November 2003 - Vol. 46 No. 11

November 2003 issue cover image

Features

Opinion Editoral pointers

Editoral Pointers

The future of high-performance networking and the data-intensive applications that depend on it is in the hands of some of today’s brightest computer scientists. Their efforts are making it possible for e-scientists to collaborate on projects sometimes so wide-ranging they embrace the entire universe from desktops worldwide. These breathtaking projects point to a globally distributed […]
News News track

News Track

Fast on the heels of a U.S. Federal Trade Commission report indicating the incidence of identity theft is far greater than the government previously believed, comes a report from the General Accounting Office offering clear evidence how easy it is to obtain fake driver’s licenses throughout the U.S. Congressional investigators readily convinced DMV employees to […]
Opinion Forum

Forum

Computer science students certainly need math, and the math they need should include what Peter Henderson recommended in his article "Mathematical Reasoning in Software Engineering Education" (Sept. 2003), namely, discrete math and logic. But computer scientists also need other kinds of math. A typical set of math courses toward a CS undergraduate degree might include: […]
Research and Advances Blueprint for the future of high-performance networking

Introduction

E-scientists are moving from a processor-centric to a network-centric world with new levels of persistent collaboration over transoceanic distances and the ability to process, disseminate, and share vast stores of distributed data.
Research and Advances Blueprint for the future of high-performance networking

Transport Protocols For High Performance

The Explicit Control Protocol and other new congestion-control systems greatly improve application performance over a range of network infrastructure, including extremely high-speed and high-delay links. What then is next for TCP and other established but less-capable Internet protocols?
Opinion Inside risks

Security By Obscurity

The belief that code secrecy can make a system more secure is commonly known as security by obscurity. Certainly, vendors have the right to use trade secret protection for their products in order to extend ownership beyond the terms afforded under copyright and patent law. But some software systems must satisfy critical requirements under intensive […]

Recent Issues

  1. July 2024 CACM cover
    July 2024 Vol. 67 No. 7
  2. June 2024 Vol. 67 No. 6
  3. May 2024 CACM cover
    May 2024 Vol. 67 No. 5
  4. April 2024 CACM cover with text
    April 2024 Vol. 67 No. 4