Science has been growing new legs of late. The traditional "legs" (or "pillars") of the scientific method were theory
Computational science has been called …
DEPARTMENT: Letters to the editor
"Managing Scientific Data" (June 2010) explained that data generated by research projects is valuable only when annotated with metadata describing the data's provenance, …
Ed H. Chi writes about the social Web's impact on CS education. Ruben Ortega discusses software and test-driven development.
DEPARTMENT: CACM online
Numbers give meaning to the promises on the Communications
Web site to deliver timely, substantive content that complements the magazine's peer-reviewed material and makes Communications
a valued component of ACM membership. …
Computational neuroscientists are learning that the brain is like a computer, except when it isn't.
Sensor-equipped bicycles are providing valuable data to cyclists, city planners, and computer scientists.
The Internet is making higher education accessible to a whole new class of students—but not necessarily at a lower cost.
ACM's expansion into China will support local professionals and increase Chinese involvement in ACM's international activities.
László Lovász, Vinton G. Cerf, and other researchers are honored for their contributions to computer science.
COLUMN: The business of software
Calculating the likely true cost of projects.
COLUMN: Law and Technology
An overview of a new set of legal principles for software contracts developed by the American Law Institute.
COLUMN: The profession of IT
Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.
Revisiting the Great Objects Debate.
Should researchers focus on designing new network architectures or improving the current Internet?
Information technology has the potential to radically transform health care. Why has progress been so slow?
Error-detection and correction features are only as good as our ability to test them.
Improving the performance of complex software is difficult, but understanding some fundamental principles can make it easier.
SECTION: Contributed articles
Computing research ages more slowly than research in other scientific disciplines, supporting the call for parity in funding.
The same component isolation that made it effective for large distributed telecom systems makes it effective for multicore CPUs and networked applications.
SECTION: Review articles
A call for the perfect marriage between classical performance evaluation and state-of-the-art verification techniques.
SECTION: Research highlights
Government agencies worldwide release statistical information about population, education, and health, crime, and economic activities. In the U.S., protecting this data …
Privacy Integrated Queries (PINQ) is an extensible data analysis platform designed to provide unconditional privacy guarantees for the records of the underlying data sets. PINQ's analysis language and its implementation provide …
It takes little imagination to come up with a wealth of problems in scheduling and planning that can be expressed as Constraint Satisfaction Problems
(CSPs). It's no surprise …
In a constraint satisfaction problem (CSP) the goal is to find an assignment of a given set of variables subject to specified constraints. A global cardinality constraint is an additional requirement that prescribes how many …
COLUMN: Last byte
It's amazing how little we know about good old plane geometry. Last month (August 2010, p. 128) we posted a trio of brainteasers, including one as yet unsolved, concerning figures on a plane. Here, we offer solutions to two of …
In a world of technology and fear, the public gets to know what it wants to know . . . and more than it can possibly digest.