Revisiting the publication culture in computing researchMoshe Y. VardiPages: 5-5doi>10.1145/1666420.1666421Full text: Html PDFOther formats: Digital EditionDEPARTMENT: Letters to the EditorToo much debate?CACM StaffPages: 6-7doi>10.1145/1666420.1666422Full text: Html PDFOther formats: Digital EditionIn the Virtual ExtensionCACM StaffPages: 8-8doi>10.1145/1666420.1666424Full text: Html PDFOther formats: Digital EditionCommunications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
expand DEPARTMENT: BLOG@CACMToo much programming too soon?Mark Guzdial, Judy RobertsonPages: 10-11doi>10.1145/1666420.1666425Full text: Html PDFOther formats: Digital EditionThe Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish excerpts from selected posts. twitter Follow us on Twitter at http://twitter.com/blogCACM ... expand DEPARTMENT: CACM onlineGranting a second lifeDavid RomanPages: 12-12doi>10.1145/1666420.1666426Full text: Html PDFOther formats: Digital EditionCOLUMN: NewsCS and biology's growing painsGregory GothPages: 13-15doi>10.1145/1666420.1666427Full text: Html PDFOther formats: Digital EditionBiologists can benefit from learning and using the tools of computer science, but several real-world obstacles remain.
expand Engineering the web's third decadeKirk L. KroekerPages: 16-18doi>10.1145/1666420.1666428Full text: Html PDFOther formats: Digital EditionAs Web technologies move beyond two-way interactive capabilities to facilitate more dynamic and pervasive experiences, the Web is quickly advancing toward its third major upgrade.
expand Tracking garbageSamuel GreengardPages: 19-20doi>10.1145/1666420.1666429Full text: Html PDFOther formats: Digital EditionResearchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into the environment.
expand Katayanagi prizes and other CS awardsCACM StaffPages: 21-21doi>10.1145/1666420.1666430Full text: Html PDFOther formats: Digital EditionCOLUMN: Economic and business dimensionsGaming will save us allTim ChangPages: 22-24doi>10.1145/1666420.1666431Full text: Html PDFOther formats: Digital EditionHow gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and entertainment.
expand COLUMN: Legally speakingOnly technological processes are patentablePamela SamuelsonPages: 25-27doi>10.1145/1666420.1666432Full text: Html PDFOther formats: Digital EditionThe U.S. Supreme Court will narrow the universe of process innovations that can be patented to those that are "technological," but what will that mean for software?
expand COLUMN: Computing ethicsThe ethics beatRachelle HollanderPages: 28-29doi>10.1145/1666420.1666433Full text: Html PDFOther formats: Digital EditionSurveying the increasing variety and nature of ethical challenges encountered by computing researchers and practitioners.
expand COLUMN: The profession of ITOrchestrating coordination in pluralistic networksPeter J. Denning, Fernando Flores, Peter LuzmorePages: 30-32doi>10.1145/1666420.1666434Full text: Html PDFOther formats: Digital EditionLearning to build virtual teams of people of diverse backgrounds is an urgent challenge.
expand COLUMN: Broadening participationHiring and developing minority faculty at research universitiesRichard TapiaPages: 33-35doi>10.1145/1666420.1666435Full text: Html PDFOther formats: Digital EditionEmphasizing the importance of creating more programs and investing more funding toward the goal of developing minority faculty at research universities.
expand COLUMN: IT policyMaking the case for computingCameron Wilson, Peter HarshaPages: 36-38doi>10.1145/1666420.1666436Full text: Html PDFOther formats: Digital EditionSeeking funding for current and future computing initiatives requires both a strong argument and a broad community of supporters.
expand COLUMN: ViewpointPrivacy on the data webKieron O'Hara, Nigel ShadboltPages: 39-41doi>10.1145/1666420.1666437Full text: Html PDFOther formats: Digital EditionConsidering the nebulous question of ownership in the virtual realm.
expand SECTION: PracticeGFS: evolution on fast-forwardKirk McKusick, Sean QuinlanPages: 42-49doi>10.1145/1666420.1666439Full text: Html PDFOther formats: Digital EditionKirk McKusick and Sean Quinlan discuss the origin and evolution of the Google File System.
expand Toward energy-efficient computingDavid J. Brown, Charles ReamsPages: 50-58doi>10.1145/1666420.1666438Full text: Html PDFOther formats: Digital EditionWhat will it take to make server-side computing more energy efficient?
expand Global IT management: structuring for scale, responsiveness, and innovationSiew Kien Sia, Christina Soh, Peter WeillPages: 59-64doi>10.1145/1666420.1666449Full text: Html PDFOther formats: Digital EditionTo succeed on a global scale, businesses should focus on a trio of key elements.
expand SECTION: Contributed articlesChasing the AIDS virusThomas Lengauer, André Altmann, Alexander Thielen, Rolf KaiserPages: 66-74doi>10.1145/1666420.1666440Full text: Html PDFOther formats: Digital EditionWith no HIV vaccine in sight, virologists need to know how the virus will react to a given combination drug therapy.
expand Virtual computing initiative at a small public universityCameron Seay, Gary TuckerPages: 75-83doi>10.1145/1666420.1666441Full text: Html PDFOther formats: Digital EditionStudent participation and resulting expertise is as valuable as having the high-performance resource itself.
expand SECTION: Review articleMaking decisions based on the preferences of multiple agentsVincent ConitzerPages: 84-94doi>10.1145/1666420.1666442Full text: Html PDFOther formats: Digital EditionComputer scientists have made great strides in how decision-making mechanisms are used.
expand SECTION: Research highlightsA first glimpse of cryptography's Holy GrailDaniele MicciancioPages: 96-96doi>10.1145/1666420.1666445Full text: Html PDFOther formats: Digital EditionComputing arbitrary functions of encrypted dataCraig GentryPages: 97-105doi>10.1145/1666420.1666444Full text: Html PDFOther formats: Digital EditionSuppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows ...
expand Seeing the trees, the forest, and much morePietro PeronaPages: 106-106doi>10.1145/1666420.1666443Full text: Html PDFOther formats: Digital EditionUsing the forest to see the trees: exploiting context for visual object detection and localizationA. Torralba, K. P. Murphy, W. T. FreemanPages: 107-114doi>10.1145/1666420.1666446Full text: Html PDFOther formats: Digital EditionRecognizing objects in images is an active area of research in computer vision. In the last two decades, there has been much progress and there are already object recognition systems operating in commercial products. However, most of the algorithms for ...
expand COLUMN: Last bytePuzzled: Solutions and sourcesPeter WinklerPages: 118-118doi>10.1145/1666420.1666447Full text: Html PDFOther formats: Digital EditionLast month (February 2010, p. 120) we posted a trio of brainteasers, including one as yet unsolved, concerning the breaking of a bar of chocolate.
expand Future Tense: The primal cueAri JuelsPages: 120-ffdoi>10.1145/1666420.1666448Full text: Html PDFOther formats: Digital EditionFuture Tense, one of the revolving features on this page, presents stories and essays from the intersection of computational science and technological speculation, their boundaries limited only by our ability to imagine what will and could be. Cybersecurity ...
expand SECTION: Virtual extensionBusiness continuity and the banking industryFabio Arduini, Vincenzo MorabitoPages: 121-125doi>10.1145/1666420.1666452Full text: Html PDFIntroduction Since the September 11th attacks on the World Trade Center, tsunami disaster, and hurricane Katrina, there has been renewed interest in emergency planning in both the private and public sectors. In particular, as managers ...
expand A framework for health care information assurance policy and complianceSherrie Drye Cannoy, A. F. SalamPages: 126-131doi>10.1145/1666420.1666453Full text: Html PDFIntroduction As many as 400 people may have access to one's personal medical information throughout the typical care process. Disclosures of sensitive information such as emotional problems, sexually transmitted diseases, substance abuse, and ...
expand Is stickiness profitable for electronic retailers?Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny LeePages: 132-136doi>10.1145/1666420.1666454Full text: Html PDFIntroduction Is stickiness the Holy Grail for e-tailing? In general, stickiness refers to the amount of time a person spends on a Web site during a visiting session (such as, session stickiness) or over a specified time period (such ...
expand User participation in software development projectsRamanath Subramanyam, Fei Lee Weisstein, M. S. KrishnanPages: 137-141doi>10.1145/1666420.1666455Full text: Html PDFIntroduction It is commonly acknowledged that success in IT projects is difficult to achieve. A recent industry survey observed that only 34% of IT projects were considered successful. Of the several potential factors contributing to this hard-to-achieve ...
expand Practitioner-based measurement: a collaborative approachS. T. Parkinson, R. M. Hierons, M. Lycett, M. NormanPages: 142-147doi>10.1145/1666420.1666456Full text: Html PDFIntroduction The established philosophy within the software development industry is that an organization implementing a program to improve software quality can expect to recoup the cost of the implementation many times over through the reduced ...
expand Organizational adoption of open source software: barriers and remediesDel Nagy, Areej M. Yassin, Anol BhattacherjeePages: 148-151doi>10.1145/1666420.1666457Full text: Html PDFIntroduction Perhaps the business case for adopting open source software is an easy sell. After all, the software is free, and can be simply downloaded from the Internet and installed or customized as needed. Organizations interested in reducing ...
expand Aligning undergraduate IS curricula with industry needsJohn H. Benamati, Zafer D. Ozdemir, H. Jeff SmithPages: 152-156doi>10.1145/1666420.1666458Full text: Html PDFIntroduction A paradox is becoming obvious to both information systems (IS) academics and executives: U.S. demand for IS graduates is increasing, but graduation numbers from university IS programs are flat or in decline. As a result, many CIOs ...
expand Agent-oriented embedded electronic measuring systemsHing Kai ChanPages: 157-162doi>10.1145/1666420.1666459Full text: Html PDFIntroduction Agent technology has attracted the attention of academia in many domains in the past decade. It is probably due to the fact that computer systems have been becoming complicated with distribution and openness characteristics. Agent-based ...
expand