Table of Contents
DEPARTMENT: Editor's letter
When Communications relaunched in July 2008, the issue included a "Viewpoint" column by Rick Rashid, entitled "Image Crisis: Inspiring a New Generation of Computer Scientists." Has anything changed in that regard in the last
DEPARTMENT: Letters to the editor
Though Moshe Y. Vardi's Editor's Letter "Open, Closed, or Clopen Access?" (July 2009) addressed the question of who pays the bills, we must also address the price of quality.
DEPARTMENT: In the virtual extension
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
Each issue of Communications publishes excerpts from selected BLOG@CACM posts to the Communications Web site. In this issue, Ramana Rao writes about the evolution of computer science curriculum and Greg Linden reflects on ethics
DEPARTMENT: CACM online
The number of Internet addiction treatment centers is growing to treat behaviors worthy of a 12-step program. But neither the American Psychiatric Association's DSM nor theICD
Computer scientists have found a way to bootstrap science, using evolutionary computation to find fundamental meaning in massive amounts of raw data.
The technological challenge for researchers working on the next generation of electronic paper is to render color as brightly as traditional paper, without increasing power requirements or end-user costs.
Despite a number of challenges, patients' medical records are slowly making the transition to the digital age.
The Expeditions in Computing program provides scientists with the funding to work on ambitious, often multidisciplinary research.
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important things safe.
How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.
Developing an effective pricing index is essential to understanding the value of broadband connectivity.
Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and benefits of which are outlined here.
Ping Fu, CEO of the digital shape sampling and processing company Geomagic, discusses her background, achievements, and challenges managing a company during a period of dynamic growth.
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.
Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.
SECTION: Contributed articles
"Digital fluency" should mean designing, creating, and remixing, not just browsing, chatting, and interacting.
Proposed contracts tend to be overpriced because insurers are unable to anticipate customers' secondary losses.
SECTION: Review articles
In 1981, Edmund M. Clarke and E. Allen Emerson, working in the USA, and Joseph Sifakis working independently in France, authored seminal papers that founded what has become the highly successful field of model checking.
SECTION: Research highlights
In science, significant advances are often made when researchers from different communities join forces.
Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications.
Interest in machine learning can be traced back to the early days of computer science. Alan Turing himself conjectured that some form of automatic learning would be required
Machine Learning today offers a broad repertoire of methods for classification and regression. But what if we need to predict complex objects like trees, orderings, or alignments? Such problems arise naturally in natural language
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.
SECTION: Virtual extension
Malicious attacks on enterprise IT infrastructures have become a serious threat with the growing importance of the Internet.
The quality of life of senior citizens is a critical issue around the world today. Scrutiny of the extant technologies for aging services reveals that they are invariably aimed
Scholarly journals are reliable means of communicating knowledge and findings in a scientific discipline. This study addresses the interconnectedness of journals from four perspectives
Outsourcing as a means of meeting organizational information technology (IT) needs is a commonly accepted and growing practice; one that is continually evolving to include a much wider set of business functions: logistics, accounting
Common to all actors in today's information world is the problem of lowering the "information noise," both reducing the amount of data to be stored and accessed, and enhancing
The Web is in constant flux — new pages and Web sites appear daily, and old pages and sites disappear almost as quickly. One study estimates that about two percent of the Web disappears from its current location every week. To
The idea of doing things that can improve something is an extremely popular concept in American culture. For example, I found the phrase,
make a difference
, in 129 million Web pages in a Yahoo! search in July 2009. The concept
The concept of distance expresses the distortion measure between any pair of entities lying in a common space. Distances are at the very heart of geometry, and are ubiquitous