DEPARTMENT: Professions board letter
A year ago, this publication was stripped to the studs and rebuilt, with everything from the content to the cover art revisited, rethought, and revitalized.
Steve Bourne, Bryan Cantrill
Page 5
DEPARTMENT: Publisher's corner
In the July issue of
Communications, Moshe Vardi addressed ACM's access model in his Editor's Letter, which has since been picked up in the blogosphere by John Dupuis. Dupuis raised some interesting questions that I believe deserve …
Scott E. Delman
Page 7
DEPARTMENT: Letters to the editor
My compliments on the article "One Laptop Per Child: Vision vs. Reality" by Kenneth L. Kraemer et al. (June 2009). It is incredibly valuable for the ACM community to understand the profound difference between invention and innovation …
CACM Staff
Pages 8-9
DEPARTMENT: In the virtual extension
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
CACM Staff
Page 10
DEPARTMENT: blog@CACM
Jeannette M. Wing writes about the need for a comprehensive research agenda, Daniel Reed discusses high-performance computing, and Mark Guzdial shares insights about women in computing.
Jeannette M. Wing, Daniel Reed, Mark Guzdial
Pages 12-13
DEPARTMENT: CACM online
Behind Google's simple search box are a complex set of algorithms. Search experts say they are updated constantly, but the same old search page and the listed results don't …
David Roman
Page 14
COLUMN: News
Recommender systems that provide consumers with customized options have redefined e-commerce, and are spreading to other fields.
Don Monroe
Pages 15-17
By using sparse representation and compressed sensing, researchers have been able to demonstrate significant improvements in accuracy over traditional face-recognition techniques.
Kirk L. Kroeker
Pages 18-19
Technologists discuss government policies affecting broadband, patent reform, privacy — and President Obama's effect on it all.
Tom Geller
Page 20
Electronic games can inspire players to explore new ideas and concepts. By gaining a better understanding of the dynamic between player and game, researchers hope to develop more interesting and effective approaches.
Leah Hoffmann
Pages 21-22
'Intent and timing' may help the federal cyberspace initiative work better than previous blueprints.
Gregory Goth
Page 23
COLUMN: Viewpoints
A contrarian's perspective on how entrepreneurial opportunities and innovation can thrive during an economic crisis.
Tim Draper
Pages 24-26
The innovative Alice 3 programming environment, currently in beta testing, teaches students to program with Alice and Java software.
Wanda Dann, Stephen Cooper
Pages 27-29
Debating and arguing the points of a proposed code of behavior to provide guidance in making choices can produce the most effective ethics training.
Brian Snow, Clinton Brooks
Pages 30-32
As the computer science field has evolved, so should the methods for disseminating computing research results.
Lance Fortnow
Pages 33-35
SECTION: Practice
Scale up your datasets enough and your apps come undone. What are the typical problems and where do the bottlenecks surface?
Adam Jacobs
Pages 36-44
To shield the browser from attacks, Google Chrome developers eyed three key problems.
Charles Reis, Adam Barth, Carlos Pizano
Pages 45-49
The age of cloud computing has begun. How can companies take advantage of the new opportunities it provides?
Mache Creeger
Pages 50-56
SECTION: Contributed articles
Meaning can be as important as usability in the design of technology.
Kristen Shinohara, Josh Tenenberg
Pages 58-66
The humanitarian focus of socially useful projects promises to motivate community-minded undergrads in and out of CS.
Ralph Morelli, Allen Tucker, Norman Danner, Trishan R. De Lanerolle, Heidi J. C. Ellis, Ozgur Izmirli, Danny Krizanc, Gary Parker
Pages 67-75
SECTION: Review articles
Satisfiability solvers can now be effectively deployed in practical applications.
Sharad Malik, Lintao Zhang
Pages 76-82
SECTION: Research highlights
It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called from a command line with particular parameters, it …
James Herbsleb
Page 84
Existing literature on distributed development in software engineering and other fields discusses various challenges, including cultural barriers, expertise transfer difficulties …
Christian Bird, Nachiappan Nagappan, Premkumar Devanbu, Harald Gall, Brendan Murphy
Pages 85-93
The traditional approach to circuit design has been to build chips that work correctly at extreme-case process corners, thereby guard-banding them …
Sachin S. Sapatnekar
Page 94
Future miniaturization of silicon transistors following Moore's Law may be in jeopardy as it becomes harder to precisely define the behavior and shape of nanoscale transistors.
Michael Orshansky, Wei-Shen Wang
Pages 95-100
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each puzzle, the issue is how your intuition matches up with the mathematics.
Peter Winkler
Page 104
SECTION: Virtual extension
Global spending on Information Technology continues to grow and is expected to reach $1.66 trillion in 2009. As CIOs and IT managers attempt to budget large IT expenditures they must help the business align IT spending with business …
Hoon S. Cha, David E. Pingry, Matt E. Thatcher
Pages 105-110
The research community has long and often been fervently keen on debating the topic of journal impact.
Andrew Lim, Hong Ma, Qi Wen, Zhou Xu, Brenda Cheang
Pages 111-116
Today most security incidents are caused by flaws in software, called vulnerabilities. It is estimated that there are as many as 20 flaws per thousand lines of software code.
Thomas Gerace, Huseyin Cavusoglu
Pages 117-121
Information Technology (IT) pervades every aspect of a firm's value chain as a vast electronic network of interconnected applications and data. Managers perceive the immense
potential of this complex infrastructure to enhance …
Rajiv Kohli, Nigel P. Melville
Pages 122-126
Global Software Development is increasingly becoming the normal practice in the software industry.
Eoin Ó Conchúir, Pär J. Ågerfalk, Helena H. Olsson, Brian Fitzgerald
Pages 127-131
Because of the web's rapid growth and lack of central organization, Internet search engines play a vital role in assisting the users of the Web in retrieving relevant information out of the tens of billions of documents available …
Rohit Kaul, Yeogirl Yun, Seong-Gon Kim
Pages 132-136
In the last two decades, the racial/ethnic composition of those earning computer science bachelor's degrees has changed in the U.S.
Roli Varma
Pages 137-140
Phishing mongers and posers have taken the world by a storm and it is estimated that the annual financial loss due to phishing scams is at least US $320 million.
Indranil Bose, Alvin Chung Man Leung
Pages 141-143