DEPARTMENT: Editor's letter
A frequent question I hear about Communications, and about ACM publishing in general, involves its access model. I am asked: "Why don't you adopt the open-access model?" Good question! Why don't we?
Moshe Y. Vardi
DEPARTMENT: Publisher's corner
This issue marks the first anniversary of the completely revamped Communications, so I thought it would be appropriate to report on how we're doing so far.
Scott E. Delman
DEPARTMENT: Letters to the editor
Mark Guzdial's Viewpoint "Teaching Computing to Everyone" (May 2009) was interesting reading but included several implications, possibly unintentional, that should be corrected.
Greg Linden reveals his new approach to reading research papers, Mark Guzdial discusses how to encourage students to write computer programs, and Tessa Lau shares her ideas about the importance of Web visibility.
Mark Guzdial, Greg Linden, Tessa Lau
DEPARTMENT: CACM online
Thanks to computer scientists like Barbara Liskov, researchers are making major progress with cost-efficient fault tolerance for Web-based systems.
Several software projects are narrowing the performance gap between browser-based applications and their desktop counterparts. In the process, they're creating new ways to improve the security of Web-based computing.
Kirk L. Kroeker
Computer technology has enhanced lives in countless ways, but some experts believe it might be affecting people's ability to think deeply.
Barbara Liskov muses about the creative process of problem solving, finding the perfect design point, and pursuing a research path.
Karen A. Frenkel
Jon Kleinberg is honored for his pioneering research on the Web and social networking.
Among this year's distinguished honorees are Barbara Liskov of Massachusetts Institute of Technology and Jon Kleinberg of Cornell University.
Why the Google Book Search settlement agreement under consideration could result in an extensive restructuring of the book industry.
Does the trend toward standardization and modularization of professional services make outsourcing inevitable?
A guide to playing the ploys frequently employed by cliché-driven management.
Phillip G. Armour
Aligning computer science with high school mathematics can help turn it into an essential subject for all students.
Matthias Felleisen, Shriram Krishnamurthi
Considering the most effective methods for teaching students the fundamental principles of software engineering.
Robert Dewar, Owen Astrachan
Revisiting Gray and Putzolu's famous rule in the age of Flash.
The laws of physics and the Internet's routing infrastructure affect performance in a big way.
Jonathan M. Smith
SECTION: Contributed articles
Network software adapts to user needs and load variations and failures to provide reliable communications in largely unknown networks.
It takes a city of developers to build a big system that is never done.
Rick Kazman, Hong-Mei Chen
SECTION: Review articles
Treasures abound from hidden facts found in imprecise data sets.
Nilesh Dalvi, Christopher Ré, Dan Suciu
SECTION: Research highlights
In one scene from The Matrix
, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither can operate. The humans quickly call up a "pilot program" for …
Stuart Russell, Lawrence Saul
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical behavior, it is particularly difficult to design controllers that …
Adam Coates, Pieter Abbeel, Andrew Y. Ng
In the early 1970s, pioneers like Floyd, Dijkstra, and Hoare argued that programs should be formally specified and proven correct. But for the past 40 years, most of the computer …
This paper reports on the development and formal verification of CompCert, a compiler from Clight (a large subset of the C programming language) to PowerPC assembly code, using the Coq proof assistant both for programming the …
COLUMN: Last byte
Barbara Liskov talks about her ground breaking work in data abstraction and distributed computing.
SECTION: Virtual extension
The "Internet of Things," once reality, will have to rely on a global IT infrastructure that provides information about all those "things" in a secure and reliable manner. The EPCglobal Network is a proposal for a widely distributed …
Benjamin Fabian, Oliver GÜnther
A number of years ago, Peter Keen implored information systems researchers to develop theory they could call their own, which would build a cumulative tradition in the area, while maintaining close ties to practice …
James L. Parrish, James F. Courtney
Wireless service providers have invested heavily in upgrading their networks to the next generation standard (3G). However, consumer interest in data services does not paint a rosy picture for the providers.
Arvind Malhotra, Claudia Kubowicz Malhotra
The literature in the field of project management, especially the literature about risk, is particularly rich in advice about addressing software failure …
Johann Rost, Robert L. Glass
Since SCADA networks were initially designed with little attention to security, they can be easy targets of attacks by terrorist groups.
Sandip C. Patel, Ganesh D. Bhatt, James H. Graham
Occasionally self-described laggards behave as early adopters. In this article, we examine the early implementation by a late adopter in a semi-crisis position, using the case of Comcast IPv6 adoption as an example.
Anat Hovav, Ciprian Popoviciu
Decades of evidence reveal a shockingly low success rate for software projects. Although the record is slowly improving, much work remains before software project success becomes the norm rather than the exception.
Richard W. Woolridge, David P. Hale, Joanne E. Hale, R. Shane Sharpe
In modern information societies, the ethical integrity and accountability of IT professionals is particularly important, given the extensive reliance of individuals as well as organisations and governments on various forms of …
Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li