acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Techniques in Sentiment Analysis
From The Eponymous Pickle

Techniques in Sentiment Analysis

In CACM:   Excellent overview piece on the subject.  The abstract itself has interest: " ... Sentiment analysis (or opinion mining) is defined as the task of finding...

Keynote: Christopher Painter, Coordinator for Cyber Issues, U.S. Department of State (Summary)
From CERIAS Blog

Keynote: Christopher Painter, Coordinator for Cyber Issues, U.S. Department of State (Summary)

Thursday, April 4th, 2013 Summary by Kelley Misata As Christopher Painter, Coordinator for Cyber Issues within the US Department of State, began his keynote address...

On Joining OIN
From Wild WebMink

On Joining OIN

I signed up Meshed Insights as an OIN licensee, and was amazed when I told people how few people knew it existed. That was the origin of this week’s InfoWorld column...

Paper vs Screens
From The Eponymous Pickle

Paper vs Screens

Sciam writes about the differences between reading on screens vs paper, provides some interesting resources, suggesting that " ... When it comes to intensivelyBut...

Software Developers – Apply to Join the White House “Hackathon” on June 1
From U.S. Public Policy Committee of the ACM

Software Developers – Apply to Join the White House “Hackathon” on June 1

The White House is accepting applications from software developers and hands-on technology experts to participate in a day of national service at the White House...

Mayo Clinic Center for Innovation
From The Eponymous Pickle

Mayo Clinic Center for Innovation

A connection pointed me to the Mayo Clinic Center for Innovation lab.   A very broad mix of capability areas.   Reminding me of similar work at Procter & Gamble...

Friday Squid Blogging: Illegal Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal Squid Fishing

While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...

Tech Talk #3: Stephen Elliot (Summary)
From CERIAS Blog

Tech Talk #3: Stephen Elliot (Summary)

Thursday, April 4th, 2013 Associate Professor Stephen Elliott, Industrial Technology, Purdue University Director, Biometric Standards, Performance and Assurance...

Bar Code Ticker
From The Eponymous Pickle

Bar Code Ticker

A Wired Article reminded me of the nonprofit organization GS1, which I worked with for years.  Among many other things they establish bar code standards.  The work...

Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity
From CERIAS Blog

Featured Commentary: The Honorable Mark Weatherford, DHS Deputy Under Secretary for Cybersecurity

Thursday April 4, 2013 Summary by Marquita A. Moreland During the introduction, Professor Spafford discussed Mark Weatherford's experience prior to becoming Deputy...

Panel 3: Security Education and Training (Panel Summary)
From CERIAS Blog

Panel 3: Security Education and Training (Panel Summary)

Thursday, April 4th, 2013 Panel Members: Diana Burley, Associate Professor of Human and Organizational Learning, George Washington University Melissa Dark, Professor...

Writing Apps to Empower Girls and Help the World
From Computer Science Teachers Association

Writing Apps to Empower Girls and Help the World

There has been a lot of discussion lately about the dearth of computer scientists in the workforce, and the corollary, the need to teach computer science to help...

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)
From CERIAS Blog

Panel 2: NSTIC, Trusted Identities and the Internet (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Cathy Tilton, VP Standards and Technology, Daon Solutions Elisa Bertino, Professor, Computer Science and CERIAS Fellow...

From Computational Complexity

You should apply for STOC and/or CCC travel money (students)

Once again there is some money from ACM and from NSF for students to goto STOC, and I am the one to send the applications to. The link for info on how to apply...

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)
From CERIAS Blog

Panel 1: Security Analytics, Analysis, and Measurement (Panel Summary)

Wednesday, April 3rd, 2013 Panel Members: Alok Chaturvedi, Professor, Management, Purdue University Samuel Liles, Associate Professor, Computer and Information...

Informatics Education Report in Europe – they get it!
From The Computing Community Consortium Blog

Informatics Education Report in Europe – they get it!

A joint report of Informatics Europe and the ACM Europe Working Group on Informatics Education was recently released.  The report highlights what is currently being...

Big Data Applications Survey
From The Eponymous Pickle

Big Data Applications Survey

Interesting survey of applications. " ... While most companies intend to invest in big data technologies, a lack of human resources and know-how keeps them from...

When is Augmented Reality the Right Choice?
From The Female Perspective of Computer Science

When is Augmented Reality the Right Choice?

Last fall, we published a paper about augmented reality, cognitive theories, and learning. I previously wrote about the design advantages of AR; these give insight...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...

The Book Reimagined by Video Game Makers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Book Reimagined by Video Game Makers

VIDYA BOOKS: the book, as reimagined by video game makers is a Kickstarter project that is being spearheaded by someone I met while I was at Microsoft. Joe Booth...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account