Table of Contents
The age of open access is upon us. Increasingly, the consensus of authors and their funding institutions is that the fruits of taxpayer-supported research should be freely available. This is a compelling argument and a noble
DEPARTMENT: From the president
I have been thinking about the demographics of the computing profession and wondering what steps ACM and its members might take to increase interest in this career across a full spectrum of potential candidates.
Bertrand Meyer wonders why malicious reviews run rampant in computer science.
Computational models are tackling the complexity of biology, from single-celled microbes to human organs.
The new Mars rover has attracted plenty of attention for its planetary gymnastics, but the big breakthroughs are under the hood.
Computer modeling is radically redefining healthcare and epidemiology by providing new tools for understanding the impact of different intervention strategies.
COLUMN: Privacy and security
Seeking to protect the fundamental privacy of network interactions.
COLUMN: Inside risks
My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In addition, I reflect on the collateral effects of Hurricane Sandy
COLUMN: Kode Vicious
Is there a "best used by" date for software?
New possibilities in online education create new challenges.
COLUMN: Economic and business dimensions
Applying a centuries-old technique to modern cost estimation.
How to address the lack of transparency, trust, and acceptance in cloud services.
Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.
Our authentication system is lacking. Is improvement possible?
The USE method addresses shortcomings in other commonly used methodologies.
Open source security foundations for mobile and embedded devices.
SECTION: Contributed articles
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
Software techniques that tolerate latency variability are vital to building responsive large-scale Web services.
SECTION: Review articles
The challenges — and great promise — of modern symbolic execution techniques, and the tools to help implement them.
SECTION: Research highlights
The microprocessor chip R&D community has been well aware of the so-called "power wall" challenge for over a decade. The following work by Esmaeilzadeh et al. is a landmark paper that opens our eyes to the unrelenting power challenge
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases continue, the per-transistor speed and energy efficiency improvements
COLUMN: Last byte
These puzzles involve computing probabilities associated with dice.