While the P vs. NP quandary is a central problem in computer science, a resolution of the problem may have limited practical impact.
DEPARTMENT: Letters to the editor
Though I agree with Mordechai Ben-Ari's Viewpoint "Objects Never? Well, Hardly Ever!" (Sept. 2010) saying that students should be introduced to procedural programming before …
Communications' Virtual Extension expands the page limitations of the print edition by bringing readers high-quality articles in an online-only format.
Tessa Lau launches a discussion about the acceptance criteria for HCI systems papers at CHI, UIST, and other conferences.
DEPARTMENT: CACM online
When it comes to electronic formats, Communications
readers prefer PDF to HTML, according to data on a year's worth of published articles. PDF's faithful reproduction of magazine pages appears to give it an edge. Legacy is another …
Today's data deluge is leading to new approaches to visualize, analyze, and catalog enormous datasets.
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
What are the job prospects for today's—and tomorrow's—graduates?
The U.S. Federal Communications Commission's decision to open frequencies in the broadcast spectrum could enable broadband networks in rural areas, permit smart electric grids, and more.
COLUMN: Economic and business dimensions
Reading between the lines of the thematic gap between the supply and demand of online news.
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
COLUMN: Legally speaking
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.
COLUMN: Privacy and security
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.
Want to keep your users? Just make it easy for them to leave.
As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.
To move forward with programming languages we must first break free from the tyranny of ASCII.
SECTION: Contributed articles
For workloads with abundant parallelism, GPUs deliver higher peak computational throughput than latency-oriented CPUs.
Concerns about biased manipulation of search results may require intervention involving government regulation.
SECTION: Review articles
Computational complexity may truly be the shield against election manipulation.
SECTION: Research highlights
Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming model. Unfortunately, shared-memory programs are …
GOLDILOCKS is a Java runtime that monitors program executions and throws a
when a data race is about to occur. This prevents racy accesses from taking place …
Multithreaded programs are notoriously prone to race conditions. Prior work developed precise dynamic race detectors that never report false alarms. However, these checkers employ expensive data structures that result in significant …
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.
COLUMN: Viewpoints: Virtual extension
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science that all students will receive as part of their K–12 education …
SECTION: Contributed articles: Virtual extension
Positioning mobile devices in the third generation of wireless communication networks is crucial to many commercial services. However, positioning techniques vary by accuracy, implementation cost, and typical application scenarios …
Though computer scientists agree that conference publications enjoy greater status in computer science than in other disciplines, there is little quantitative evidence to support this view.