acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sending Coded Messages with Postage Stamps
From Schneier on Security

Sending Coded Messages with Postage Stamps

The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...

From The Computing Community Consortium Blog

Last March, we noted that the National Science Foundation (NSF), together with 7 other international funders, was launching the second round of an international...

Control Algorithm
From The Eponymous Pickle

Control Algorithm

An Algorithm that estimates who is in control based on speech patterns. Sounds obvious, but there are likely subtle semantic details involved.

Microsoft Bliink 2012 Illinois Web Design Competition
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Microsoft Bliink 2012 Illinois Web Design Competition

Registration for the Microsoft Bliink 2012 Illinois Web Design Competition is now open. Bliink (http://bit.ly/Bliink) is open to Illinois students ages 13-19 participating...

The Poor State of US Public Domain Laws
From The Eponymous Pickle

The Poor State of US Public Domain Laws

Techdirt Post on how public domain laws are preventing access to works that should surely be available to all by now. A situation that needs to be corrected soon...

US to Become Paperless?
From The Eponymous Pickle

US to Become Paperless?

Polls say no. we examined this for years. Paper will always be here, but in reduced amounts. I think tablets will push the gap closer than it had been.

Are you a gold prospector, or a construction worker?
From Daniel Lemire's Blog

Are you a gold prospector, or a construction worker?

Most work is akin to construction jobs: you work until the house is built. You just have to keep the servers running day after day. You keep writing code day after...

Is It Smart to Use Smart Phones
From Computer Science Teachers Association

Is It Smart to Use Smart Phones

While not the latest trend, I find that more of the teachers in one district I serve are using 'smart' phones among their educational tools for learning. One teacher...

From Computational Complexity

Is there a NICE gadget for showing PLANAR HC is NPC?

(I have already posted this question on CS Theory Stack Exchange.) If you know that 3-COL is NPC then you can prove that PLANAR 3-COL is NPC by a NICE gadget...

Data Tech Trend
From The Eponymous Pickle

Data Tech Trend

Data will be a defining Tech Trend. Based on several trips I took in December to clients, it is clear that companies are looking for ways to leverage their huge...

From The Computing Community Consortium Blog

Happy New Year, everyone! As we kick off 2012,

Computer Science Orphans
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Orphans

I had a conversation with one one of the senior managers of the FIRST Lego League challenge. FIRST Lego League or FLL is a robot related competition for students...

Pointer, to Cash for Citations
From My Biased Coin

Pointer, to Cash for Citations

I'm disturbed to find that nobody is offering to pay me large sums just to have me affiliated with them for the purposes of raising their citation count.  WhatCrooked...

Maps of science
From The Eponymous Pickle

Maps of science

In Flowingdata: An interesting map that shows the interrelationships of scientific fields based on published papers. This kind of visualization is more useful for...

Changing our Relationhip with Technology
From The Eponymous Pickle

Changing our Relationhip with Technology

Will AI do this?. An Intel director comments. Yes I have believed that since our work in the area in the 80s. It is a matter of timing. We were too optimistic...

Allocating Security Resources to Protect Critical Infrastructure
From Schneier on Security

Allocating Security Resources to Protect Critical Infrastructure

Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56

More than money
From Putting People First

More than money

It’s increasingly clear that we live in collaborative times. Many of the most interesting innovations of recent years have at their heart ideas of sharing, bartering...

Applying Game Theory to Cyberattacks and Defenses
From Schneier on Security

Applying Game Theory to Cyberattacks and Defenses

Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...

Interesting Links 02 January 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 02 January 2012

Happy New Year! My best wishes for a healthy, happy and prosperous New Year to all my readers. Today is technically the last day of y vacation. Back to a full day...

AI Will Change Our Relationship With Tech
From Putting People First

AI Will Change Our Relationship With Tech

Genevieve Bell, interaction and experience research director at Intel Labs, has published a guest post on the BBC website on how artificial intelligence will change...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account