acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

EC Papers Up
From My Biased Coin

EC Papers Up

The list of accepted papers for EC is up.  I'm happy to say that our Swoopo paper made the list. I was surprised in the acceptance letter to find that there were...

Guide to Microsoft Police Forensic Services
From Schneier on Security

Guide to Microsoft Police Forensic Services

The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...

Arrays of Controls
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Arrays of Controls

Over the weekend for the second time in about three weeks a teacher asked my about creating arrays of controls in Visual basic .NET. Interestingly enough both teachers...

Predict Marketing ROI with Next-Gen Planning Tools
From The Eponymous Pickle

Predict Marketing ROI with Next-Gen Planning Tools

I repeat this invitation. We worked with Thinkvine in the enterprise and remain impressed with their work.March 18, 2010 | 2 p.m. ET | Duration: 1 HourRegister...

Startup Visa
From The Eponymous Pickle

Startup Visa

In the World Flattener: Sammy Haroon posts about Startup Visa to USA. Always provocative. -

Power from Nanotubes
From The Eponymous Pickle

Power from Nanotubes

From research at MIT: Big power from tiny wires: New discovery shows carbon nanotubes can produce powerful waves that could be harnessed for new energy systems....

Statistics and Behavioral Modeling
From The Eponymous Pickle

Statistics and Behavioral Modeling

Intriguing article, by Steve Miller. I have now dealt with these 'two cultures' a number of times in various enterprises. This article and the included link are...

Phone Lip-Reading
From The Eponymous Pickle

Phone Lip-Reading

Can you have a phone read your lips and interpret what you say? Silent verbal communications. Research in that area.-

Google in <i>The Onion</i>
From Schneier on Security

Google in The Onion

Funny: MOUNTAIN VIEW, CA

Sundown
From Wild WebMink

Sundown

After nearly 10 years, I've now left Sun. Thanks to everyone for following my blog for all these years. Please follow my new blog, Wild Webmink, where I have posted...

Marketing Computer Science Courses
From Computer Science Teachers Association

Marketing Computer Science Courses

I joked as I left work on Friday that it was "my day of shame". I am responsible for recruiting students for a government-funded course that offers MCSE (Microsoft...

Eating a Flash Drive
From Schneier on Security

Eating a Flash Drive

How not to destroy evidence: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...

Language, Mathematics and Programming
From Daniel Lemire's Blog

Language, Mathematics and Programming

Even if you have extensive training in Mathematics, the average Mathematics paper is undistinguishable from the ramblings of a madman. Many of these papers seek...

From Computational Complexity

A HW policy- MORAL due date.

This semester I am using the following HW policy. HW is due on Tuesday. However, your dog died! Hence you get an extension to Thursday. That is, for all people...

Ethnography informs text-free UI for illiterate people
From Putting People First

Ethnography informs text-free UI for illiterate people

Indrani Medhi, an Associate Researcher at Microsoft Research India where she works in the Technology for Emerging Markets team, designed a text free user interface...

Lessons from a Restaurant App
From The Eponymous Pickle

Lessons from a Restaurant App

Well stated, I like simple apps with a recognizable and uniform interface. Because mobile often means we don't have the time to learn a new user interface on the...

Hill Tech Happenings, Week of March 8
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 8

March 10 Hearing: The House Foreign Affairs Committee will hold a hearing on U.S. cyberspace policy and foreign policy (rescheduled from February 10). 10 a.m....

De-Anonymizing Social Network Users
From Schneier on Security

De-Anonymizing Social Network Users

Interesting paper: "A Practical Attack to De-Anonymize Social Network Users." Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...

Interesting Links 8 March 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 8 March 2010

Well last week was another interesting week for me. I finished it off with a short trip to Houston TX for the annual HP Code Wars high school programming competition...

Carousel (NSDI Paper)
From My Biased Coin

Carousel (NSDI Paper)

The "final version" for our NSDI paper, Carousel: Scalable Logging for Intrusion Prevention Systems, is now up.Here's the main idea.  In IPS systems, the logger...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account