default search action
ACM Queue, Volume 7
Volume 7, Number 1, January 2009
- George V. Neville-Neil:
Pride and Prejudice: (The Vasa). 6-7
- John Stanik:
A Conversation with Van Jacobson. 8-16
- Mike Shapiro:
Purpose-Built Languages. 18-24
- Mache Creeger:
Virtualization: Part One. 26-35
- Benjamin Boer:
The Obama Campaign: A Programmer's Perspective. 36-39
- Alessandro Berni:
Review of "Wireless Ad Hoc and Sensor Networks (1st ED.) by Houda Labiod, " John Wiley & Sons, Inc., 2008, ISBN 1848210035. 40 - S. Balaraman:
Review of "Pro Web 2.0 Application Development with GWT by S. Balaraman, " Jeff Dwyer, Apress, 2008, ISBN 9781590599853. 40
- John Stanik:
Calendar. 41
- Stan Kelly-Bootle:
The Flaws of Nature. 42-45
- Jeff Norwalk:
Featured Case Study: Making the Move to AJAX. - Peter Christy:
Commentary: A Trip Without a Roadmap. - Eric Schrock:
Featured Article: Debugging AJAX in Production.
Volume 7, Number 2, February 2009
- James Maurer:
Introducing...acmqueue. 5
- George V. Neville-Neil:
Don't be Typecast as a Software Developer. 6-9
- Thomas Wadlow, Vlad Gorelik:
Security in the Browser. 40-41 - Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis:
Cybercrime 2.0: When the Cloud Turns Dark. 46-47 - Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown:
How Do I Model State? Let Me Count the Ways. 54-55
- Matt Zandstra, Robert Martin:
Book Reviews. 75
Volume 7, Number 3, April 2009
- Jonathan M. Smith:
Fighting Physics: A Tough Battle. 20-21 - Mike O'Dell:
Network Front-end Processors, Yet Again. 28-29
- Charles Beeler, Craig Partridge:
All-Optical Computing and All-Optical Networks are Dead.
Volume 7, Number 4, May 2009
- George V. Neville-Neil:
Whither Sockets? 34-35
- Stan Kelly-Bootle:
One Peut-Être, Two Peut-Être, Three Peut-Être, More. 77-80
Volume 7, Number 5, June 2009
- Mache Creeger:
Cloud Computing: An Overview. 2
- Charles Reis, Adam Barth, Carlos Pizano:
Browser Security: Lessons from Google Chrome. 3
Volume 7, Number 6, July 2009
- Adam Jacobs:
The Pathologies of Big Data. 10
- Stan Kelly-Bootle:
Words Fail Them. 20-24
- Bruce Johnson:
Reveling in Constraints. 30
- Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan:
Monitoring and Control of Large Systems with MonALISA. 40
Volume 7, Number 7, August 2009
- Marshall K. McKusick, Sean Quinlan:
GFS: Evolution on Fast-forward. 10
- George V. Neville-Neil:
The Meaning of Maintenance. 20-22
- Bryan O'Sullivan:
Making Sense of Revision-control Systems. 30 - Katie Shilton:
Four Billion Little Brothers?: Privacy, mobile phones, and ubiquitous data collection. 40
Volume 7, Number 8, September 2009
- Whitfield Diffie, Susan Landau:
Communications Surveillance: Privacy and Security at Risk. 10
Volume 7, Number 9, October 2009
- Jim Waldo, Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary:
A Threat Analysis of RFID Passports. 10 - Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best:
Unifying Biological Image Formats with HDF5. 20 - James C. Phillips, John E. Stone:
Probing Biomolecular Machines with Graphics Processors. 30 - Samantha Kleinberg, Bud Mishra:
Metamorphosis: the Coming Transformation of Translational Systems Biology. 40 - Paul D. Stachour, David Collier-Brown:
You Don't Know Jack About Software Maintenance. 50
- George V. Neville-Neil:
Merge Early, Merge Often. 60-62
Volume 7, Number 10, November 2009
- Paul Vixie:
What DNS Is Not: DNS is many things to many people - perhaps too many things to too many people. 10-15 - Stephen Petschulat:
Other People's Data. 20 - Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto:
Maximizing Power Efficiency with Asymmetric Multicore Systems. 30
Volume 7, Number 11, December 2009
- Stan Kelly-Bootle:
Some Rules and Restrictions May Apply. 1-3
- Julian Hyde:
Data in Flight. 20 - Adam Leventhal:
Triple-Parity RAID and Beyond. 30
- George V. Neville-Neil:
Standards Advice. 40-43
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.