DEPARTMENT: Education letter
The student enrollment crisis in computer science has propelled the need to re-examine all aspects of computing education on a global scale.
Andrew McGettrick
Page 5
DEPARTMENT: Letters to the editor
The contributed article "The Topology of Dark Networks" by Jennifer Xu and Hsinchun Chen (Oct. 2008) ignored sensitive cultural issues while addressing a subject that might by itself offend some people in Muslim societies, including …
CACM Staff
Page 9
DEPARTMENT: CACM online
The new Communications Web site went live last month after several weeks of intense beta testing. While we gleaned many valuable insights and lessons in this process, several highlights and user comments do stand out.
David Roman
Page 10
COLUMN: News
Active learning algorithms are producing substantial savings in label complexity over passive learning approaches.
Graeme Stemp-Morlock
Pages 11-13
With sentiment analysis algorithms, companies can identify and assess the wide variety of opinions found online and create computational models of human opinion.
Alex Wright
Pages 14-15
Doctors are saving lives with virtual, 3D exams that are less invasive than a conventional optical colonoscopy.
David Essex
Pages 16-18
A diverse, international group of more than 200 attendees met at the Rebooting Computing Summit to address the problems confronting computer science.
Bob Violino
Page 19
Experts warn the U.S. may soon relinquish its leadership role in IT research and development.
Alan Joch
Page 20
COLUMN: Viewpoints
How can information technology be best applied to address problems and provide opportunities for inhabitants of the world's poorest countries?
Richard Heeks
Pages 22-24
Every system change has to have some benefit to users, but every time you add a new responsibility a system is tweaked in some way, which usually has unintended side effects.
George V. Neville-Neil
Pages 25-26
How the axiom of survival of the fittest applies in the context of a global economic downturn.
Michael Cusumano
Pages 27-28
College students must be shown that computer science is social, relevant, important, and caring. The way computer science is taught can hold students' interest by encouraging them to develop solutions to socially relevant problems …
Michael Buckley
Pages 29-30
Reassessing the assessment criteria and techniques traditionally used in evaluating computer science research effectiveness.
Bertrand Meyer, Christine Choppy, Jørgen Staunstrup, Jan van Leeuwen
Pages 31-34
SECTION: Practice
The ecosystem of purpose-built languages is a key part of systems development.
Mike Shapiro
Pages 36-41
Web-based malware attacks are more insidious than ever. What can be done to stem the tide?
Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis
Pages 42-47
Dynamic languages offer a taste of object-relational mapping that eases application code.
Chris Richardson
Pages 48-55
SECTION: Contributed articles
Comprehensive knowledge bases would tap the Web's deepest information sources and relationships to address questions beyond today's keyword-based search engines.
Gerhard Weikum, Gjergji Kasneci, Maya Ramanath, Fabian Suchanek
Pages 56-64
The Roofline model offers insight on how to improve the performance of multicore microprocessors whose design diversity exacerbates the jobs of programmers, compiler writers, and architects.
Samuel Williams, Andrew Waterman, David Patterson
Pages 65-76
SECTION: Review articles
Who could fault an approach that offers greater credibility at reduced cost?
Daniel Jackson
Pages 78-88
SECTION: Research highlights
Large disk arrays are everywhere. When we shop at an Internet retailer, the product and account data come from a disk array in a data center. Our email, banking, payroll, …
Arif Merchant
Page 90
Relative fitness is a new approach to modeling the performance of storage devices. In contrast to a conventional model, which predicts the performance of an application's I/O on a given device, a relative fitness model predicts …
Michael P. Mesnier, Matthew Wachs, Raja R. Sambasivan, Alice X. Zheng, Gregory R. Ganger
Pages 91-96
Flash memory nowadays seems to be in every discussion about system architecture. Sure enough, flash memory boasts multiple qualities and advantages over traditional mass storage …
Goetz Graefe
Page 97
In this paper, we examine the use of Flash storage in the server domain. Wear-out has the potential to limit the use of Flash in this domain. To seriously consider Flash in the server domain, architectural support must exist …
David Roberts, Taeho Kgil, Trevor Mudge
Pages 98-103
COLUMN: Last byte
Wendy Hall discusses her plans to increase ACM's membership and to create task forces in China, India, and Europe.
Leah Hofmann
Pages 112-ff
SECTION: Virtual extension
Vitual teams are becoming ubiquitous. Therefore, it is important to understand how to make virtual teams effective.
Jay F. Nunamaker, Bruce A. Reinig, Robert O. Briggs
Pages 113-117
The prevailing business culture in the U.S. undoubtedly encouraged the rapid and radical changes prescribed with Business Process Re-engineering (BPR). However, America's egalitarianism and individualism also created a need for …
Maris G. Martinsons, Robert M. Davison, Valdis Martinsons
Pages 118-123
The internet is becoming a commodity in organizations with an increase in accessibility by professionals from their own work desks. Vault.com conducted a survey in 1999 with 1,244 respondents, and found that 84% of employees …
Gee-Woo Bock, Swee Ling Ho
Pages 124-128
What does object language communicate about IT professionals? Can the messages conveyed by object language be used to offset the stereotypical image of a "computer geek?"
Kevin P. Scheibe, James C. McElroy, Paula C. Morrow
Pages 129-131
Internet use has been growing steadily for the past decade. In a recent report, the Pew Internet & American Life Project survey found that 75% of American adults use the Internet. As more citizens turn to the Internet as a medium …
France Bélanger, Lemuria Carter
Pages 132-135
In June 2005, a unit of lexis-nexis discovered the theft of 310,000 customer records containing sensitive information such as customer names, addresses, and social security numbers. This incident followed closely on ChoicePoint's …
Zeinab Karake Shalhoub
Pages 136-141
During the past six years the rapid proliferation of mobile devices, particularly cellular phones, has presented an opportunity to develop new interactive classroom systems which have the potential to enhance students' learning …
Eusebio Scornavacca, Sid Huff, Stephen Marshall
Pages 142-146
The number of online auctions that don't result in valid transactions is astonishing, which leads us to call for a better understanding about unsuccessful auctions. Why are there so many of them and what can be done about it?
Paulo Goes, Yanbin Tu, Y. Alex Tung
Pages 147-149