As most members of our organizations probably know, there is a great deal of overlap between the products and services offered by the IEEE CS and ACM. In fact, about 27% of ACM members belong to IEEE CS.
DEPARTMENT: Letters to the editor
In their article "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Qing Hu et al. (June 2011) analyzed deterrence of employee violation of …
To ensure the timely publication of articles, Communications
created the Virtual Extension (VE) to bring readers high-quality articles in an online-only format. The following articles are now available to ACM members via the …
DEPARTMENT: [email protected]
Michael Stonebraker discusses several reasons why NoSQL has not caught on with enterprise users.
DEPARTMENT: CACM online
For many, the five dreaded words "This article is premium content" is a frustration. Many in the community would prefer all publications be made freely …
Computers are unable to defeat the world's best Go players, but that may change with the application of a new strategy that promises to revolutionize artificial intelligence.
The twin challenges of parallelism and energy consumption are enlivening supercomputers' progress.
The Holy Grail of language translation is to develop a machine-based system that can handle the task transparently and accurately.
COLUMN: Economic and business dimensions
Just because a team is virtual, it doesn't mean geography is dead.
Computer science is not that difficult but wanting to learn it is.
COLUMN: Privacy and security
An assessment of the U.S. government's EINSTEIN project.
COLUMN: Kode Vicious
Beware keeping data in binary format.
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice in CS has been to publish in a conference …
In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a good proposition for implementing network …
Heterogeneous systems allow us to target our programming to the appropriate environment.
It's no easy task for NoSQL.
SECTION: Contributed articles
Unite neuroscience, supercomputing, and nanotechnology to discover, demonstrate, and deliver the brain's core algorithms.
Women increasingly publish in ACM conference proceedings and are notably productive authors.
Algorithmic-based user incentives ensure the trustworthiness of evaluations of Wikipedia entries and Google Maps business information.
SECTION: Review articles
BI technologies are essential to running today's businesses and this technology is going through sea changes.
SECTION: Research highlights
Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive datasets? The answer to this question is a firm …
Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications in information retrieval and data management. One common …
Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for interacting, more real estate is generally better. This …
is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve the location of finger taps on the arm and hand using a novel …
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In fact, this time it's a famously unsolved problem.
SECTION: Contributed articles: Virtual extension
Privacy impact assessments should be integrated into the overall approach to risk management with other strategic planning instruments.
Cyberwarfare is a potent weapon in political conflicts, espionage, and propaganda. Difficult to detect a priori, it is often recognized only after significant damage has been done. Gaining offensive capability on the cyber battlefield …