acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)
From CERIAS Blog

Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)

Wednesday, March 31, 2010 Summary by Gaspar Modelo-Howard Day two opened with a keynote from Under Secretary Beers, who has had a long and interesting career3...

Fireside Chat (Symposium Summary)
From CERIAS Blog

Fireside Chat (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Mike McConnell, Booz Allen Hamilton Rand Beers, DHS Eugene H. Spafford, CERIAS Summary by Derril Lucci The fireside...

Panel #2: Infosec Ethics (Symposium Summary)
From CERIAS Blog

Panel #2: Infosec Ethics (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Nicolas Christin, Carnegie Mellon University Cassio Goldschmidt, Symantec Corporation Aaron Massey, North Carolina State...

Panel #1: Visualization of Security (Symposium Summary)
From CERIAS Blog

Panel #1: Visualization of Security (Symposium Summary)

Tuesday, March 30, 2010 Panel Members: Donald Robinson, Northrop Grumman Ross Maciejewski, Purdue Alok Chaturvedi, Purdue Summary by Ryan Poyar The first...

Opening Keynote: Mike McConnell (Symposium Summary)
From CERIAS Blog

Opening Keynote: Mike McConnell (Symposium Summary)

Tuesday, March 30, 2010 Summary by Jason Ortiz Mike McConnell, retired Admiral of the Navy, former Director of NSA and former Director of National Intelligence...

Interview with Zakta
From The Eponymous Pickle

Interview with Zakta

An interview with long time connection Sundar Kadayam about his very innovative search and knowledge system Zakta. We used some of Sundar's previous systems. Also...

Build Your Own NYT Linked Data Application
From The Noisy Channel

Build Your Own NYT Linked Data Application

Regular readers may recall hearing about the New York Times Annotated Corpus (which is the basis for the HCIR Challenge), and decision to publish their tags as Linked...

From Computational Complexity

But seriously now folks- what do you make of barrier results?

In my April Fools Day Post I said the following: Here are problems that I believe can be solved with current techniques. That was indeed true- since they were...

New York and the Moscow Subway Bombing
From Schneier on Security

New York and the Moscow Subway Bombing

People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...

60-40 papers
From My Biased Coin

60-40 papers

A recent paper I worked on was a 60-40 paper.  That's what I call it when one of the authors does noticeably more of the work.  Really, it could be a 70-30 paper...

links for 2010-04-07
From Wild WebMink

links for 2010-04-07

IBM: Back to the Bad Old Days? Pretty good analysis of the IBM patent aggression from ESR: "IBM has reached a critical juncture. For the last decade the company...

2010 US Imagine Cup Community Showcase
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

2010 US Imagine Cup Community Showcase

Please join Microsoft for the 2010 US Imagine Cup Community Showcase The US Imagine Cup team would like to extend an invitation to you...

Foundation of Semantic Web Technologies
From The Eponymous Pickle

Foundation of Semantic Web Technologies

I had a very good conversation today with Prof Pascal Hitzler. Author of the books: Semantic Web - Grundlagen and Foundations of Semantic Web Technologies. He is...

Brand Names in Scrabble Games
From The Eponymous Pickle

Brand Names in Scrabble Games

In the BBC: Proper nouns are now allowed in new versions of the Scrabble board game. Think of the opportunity for product placement! Though how many people play...

Bypassing the Chain on Hotel-Room Doors
From Schneier on Security

Bypassing the Chain on Hotel-Room Doors

Technique, plus video.

Balancing the Needs of Industry and Academia
From The Female Perspective of Computer Science

Balancing the Needs of Industry and Academia

As I embark on this journey that is a PhD, I constantly remind myself of my goal of remaining useful. I want to retain practical skills that could be used in outside...

ACM Washington Update, Vol. 14.2 (April 6, 2010)
From U.S. Public Policy Committee of the ACM

ACM Washington Update, Vol. 14.2 (April 6, 2010)

CONTENTS [1] Newsletter Highlights [2] 2009 ACM Turing Award Goes to Charles Thacker [3] USACM and CRA Express Concerns with Senate Cybersecurity Bill [4] Science...

The Last Bug
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Last Bug

I spent much of yesterday working on a computer program. A friend of mine wrote it in Visual Basic .NET and I was converting it to C# so that it could be used as...

External-Memory Sorting in Java : the First Release
From Daniel Lemire's Blog

External-Memory Sorting in Java : the First Release

In my previous post, you were invited to help with a reference implementation of external sorting in Java. Several people tested and improved the code. I like the...

From Computational Complexity

Finding the Right Model

Last fall I wrote about the different focus on models and proofs in the Econ and CS theory communities. Today I'll focus on the purpose of a model and what makes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account