Information processes and computation continue to be found abundantly in the deep structures of many fields. Computing is not---in fact, never was---a science only of the artificial.Peter J. Denning Pages 13-18COLUMN: Technology strategy and management
Why network owners should not be the sole arbiters of access to networks, including the Internet.Abbe Mowshowitz, Nanda Kumar Pages 23-25SPECIAL ISSUE: Creating a science of games
The same technology that makes interactive 3D games so entertaining in the physical action domain is just as effective in education, training, and other more serious applications.Michael Zyda Pages 26-29
DARPA simulations teach habits of thought so soldiers respond on the first day of combat as if they had been there a week. More often than not, it's don't shoot, talk instead.Ralph E. Chatham Pages 36-43
Like a discovery game that requires players to earn the right to take on new challenges, Immune Attack compels its players to learn the rules of the immune system before it reveals deeper biological insight.Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper Pages 44-49
This professional master's degree program puts artists and technologists together on interdisciplinary teams to create interactive experiences.Randy Pausch, Don Marinelli Pages 50-57
Using the Storytelling Alice programming environment to create computer-animated movies inspires middle school girls' interest in learning to program computers.
Caitlin Kelleher, Randy Pausch Pages 58-64
Simulating the complete process of sound synthesis and propagation by exploiting aural perception makes the experience of playing games much more realistic and immersive.Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin Pages 66-73
The TARA Project examined how a trio of modified chatterbots could be used to disseminate terrorism-related information to the general public.
Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen Pages 74-80
Online recruiting has revolutionized the way businesses worldwide hire employees. The next step is to seamlessly integrate existing systems to create a comprehensive---and complex---corporate career center.In Lee Pages 81-85
Technology infrastructure, business process, and managerial issues must be addressed by IT practitioners as they adapt to the business changes associated with the diffusion of RFID technology in the supply chain.
Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon Pages 92-101
The major benefits of knowledge management, particularly as it pertains to security measures, makes it critical that organizations have a mechanism for defining and identifying knowledge needs.
Someswar Kesh, Pauline Ratnasingam Pages 103-108
A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized.Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu Pages 109-116
Considering some of the perceived vagaries of the conference peer-review process and proposing ways to improve evaluation procedures.
Sabah Al-Fedaghi Pages 123-126DEPARTMENT: Hot Links