Sign In

Communications of the ACM

Table of Contents

DEPARTMENT: Editorial pointers

Editorial Pointers

DEPARTMENT: News track

News Track



COLUMN: The business of software

To Plan, Two Plans

A planning approach to managing risk.
COLUMN: Staying connected

Nanotechnology's Shadow

The science of manipulating small particles unleashes big issues.
COLUMN: President's letter

Restoring the Popularity of Computer Science

Inaccurate impressions of the opportunities of 21st century CS are shrinking the next generation of IT professionals. You can help by dispelling incorrect beliefs about employment and by helping improve pre-college education.

Top 10 Downloads from ACM's Digital Library

COLUMN: Viewpoint

RFID Is X-Ray Vision

In a world saturated with RFID tags, protecting the privacy of individuals is technically difficult. Without a proper alignment of interests it may be impossible.
SPECIAL ISSUE: RFID: tagging the world


Cheap, tiny, plentiful radio-frequency identification tags will make it possible to tag almost everything, spurring a revolution in how physical objects interact with information services.

RFID-Based Techniques For Human-Activity Detection

The iBracelet and the Wireless Identification and Sensing Platform promise the ability to infer human activity directly from sensor readings.

Photosensing Wireless Tags For Geometric Procedures

Interacting with a self-describing, self-locating world sprinkled with RFIG tags, physical objects come alive through augmented reality labels and context-sensitive annotation.

Spontaneous Marriages of Mobile Devices and Interactive Spaces

Configuring themselves through Elope middleware, tagged physical objects and rooms let users seamlessly integrate their content and invoke services.

RFID Enhances Visitors' Museum Experience at the Exploratorium

Interactive RFID-enhanced museum exhibits let visitors continue their scientific exploration beyond the museum's walls. But museums must still help them understand the technology and address their data privacy concerns.

RFID Privacy Issues and Technical Challenges

Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.

RFID and the Perception of Control: The Consumer's View

Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services.

What Does RFID Do For the Consumer?

Want consumers to adopt RFID-based systems? Make the perceived (and real) risk acceptable through convenience, variety, and lower prices.

Nurturing Software

How societal institutions shape the development of software.

A Question of Trust

An economic perspective on quality standards in the certification services market.

Multimedia-Based Interactive Advising Technology For Online Consumer Decision Support

Multimedia technologies (such as Flash and QuickTime) have been widely used in online product presentation and promotion to portray products in a dynamic way. The continuous visual stimuli and associated sound effects provide …

Webview: An SQL Extension For Joining Corporate Data to Data Derived from the Web

Using SQL and database technology to seamlessly retrieve information from any corporate or external Web site.

The Importance of Affective Quality

Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.

Exploring an Epidemic in an E-Science Environment

Rules of bio-epidemic and e-epidemic inspire scientists to create a live, scalable interconnected environment for effectively managing situations in nature, society, and the digital virtual world.

Prepare Your Mind For Learning

The learning process must evolve and expand throughout one's IT career. Most would agree that's often easier said than done. Here are some ways professionals can overcome mental blocks that may prevent learning.
COLUMN: Technical opinion

As Simple as Possible, but Not Simpler

How the use of technology affects what we know and how we know it.
COLUMN: Inside risks

Risks of Technology-Oblivious Policy