


default search action
Communications of the ACM (CACM), Volume 54, 2011
Volume 54, Number 1, January 2011 (EE)
- Moshe Y. Vardi:
Where have all the workshops gone? 5
- To change the world, take a chance. 6-7
- In the Virtual Extension. 8
- Wendy Hall:
ACM's annual report. 9-13
- Jack Rosenberger, Judy Robertson
:
Smart career advice; laptops as a classroom distraction. 14-15
- David Roman:
Scholarly publishing model needs an update. 16-
- Gary Anthes:
Nonlinear systems made easy. 17-19 - Alex Wright:
The touchy subject of haptics. 20-22 - Marina Krakovsky:
India's elephantine effort. 23-24 - Jack Rosenberger:
EMET prize and other awards. 25
- Phillip G. Armour:
Don't bring me a good idea. 27-29
- Stefan Bechtold:
Google AdWords and European trademark law. 30-32
- Michael A. Cusumano:
Reflections on the Toyota debacle. 33-35
- Mark Dermot Ryan
:
Cloud computing privacy concerns on our doorstep. 36-38
- Guy L. Steele Jr.:
An interview with Frances E. Allen. 39-45
- Eben M. Haber, Eser Kandogan, Paul P. Maglio:
Collaboration in system administration. 46-53 - UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). 54-60
- Evangelos Kotsovinos:
Virtualization: blessing or curse? 61-65
- Gio Wiederhold:
Follow the intellectual property. 66-74 - Uzi Vishkin:
Using simple abstraction to reinvent computing for parallelism. 75-85
- Cynthia Dwork:
A firm foundation for private data analysis. 86-95
- Dina Katabi:
Sora promises lasting impact: technical perspective. 98 - Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. 99-107 - Damon Wischik:
Multipath: a new control architecture for the internet: technical perspective. 108 - Peter B. Key, Laurent Massoulié, Donald F. Towsley
:
Path selection and multipath congestion control. 109-116
- Dennis McCafferty:
Q&A. 128-
- Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia
, Angelos Stavrou
:
The ephemeral legion: producing an expert cyber-security work force from thin air. 129-131
- Peter Fröhlich, Antti Oulasvirta
, Matthias Baldauf, Antti Nurminen:
On the move, wirelessly connected to the world. 132-138 - Matthias Häsel:
Opensocial: an enabler for social applications on the web. 139-144
Volume 54, Number 2, February 2011 (EE)
- Tom Rodden:
ICPS offers major research venue. 5
- Shine the light of computational complexity. 6-7
- In the Virtual Extension. 9
- Jason I. Hong
:
Matters of design. 10-11
- David Roman:
End of days for Communications in print? 12
- Gregory Goth:
Chipping away at greenhouse gases. 13-15 - Neil Savage:
Information theory after Shannon. 16-18 - Leah Hoffmann:
Maurice Wilkes: the last pioneer. 19 - Samuel Greengard:
Following the crowd. 20-22 - Gary Anthes:
ACM launches new Digital Library. 23-24 - ACM Fellows honored. 25
- Maura Conway
:
Against cyberterrorism. 26-28
- Gregory L. Rosston
, Scott Savage, Donald Waldman:
Household demand for broadband internet service. 29-31
- George Ledin Jr.:
The growing harm of not teaching malware. 32-34
- George V. Neville-Neil
:
Forest for the trees. 35-36
- Mark Guzdial
:
From science to engineering. 37-39
- Jonathan Grudin:
Technology, conferences, and community. 41-43
- Julian Harty:
Finding usability bugs with automated tests. 44-49 - Thomas A. Limoncelli:
A plea from sysadmins to software vendors: 10 do's and don'ts. 50-51 - Christina Lear:
System administration soft skills. 52-58
- Juan P. Wachs
, Mathias Kölsch, Helman Stern, Yael Edan
:
Vision-based hand-gesture applications. 60-71 - Michael J. Cafarella, Alon Y. Halevy, Jayant Madhavan:
Structured data on the web. 72-79
- Stephen Davies:
Still building the memex. 80-88
- Fernando Pereira:
Markov meets Bayes: technical perspective. 90 - Frank D. Wood, Jan Gasthaus, Cédric Archambeau, Lancelot James, Yee Whye Teh:
The sequence memoizer. 91-98 - Norman P. Jouppi:
DRAM errors in the wild: technical perspective. 99 - Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber:
DRAM errors in the wild: a large-scale field study. 100-107
- Peter Winkler
:
Puzzled. 112
- John K. Estell, Ken Christensen:
The need for a new graduation rite of passage. 113-115
- Qinping Zhao:
10 scientific problems in virtual reality. 116-118
- David Wright, Paul de Hert, Serge Gutwirth:
Are the OECD guidelines at 30 showing their age? 119-127
Volume 54, Number 3, March 2011 (EE)
- Moshe Y. Vardi:
Fumbling the future. 5
- Free speech for algorithms? 6-7
- In the Virtual Extension. 11
- Mark Guzdial
, Greg Linden:
Scientists, engineers, and computer science; industry and research groups. 12-13
- David Roman:
Time to change. 14
- Kirk L. Kroeker:
Grid computing's future. 15-17 - Neil Savage:
Twitter as medium and message. 18-20 - Tom Geller:
Evaluating government funding. 21 - Gary Anthes:
Memristors: pass or fail? 22-24 - Samuel Greengard:
Gary Chapman, technologist: 1952-2010. 25
- Pamela Samuelson:
Do you own the software you buy? 26-28
- Kenneth D. Pimple:
Surrounded by machines. 29-31
- Peter J. Denning:
Managing time. 32-34
- Daryl E. Chubin, Roosevelt Y. Johnson:
A program greater than the sum of its parts: the BPC alliances. 35-37
- Marc Snir:
Computer and information science and engineering: one discipline, many specialties. 38-43
- Mark Burgess:
Testable system administration. 44-49 - Ross Stapleton-Gray, William Woodcock:
National internet defense - small states on the skirmish line. 50-55 - Poul-Henning Kamp:
B.Y.O.C (1, 342 times and counting). 56-58
- Katy Börner:
Plug-and-play macroscopes. 60-69 - Frank Stajano, Paul Wilson:
Understanding scam victims: seven principles for systems security. 70-75
- Nir Shavit:
Data structures in the multicore age. 76-84
- Juan Pablo Bello
, Yann LeCun, Robert Rowe:
Concerto for violin and Markov model: technical perspective. 86 - Christopher Raphael:
The informatics philharmonic. 87-93 - Jennifer Rexford:
VL2: technical perspective. 94 - Albert G. Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta:
VL2: a scalable and flexible data center network. 95-104
- Peter Winkler
:
Puzzled. 109 - Gregory Benford:
Future tense. 112-
- Frances A. Rosamond
, Roswitha Bardohl, Stephan Diehl
, Uwe Geisler
, Gordon Bolduan, Annette Lessmöllmann
, Andreas Schwill, Ulrike Stege:
Reaching out to the media: become a computer science ambassador. 113-116
- R. Kelly Garrett
, James N. Danziger:
The Internet electorate. 117-123 - Steven De Hertogh, Stijn Viaene, Guido Dedene:
Governing Web 2.0. 124-130
Volume 54, Number 4, April 2011 (EE)
- Robert B. Schnabel:
Educating computing's next generation. 5 - In the Virtual Extension. 8
- I want a personal information pod. 9
- Jason I. Hong
:
Matters of design, part II. 10-11
- Scott E. Delman
:
ACM on the move. 12
- Gary Anthes:
The quest for randomness. 13-15 - Kirk L. Kroeker:
Engineering sensation in artificial limbs. 16-18 - Samuel Greengard:
Social games, virtual goods. 19-22 - Sarah Underwood:
British computer scientists reboot. 23
- Fred Niederman, Felix B. Tan
:
Managing global IT teams: considering cultural dynamics. 24-27
- Nathan L. Ensmenger
:
Building castles in the air. 28-30
- Michael A. Cusumano:
Platform wars come to social media. 31-33
- George V. Neville-Neil
:
Coder's block. 34-35
- José Luis Gómez Barroso
, Claudio Feijóo
:
Asymmetries and shortages of the network neutrality principle. 36-37
- Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza:
Returning control to the programmer: SIMD intrinsics for virtual machines. 38-43 - Thomas A. Limoncelli, Vinton G. Cerf:
Successful strategies for IPv6 rollouts.: Really. 44-48 - Erik Meijer, Gavin M. Bierman:
A co-relational model of data for large shared data banks. 49-58
- Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz:
Design principles for visual communication. 60-69 - Aleksandar Dragojevic, Pascal Felber
, Vincent Gramoli, Rachid Guerraoui
:
Why STM can be more than a research toy. 70-77 - John C. Tang
, Manuel Cebrián
, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert:
Reflecting on the DARPA Red Balloon Challenge. 78-85
- AnHai Doan, Raghu Ramakrishnan, Alon Y. Halevy:
Crowdsourcing systems on the World-Wide Web. 86-96
- Daniel M. Berry:
Liability issues in software engineering: technical perspective. 98 - Daniel Le Métayer, Manuel Maarek
, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin:
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties. 99-106 - Madhu Sudan:
Patterns hidden from simple algorithms: technical perspective. 107 - Mark Braverman:
Poly-logarithmic independence fools bounded-depth boolean circuits. 108-115
- Leah Hoffmann:
Q&A. 120-
- Patricia Morreale
, David A. Joiner:
Reaching future computer scientists. 121-124
- Ann Majchrzak, Philip H. B. More:
Emergency! Web 2.0 to the rescue! 125-132 - Fred Grossman, Charles C. Tappert, Joe Bergin, Susan M. Merritt:
A research doctorate for computing professionals. 133-141
- Gerardo Canfora
, Massimiliano Di Penta
, Luigi Cerulo
:
Achievements and challenges in software reverse engineering. 142-151
Volume 54, Number 5, May 2011 (EE)
- Moshe Y. Vardi:
Technology has social consequences. 5
- Preserve privacy in statistical correlations. 6-7
- In the Virtual Extension. 9
- Michael Stonebraker:
Stonebraker on data warehouses. 10-11
- Scott E. Delman
:
Let ACM help you find your next job 'online'. 12
- Neil Savage:
Sorting through photos. 13-15 - Gregory Goth:
I, domestic robot. 16-17 - Leah Hoffmann:
Data optimization in developing nations. 18-20 - Marina Krakovsky:
Deus ex machina. 22 - Alex Wright:
Web science meets network science. 23
- Avi Goldfarb
, Catherine Tucker:
Online advertising, behavioral targeting, and privacy. 25-27
- Brian Dorn:
Reaching learners beyond our hallowed halls. 28-30
- Tim Wu:
Bell labs and centralized innovation. 31-33
- Jason Fitzpatrick:
An interview with Steve Furber. 34-39
- Juan A. Añel:
The importance of reviewing the code. 40-41
- Poul-Henning Kamp:
The one-second war. 44-48 - Andre Charland, Brian LeRoux:
Mobile application development: web vs. native. 49-53 - Patrick McKenzie:
Weapons of mass assignment. 54-59
- Dennis J. McFarland, Jonathan R. Wolpaw
:
Brain-computer interfaces for communication and control. 60-66 - Shekhar Borkar, Andrew A. Chien:
The future of microprocessors. 67-77 - Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. 78-87
- Byron Cook, Andreas Podelski, Andrey Rybalchenko:
Proving program termination. 88-98
- David C. Parkes:
Complex financial products: caveat emptor: technical perspective. 100 - Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge:
Computational complexity and information asymmetry in financial products. 101-107 - Guillermo Sapiro:
Images everywhere: looking for models: technical perspective. 108 - Antoni Buades
, Bartomeu Coll, Jean-Michel Morel
:
Self-similarity-based image denoising. 109-117
- Peter Winkler:
Puzzled. 120
- Subhankar Dhar
, Upkar Varshney:
Challenges and business models for mobile location-based services and advertising. 121-128 - Guido Schryen:
Is open source security a myth? 130-140 - Jacques Wainer
, Siome Goldenstein, Cléo Zanella Billa:
Invisible work in standard bibliometric evaluation of computer science. 141-146
Volume 54, Number 6, June 2011 (EE)
- P. J. Narayanan, Anand Deshpanda:
Computing and India. 5
- Why concurrent objects are recurrently complicated. 6
- In the Virtual Extension. 7
- Daniel Reed, Mark Guzdial
, Judy Robertson:
Simple design; research vs. teaching; and quest to learn. 8-9
- Scott E. Delman
:
Say it with video. 10
- Kirk L. Kroeker:
Biology-inspired networking. 11-13 - Gary Anthes:
Beauty and elegance. 14-15 - Tom Geller:
The promise of flexible displays. 16-18 - Gregory Goth:
Unlimited possibilities. 19 - Marina Krakovsky:
All the news that's fit for you. 20-21
- Ari Schwartz:
Identity management and privacy: a rare opportunity to get it right. 22-24
- Peter J. Denning, Dennis J. Frailey:
Who are we - now? 25-27
- Phillip G. Armour:
Practical application of theoretical estimation. 28-30
- David Lorge Parnas:
The risks of stopping too soon. 31-33
- George V. Neville-Neil
:
Think before you fork. 34-35
- Clayton T. Morrison, Richard T. Snodgrass:
Computer science can use more science. 36-38
- Pat Helland:
If you have too much data, then 'good enough' is good enough. 40-47 - Michael Rys:
Scalable SQL. 48-53 - Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling:
Does deterrence work in reducing information security policy abuse by employees? 54-60
- W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall:
Advancing the state of home networking. 62-71 - Michael Stonebraker, Rick Cattell:
10 rules for scalable performance in 'simple operation' datastores. 72-80 - Mike Barnett, Manuel Fähndrich, K. Rustan M. Leino, Peter Müller, Wolfram Schulte, Herman Venter:
Specification and verification: the Spec# experience. 81-91
- Massimo Franceschet:
PageRank: standing on the shoulders of giants. 92-101
- Phokion G. Kolaitis:
The quest for a logic for polynomial-time computation: technical perspective. 103 - Martin Grohe
:
From polynomial time queries to graph structure theory. 104-112 - Michael J. Franklin:
Data analysis at astonishing speed: technical perspective. 113 - Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis:
Dremel: interactive analysis of web-scale datasets. 114-123
- Peter Winkler
:
Puzzled. 126 - Leah Hoffmann:
Q&A. 128-
- Paolo Boldi
, Francesco Bonchi, Carlos Castillo
, Sebastiano Vigna
:
Viscous democracy for social networks. 129-137 - Denise Johnson McManus, Houston Hume Carr, Benjamin Adams:
Wireless on the precipice: The 14th century revisited. 138-143
Volume 54, Number 7, July 2011 (EE)
- Moshe Y. Vardi:
Solving the unsolvable. 5
- Practical research yields fundamental insight, too. 6-7
- Jeannette M. Wing, Ed H. Chi:
Reviewing peer review. 10-11
- Scott E. Delman
:
ACM aggregates publication statistics in the ACM Digital Library. 12
- Kirk L. Kroeker:
Weighing Watson's impact. 13-15 - Alex Wright:
Automotive autonomy. 16-18 - Dennis McCafferty:
Brave, new social world. 19-21 - ACM award recipients. 22
- Mari Sako:
Driving power in global supply chains. 23-25
- Cory P. Knobel, Geoffrey C. Bowker:
Values in design. 26-28
- Pamela Samuelson:
Too many copyrights? 29-31
- Maria (Mia) Ong:
The status of women of color in computer science. 32-34
- Mordechai Ben-Ari:
Non-myths about programming. 35-37
- Roberto Ierusalimschy
, Luiz Henrique de Figueiredo
, Waldemar Celes Filho:
Passing a language through the eye of a needle. 38-43 - Debasish Ghosh:
DSL for the uninitiated. 44-50 - Microsoft's protocol documentation program: interoperability testing at scale. 51-57
- Michael Edwards:
Algorithmic composition: computational thinking in music. 58-67 - Thomas Ball, Vladimir Levin, Sriram K. Rajamani:
A decade of software model checking with SLAM. 68-76 - Joseph M. Hellerstein, David L. Tennenhouse:
Searching for Jim Gray: a technical overview. 77-87
- Stephen B. Wicker:
Cellular telephony and the question of privacy. 88-98
- Luiz André Barroso:
FAWN: a fast array of wimpy nodes: technical perspective. 100 - David G. Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan:
FAWN: a fast array of wimpy nodes. 101-109 - John K. Ousterhout:
Is scale your enemy, or is scale your friend?: technical perspective. 110 - Kinshuman Kinshumann, Kirk Glerum, Steve Greenberg, Gabriel Aul, Vince R. Orgovan, Greg Nichols, David Grant, Gretchen Loihle, Galen C. Hunt:
Debugging in the (very) large: ten years of implementation and experience. 111-116
- Rudy Rucker:
Future tense. 120-
- John K. Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra
, Aravind Narayanan, Diego Ongaro, Guru M. Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman:
The case for RAMCloud. 121-130
- Gargi Dasgupta, Amit Sharma, Akshat Verma, Anindya Neogi, Ravi Kothari:
Workload management for power efficiency in virtualized data centers. 131-141
Volume 54, Number 8, August 2011 (EE)
- Sorel Reisman
, Alain Chesnais:
From the presidents of the IEEE Computer Society and ACM. 5
- A policy that deters violation of security policy. 7
- Michael Stonebraker:
Stonebraker on NoSQL and enterprises. 10-11
- Scott E. Delman
:
Why you should be happy to sign in! 12
- Kirk L. Kroeker:
A new benchmark for artificial intelligence. 13-15 - Tom Geller:
Supercomputing's exaflop target. 16-18 - Samuel Greengard:
Life, translated. 19-21
- Jonathon N. Cummings:
Geography is alive and well in virtual teams. 24-26
- Betsy James DiSalvo, Amy S. Bruckman:
From interests to values. 27-29
- Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford
:
As simple as possible - but not more so. 30-33
- George V. Neville-Neil
:
Storage strife. 34-35
- Joseph Y. Halpern, David C. Parkes:
Journals for certification, conferences for rapid dissemination. 36-38
- Eric Allman:
The robustness principle reconsidered. 40-45 - Satnam Singh:
Computing without processors. 46-54 - Oren Eini:
The pain of implementing LINQ providers. 55-61
- Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony J. Sherbondy, Raghavendra Singh:
Cognitive computing. 62-71 - Joanne McGrath Cohoon, Sergey Nigai, Joseph Kaye:
Gender and computing conference papers. 72-80 - Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler:
Reputation systems for open collaboration. 81-87
- Surajit Chaudhuri, Umeshwar Dayal, Vivek R. Narasayya:
An overview of business intelligence technology. 88-98
- Peter J. Haas:
Sketches get sketchier. 100 - Ping Li, Arnd Christian König:
Theory and applications of b-bit minwise hashing. 101-109 - Scott R. Klemmer:
Skintroducing the future. 110 - Chris Harrison, Desney S. Tan, Dan Morris:
Skinput: appropriating the skin as an interactive canvas. 111-118
- Peter Winkler
:
Puzzled. 120
- David Wright:
Should privacy impact assessments be mandatory? 121-131 - Sanjay Goel:
Cyberwarfare: connecting the dots in cyber intelligence. 132-140
Volume 54, Number 9, September 2011 (EE)
- Moshe Y. Vardi:
Are you talking to me? 5
- Solved, for all practical purposes. 7
- In the Virtual Extension. 9
- Jeannette M. Wing, Valerie Barr:
Jeannette M. Wing @ PCAST; Barbara Liskov keynote. 10-11
- Kirk L. Kroeker:
A breakthrough in algorithm design. 13-15 - Gary Anthes:
Invasion of the mobile apps. 16-18 - Neil Savage:
Remaking American medicine. 19-21
- Rebecca Tushnet:
Remix nation. 22-24
- Martin Campbell-Kelly:
In praise of 'Wilkes, Wheeler, and Gill'. 25-27
- Ron Babin, Steve Briggs, Brian Nicholson
:
Corporate social responsibility and global IT outsourcing. 28-30
- Peter J. Denning, Ritu Raj:
Managing time, part 2. 31-33
- Ben Shneiderman, Jennifer Preece, Peter Pirolli:
Realizing the value of social media requires innovative computing research. 34-37
- Paul Vixie:
Arrogance in business planning. 38-41 - Poul-Henning Kamp:
The most expensive one-byte mistake. 42-44 - Mache Creeger:
ACM CTO roundtable on mobile devices in the enterprise. 45-53
- Stephen J. Lukasik:
Protecting users of the cyber commons. 54-61 - Craig Partridge:
Realizing the future of wireless data communications. 62-68 - Leonardo Mendonça de Moura, Nikolaj S. Bjørner:
Satisfiability modulo theories: introduction and applications. 69-77
- Patricia Bouyer, Uli Fahrenberg, Kim G. Larsen
, Nicolas Markey
:
Quantitative analysis of real-time systems using priced timed automata. 78-87
- Christopher Kruegel:
Making browser extensions secure: technical perspective. 90 - Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett:
Vetting browser extensions for security vulnerabilities with VEX. 91-99 - Olivier Danvy
, Jan Midtgaard
:
Abstracting abstract machines: technical perspective. 100 - David Van Horn
, Matthew Might:
Abstracting abstract machines: a systematic approach to higher-order program analysis. 101-109
- Peter Winkler
:
Puzzled. 110 - Leah Hoffmann:
Q&A. 112-
- Murray Cantor:
Calculating and improving ROI in software and system programs. 121-130
Volume 54, Number 10, October 2011 (EE)
- Ronald F. Boisvert
, Jack W. Davidson:
ACM's copyright policy. 5-6 - In the Virtual Extension. 7
- Daniel Reed, Mark Guzdial
:
From idea to product: how schools of education can help CS. 8-9
- Scott E. Delman
:
ACM TechNews now available in the Android Market. 10
- Kirk L. Kroeker:
Improving brain-computer interfaces. 11-14 - Tom Geller:
Seeing is not enough. 15-16 - Samuel Greengard:
Living in a digital world. 17-19 - Marina Krakovsky:
Success at 16. 20
- Michael A. Cusumano:
The platform leader's dilemma. 21-24
- George V. Neville-Neil:
File-system litter. 25-26
- Carsten Schürmann:
Modernizing the Danish democratic process. 27-29
- Phillip G. Armour:
Testing: failing to succeed. 30-31
- Dan S. Wallach:
Rebooting the CS publication process. 32-35
- Rishiyur S. Nikhil:
Abstraction in hardware system design. 36-44 - Erik Meijer:
The world according to LINQ. 45-51 - B. Scott Andersen, George Romanski:
Verification of safety-critical software. 52-57
- John Arquilla:
From blitzkrieg to bitskrieg: the military encounter with computers. 58-65 - Sarah Cohen, James T. Hamilton, Fred Turner:
Computational journalism. 66-71
- Jasmin Fisher
, David Harel, Thomas A. Henzinger:
Biology as reactivity. 72-82
- Charles R. Moore:
Power efficiency as the #1 design constraint: technical perspective. 84 - Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz:
Understanding sources of ineffciency in general-purpose chips. 85-93 - Geoffrey E. Hinton:
A better way to learn features: technical perspective. 94 - Honglak Lee, Roger B. Grosse, Rajesh Ranganath, Andrew Y. Ng:
Unsupervised learning of hierarchical representations with convolutional deep belief networks. 95-103 - Carlo Tomasi:
Visual reconstruction: technical perspective. 104 - Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski:
Building Rome in a day. 105-112
- Shumeet Baluja:
Future tense. 120-
- Daniel Gayo-Avello
:
Don't turn social media into another 'Literary Digest' poll. 121-128 - Zhiwei Xu, Guojie Li:
Computing for the masses. 129-137
Volume 54, Number 11, November 2011 (EE)
- Moshe Y. Vardi:
Is Moore's Party over? 5
- Justice for Jahromi. 6-7
- In the Virtual Extension. 9
- Bertrand Meyer, Greg Linden:
In support of open reviews; better teaching through large-scale data mining. 12-13
- Scott E. Delman
:
ACM offers a new approach to self-archiving. 14
- Kirk L. Kroeker:
Modeling chaotic storms. 15-17 - Alex Wright:
Hacking cars. 18-19 - Leah Hoffmann:
Risky business. 20-22
- Hannes Tschofenig:
Security risks in next-generation emergency services. 23-25
- Scott Wallsten:
What gets measured gets done. 26-28
- Pamela Samuelson:
Why the Google book settlement failed: and what comes next? 29-31
- Michael Davis:
Will software engineering ever be engineering? 32-34
- Teaching-oriented faculty at research universities. 35-37
- Douglas Baumann, Susanne E. Hambrusch, Jennifer Neville:
Gender demographics trends and changes in U.S. CS departments. 38-42
- Poul-Henning Kamp:
The software industry is the problem. 44-47 - Li Gong:
Java security architecture revisited. 48-52 - Yaron Minsky:
OCaml for the masses. 53-58
- Marti A. Hearst:
'Natural' search user interfaces. 60-67 - DongBack Seo, Albert Boonstra
, Marjolein van Offenbeek
:
Managing IS adoption in ambivalent groups. 68-73 - Ken Kennedy, Charles Koelbel, Hans P. Zima:
The rise and fall of high performance Fortran. 74-82
- Ian F. Akyildiz, Josep Miquel Jornet
, Massimiliano Pierobon:
Nanonetworks: a new frontier in communications. 84-89
- Butler W. Lampson:
Making untrusted code useful: technical perspective. 92 - Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making information flow explicit in HiStar. 93-101 - William T. Freeman:
A perfect 'match': technical perspective. 102 - Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein:
The PatchMatch randomized matching algorithm for image manipulation. 103-110
- Peter Winkler:
Puzzled. 120
- Hector Garcia-Molina, Georgia Koutrika, Aditya G. Parameswaran
:
Information seeking: convergence of search, recommendations, and advertising. 121-130
Volume 54, Number 12, December 2011 (EE)
- Moshe Y. Vardi:
Computing for humans. 5
- To boost presentation quality, ask questions. 7
- John Langford, Judy Robertson
:
Conferences and video lectures; scientific educational games. 8-9 - Nominees for elections and report of the ACM Nominating Committee. 10
- Kirk L. Kroeker:
The rise of molecular machines. 11-13 - Gregory Goth:
Brave NUI world. 14-16 - Dennis McCafferty:
Activism vs. slacktivism. 17-19 - Samuel Greengard:
CSEdWeek takes hold. 20 - Paul Hyman:
Dennis Ritchie, 1941-2011. 21 - Jaron Lanier:
The most ancient marketing. 22-23 - Genevieve Bell
:
Life, death, and the iPad: cultural symbols and Steve Jobs. 24-25
- Michael A. Cusumano:
The legacy of Steve Jobs. 26-28
- Kentaro Toyama
:
On turbocharged, heat-seeking, robotic fishing poles. 29-31
- George V. Neville-Neil
:
Debugging on live systems. 32-33
- Valerie E. Taylor, Richard E. Ladner
:
Data trends on minorities and people with disabilities in computing. 34-37
- Peter J. Denning:
The grounding practice. 38-40
- Andrew P. Bernat, Eric Grimson:
Doctoral program rankings for U.S. computing programs: the national research council strikes out. 41-43
- David Pacheco:
Postmortem debugging in dynamic environments. 44-51 - G. Bruce Berriman, Steven L. Groom:
How will astronomy archives survive the data tsunami? 52-56 - Robert Green
, Henry F. Ledgard:
Coding guidelines: finding the art in the science. 57-63
- Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah
:
Visual crowd surveillance through a hydrodynamics lens. 64-73 - Manuel Sojer, Joachim Henkel
:
License risks from ad hoc reuse of code from the internet. 74-81 - Ganesh Gopalakrishnan, Robert M. Kirby, Stephen F. Siegel, Rajeev Thakur
, William Gropp
, Ewing L. Lusk, Bronis R. de Supinski, Martin Schulz
, Greg Bronevetsky:
Formal analysis of MPI-based parallel programs. 82-91
- Gerhard Brewka, Thomas Eiter, Miroslaw Truszczynski:
Answer set programming at a glance. 92-103
- Xavier Leroy:
Safety first!: technical perspective. 122 - Jean Yang, Chris Hawblitzel:
Safe to the last instruction: automated verification of a type-safe operating system. 123-131 - Vitaly Shmatikov:
Anonymity is not privacy: technical perspective. 132 - Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg:
Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. 133-141
- Peter Winkler
:
Puzzled. 142 - Leah Hoffmann:
Q&A. 144-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.