DEPARTMENT: Tapia conference letter
Created as a supportive networking environment for underrepresented groups in computing and information technology, the Richard Tapia Celebration of Diversity in …
David A. Patterson
Page 5
DEPARTMENT: Letters to the editor
As an editor of
The Fourth Paradigm and someone who subscribes to Jim Gray's vision that there are now four fundamental scientific methodologies, I feel I must respond to Moshe Y. Vardi's Editor's Letter "Science Has Only Two …
CACM Staff
Pages 6-7
The following synopses are from Virtual Extension articles that are now available in their entirety to ACM members via the Digital Library.
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
Greg Linden discusses security advice and the cost of user effort, Jason Hong considers the increase in malvertisements, and Mark Guzdial writes about gender and CS education in Qatar.
Greg Linden, Jason Hong, Mark Guzdial
Pages 10-11
DEPARTMENT: CACM online
Much has been written over the last decade about the abysmal state of the education arms race in the U.S., particularly in the STEM disciplines. Two recent reports show how …
David Roman
Page 12
COLUMN: News
Eye-tracking control for mobile phones might lead to a new era of context-aware user interfaces.
Gregory Goth
Pages 13-15
With topic modeling, scientists can explore and understand huge collections of unlabeled information.
Gary Anthes
Pages 16-18
The second Computer Science Education Week is showing students, parents, and educators why computer science is important.
Marina Krakovsky
Page 19
With the introduction of the sophisticated Stuxnet worm, the stakes of cyberwarfare have increased immeasurably.
Samuel Greengard
Pages 20-22
Do consumers have enough control over their personal information or is more government regulation needed?
David Lindley
Page 23
COLUMN: Emerging markets
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.
Seymour Goodman, Andrew Harris
Pages 24-27
COLUMN: Historical reflections
Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is the ACS-1 supercomputer designed more than 40 years ago.
Mark Smotherman, Dag Spicer
Pages 28-30
COLUMN: Broadening participation
In order to thrive and even survive in the worldwide marketplace of ideas and innovation, the U.S. must aggressively meet the challenge of increasing the number of students …
Ann Quiroz Gates
Pages 31-33
COLUMN: The profession of IT
Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.
Peter J. Denning, Robert E. Kahn
Pages 34-36
COLUMN: Kode Vicious
While it is true that "programmers aren't English majors," there are many days that I wish they were, or that they knew one and offered to help with …
George V. Neville-Neil
Pages 37-38
COLUMN: Viewpoint
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.
Francine Berman
Pages 39-41
SECTION: Practice
Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.
CACM Staff
Pages 42-47
These days, cybercriminals are looking to steal more than just banking information.
Mache Creeger
Pages 48-55
SECTION: Contributed articles
Only if the programmer can prove (through formal machine-checkable proofs) it is free of bugs with respect to a claim of dependability.
Zhong Shao
Pages 56-66
What do wikis, blogs, podcasts, social networks, virtual worlds, and the rest do for corporate productivity and management?
Stephen J. Andriole
Pages 67-79
SECTION: Review articles
What are Bayesian networks and why are their applications growing across all fields?
Adnan Darwiche
Pages 80-90
SECTION: Research highlights
You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict it. Sounds familiar? This is the …
Michael Elad, Raja Giryes
Page 92
Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible signal from the reduced representation acquired by the sampling …
Deanna Needell, Joel A. Tropp
Pages 93-100
It is now clear that for a wide range of problems, quantum computers offer little or no advantage over their classical counterparts.
Scott Aaronson
Page 101
The collection of computational problems having quantum interactive proof systems consists precisely of those problems solvable with an ordinary classical computer using at most a polynomial amount of memory (or QIP = PSPACE …
Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous
Pages 102-109
COLUMN: Last byte
It's amazing how little we know about the simple, ordinary, axis-aligned rectangle. Last month (p. 112) we posted a trio of brainteasers, including one as yet unsolved, concerning rectangles galore. Here, we offer solutions to …
Peter Winkler
Page 126
Build a digital library of pioneering virtual worlds as a living laboratory of history and social science.
Rumilisoun
Pages 128-ff
SECTION: Virtual extension
A bibliometric view of the publishing frequency and impact of conference proceedings compared to archival journal publication.
Massimo Franceschet
Pages 129-132
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline.
Barry Lunt, J. Ekstrom, Han Reichgelt, Michael Bailey, Richard Leblanc
Pages 133-141
A firsthand account of an international team effort to install the Sahana disaster-management system in Chengdu, Sichuan after an earthquake.
Ralph Morelli, Chamindra de Silva, Trishan de Lanerolle, Rebecca Curzon, Xin Sheng Mao
Pages 142-149