December 2002 - Vol. 45 No. 12

December 2002 issue cover image

Features

Opinion Editorial pointers

Editorial Pointers

Ubiquitous computing is intangible—physically, figuratively, literally. In the continuing evolution of computing technologies we’re not supposed to see or sense, technical advances have been swift, but the surface is barely scuffed. Many challenges and obstacles still stand between us and the promise of living and working environments embedded with computing devices in a seamless, invisible […]
News News track

News Track

A simulation computer program designed to prevent terrorist attacks was shown at the White House to demonstrate the program’s homeland defense applications. Two professors at Purdue University’s e-Business Research Center improved on the technology, which was originally built for telecommunications and business, by incorporating two IBM supercomputers to build a "synthetic" model of the U.S. […]
Opinion Forum

Forum

Thanks for Robert Glass’s delightfully written history ("The Proof of Correctness Wars," "Practical Programmer," Aug. 2002). As a mathematician and a computer scientist, I have always been saddened that proof-of-correctness methodology never worked out, but as a practical programmer I understand why. I remember discussing the proof-of-correctness effort to verify the correctness of the INMOS […]
Research and Advances

Strategic It Applications in Health Care

Information technology plays an increasingly central role in the U.S. health care industry. A survey by Sheldon I. Dorenfest & Associates of Chicago estimated IT spending on health care in 2002 would be $21.6 billion [9]. Further exponential growth can be expected as the industry implements further large-scale electronic medical record keeping; provides remote diagnostics […]
Research and Advances Issues and challenges in ubiquitous computing

Introduction

A fundamental measure of progress in computing involves rendering it as an inseparable part of our everyday experience while simultaneously making it disappear [2]. Radical improvements in microprocessor cost-performance ratios have pushed this process forward while drastically reducing computing-device form factors, enabling us to embed computers in many parts of our environments. In 40 years […]
Opinion Inside risks

Why Security Standards Sometimes Fail

Security experts have long been saying that secure systems, and especially security standards, need to be designed through an open process, allowing review by anyone. Unfortunately, even openly designed standards sometimes result in flawed cryptographic systems. A recent example is the IEEE 802.11 wireless LAN standard, in which several serious cryptographic failures were found (see […]

Recent Issues

  1. July 2024 CACM cover
    July 2024 Vol. 67 No. 7
  2. June 2024 Vol. 67 No. 6
  3. May 2024 CACM cover
    May 2024 Vol. 67 No. 5
  4. April 2024 CACM cover with text
    April 2024 Vol. 67 No. 4