DEPARTMENT: CSTA letter
Many colleges and universities now have ongoing outreach and mentoring programs because they understand that waiting for students to come to them is a recipe for disaster. Interest …
DEPARTMENT: Letters to the editor
As long as CS educators cannot agree about the fundamental importance of mathematics is an essential aspect of a proper CS education, practice will remain below the professional …
In excerpts from the BLOG@CACM expert blog, Jeannette M. Wing writes about the negative effects of deadline-driven research, and Mark Guzdial discusses the role of computer science faculty in fostering inequality.
DEPARTMENT: In the virtual extension
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
DEPARTMENT: CACM online
There is an in inherent weakness to crowdsourcing that should bother computer scientists and computer users alike. It's the fact there is no clear difference between "the wisdom …
Researchers are using tools from information theory and computer science to facilitate the automatic creation of nanoscale structures.
The hegemony of the traditional desktop operating system is starting to fracture with the emergence of a new generation of Web browsers that may finally herald the long-awaited convergence of Web and OS.
Today's automated systems provide enormous safety and convenience. However, when glitches, problems, or breakdowns occur, the results can be catastrophic.
This year's Grace Hopper Celebration focused on using technology for social good.
Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.
How government-industry collaboration can have far-reaching economic influences.
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.
Frequent broken builds could be symptomatic of deeper problems within a development project.
A view of semantic computing and its role in research.
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
DNS is many things to many people — perhaps too many things to too many people.
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?
SECTION: Contributed articles
Easing the programmer's burden does not compromise system performance or increase the complexity of hardware implementation.
University CS departments are incorporating game design and development to prepare their students for the game industry's expectations.
SECTION: Review articles
Integrating computer games into existing CS courses may help attract students to the field, but there are guidelines to be considered.
SECTION: Research highlights
There are many who believe we are on the verge of the biggest change in the way products are made since the Industrial Revolution. This is a revolution where individuals will …
We introduce Plushie, an interactive system that allows nonprofessional users to design their own original plush toys. We successfully demonstrated that nonprofessional users could design plush toys or balloon easily using Plushie …
One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The combination of computer graphics hardware with a …
ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability to sense a …
COLUMN: Last byte
Last month (November 2009, p. 112) we posted a trio of brain teasers, including one as yet unsolved, concerning the covering of a plane.
The computer reconfigures me.
SECTION: Virtual extension
Though the current understanding of virtual teams has advanced in significant areas over the last few years, it has not taken sufficient account of power dynamics within virtual teams nor sought to explore the nature of power …
Are Internet users' concerns for personal information privacy, principally manifested as online privacy, related to their attitudes on government surveillance and national ID cards (often perceived as a surveillance tool)?
The processes behind corporate efforts to create, manage, publish, and archive Web information has also evolved using Web Content Management Systems (WCMS). WCMS allow teams to maintain Web content in a dynamic fashion through …
Academic computer science has an odd relationship with software: Publishing papers about software is considered a distinctly stronger contribution than publishing the software. The historical reasons for this paradox no longer …
We have been developing software since the 1960s but still have not learned enough to ensure that our software development projects are successful. Boehm suggested that realistic schedule and budgets together with a continuing …
Users of computer systems are accustomed to being asked for passwords — it is as universal as it is frustrating. In the past there was little tolerance for the problems experienced …
The meteoric rise in cybercrime has been an issue of pressing concern to our society. Internet-related frauds accounted for 46% of consumer complaints made to the Federal Trade Commission (FTC) in 2005. Total losses of Internet …
Careless employees, who do not follow information security policies, constitute a serious threat to their organization. We conducted a field survey in order to understand which factors help towards employees' compliance with …