In a typical business, you have two parties: sellers and buyers. In scholarly publishing you also have sellers and buyers, these are the publishers and the research libraries. However, you have two additional parties. On one …
DEPARTMENT: Letters to the Editor
Pondering Moshe Y. Vardi's "What Is an Algorithm?" (Mar. 2012), one should consider that in its most abstract and tangible form an algorithm is simply an integral number and that an interpretation of an algorithm as an abstract …
DEPARTMENT: [email protected]
Mark Guzdial writes about why computer science should permeate popular culture. Judy Robertson discusses the educational benefits of using console games in the classroom.
Researchers now have the capability to look at the small-world problem from both the traditional algorithmic approach and the new topological approach.
Propelled by a proliferation of mobile devices and social networks, an enhanced family of Web specifications is bringing new power to developers and new capabilities to users.
The biggest change to U.S. patent law in nearly 60 years brings many changes, but fails to solve the software industry's most vexing problems.
Researchers discover computer pioneer Konrad Zuse's long-forgotten Z9, the world's first program-controlled binary relay calculator using floating-point arithmetic.
COLUMN: Technology strategy and management
While often ambiguously defined, business models are central to innovation.
COLUMN: Legally speaking
Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.
COLUMN: Computing ethics
Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies do not adequately recognize the potential of information systems …
COLUMN: Historical reflections
All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical stored program computer Turing proposed after the war in February …
By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company.
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management commitment and step-by-step methods to integrate privacy into systems …
Active queue management is just one piece of the solution to persistently full buffers.
Until our programming languages catch up, code will be full of horrors.
There are four common pitfalls to avoid when using software metrics in a project management setting.
SECTION: Contributed articles
A searchable meta-graph can connect even troublesome house elves and other supernatural beings to scholarly folk categories.
The reductionism behind today's software-engineering methods breaks down in the face of systems complexity.
On-chip hardware coherence can scale gracefully as the number of cores increases.
SECTION: Review articles
A novel paradigm for programming reactive systems centered on naturally specified modular behavior.
SECTION: Research highlights
Like other IT fields, computer architects initially reported incomparable results. We quickly saw the folly of this approach. We then went through a sequence of performance metrics. When a field has good benchmarks, we settle …
The past 10 years have delivered two significant revolutions. Microprocessor design has been transformed — leading to multicore processors. And an entirely new software landscape has emerged — revolutionizing how software is …
In 1999, Elias Koutsoupias and Christos Papadimitriou initiated the study of "How much worse off are we due to selfishness?" They compared the worst case pure Nash equilibria to the optimal solution. This ratio was later called …
The price of anarchy, defined as the ratio of the worst-case objective function value of a Nash equilibrium of a game and that of an optimal outcome, quantifies the inefficiency of selfish behavior.
COLUMN: Last byte
When glasses track glances, will eyes still meet across a crowded room?
SECTION: Contributed articles: Virtual extension
Evidence suggests small firms can reap rewards from developing a high level of formal process capability.