DEPARTMENT: CSTA letter
Many colleges and universities now have ongoing outreach and mentoring programs because they understand that waiting for students to come to them is a recipe for disaster. Interest …
Chris Stephenson
Page 5
DEPARTMENT: Letters to the editor
As long as CS educators cannot agree about the fundamental importance of mathematics is an essential aspect of a proper CS education, practice will remain below the professional …
CACM Staff
Pages 6-7
DEPARTMENT: blog@CACM
In excerpts from the BLOG@CACM expert blog, Jeannette M. Wing writes about the negative effects of deadline-driven research, and Mark Guzdial discusses the role of computer science faculty in fostering inequality.
Jeannette M. Wing, Mark Guzdial
Pages 8-9
DEPARTMENT: In the virtual extension
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
CACM Staff
Page 11
DEPARTMENT: CACM online
There is an in inherent weakness to crowdsourcing that should bother computer scientists and computer users alike. It's the fact there is no clear difference between "the wisdom …
David Roman
Page 12
COLUMN: News
Researchers are using tools from information theory and computer science to facilitate the automatic creation of nanoscale structures.
Gary Anthes
Pages 13-15
The hegemony of the traditional desktop operating system is starting to fracture with the emergence of a new generation of Web browsers that may finally herald the long-awaited convergence of Web and OS.
Alex Wright
Pages 16-17
Today's automated systems provide enormous safety and convenience. However, when glitches, problems, or breakdowns occur, the results can be catastrophic.
Samuel Greengard
Pages 18-19
This year's Grace Hopper Celebration focused on using technology for social good.
Leah Hoffmann
Page 20
COLUMN: Viewpoints
Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.
Richard E. Ladner
Pages 22-24
How government-industry collaboration can have far-reaching economic influences.
Orna Berry, Yigal Grayeff
Pages 25-27
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.
Peter J. Denning, Peter A. Freeman
Pages 28-30
Frequent broken builds could be symptomatic of deeper problems within a development project.
George V. Neville-Neil
Pages 31-32
A view of semantic computing and its role in research.
Savas Parastatidis, Evelyne Viegas, Tony Hey
Pages 33-37
SECTION: Practice
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo
Pages 38-42
DNS is many things to many people — perhaps too many things to too many people.
Paul Vixie
Pages 43-47
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?
Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto
Pages 48-57
SECTION: Contributed articles
Easing the programmer's burden does not compromise system performance or increase the complexity of hardware implementation.
Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic
Pages 58-65
University CS departments are incorporating game design and development to prepare their students for the game industry's expectations.
Michael Zyda
Pages 66-72
SECTION: Review articles
Integrating computer games into existing CS courses may help attract students to the field, but there are guidelines to be considered.
Kelvin Sung
Pages 74-78
SECTION: Research highlights
There are many who believe we are on the verge of the biggest change in the way products are made since the Industrial Revolution. This is a revolution where individuals will …
James A. Landay
Page 80
We introduce Plushie, an interactive system that allows nonprofessional users to design their own original plush toys. We successfully demonstrated that nonprofessional users could design plush toys or balloon easily using Plushie …
Yuki Igarashi, Takeo Igarashi
Pages 81-88
One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The combination of computer graphics hardware with a …
Pat Hanrahan
Page 89
ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability to sense a variety of objects near the surface, including fingertips …
Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton
Pages 90-98
COLUMN: Last byte
Last month (November 2009, p. 112) we posted a trio of brain teasers, including one as yet unsolved, concerning the covering of a plane.
Peter Winkler
Page 111
The computer reconfigures me.
Joe Haldeman
Page 112
SECTION: Virtual extension
Though the current understanding of virtual teams has advanced in significant areas over the last few years, it has not taken sufficient account of power dynamics within virtual teams nor sought to explore the nature of power …
Niki Panteli, Robert Tucker
Pages 113-115
Are Internet users' concerns for personal information privacy, principally manifested as online privacy, related to their attitudes on government surveillance and national ID cards (often perceived as a surveillance tool)?
Sun Sun Lim, Hichang Cho, Milagros Rivera Sanchez
Pages 116-120
The processes behind corporate efforts to create, manage, publish, and archive Web information has also evolved using Web Content Management Systems (WCMS). WCMS allow teams to maintain Web content in a dynamic fashion through …
Ganesh Vaidyanathan, Steven Mautone
Pages 121-125
Academic computer science has an odd relationship with software: Publishing papers about software is considered a distinctly stronger contribution than publishing the software. The historical reasons for this paradox no longer …
Lou Hafer, Arthur E. Kirkpatrick
Pages 126-129
We have been developing software since the 1960s but still have not learned enough to ensure that our software development projects are successful. Boehm suggested that realistic schedule and budgets together with a continuing …
Narciso Cerpa, June M. Verner
Pages 130-134
Users of computer systems are accustomed to being asked for passwords — it is as universal as it is frustrating. In the past there was little tolerance for the problems experienced …
Karen Renaud, Antonella De Angeli
Pages 135-140
The meteoric rise in cybercrime has been an issue of pressing concern to our society. Internet-related frauds accounted for 46% of consumer complaints made to the Federal Trade Commission (FTC) in 2005. Total losses of Internet …
Nir Kshetri
Pages 141-144
Careless employees, who do not follow information security policies, constitute a serious threat to their organization. We conducted a field survey in order to understand which factors help towards employees' compliance with …
Mikko Siponen, M. Adam Mahmood, Seppo Pahnila
Pages 145-147