While the P vs. NP quandary is a central problem in computer science, a resolution of the problem may have limited practical impact.
Moshe Y. Vardi
DEPARTMENT: Letters to the editor
Though I agree with Mordechai Ben-Ari's Viewpoint "Objects Never? Well, Hardly Ever!" (Sept. 2010) saying that students should be introduced to procedural programming before …
Communications' Virtual Extension expands the page limitations of the print edition by bringing readers high-quality articles in an online-only format.
Tessa Lau launches a discussion about the acceptance criteria for HCI systems papers at CHI, UIST, and other conferences.
DEPARTMENT: CACM online
When it comes to electronic formats, Communications
readers prefer PDF to HTML, according to data on a year's worth of published articles. PDF's faithful reproduction of magazine pages appears to give it an edge. Legacy is another …
Today's data deluge is leading to new approaches to visualize, analyze, and catalog enormous datasets.
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
What are the job prospects for today's—and tomorrow's—graduates?
The U.S. Federal Communications Commission's decision to open frequencies in the broadcast spectrum could enable broadband networks in rural areas, permit smart electric grids, and more.
COLUMN: Economic and business dimensions
Reading between the lines of the thematic gap between the supply and demand of online news.
Pablo J. Boczkowski
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey
COLUMN: Legally speaking
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.
COLUMN: Privacy and security
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.
Joel F. Brenner
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.
COLUMN: Viewpoints: Virtual extension
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science that all students will receive as part of their K–12 education …
Want to keep your users? Just make it easy for them to leave.
Brian W. Fitzpatrick, JJ Lueck
As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.
David S. H. Rosenthal
To move forward with programming languages we must first break free from the tyranny of ASCII.
SECTION: Contributed articles
For workloads with abundant parallelism, GPUs deliver higher peak computational throughput than latency-oriented CPUs.
Michael Garland, David B. Kirk
Concerns about biased manipulation of search results may require intervention involving government regulation.
Patrick Vogl, Michael Barrett
SECTION: Contributed articles: Virtual extension
Positioning mobile devices in the third generation of wireless communication networks is crucial to many commercial services. However, positioning techniques vary by accuracy, implementation cost, and typical application scenarios …
Massimo Ficco, Roberto Pietrantuono, Stefano Russo
Though computer scientists agree that conference publications enjoy greater status in computer science than in other disciplines, there is little quantitative evidence to support this view.
Jill Freyne, Lorcan Coyle, Barry Smyth, Padraig Cunningham
SECTION: Review articles
Computational complexity may truly be the shield against election manipulation.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
SECTION: Research highlights
Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming model. Unfortunately, shared-memory programs are …
GOLDILOCKS is a Java runtime that monitors program executions and throws a
when a data race is about to occur. This prevents racy accesses from taking place …
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran
Multithreaded programs are notoriously prone to race conditions. Prior work developed precise dynamic race detectors that never report false alarms. However, these checkers employ expensive data structures that result in significant …
Cormac Flanagan, Stephen N. Freund
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.