acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editorial pointers

Editorial Pointers


DEPARTMENT: News track

News Track


DEPARTMENT: Forum

Forum


DEPARTMENT: ACM A.M. Turing Award nominations solicited

ACM A.M. Turing Award Nominations Solicited


COLUMN: Viewpoint

The Crucial Role of CS in Systems and Synthetic Biology

Biological cells, coerced to function as hardware and driven by artificial DNA, can perform such nanoscale tasks as detecting toxic substances and manufacturing new drugs.
COLUMN: Staying connected

This Menu Has Changed

Innovative interfaces will give wireless the golden touch.

2008 ACM Elections


Web Searching in a Multilingual World

Studies of three prototype Web search portals---in Chinese, Spanish, and Arabic---reveal how to best support non-English Web searching.

How Intuitive Is Object-Oriented Design?

Intuition is a powerful tool that helps us navigate through life, but it can get in the way of more formal processes.

Words from Pictures For Dual-Channel Processing

Combining graphics and text representations of complex systems, Object-Process Methodology makes it easier to understand technical ideas, whether or not one is technically oriented by nature or training.

Emerging Trends in M-Government

Considering the advantages and implications of increased usage of wireless connectivity for governmental information and services.

Improving the Change-Management Process

It is crucial to integrate SCM and traceability, but significant challenges slow progress toward this goal.

Coordination in Emergency Response Management

Developing a framework to analyze coordination patterns occurring in the emergency response life cycle.

Taming Heterogeneous Agent Architectures

Using aspect-oriented techniques to construct high-quality multi-agent systems.

Technology-Facilitated 'Give According to Your Abilities, Receive According to Your Needs'

Software, hardware, computer networks, and online content all require mechanisms to prevent free riding, overuse of common resources, use of resources without consent, and blocking of resource access.

Reducing Internet Auction Fraud

When it comes to online auctions, "caveat emptor" is an understatement.
COLUMN: Technical opinion

Departmental Influences on Policy Design

How the U.K. is confusing identity fraud with other policy agendas.
COLUMN: Inside risks

The Physical World and the Real World