Sign In

Communications of the ACM

Table of Contents

Revisiting computer security in the business world

In my first column (Communications, Apr. 1990) I discussed computer security in the business world. I remarked that whereas the military had always attached great importance to security, business managers regarded it as yet another …

Private life in cyberspace

I have lived most of my life in a small Wyoming town, where there is little of the privacy which both insulates and isolates suburbanites. Anyone in Pinedale who is interested in me or my doings can get most of that information …

Real-time knowledge-based control systems

This special section is the outgrowth of a workshop on real-time knowledge-based control systems, held during the 1990 national conference of the American Association for Artificial Intelligence (AAAI). The workshop was motivated …

Real-time disturbance control

Intelligent real-time control of robotic vehicles

Declarative control architecture

Reducing problem-solving variance to improve predictability

A storage and access manager for ill-structured data

Database management systems are powerful tools for processing large volumes of structured, or normalized, data. Much of the data to be stored in computer systems, however, differs from normalized data in both its logical uses …

Impacts of life cycle models on software configuration management

Mixed signals about social responsibility

What is the appropriate role of computer professionals in determining how their work is used? Should they consider the societal implications of their work?