In my May 2009 Editor's Letter, "Conferences vs. Journals in Computing Research,"
I addressed the publication culture of our field: "As far as I know, we are the only scientific …
Moshe Y. Vardi
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
DEPARTMENT: Letters to the Editor
In his editor's letter "More Debate, Please!"
(Jan. 2010), Moshe Y. Vardi made a plea for controversial topics on these pages, citing a desire to "let truth emerge from vigorous …
Mark Guzdial and Judy Robertson discuss the role of programming in introductory computer science.
Mark Guzdial, Judy Robertson
DEPARTMENT: CACM online
Almost 90% of what we learn comes from reading, estimates say, and the path that online information takes to your brain is less direct than most. TheCommunications
Web site …
Biologists can benefit from learning and using the tools of computer science, but several real-world obstacles remain.
As Web technologies move beyond two-way interactive capabilities to facilitate more dynamic and pervasive experiences, the Web is quickly advancing toward its third major upgrade.
Kirk L. Kroeker
Researchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into the environment.
Donald E. Knuth, Jon Kleinberg, Andrew Herbert, and other members of the computer science community were recently honored for their innovative research and service.
COLUMN: Economic and business dimensions
How gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and entertainment.
COLUMN: Legally speaking
The U.S. Supreme Court will narrow the universe of process innovations that can be patented to those that are "technological," but what will that mean for software?
COLUMN: Computing ethics
Surveying the increasing variety and nature of ethical challenges encountered by computing researchers and practitioners.
COLUMN: The profession of IT
Learning to build virtual teams of people of diverse backgrounds is an urgent challenge.
Peter J. Denning, Fernando Flores, Peter Luzmore
COLUMN: Broadening participation
Emphasizing the importance of creating more programs and investing more funding toward the goal of developing minority faculty at research universities.
COLUMN: IT policy
Seeking funding for current and future computing initiatives requires both a strong argument and a broad community of supporters.
Cameron Wilson, Peter Harsha
Considering the nebulous question of ownership in the virtual realm.
Kieron O'Hara, Nigel Shadbolt
Kirk McKusick and Sean Quinlan discuss the origin and evolution of the Google File System.
Kirk McKusick, Sean Quinlan
What will it take to make server-side computing more energy efficient?
David J. Brown, Charles Reams
To succeed on a global scale, businesses should focus on a trio of key elements.
Siew Kien Sia, Christina Soh, Peter Weill
SECTION: Contributed articles
With no HIV vaccine in sight, virologists need to know how the virus will react to a given combination drug therapy.
Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
Student participation and resulting expertise is as valuable as having the high-performance resource itself.
Cameron Seay, Gary Tucker
SECTION: Review article
Computer scientists have made great strides in how decision-making mechanisms are used.
SECTION: Research highlights
We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect valuable or sensitive data can be …
Suppose that you want to delegate the ability to process
your data, without giving away access
to it. This separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a …
Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and blind. How shall we go about building machines that can …
Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search across all locations and scales in the image comparing local image …
A. Torralba, K. P. Murphy, W. T. Freeman
COLUMN: Last byte
Last month (February 2010, p. 120) we posted a trio of brainteasers, including one as yet unsolved, concerning the breaking of a bar of chocolate.
Future Tense, one of the revolving features on this page, presents stories and essays from the intersection of computational science and technological speculation, their boundaries limited only by our ability to imagine what …
SECTION: Virtual extension
There is renewed interest in emergency planning in both the private and public sectors. As managers realize the size of potential exposure to unmanaged risk, insuring "business continuity" is becoming a key task within all industrial …
Fabio Arduini, Vincenzo Morabito
As many as 400 people may have access to one's personal medical information throughout the typical care process. Patients (consumers) feel that it is critical that their medical information is held in confidence, otherwise they …
Sherrie Drye Cannoy, A. F. Salam
Is stickiness the Holy Grail for e-tailing? The conventional wisdom suggests that stickiness is crucial and can contribute to e-tailers' bottom lines considerably. However, the direct economic impacts of stickiness have not been …
Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Lee
A recent industry survey observed that only 34% of IT projects were considered successful. Of the several potential factors contributing to this hard-to-achieve success, user involvement was noted as the most important one.
Ramanath Subramanyam, Fei Lee Weisstein, M. S. Krishnan
The established philosophy within the software development industry is that an organization implementing a program to improve software quality can expect to recoup the cost of the implementation many times over. While organizations …
S. T. Parkinson, R. M. Hierons, M. Lycett, M. Norman
Perhaps the business case for adopting open source software is an easy sell. Less obvious than the cost savings but equally important are the barriers ("hidden costs") of adopting open source software.
Del Nagy, Areej M. Yassin, Anol Bhattacherjee
A paradox is becoming obvious to both information systems (IS) academics and executives: U.S. demand for IS graduates is increasing, but graduation numbers from university IS programs are flat or in decline, and many CIOs report …
John H. Benamati, Zafer D. Ozdemir, H. Jeff Smith
Agent-based systems, or multi-agent systems in general, are a contemporary paradigm for software development.
Hing Kai Chan