It has been almost a year since I assumed the editor-in-chief role for Journal of the ACM (JACM). It seems the right time to share some thoughts on how ACM's oldest publication is doing and where it might be headed.
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
DEPARTMENT: Letters to the editor
IRBs need computer scientists, a point highlighted by the Viewpoint "Institutional Review Boards and Your Research" by Simson L. Garfinkel and Lorrie Faith Cranor (June 2010) …
Greg Linden asks if spammers have been defeated; Michael Bernstein discusses Clay Shirky's keynote speech at CSCW 2010; and Erika S. Poole writes about how the digital world can help parents cope with the death of a child.
Greg Linden, Michael Bernstein, Erika Shehan Poole
DEPARTMENT: CACM online
The world of Communications
is not contained in the pages of a monthly magazine. Like other publications, it has expanded over time into a variety of electronic formats for …
A field emerging from economics is teaming up with computer science to improve auctions, supply chains, and communication protocols.
Researchers working in vision and graphics are attempting to develop new techniques and technologies to overcome the current limitations in stereoscopic 3D.
Kirk L. Kroeker
Data captured by sensors worn on the human body and analyzed in near real-time could transform our understanding of human behavior, health, and society.
The PLATO@50 Conference marked the semicentennial of the computer system that was the forerunner of today's social media and interactive education.
Kirk L. Kroeker
Sanjeev Arora, Joseph S.B. Mitchell, and other researchers are recognized for their contributions to computer science.
COLUMN: Economic and business dimensions
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband adoption; and the debate over network neutrality. Interestingly …
Christopher S. Yoo
Robotics will inspire dramatic changes in the CS curriculum.
David S. Touretzky
COLUMN: Emerging markets
An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Ping Gao, Jiang Yu
COLUMN: Kode Vicious
The what, the how, and the why of giving an effective presentation.
George V. Neville-Neil
COLUMN: Privacy and security
Recalling malware milestones.
Eugene H. Spafford
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.
The computer science luminary, in one of his last interviews before his death in 2002, reflects on a programmer's life.
Philip L. Frana, Thomas J. Misa
Could ubiquitous hand-drawn code map diagrams become a thing of the past?
Robert DeLine, Gina Venolia, Kael Rowan
Leading experts debate how virtualization and clouds impact network service architectures.
Everything you always wanted to know but were afraid to ask about the decision-making process.
Jan Damsgaard, Jan Karlsbjerg
SECTION: Contributed articles
Safe, modern programming languages let Microsoft rethink the architectural trade-offs in its experimental operating system.
James Larus, Galen Hunt
Early patterns of Digg diggs and YouTube views reflect long-term user interest.
Gabor Szabo, Bernardo A. Huberman
SECTION: Review articles
Solving the memory model problem will require an ambitious and cross-disciplinary research direction.
Sarita V. Adve, Hans-J. Boehm
SECTION: Research highlights
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider many real-world systems are constantly evolving.
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target Web server logic and are based on a new …
Hristo Bojinov, Elie Bursztein, Dan Boneh
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of it dead code? Can I replace that code fragment with …
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated …
Isil Dillig, Thomas Dillig, Alex Aiken
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.
SECTION: Virtual extension
The service sector is becoming increasingly important to the economies of many countries, especially developed countries. OECD recently released a report noting that government policy in developed countries has not been attuned …
Wei-Fung Tung, Soe-Tsyr Yuan
Software development practices have evolved substantially during the past decade. As so called "agile" approaches have gained more acceptance, the service-oriented approach to IT architecture has become an important alternative …
Marc N. Haines, Marcus A. Rothenberger
The growth both in quantity and diversity of online communities across the World Wide Web, along with a number of new technologies that enhance both social interaction and content management, have bred an array of increasingly …
Software developers during their work face a multitude of options. There are methodological choices and technological choices. While solid research is available on some methodological topics, there is hardly any high-quality …