default search action
Communications of the ACM (CACM), Volume 54, 2011
Volume 54, Number 1, January 2011 (EE)
- Moshe Y. Vardi:
Where have all the workshops gone? 5
- To change the world, take a chance. 6-7
- In the Virtual Extension. 8
- Wendy Hall:
ACM's annual report. 9-13
- Jack Rosenberger, Judy Robertson:
Smart career advice; laptops as a classroom distraction. 14-15
- David Roman:
Scholarly publishing model needs an update. 16-
- Gary Anthes:
Nonlinear systems made easy. 17-19 - Alex Wright:
The touchy subject of haptics. 20-22 - Marina Krakovsky:
India's elephantine effort. 23-24 - Jack Rosenberger:
EMET prize and other awards. 25
- Phillip G. Armour:
Don't bring me a good idea. 27-29
- Stefan Bechtold:
Google AdWords and European trademark law. 30-32
- Michael A. Cusumano:
Reflections on the Toyota debacle. 33-35
- Mark Dermot Ryan:
Cloud computing privacy concerns on our doorstep. 36-38
- Guy L. Steele Jr.:
An interview with Frances E. Allen. 39-45
- Eben M. Haber, Eser Kandogan, Paul P. Maglio:
Collaboration in system administration. 46-53 - UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). 54-60
- Evangelos Kotsovinos:
Virtualization: blessing or curse? 61-65
- Gio Wiederhold:
Follow the intellectual property. 66-74 - Uzi Vishkin:
Using simple abstraction to reinvent computing for parallelism. 75-85
- Cynthia Dwork:
A firm foundation for private data analysis. 86-95
- Dina Katabi:
Sora promises lasting impact: technical perspective. 98 - Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. 99-107 - Damon Wischik:
Multipath: a new control architecture for the internet: technical perspective. 108 - Peter B. Key, Laurent Massoulié, Donald F. Towsley:
Path selection and multipath congestion control. 109-116
- Dennis McCafferty:
Q&A. 128-
- Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou:
The ephemeral legion: producing an expert cyber-security work force from thin air. 129-131
- Peter Fröhlich, Antti Oulasvirta, Matthias Baldauf, Antti Nurminen:
On the move, wirelessly connected to the world. 132-138 - Matthias Häsel:
Opensocial: an enabler for social applications on the web. 139-144
Volume 54, Number 2, February 2011 (EE)
- Tom Rodden:
ICPS offers major research venue. 5
- Shine the light of computational complexity. 6-7
- In the Virtual Extension. 9
- Jason I. Hong:
Matters of design. 10-11
- David Roman:
End of days for Communications in print? 12
- Gregory Goth:
Chipping away at greenhouse gases. 13-15 - Neil Savage:
Information theory after Shannon. 16-18 - Leah Hoffmann:
Maurice Wilkes: the last pioneer. 19 - Samuel Greengard:
Following the crowd. 20-22 - Gary Anthes:
ACM launches new Digital Library. 23-24 - ACM Fellows honored. 25
- Maura Conway:
Against cyberterrorism. 26-28
- Gregory L. Rosston, Scott Savage, Donald Waldman:
Household demand for broadband internet service. 29-31
- George Ledin Jr.:
The growing harm of not teaching malware. 32-34
- George V. Neville-Neil:
Forest for the trees. 35-36
- Mark Guzdial:
From science to engineering. 37-39
- Jonathan Grudin:
Technology, conferences, and community. 41-43
- Julian Harty:
Finding usability bugs with automated tests. 44-49 - Thomas A. Limoncelli:
A plea from sysadmins to software vendors: 10 do's and don'ts. 50-51 - Christina Lear:
System administration soft skills. 52-58
- Juan P. Wachs, Mathias Kölsch, Helman Stern, Yael Edan:
Vision-based hand-gesture applications. 60-71 - Michael J. Cafarella, Alon Y. Halevy, Jayant Madhavan:
Structured data on the web. 72-79
- Stephen Davies:
Still building the memex. 80-88
- Fernando Pereira:
Markov meets Bayes: technical perspective. 90 - Frank D. Wood, Jan Gasthaus, Cédric Archambeau, Lancelot James, Yee Whye Teh:
The sequence memoizer. 91-98 - Norman P. Jouppi:
DRAM errors in the wild: technical perspective. 99 - Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber:
DRAM errors in the wild: a large-scale field study. 100-107
- Peter Winkler:
Puzzled. 112
- John K. Estell, Ken Christensen:
The need for a new graduation rite of passage. 113-115
- Qinping Zhao:
10 scientific problems in virtual reality. 116-118
- David Wright, Paul de Hert, Serge Gutwirth:
Are the OECD guidelines at 30 showing their age? 119-127
Volume 54, Number 3, March 2011 (EE)
- Moshe Y. Vardi:
Fumbling the future. 5
- Free speech for algorithms? 6-7
- In the Virtual Extension. 11
- Mark Guzdial, Greg Linden:
Scientists, engineers, and computer science; industry and research groups. 12-13
- David Roman:
Time to change. 14
- Kirk L. Kroeker:
Grid computing's future. 15-17 - Neil Savage:
Twitter as medium and message. 18-20 - Tom Geller:
Evaluating government funding. 21 - Gary Anthes:
Memristors: pass or fail? 22-24 - Samuel Greengard:
Gary Chapman, technologist: 1952-2010. 25
- Pamela Samuelson:
Do you own the software you buy? 26-28
- Kenneth D. Pimple:
Surrounded by machines. 29-31
- Peter J. Denning:
Managing time. 32-34
- Daryl E. Chubin, Roosevelt Y. Johnson:
A program greater than the sum of its parts: the BPC alliances. 35-37
- Marc Snir:
Computer and information science and engineering: one discipline, many specialties. 38-43
- Mark Burgess:
Testable system administration. 44-49 - Ross Stapleton-Gray, William Woodcock:
National internet defense - small states on the skirmish line. 50-55 - Poul-Henning Kamp:
B.Y.O.C (1, 342 times and counting). 56-58
- Katy Börner:
Plug-and-play macroscopes. 60-69 - Frank Stajano, Paul Wilson:
Understanding scam victims: seven principles for systems security. 70-75
- Nir Shavit:
Data structures in the multicore age. 76-84
- Juan Pablo Bello, Yann LeCun, Robert Rowe:
Concerto for violin and Markov model: technical perspective. 86 - Christopher Raphael:
The informatics philharmonic. 87-93 - Jennifer Rexford:
VL2: technical perspective. 94 - Albert G. Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta:
VL2: a scalable and flexible data center network. 95-104
- Peter Winkler:
Puzzled. 109 - Gregory Benford:
Future tense. 112-
- Frances A. Rosamond, Roswitha Bardohl, Stephan Diehl, Uwe Geisler, Gordon Bolduan, Annette Lessmöllmann, Andreas Schwill, Ulrike Stege:
Reaching out to the media: become a computer science ambassador. 113-116
- R. Kelly Garrett, James N. Danziger:
The Internet electorate. 117-123 - Steven De Hertogh, Stijn Viaene, Guido Dedene:
Governing Web 2.0. 124-130
Volume 54, Number 4, April 2011 (EE)
- Robert B. Schnabel:
Educating computing's next generation. 5 - In the Virtual Extension. 8
- I want a personal information pod. 9
- Jason I. Hong:
Matters of design, part II. 10-11
- Scott E. Delman:
ACM on the move. 12
- Gary Anthes:
The quest for randomness. 13-15 - Kirk L. Kroeker:
Engineering sensation in artificial limbs. 16-18 - Samuel Greengard:
Social games, virtual goods. 19-22 - Sarah Underwood:
British computer scientists reboot. 23
- Fred Niederman, Felix B. Tan:
Managing global IT teams: considering cultural dynamics. 24-27
- Nathan L. Ensmenger:
Building castles in the air. 28-30
- Michael A. Cusumano:
Platform wars come to social media. 31-33
- George V. Neville-Neil:
Coder's block. 34-35
- José Luis Gómez Barroso, Claudio Feijóo:
Asymmetries and shortages of the network neutrality principle. 36-37
- Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza:
Returning control to the programmer: SIMD intrinsics for virtual machines. 38-43 - Thomas A. Limoncelli, Vinton G. Cerf:
Successful strategies for IPv6 rollouts.: Really. 44-48 - Erik Meijer, Gavin M. Bierman:
A co-relational model of data for large shared data banks. 49-58
- Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz:
Design principles for visual communication. 60-69 - Aleksandar Dragojevic, Pascal Felber, Vincent Gramoli, Rachid Guerraoui:
Why STM can be more than a research toy. 70-77 - John C. Tang, Manuel Cebrián, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert:
Reflecting on the DARPA Red Balloon Challenge. 78-85
- AnHai Doan, Raghu Ramakrishnan, Alon Y. Halevy:
Crowdsourcing systems on the World-Wide Web. 86-96
- Daniel M. Berry:
Liability issues in software engineering: technical perspective. 98 - Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin:
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties. 99-106 - Madhu Sudan:
Patterns hidden from simple algorithms: technical perspective. 107 - Mark Braverman:
Poly-logarithmic independence fools bounded-depth boolean circuits. 108-115
- Leah Hoffmann:
Q&A. 120-
- Patricia Morreale, David A. Joiner:
Reaching future computer scientists. 121-124
- Ann Majchrzak, Philip H. B. More:
Emergency! Web 2.0 to the rescue! 125-132 - Fred Grossman, Charles C. Tappert, Joe Bergin, Susan M. Merritt:
A research doctorate for computing professionals. 133-141
- Gerardo Canfora, Massimiliano Di Penta, Luigi Cerulo:
Achievements and challenges in software reverse engineering. 142-151
Volume 54, Number 5, May 2011 (EE)
- Moshe Y. Vardi:
Technology has social consequences. 5
- Preserve privacy in statistical correlations. 6-7
- In the Virtual Extension. 9
- Michael Stonebraker:
Stonebraker on data warehouses. 10-11
- Scott E. Delman:
Let ACM help you find your next job 'online'. 12
- Neil Savage:
Sorting through photos. 13-15 - Gregory Goth:
I, domestic robot. 16-17 - Leah Hoffmann:
Data optimization in developing nations. 18-20 - Marina Krakovsky:
Deus ex machina. 22 - Alex Wright:
Web science meets network science. 23
- Avi Goldfarb, Catherine Tucker:
Online advertising, behavioral targeting, and privacy. 25-27