Positioning ACM For an Open Access Future
February 2013 - Vol. 56 No. 2
Features
The age of open access is upon us. Increasingly, the consensus of authors and their funding institutions is that the fruits of taxpayer-supported research should be freely available. This is a compelling argument and a noble goal. But, achieving open access is not easy.
Opinion From the president
I have been thinking about the demographics of the computing profession and wondering what steps ACM and its members might take to increase interest in this career across a full spectrum of potential candidates.
When Reviews Do More Than Sting
Bertrand Meyer wonders why malicious reviews run rampant in computer science.
Computational models are tackling the complexity of biology, from single-celled microbes to human organs.
The new Mars rover has attracted plenty of attention for its planetary gymnastics, but the big breakthroughs are under the hood.
Computer modeling is radically redefining healthcare and epidemiology by providing new tools for understanding the impact of different intervention strategies.
Opinion Privacy and security
Seeking to protect the fundamental privacy of network interactions.
Opinion Inside risks
My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In addition, I reflect on the collateral effects of Hurricane Sandy.
Opinion Education
Reflections on Stanford’s MOOCs
New possibilities in online education create new challenges.
Opinion Economic and business dimensions
The Value of Microprocessor Designs
Applying a centuries-old technique to modern cost estimation.
Opinion Viewpoint
How to address the lack of transparency, trust, and acceptance in cloud services.
Opinion Viewpoint
The Explosive Growth of Postdocs in Computer Science
Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.
Thinking Methodically About Performance
The USE method addresses shortcomings in other commonly used methodologies.
A Decade of OS Access-Control Extensibility
Open source security foundations for mobile and embedded devices.
Research and Advances Contributed articles
New Approaches to Security and Availability For Cloud Data
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
Research and Advances Contributed articles
Software techniques that tolerate latency variability are vital to building responsive large-scale Web services.
Research and Advances Review articles
Symbolic Execution For Software Testing: Three Decades Later
The challenges — and great promise — of modern symbolic execution techniques, and the tools to help implement them.
Research and Advances Research highlights
Technical Perspective: Is Dark Silicon Real?
The microprocessor chip R&D community has been well aware of the so-called "power wall" challenge for over a decade. The following work by Esmaeilzadeh et al. is a landmark paper that opens our eyes to the unrelenting power challenge we face in the multicore era.
Research and Advances Research highlights
Power Challenges May End the Multicore Era
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases continue, the per-transistor speed and energy efficiency improvements have slowed dramatically.
Opinion Last byte
These puzzles involve computing probabilities associated with dice.