Table of Contents
"Another reason to ditch ACM," thundered an ACM member in a social-media posting during recent debate over the Research Works Act, introduced by Congress in 2011. While deep concerns with the bill were widespread, the nasty
DEPARTMENT: Letters to the editor
While I largely agree with Sarah Spiekermann's "The Challenges of Privacy by Design" (July 2012), I want to make it clear that many organizations do understand the need to embed privacy in their systems and technologies and
Bertrand Meyer asks why too many research agencies seem obsessed with funding only groundbreaking projects.
Thanks to the University of New South Wales and IBM Research, scientists are moving closer to the junction of quantum and digital computing.
After decades in Flatland, the end of Moore's Law is pushing semiconductors into the third dimension.
Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.
Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to "the father of CS" and discuss the past, present, and future of computing.
COLUMN: Historical reflections
Journalists, historians, and the invention of email.
COLUMN: The profession of IT
Wise experts and powerful machines are no match for chaotic events and human declarations. Beware of their predictions and be humble in your own.
COLUMN: Law and technology
A few predictions about predictions.
COLUMN: Broadening participation
Seeking to improve the process for writing and reviewing proposals for new educational programs.
Some thoughts about author order in research papers.
A personal account of Alan Turing's life and impact.
Backward compatibility always trumps new features.
Finding and fixing bugs in deployed software is difficult and time-consuming. Here are some alternatives.
In the big open world of the cloud, highly available distributed objects will rule.
SECTION: Contributed articles
Trust between client organization and cloud provider is a strong predictor of successful cloud deployment.
Continually verify self-adaptation decisions taken by critical software in response to changes in the operating environment.
SECTION: Review articles
Three-dimensional user interfaces are uniquely able to achieve superior interaction fidelity, and this naturalism can be a huge advantage.
SECTION: Research highlights
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets has a long history.
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards has inspired both academic researchers and the information technology
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data, without the server ever decrypting the data to plaintext.
COLUMN: Last byte
Last month (August 2012) we posted a
trio of brainteasers
concerning "magic sets." Here, we offer solutions to all three. How did you do?
Harvey Mudd College president Maria Klawe talks about increasing the number of women who study computer science.