitzgerald:
Global software development: where are the benefits? 127-131 - Rohit Kaul, Yeogirl Yun, Seong-Gon Kim:
Ranking billions of web pages using diodes. 132-136 - Roli Varma:
Attracting Native Americans to computing. 137-140 - Indranil Bose, Alvin Chung Man Leung:
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? 141-143
Volume 52, Number 9, September 2009 (EE)
- Moshe Y. Vardi:
The financial meltdown and computing. 5
- Computer Science does matter. 8-9
- In the Virtual Extension. 10
- Michael Stonebraker, Jason I. Hong:
Saying good-bye to DBMSs, designing effective interfaces. 12-13
- David Roman:
What you read on your summer vacation. 14
- Gregory Goth:
Entering a parallel universe. 15-17 - Kirk L. Kroeker:
Medical nanobots. 18-19 - Samuel Greengard:
Facing an age-old problem. 20-22 - Karen A. Frenkel:
Computer Science meets environmental science. 23
- Paul M. Schwartz:
Law and technology - Keeping track of telecommunications surveillance. 24-26 - Peter J. Denning, Paul S. Rosenbloom:
The profession of IT - Computing: the fourth great domain of science. 27-29 - Mark Cleverley:
Emerging markets - How ICT advances might help developing nations. 30-32 - Cameron Wilson, Peter Harsha:
IT policy - The long road to Computer Science education reform. 33-35 - Anwar M. Ghuloum:
Viewpoint - Face the inevitable, embrace parallelism. 36-38 - David P. Anderson:
Interview - An interview with Maurice Wilkes. 39-42
- Bruce Johnson:
Reveling in constraints. 44-48 - Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan:
Monitoring and control of large systems with MonALISA. 49-55 - Bryan O'Sullivan:
Making sense of revision-control systems. 56-62
- Varun Bhagwan, Tyrone Grandison, Daniel Gruhl:
Sound index: charts for the people, by the people. 64-70 - James Boyle:
What intellectual property law should learn from software. 71-76
- Lance Fortnow:
The status of the P versus NP problem. 78-86
- Katherine A. Yelick:
Technical perspective - Abstraction for parallelism. 88 - Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew:
Optimistic parallelism requires abstractions. 89-97 - Marc Dacier:
Technical perspective - They do click, don't they? 98 - Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. 99-107
- Peter Winkler:
Puzzled - Solutions and sources. 110 - Jaron Lanier:
Future tense - Confusions of the hive mind. 112-
- Achita Muthitacharoen, Khawaja Asjad Saeed:
Examining user involvement in continuous software development: (a case of error reporting system). 113-117 - Alexander A. Pasko, Valery Adzhiev:
Constructive function-based modeling in multilevel education. 118-122 - Hongwei Zhu, Stuart E. Madnick:
One size does not fit all: legal protection for non-copyrightable data. 123-128 - Eleanor T. Loiacono, Nicholas C. Romano Jr., Scott McCoy:
The state of corporate website accessibility. 128-132 - Robert Willison, Mikko T. Siponen:
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. 133-137 - Mu Xia, Yun Huang, Wenjing Duan, Andrew B. Whinston:
Ballot box communication in online communities. 138-142 - Dinesh Batra:
Modified agile practices for outsourced software projects. 143-148 - James E. Katz, Ronald E. Rice:
Technical opinion - Falling into the net: main street America playing games and making friends online. 149-150
Volume 52, Number 10, October 2009 (EE)
- Wendy Hall:
ACM Europe. 5
- Time and computing. 6
- In the Virtual Extension. 7
- Greg Linden, Michael D. Conover, Judy Robertson:
The Netflix prize, computer science outreach, and Japanese mobile phones. 8-9
- Following the leaders. 10
- David Lindley:
Managing data. 11-13 - Alan Joch:
Debating net neutrality. 14-15 - Tom Geller:
Shaping the future. 16-18
- Phillip G. Armour:
The business of software - Contagious craziness, spreading sanity. 19-20 - Martin Campbell-Kelly:
Historical reflections - Computing in the depression era. 21-22 - Phillip A. Porras:
Inside risks - Reflections on Conficker. 23-24 - Michael A. Cusumano:
Technology strategy and management - Dealing with the venture capital crisis. 25-27 - George V. Neville-Neil:
Kode Vicious - Kode reviews 101. 28-29 - C. A. R. Hoare:
Viewpoint - Retrospective: an axiomatic basis for computer programming. 30-32
- James C. Phillips, John E. Stone:
Probing biomolecular machines with graphics processors. 34-41 - Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best:
Unifying biological image formats with HDF5. 42-47 - A conversation with David E. Shaw. 48-54
- Krste Asanovic, Rastislav Bodík, James Demmel, Tony M. Keaveny, Kurt Keutzer, John Kubiatowicz, Nelson Morgan, David A. Patterson, Koushik Sen, John Wawrzynek, David Wessel, Katherine A. Yelick:
A view of the parallel computing landscape. 56-67 - Jane Cleland-Huang, Horatiu Dumitru, Chuan Duan, Carlos Castro-Herrera:
Automated support for managing feature requests in open forums. 68-74
- Daniel A. Spielman, Shang-Hua Teng:
Smoothed analysis: an attempt to explain the behavior of algorithms in practice. 76-84
- Surajit Chaudhuri:
Technical perspective - Relational query optimization: data management meets statistical estimation. 86 - Kevin S. Beyer, Rainer Gemulla, Peter J. Haas, Berthold Reinwald, Yannis Sismanis:
Distinct-value synopses for multiset operations. 87-95 - Johannes Gehrke:
Technical perspective - Data stream processing: when you only get one look. 96 - Graham Cormode, Marios Hadjieleftheriou:
Finding the frequent items in streams of data. 97-105
- Leah Hoffmann:
Q&A - The networker. 112
- Richard J. Goeke, Robert H. Faley:
Technical opinion - Do SAP successes outperform themselves and their competitors? 113-117 - Girish H. Subramanian, Gary Klein, James J. Jiang, Chien-Lung Chan:
Balancing four factors in system development projects. 118-121 - Sridhar R. Papagari Sangareddy, Sanjeev Jha, Chen Ye, Kevin C. Desouza:
Attaining superior complaint resolution. 122-126 - Vivienne Waller, Robert B. Johnston:
Making ubiquitous computing available. 127-130 - Donal J. Flynn, Gary S. C. Pan, Mark Keil, Magnus Mähring:
De-escalating IT projects: the DMM model. 131-134 - Francisco Casacuberta, Jorge Civera, Elsa Cubel, Antonio L. Lagarda, Guy Lapalme, Elliott Macklovitch, Enrique Vidal:
Human interaction for high-quality machine translation. 135-138 - Jacques Savoy, Ljiljana Dolamic:
How effective is Google's translation service in search? 139-143 - Nan Hu, Jie Zhang, Paul A. Pavlou:
Overcoming the J-shaped distribution of product reviews. 144-147
Volume 52, Number 11, November 2009 (EE)
- Moshe Y. Vardi:
Is the image crisis over? 5
- Pay for editorial independence. 6-7
- In the virtual extension. 9
- Ramana Rao, Greg Linden:
Computer science curriculum, deceptive advertising. 10-11
- David Roman:
Internet addiction: it's spreading, but is it real? 12
- Gary Anthes:
Deep data dives discover natural laws. 13-14 - Kirk L. Kroeker:
Electronic paper's next chapter. 15-17 - Leah Hoffmann:
Implementing electronic medical records. 18-20 - Gregory Goth:
Exploring new frontiers. 21-23
- Butler W. Lampson:
Privacy and security - Usable security: how to get it. 25-27 - Pamela Samuelson:
Legally speaking - Are business methods patentable? 28-30 - Shane Greenstein:
Economic and business dimensions - The broadband price is not right. 31-33 - Jonathan M. Smith:
Viewpoint - On public service and computer science. 34-35 - Bob Cramblitt:
Interview - An interview with Ping Fu. 36-39
- Whitfield Diffie, Susan Landau:
Communications surveillance: privacy and security at risk. 42-47 - Katie Shilton:
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection. 48-53 - Paul D. Stachour, David Collier-Brown:
You don't know jack about software maintenance. 54-58
- Mitchel Resnick, John H. Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay S. Silver, Brian Silverman, Yasmin B. Kafai:
Scratch: programming for all. 60-67 - Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao:
Why IT managers don't go for cyber-insurance products. 68-73
- Edmund M. Clarke, E. Allen Emerson, Joseph Sifakis:
Model checking: algorithmic verification and debugging. 74-84
- Peter Druschel:
Technical perspective - Narrowing the semantic gap in distributed programming. 86 - Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica:
Declarative networking. 87-95 - John Shawe-Taylor:
Technical perspective - Machine learning for complex predictions. 96 - Thorsten Joachims, Thomas Hofmann, Yisong Yue, Chun-Nam John Yu:
Predicting structured objects with support vector machines. 97-104
- Peter Winkler:
Puzzled - Covering the plane. 112
- Lara Khansa, Divakaran Liginlal:
Quantifying the benefits of investing in information security. 113-117 - Wei-Lun Chang, Soe-Tsyr Yuan, Eldon Y. Li:
iCare home portal: an extended model of quality aging e-services. 118-124 - Aakash Taneja, Anil Singh, M. K. Raja:
Computing journals and their emerging roles in knowledge exchange. 125-131 - Rudy Hirschheim:
Offshoring and the new world order. 132-135 - Cristiana Bolchini, Carlo Curino, Giorgio Orsi, Elisa Quintarelli, Rosalba Rossato, Fabio Alberto Schreiber, Letizia Tanca:
And what can context do for data? 136-140 - Frank McCown, Catherine C. Marshall, Michael L. Nelson:
Why web sites are lost (and how they're sometimes found). 141-145 - Ralph Westfall:
If your pearls of wisdom fall in a forest... 146-149 - Frank Nielsen:
Technical opinion - Steering self-learning distance algorithms. 150-152
Volume 52, Number 12, December 2009 (EE)
- Chris Stephenson:
It is a pivotal time for K--12 computer science. 5
- In CS education, educate the educators first. 6-7
- Jeannette M. Wing, Mark Guzdial:
CS woes: deadline-driven research, academic inequality. 8-9
- In the virtual extension. 11
- David Roman:
Crowdsourcing and the question of expertise. 12
- Gary Anthes:
Blueprints for self-assembly. 13-15 - Alex Wright:
Ready for a Web OS? 16-17 - Samuel Greengard:
Making automation work. 18-19 - Leah Hoffmann:
Problem solvers. 20
- Richard E. Ladner:
Broadening participation - Opening remarks. 22-24 - Orna Berry, Yigal Grayeff:
Emerging markets - Israel's technology industry as an economic growth engine. 25-27 - Peter J. Denning, Peter A. Freeman:
The profession of IT - Computing's paradigm. 28-30 - George V. Neville-Neil:
Kode Vicious - Broken builds. 31-32 - Savas Parastatidis, Evelyne Viegas, Tony Hey:
Viewpoint - A "smart" cyberinfrastructure for research. 33-37
- Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo:
A threat analysis of RFID passports. 38-42 - Paul Vixie:
What DNS is not. 43-47 - Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto:
Maximizing power efficiency with asymmetric multicore systems. 48-57
- Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic:
The Bulk Multicore architecture for improved programmability. 58-65 - Michael Zyda:
Computer science in the conceptual age. 66-72
- Kelvin Sung:
Computer games and traditional CS courses. 74-78
- James A. Landay:
Technical perspective - Design tools for the rest of us. 80 - Yuki Igarashi, Takeo Igarashi:
Designing plush toys with a computer. 81-88 - Pat Hanrahan:
Technical perspective - A graphical sense of touch. 89 - Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton:
ThinSight: a thin form-factor interactive surface technology. 90-98
- Peter Winkler:
Puzzled - Solutions and sources. 111 - Joe Haldeman:
Future tense - Mightier than the pen. 112
- Niki Panteli, Robert J. Tucker:
Power and trust in global virtual teams. 113-115 - Sun Sun Lim, Hichang Cho, Milagros Rivera Sánchez:
Online privacy, government surveillance and national ID cards. 116-120 - Ganesh Vaidyanathan, Steven Mautone:
Security in dynamic web content management systems applications. 121-125 - Lou Hafer, Arthur E. Kirkpatrick:
Assessing open source software as a scholarly contribution. 126-129 - Narciso Cerpa, June M. Verner:
Why did your project fail? 130-134 - Karen Renaud, Antonella De Angeli:
Visual passwords: cure-all or snake-oil? 135-140 - Nir Kshetri:
Positive externality, increasing returns, and the rise in cybercrimes. 141-144 - Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila:
Technical opinion - Are employees putting your company at risk by not following information security policies? 145-147
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.