Table of Contents
COLUMN: ACM awards committee
ACM currently sponsors over 100 awards for technical and professional excellence. These awards serve many purposes within the computing community.
DEPARTMENT: Letters to the editor
Computing can't be viewed as a branch of science since it doesn't deal with nature but with an artifact, namely the computer
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
Recently, there has been a lot of buzz about NoSQL databases. In fact, there were at least two conferences on the topic in 2009, one on each coast.
DEPARTMENT: CACM online
Communications' site performs ably on today's leading mobile systems. However, support for these and other mobile devices will be improved.
In today's real-time Web, data streaming applications no longer have the luxury of making multiple passes over a recorded data set.
After 15 years of research, robots for search and rescue may be nearing prime time.
Governments' practice of electronic surveillance—and the growing use of warrantless wiretapping—has observers deeply concerned.
COLUMN: Emerging markets
The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor.
COLUMN: Historical reflections
Reflections on the decline of mathematical tables.
COLUMN: Technology strategy and management
To become an industry platform, vendors must open their infrastructure technology to other product companies.
Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.
COLUMN: Kode Vicious
Data structures are part of the foundation of computer science. It pays to revisit them from time to time.
What can be done to make cooling systems in data centers more energy efficient?
The battle is bigger than most of us realize.
Clearing the clouds away from the true potential and obstacles posed by this computing capability.
SECTION: Contributed articles
Prior work on power management reflects recurring themes that can be leveraged to make future systems more energy efficient.
Cryptographic protocols safeguard the privacy of user queries to public databases.
SECTION: Review articles
Combining the paradigm features of both logic and functional programming makes for some powerful implementations.
SECTION: Research highlights
The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of both theoretical results and highly visible practical
Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer inclinations are evolving, leading them to ever redefine their
Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries.
Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine vessels. This article reviews this technology.
COLUMN: Last byte
Andrew S. Tanenbaum talks about MINIX, microkernels, and electronic voting systems.
SECTION: Virtual extension
In spite of its importance in software reliability, testing is labor intensive and expensive. It has been found that software testing without a good strategy may not be more effective than testing the system with random data.
Few ISP supervisors are aware that some courts are in the process of creating a legal duty for employers to monitor their workers.
When Edgster Dijkstra wrote his paper Go To Statements Considered Harmful, programmers were lost in millions of lines of spaghetti code. Now programmers have lost their way again—this time amidst thousands of unread resumes.
The competition for college admissions is getting fiercer each year with most colleges receiving record number of applications and hence becoming increasingly selective. The admissions process is extremely stressful and unpredictable
A collective intelligence application is one that harnesses the knowledge and work of its users to provide the data for the application and to improve its usefulness. The most hyped examples have been labeled as "Web 2.0" applications
Web 2.0 is affecting the structure of our society by creating new spaces of freedom, giving voice to any opinion, easing interpersonal relationships, and encouraging the creation of collaborating collectivities.
Adoption of an information technology (IT) innovation is a much more attractive and frequently examined area to study than non-adoption. However, many IT innovations face varying degrees of resistance in their lifetime.
Access the latest issue, plus archived issues and more
Find the app for your mobile device
- ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
- ACM Digital Library apps available for iOS, Android, and Windows devices
- Download an app and sign in to it with your ACM Web Account