DEPARTMENT: Editor's letter
A frequent question I hear about Communications, and about ACM publishing in general, involves its access model. I am asked: "Why don't you adopt the open-access model?" Good question! Why don't we?
Moshe Y. Vardi
Page 5
DEPARTMENT: Publisher's corner
This issue marks the first anniversary of the completely revamped Communications, so I thought it would be appropriate to report on how we're doing so far.
Scott E. Delman
Pages 6-7
DEPARTMENT: Letters to the editor
Mark Guzdial's Viewpoint "Teaching Computing to Everyone" (May 2009) was interesting reading but included several implications, possibly unintentional, that should be corrected.
Pages 8-9
DEPARTMENT: blog@CACM
Greg Linden reveals his new approach to reading research papers, Mark Guzdial discusses how to encourage students to write computer programs, and Tessa Lau shares her ideas about the importance of Web visibility.
Mark Guzdial, Greg Linden, Tessa Lau
Pages 10-11
DEPARTMENT: CACM online
David Roman
Page 12
COLUMN: News
Thanks to computer scientists like Barbara Liskov, researchers are making major progress with cost-efficient fault tolerance for Web-based systems.
Alex Wright
Pages 13-15
Several software projects are narrowing the performance gap between browser-based applications and their desktop counterparts. In the process, they're creating new ways to improve the security of Web-based computing.
Kirk L. Kroeker
Pages 16-17
Computer technology has enhanced lives in countless ways, but some experts believe it might be affecting people's ability to think deeply.
Samuel Greengard
Pages 18-19
Barbara Liskov muses about the creative process of problem solving, finding the perfect design point, and pursuing a research path.
Karen A. Frenkel
Pages 20-22
Jon Kleinberg is honored for his pioneering research on the Web and social networking.
Alan Joch
Page 23
Among this year's distinguished honorees are Barbara Liskov of Massachusetts Institute of Technology and Jon Kleinberg of Cornell University.
CACM Staff
Page 25
COLUMN: Viewpoints
Why the Google Book Search settlement agreement under consideration could result in an extensive restructuring of the book industry.
Pamela Samuelson
Pages 28-30
Does the trend toward standardization and modularization of professional services make outsourcing inevitable?
Mari Sako
Pages 31-33
A guide to playing the ploys frequently employed by cliché-driven management.
Phillip G. Armour
Pages 34-36
Aligning computer science with high school mathematics can help turn it into an essential subject for all students.
Matthias Felleisen, Shriram Krishnamurthi
Pages 37-40
Considering the most effective methods for teaching students the fundamental principles of software engineering.
Robert Dewar, Owen Astrachan
Pages 41-45
SECTION: Practice
Revisiting Gray and Putzolu's famous rule in the age of Flash.
Goetz Graefe
Pages 48-59
The laws of physics and the Internet's routing infrastructure affect performance in a big way.
Jonathan M. Smith
Pages 60-65
SECTION: Contributed articles
Network software adapts to user needs and load variations and failures to provide reliable communications in largely unknown networks.
Erol Gelenbe
Pages 66-75
It takes a city of developers to build a big system that is never done.
Rick Kazman, Hong-Mei Chen
Pages 76-84
SECTION: Review articles
Treasures abound from hidden facts found in imprecise data sets.
Nilesh Dalvi, Christopher Ré, Dan Suciu
Pages 86-94
SECTION: Research highlights
In one scene from
The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither can operate. The humans quickly call up a "pilot program" for …
Stuart Russell, Lawrence Saul
Page 96
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical behavior, it is particularly difficult to design controllers that …
Adam Coates, Pieter Abbeel, Andrew Y. Ng
Pages 97-105
In the early 1970s, pioneers like Floyd, Dijkstra, and Hoare argued that programs should be formally specified and proven correct. But for the past 40 years, most of the computer …
Greg Morrisett
Page 106
This paper reports on the development and formal verification of CompCert, a compiler from Clight (a large subset of the C programming language) to PowerPC assembly code, using the Coq proof assistant both for programming the …
Xavier Leroy
Pages 107-115
COLUMN: Last byte
Barbara Liskov talks about her ground breaking work in data abstraction and distributed computing.
Leah Hoffmann
Pages 120-ff
SECTION: Virtual extension
The "Internet of Things," once reality, will have to rely on a global IT infrastructure that provides information about all those "things" in a secure and reliable manner. The EPCglobal Network is a proposal for a widely distributed …
Benjamin Fabian, Oliver GÜnther
Pages 121-125
Introduction A number of years ago, Peter Keen implored information systems researchers to develop theory they could call their own, which would build a cumulative tradition in the area, while maintaining close ties to practice …
James L. Parrish, James F. Courtney
Pages 126-129
Wireless service providers have invested heavily in upgrading their networks to the next generation standard (3G). However, consumer interest in data services does not paint a rosy picture for the providers.
Arvind Malhotra, Claudia Kubowicz Malhotra
Pages 130-134
The literature in the field of project management, especially the literature about risk, is particularly rich in advice about addressing software failure …
Johann Rost, Robert L. Glass
Pages 135-138
Since SCADA networks were initially designed with little attention to security, they can be easy targets of attacks by terrorist groups.
Sandip C. Patel, Ganesh D. Bhatt, James H. Graham
Pages 139-142
Occasionally self-described laggards behave as early adopters. In this article, we examine the early implementation by a late adopter in a semi-crisis position, using the case of Comcast IPv6 adoption as an example.
Anat Hovav, Ciprian Popoviciu
Pages 143-146
Decades of evidence reveal a shockingly low success rate for software projects. Although the record is slowly improving, much work remains before software project success becomes the norm rather than the exception.
Richard W. Woolridge, David P. Hale, Joanne E. Hale, R. Shane Sharpe
Pages 147-152
In modern information societies, the ethical integrity and accountability of IT professionals is particularly important, given the extensive reliance of individuals as well as organisations and governments on various forms of …
Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li
Pages 153-155