Table of Contents
The ACM International Conference Proceedings Series (ICPS) has recently being relaunched as a publication venue for research activities.
DEPARTMENT: Letters to the editor
Regarding Moshe Y. Vardi's view of computational complexity in "On P, NP, and Computational Complexity" (Nov. 2010), I'd like to add that the goal of computational complexity
To ensure the timely publication of articles, Communications created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format.
Jason Hong considers how software companies could effectively incorporate first-rate design into their products.
DEPARTMENT: CACM online
The rise in online publishing raises a question about the durability of print publications and of the printed magazine version of Communications of the How long will it last
Power-saving processor algorithms have the potential to create significant energy and cost savings.
Purdue University's Science of Information Center seeks new principles to answer the question 'What is information?'
Computer science has lost not only a great scientist, but an important link to the electronic computing revolution that took place in the 1940s.
Crowdsourcing is based on a simple but powerful concept: Virtually anyone has the potential to plug in valuable information.
More than 50 years of computing literature is augmented, streamlined, and joined to powerful new tools for retrieval and analysis.
Forty-one men and women are inducted as 2010 ACM Fellows.
COLUMN: Privacy and security
Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting if one believes, as I do, that
COLUMN: Economic and business dimensions
How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay (WTP) for broadband service and shows a high valuation for
COLUMN: Inside risks
Revisiting the need to educate professionals to defend against malware in its various guises.
COLUMN: Kode Vicious
With the amount of disk space available to the modern programmer, and the lack of parental supervision in most workplaces, the time for programmers to "clean your room!" and
A series of recent reports claim the U.S. education system is in a very severe crisis; others suggest the crisis is "overblown." An explanation that
Considering the impact and implications of changes in scholarly communication.
COLUMN: Viewpoints: Virtual extension
A new organization is being proposed that is solely intended to promote and recognize the ethical and moral behavior in graduates of computing-related degree programs as they transition to careers of service to society.
Ideally, all software should be easy to use and accessible for a wide range of people. However, software often falls short of these basic goals. We therefore need ways to help us discover usability
What can software vendors do to make the lives of system administrators a little easier?
How can system administrators reduce stress and conflict in the workplace?
SECTION: Contributed articles
Body posture and finger pointing are a natural modality for human-machine interaction, but first the system must know what it's seeing.
Google's Web Tables and Deep Web Crawler identify and deliver this otherwise inaccessible resource directly to end users.
SECTION: Contributed articles: Virtual extension
Virtual Reality was one of the 14 Grand Challenges identified as awaiting engineering solutions for the 21st century announced in 2008 by the U.S. National Academy of Engineering. Here, I explore 10 related open VR challenges
SECTION: Review articles
What would it take for a true personal knowledge base to generate the benefits envisioned by Vannevar Bush?
SECTION: Review articles: Virtual extension
This article briefly reviews the factors that led to production of the Guidelines on the Transborder Flows of Personal Data in the 1970s and some of the key points in them.
SECTION: Research highlights
The history of probabilistic sequence models dates back to Markov at the turn of the last century. Though informed by decades of research, current practices are still something
The sequence memoizer is a new hierarchical Bayesian model for discrete sequence data that captures long range dependencies and power-law characteristics, while remaining computationally attractive.
In order to advance the field, knowledge of the types of memory errors at the system level, their frequencies, and conditions that exacerbate or are unrelated to higher error
While a large body of work exists on DRAM in lab conditions, little has been reported on real DRAM failures in large production clusters. In this paper, we analyze measurements of memory errors in a large fleet of commodity servers
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.