acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sharing Security Information and the Prisoner's Dilemma
From Schneier on Security

Sharing Security Information and the Prisoner's Dilemma

New paper: Dengpan Liu, Yonghua Ji, and Vijay Mookerjee (2011), "Knowledge Sharing and Investment Decisions in Information Security," Decision Support Systems,...

WellPoint Meet Watson
From The Eponymous Pickle

WellPoint Meet Watson

More on the use of Artificial Intelligence techniques for medical diagnosis.  I happen to be visiting the offices of WellPoint this afternoon.  Note the mention...

On Marketing Automation
From The Eponymous Pickle

On Marketing Automation

In E-Commerce Times:  " ... There is a lot of hype around marketing automation, and it's for good reason. An effective marketing automation strategy and implementation...

NSF Seeking Proposals at the Interface of Computing, Economics
From The Computing Community Consortium Blog

NSF Seeking Proposals at the Interface of Computing, Economics

The National Science Foundation’s Directorates for Computer and Information Science and Engineering (CISE) and Social, Behavioral, and Economic Sciences (SBE)

links for 2011-09-15
From Wild WebMink

links for 2011-09-15

UK business and government dangerously out of tune with cyber threats, says Chatham House – 9/15/2011 – Computer Weekly Interesting how the government is keen to...

This Week, I Am Part of an Internet Meme
From My Biased Coin

This Week, I Am Part of an Internet Meme

My frequent co-authors John Byers, Giorgos Zervas, and I posted an extended version of a current submission to the arxiv (as people do), which showed up last Friday...

A Status Report: "Liars and Outliers"
From Schneier on Security

A Status Report: "Liars and Outliers"

It's been a long hard year, but the book is almost finished. It's certainly the most difficult book I've ever written, mostly because I've had to learn academic...

Imagine Cup 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Imagine Cup 2012

Solving the world

More Efficient Crowdsourcing Models
From The Eponymous Pickle

More Efficient Crowdsourcing Models

In the ACM:" ... In recent years, crowdsourcing has gained more adherents as governments, businesses, and others aim to tap into the collective wisdom of crowds...

Master Class on the Science of Human Nature
From The Eponymous Pickle

Master Class on the Science of Human Nature

In The Edge: This looks very good. " ... Princeton psychologist Daniel Kahneman on the marvels and the flaws of intuitive thinking; Harvard mathematical biologist...

Crowd Sourcing Open Innovation with Lego
From The Eponymous Pickle

Crowd Sourcing Open Innovation with Lego

From Innovation Excellence: " ... Yes, you gotta love Lego! Not only is the company doing amazingly well during this

I'll Have Some AppInventor with My Java, Please!
From Computer Science Teachers Association

I'll Have Some AppInventor with My Java, Please!

I jumped on the AppInventor bandwagon at a workshop at SIGCSE 2010 and believed that my students would really enjoy building apps for Android phones as much as...

Six Provocations for Big Data
From Apophenia

Six Provocations for Big Data

The era of “Big Data” has begun. Computer scientists, physicists, economists, mathematicians, political scientists, bio-informaticists, sociologists, and many others...

Risk Tolerance and Culture
From Schneier on Security

Risk Tolerance and Culture

This is an interesting study on cultural differences in risk tolerance. The Cultures of Risk Tolerance Abstract: This study explores the links between culture...

Cosmetics of Youth
From The Eponymous Pickle

Cosmetics of Youth

A piece in the local paper about a scientist at P&G that is working on Olay solutions." ... As a senior scientist at P&G's Miami Valley labs, her work won't even...

Teaching at Girl Develop It Ottawa's Kickoff Event
From The Female Perspective of Computer Science

Teaching at Girl Develop It Ottawa's Kickoff Event

Girl Develop It: "Want to learn how to code? Have a great idea? Don't be shy. Develop it."  It's exactly what the Ottawa community needs: a way to engage professional...

From Computational Complexity

Conventions in Math- just to make the rules work or more?

Why is a1/2 = sqrt(a)? true? To make the rule ax+y=ax a y work out. Why is (∀ x ∈ ∅)[P(x)] true? To make the rule (∀ x ∈ A ∪ B)[P(x)] iff (∀ x ∈ A)[P(x)]...

links for 2011-09-14
From Wild WebMink

links for 2011-09-14

The Great Copyright Conspiracy Laid Bare It will come as no surprise to anyone reading here regularly, but there may be some that still don't realise their political...

Google Changes their Algorithm
From The Eponymous Pickle

Google Changes their Algorithm

Algorithmic improvements at Google.   Its good to watch what Google is doing to know what you are getting.   Are you getting more quality sites today?  I find myself...

TSA Administrator John Pistole on the Future of Airport Security
From Schneier on Security

TSA Administrator John Pistole on the Future of Airport Security

There's a lot here that's worth watching. He talks about expanding behavioral detection. He talks about less screening for "trusted travelers." So, what do the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account