Sign In

Communications of the ACM



Can Randomly Generated Code Fix Software Bugs?
From [email protected]

Can Randomly Generated Code Fix Software Bugs?

Can the principles of evolution be applied to software code and used to improve it? Stephanie Forrest thinks so—and has some encouraging data to prove it.  

Fixing the Process of Computer Science Refereeing
From [email protected]

Fixing the Process of Computer Science Refereeing

There is a simple way to make refereeing better, almost overnight. It takes a bit of courage, but it would restore honesty and quality to the process.

Technology Transfer: A Contact Sport
From [email protected]

Technology Transfer: A Contact Sport

The success or failure of technology transfer depends on many factors. No single mechanism is guaranteed to succeed, though there are many mechanisms that are likely...

Barbara Liskov Keynote Grace Hopper Conference
From [email protected]

Barbara Liskov Keynote Grace Hopper Conference

In her Grace Hopper keynote talk, Barbar Liskov reflected on her research journey and the work for which she was given the Turing Award.

Talking with Pcast
From [email protected]

Talking with Pcast

I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...

Simple Hpc Wins
From [email protected]

Simple Hpc Wins

You want to be the first person to design a successful, transistorized computer system, not the last person to design vacuum tube computer.  Any designer’s challenge...

From [email protected]

The First ACM Symposium on Cloud Computing (socc)

Earlier this summer the first ACM Symposium on Cloud Computing was held in Indianapolis, Indiana. With three stellar keynotes and an exceptional program, the inaugural...

Why Is Great Design So Hard?
From [email protected]

Why Is Great Design So Hard?

Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...

In Vivo, In Vitro, In Silico
From [email protected]

In Vivo, In Vitro, In Silico

These “grand challenges” of systems biology encompass almost every aspect of modern computing, from numerical and symbolic methods through data management and analytics...

Web Applications Crave Memory
From [email protected]

Web Applications Crave Memory

Big web applications are hungry for RAM.  They want lots of low power RAM.  And they want little else.

The Future of Electronic Design Automation, According to IBM
From [email protected]

The Future of Electronic Design Automation, According to IBM

To paraphrase Mr. Meyerson: A truly talented engineer is someone who, when his hand gets slammed in a doorway and is badly hurt, inserts his other hand in the doorway...

Malvertisements Growing as Online Security Threat
From [email protected]

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

On Social Networks, Political Campaigns and Threats
From [email protected]

On Social Networks, Political Campaigns and Threats

 Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.

Consumerization of It and Research
From [email protected]

Consumerization of It and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Internet Information Freedom Revisited.
From [email protected]

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...

A Personal View of the Future of Personal Computing
From [email protected]

A Personal View of the Future of Personal Computing

The future of computers will be created by a conjunction of several key aspects of technology.

Investigating Old Problems in a New Light at Cscw, Day 2
From [email protected]

Investigating Old Problems in a New Light at Cscw, Day 2

This post will give a summary of one paper each from sessions on Groupware Technologies, the experimental CSCW Horizons, and Everyday Healthcare.

Paucity to Plethora: Jevons Paradox
From [email protected]

Paucity to Plethora: Jevons Paradox

I suspect much of computing is still socially conditioned by its roots in computational paucity to recognize fully the true opportunity afforded by computational...

What Will 2010 Bring?
From [email protected]

What Will 2010 Bring?

What changes will we see in 2010 in computing?

Showcasing European Computer Science
From [email protected]

Showcasing European Computer Science

Retrospective on the 2009 European Computer Science Summit and the launch of ACM Europe
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account