DEPARTMENT: Editor's letter
An old joke tells of a driver, returning home from a party where he had one drink too many, who hears a warning over the radio about a car careening down the wrong side of the …
Moshe Y. Vardi
Page 5
DEPARTMENT: Letters to the editor
I am deeply ambivalent about what I read in the contributed article "Compiler Research: The Next 50 Years" (Feb. 2009). On the one hand, its description of the field's challenges and opportunities evoke great excitement; on the …
CACM Staff
Pages 7-9
DEPARTMENT: blog@CACM
Greg Linden, Jason Hong, Michael Stonebraker, and Mark Guzdial discuss recommendation algorithms, online privacy, scientific databases, and programming in introductory computer science classes.
CACM Staff
Pages 10-11
DEPARTMENT: CACM online
The relationship between Communications' Web site and its print forefather is entering a new era this month with the debut of the BLOG@CACMin this issue.
David Roman
Page 12
COLUMN: News
Compressed sensing, which draws on information theory, probability theory, and other fields, has generated a great deal of excitement with its nontraditional approach to signal processing.
Kirk L. Kroeker
Pages 13-15
The rapidly changing advertisements that appear on Web pages are often chosen by sophisticated algorithms that seek to place the best ad in the best context before the right customer.
David Essex
Pages 16-17
In a world that's increasingly global and interconnected, international education is growing, changing, and evolving. More than 1.5 million students a year study at schools outside their country's borders, and the nature and …
Samuel Greengard
Pages 18-19
MIT's Barbara Liskov is the 55th person, and the second woman, to win the ACM A.M. Turing Award.
CACM Staff
Page 21
COLUMN: Viewpoints
Differences in telecommunications regulation between the U.S. and the European Union are a key factor in viewing the debate over network neutrality legislation from a European perspective.
Pierre Larouche
Pages 22-24
Want to increase participation of women in IT work? Change the work.
LeAnne Coder, Joshua L Rosenbloom, Ronald A. Ash, Brandon R. Dupont
Pages 25-27
The commercial opportunities of software as a service are widely hyped these days and many think SaaS is the future of software. That might be true in the medium term, but the volatile history of remote …
Martin Campbell-Kelly
Pages 28-30
Georgia Institute of Technology has required every undergraduate on campus to take a course in computing. Here are the lessons learned from the practice, now almost 10 years old, of creating high-demand computer science courses …
Mark Guzdial
Pages 31-33
Conference program committees must adapt their review and selection process dynamics in response to evolving research cultural changes and challenges.
Ken Birman, Fred B. Schneider
Pages 34-37
SECTION: Practice
Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make browsers secure while preserving their usability?
Thomas Wadlow, Vlad Gorelik
Pages 40-45
It is very easy to create a bad API and rather difficult to create a good one. Recent APIs implemented in modern programming languages make the same mistakes as their 20-year-old counterparts written in C. What can be done to …
Michi Henning
Pages 46-56
Lacking proper browser support, what steps can we take to debug production AJAX code?
Eric Schrock
Pages 57-60
SECTION: Contributed articles
Multicore computers shift the burden of software performance from chip designers and to software developers. Now the computing industry is challenged to make parallel computing the mainstream method …
James Larus
Pages 62-69
The passage of time is essential to ensuring the repeatability and predictability of software and networks in cyber-physical systems.
Edward A. Lee
Pages 70-79
SECTION: Review articles
The convergence of computer science and biology will serve both disciplines, providing each with greater power and relevance.
Corrado Priami
Pages 80-88
SECTION: Research highlights
Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.
Ross Anderson
Page 90
DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and its contents persist sufficiently for malicious (or forensic) …
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten
Pages 91-98
The advent of multicore architectures has produced a Renaissance in the study of highly concurrent data structures.
Maurice Herlihy
Page 99
In a thread-safe
concurrent queue, consumers typically wait for producers to make data available. In a
synchronous queue, producers similarly wait for consumers to take the data. We present two new nonblocking, contention-free …
William N. Scherer, Doug Lea, Michael L. Scott
Pages 100-111
COLUMN: Last byte
Welcome to three new challenging mathematical puzzles. Solutions to the first two will be published next month; the third is as yet (famously) unsolved. In each puzzle, the issue is how numbers interact with one another.
Peter Winkler
Page 112
SECTION: Virtual extension
J. Drew Procaccino, June M. Verner
Pages 113-116
Information technology is no longer restricted to organizational use but is as common place in the home as electricity and water. Because of this increased ubiquity, work activities infiltrate the home with ease and spontaneity …
Karlene C. Cousins, Upkar Varshney
Pages 117-123
Stuart D. Galup, Ronald Dattero, Jim J. Quan, Sue Conger
Pages 124-127
Anti-spam researchers are in an arms race. Deploying ever-more-sophisticated identification and filtering technologies, they have kept one step ahead …
Robert K. Plice, Nigel P. Melville, Oleg V. Pavlov
Pages 128-130
Online auctions have dramatically transformed the way many people trade goods and services on the Internet. The popularity of the online auction market and evolving variations …
James A. McCart, Varol O. Kayhan, Anol Bhattacherjee
Pages 131-134
One major obstacle to the widespread diffusion of e-commerce is consumer distrust. In the highly uncertain virtual environment, people have a more prevalent …
Carol Xiaojuan Ou, Choon Ling Sia
Pages 135-139
Process improvement requires understanding and measuring existing processes, analyzing the data to discover cost, quality, or schedule improvement opportunities, and introducing …
Gary W. Brock, Denise J. McManus, Joanne E. Hale
Pages 140-144
Establishing true understanding has been a challenge to human communication throughout history. In the age of electronic communication, the challenge not only remains, but is …
Michael Rebstock
Pages 145-146