acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Proving DFA-langs closed under concat and * without using equiv to NDFA's

While teaching the Equiv of DFA, NDFA, Reg exps, I wanted to impress upon my students that the best way to show DFA-langs are closed under concat and * is to first...

Hill Tech Happenings, Week of February 11
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 11

February 14 Hearing: The House Select Committee on Intelligence will hold a hearing on advanced cyber threats. 10 a.m., HVC-210 Capitol Visitors Center The Research...

Our New Regimes of Trust
From Schneier on Security

Our New Regimes of Trust

Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...

CS Principles–An Update
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Principles–An Update

The About the Program page for the CS Principles, A New First Course in Computing website has some updated documents since the last time I visited it. Of particular...

Daily Show
From My Biased Coin

Daily Show

Anyone else watching Jon Stewart making fun of Harvard w/regard to the "cheating scandal".[I need the exact wording for the punch line -- "Open Internet?  Is this...

Really Clever TLS Attack
From Schneier on Security

Really Clever TLS Attack

This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...

The big-O notation is a teaching tool
From Daniel Lemire's Blog

The big-O notation is a teaching tool

One of my clients once got upset. Indeed, the running time of our image processing algorithm grew by a factor of four when he doubled the resolution of an image...

Platform Fragmentation as a Security Issue
From Schneier on Security

Platform Fragmentation as a Security Issue

Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...

Interesting Links 11 February 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 11 February 2013

Last week was a great one for me. It ended with a massive snowstorm that hit New Hampshire Friday though Saturday. I love snow and we haven’t had as much as I would...

Networked Norms: How Tech Startups and Teen Practices Challenge Organizational Boundaries
From Apophenia

Networked Norms: How Tech Startups and Teen Practices Challenge Organizational Boundaries

At the ASTD TechKnowledge conference, I was asked to reflect on networked learning and how tomorrow’s workers will challenge today’s organizations. I did some reflecting...

Recipes and Components
From The Eponymous Pickle

Recipes and Components

Online grocery start up HelloFresh raises 'millions' in funding from Rocket, Kinnevik and others.  More details.   As an amateur cook I like the idea of task lists...

Interview with Michael Griffiths, Director of Ethnographic Research, Ogilvy & Mather China
From Putting People First

Interview with Michael Griffiths, Director of Ethnographic Research, Ogilvy & Mather China

Michael B Griffiths is Director of Ethnography at Ogilvy & Mather, Greater China, Associate Research Fellow, White Rose East Asia Centre, and External Research...

Industrial design
From The Computing Community Consortium Blog

Industrial design

Here’s a “must read” article for you HCI types:  a New York Times obituary for John E. Karlin, a Bell Labs industrial psychologist who is responsible for 7-digit...

UK Report: Notions of identity will be transformed in the next decade
From Putting People First

UK Report: Notions of identity will be transformed in the next decade

Hyper-connectivity – where people are constantly connected to social networks and streams of information – will have a transforming effect on how we see ourselves...

Delete All EMails Simplifies Communications
From The Eponymous Pickle

Delete All EMails Simplifies Communications

In ComputerWorld:   In a review of the new Blackberry phone the idea of a  'delete all' email button is mentioned.  I remember that capability when I used a Backberry...

Friday Squid Blogging: Squid Recipe
From Schneier on Security

Friday Squid Blogging: Squid Recipe

Chorizo-stuffed squid with potatoes, capers and sage. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

I Seem to Be a Physical Security Expert Now
From Schneier on Security

I Seem to Be a Physical Security Expert Now

This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.

CCC Sponsored Workshop for Multidisciplinary Research for Online Education (MROE)
From The Computing Community Consortium Blog

CCC Sponsored Workshop for Multidisciplinary Research for Online Education (MROE)

The following is a special contribution to this blog from Douglas H. Fisher, Associate Professor of Computer Science and Computer Engineering at Vanderbilt University...

Millennials and Cybersecurity
From Schneier on Security

Millennials and Cybersecurity

This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...

Promoting Computer Science
From Computer Science Teachers Association

Promoting Computer Science

Computer Science is an elective class in my high school district and in many other districts. The simple truth is that elective teachers must promote their courses...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account