COLUMN: ACM awards committee
ACM currently sponsors over 100 awards for technical and professional excellence. These awards serve many purposes within the computing community.
Calvin Gotlieb, James Horning
Page 5
DEPARTMENT: Letters to the editor
Computing can't be viewed as a branch of science since it doesn't deal with nature but with an artifact, namely the computer
CACM Staff
Pages 6-7
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
CACM Staff
Page 8
DEPARTMENT: BLOG@CACM
Recently, there has been a lot of buzz about NoSQL databases. In fact, there were at least two conferences on the topic in 2009, one on each coast.
Michael Stonebraker
Pages 10-11
DEPARTMENT: CACM online
Communications' site performs ably on today's leading mobile systems. However, support for these and other mobile devices will be improved.
David Roman
Page 12
COLUMN: News
In today's real-time Web, data streaming applications no longer have the luxury of making multiple passes over a recorded data set.
Alex Wright
Pages 13-14
After 15 years of research, robots for search and rescue may be nearing prime time.
Gary Anthes
Pages 15-16
Governments' practice of electronic surveillance—and the growing use of warrantless wiretapping—has observers deeply concerned.
Samuel Greengard
Pages 17-19
COLUMN: Emerging markets
The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor.
Richard Heeks
Pages 22-24
COLUMN: Historical reflections
Reflections on the decline of mathematical tables.
Martin Campbell-Kelly
Pages 25-26
COLUMN: Technology strategy and management
To become an industry platform, vendors must open their infrastructure technology to other product companies.
Michael Cusumano
Pages 27-29
COLUMN: Viewpoint
Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.
Paul Ohm
Pages 30-32
COLUMN: Kode Vicious
Data structures are part of the foundation of computer science. It pays to revisit them from time to time.
George V. Neville-Neil
Pages 33-34
SECTION: Practice
What can be done to make cooling systems in data centers more energy efficient?
Andy Woods
Pages 36-42
The battle is bigger than most of us realize.
Mache Creeger
Pages 43-49
Clearing the clouds away from the true potential and obstacles posed by this computing capability.
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia
Pages 50-58
SECTION: Contributed articles
Prior work on power management reflects recurring themes that can be leveraged to make future systems more energy efficient.
Parthasarathy Ranganathan
Pages 60-67
Cryptographic protocols safeguard the privacy of user queries to public databases.
Sergey Yekhanin
Pages 68-73
SECTION: Review articles
Combining the paradigm features of both logic and functional programming makes for some powerful implementations.
Sergio Antoy, Michael Hanus
Pages 74-85
SECTION: Research highlights
The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of both theoretical results and highly visible practical …
Padhraic Smyth, Charles Elkan
Page 88
Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer inclinations are evolving, leading them to ever redefine their …
Yehuda Koren
Pages 89-97
Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries.
Leslie Pack Kaelbling
Page 98
Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine vessels. This article reviews this technology.
Sebastian Thrun
Pages 99-106
COLUMN: Last byte
Andrew S. Tanenbaum talks about MINIX, microkernels, and electronic voting systems.
Leah Hoffmann
Pages 112-ff
SECTION: Virtual extension
In spite of its importance in software reliability, testing is labor intensive and expensive. It has been found that software testing without a good strategy may not be more effective than testing the system with random data. …
Pak-Lok Poon, Sau-Fun Tang, T. H. Tse, T. Y. Chen
Pages 113-118
Few ISP supervisors are aware that some courts are in the process of creating a legal duty for employers to monitor their workers.
Robert J. Aalberts, Percy S. Poon, Paul D. Thistle
Pages 119-123
When Edgster Dijkstra wrote his paper Go To Statements Considered Harmful, programmers were lost in millions of lines of spaghetti code. Now programmers have lost their way again—this time amidst thousands of unread resumes.
Keith Wright
Pages 124-127
The competition for college admissions is getting fiercer each year with most colleges receiving record number of applications and hence becoming increasingly selective. The admissions process is extremely stressful and unpredictable …
Surya Rebbapragada, Amit Basu, John Semple
Pages 128-133
A collective intelligence application is one that harnesses the knowledge and work of its users to provide the data for the application and to improve its usefulness. The most hyped examples have been labeled as "Web 2.0" applications …
Dawn G. Gregg
Pages 134-138
Web 2.0 is affecting the structure of our society by creating new spaces of freedom, giving voice to any opinion, easing interpersonal relationships, and encouraging the creation of collaborating collectivities.
Stefano Ferretti, Marco Furini, Claudio E. Palazzi, Marco Roccetti, Paola Salomoni
Pages 139-143
Adoption of an information technology (IT) innovation is a much more attractive and frequently examined area to study than non-adoption. However, many IT innovations face varying degrees of resistance in their lifetime.
Rhoda C. Joseph
Pages 144-146