It has been almost a year since I assumed the editor-in-chief role for Journal of the ACM (JACM). It seems the right time to share some thoughts on how ACM's oldest publication is doing and where it might be headed.
Victor Vianu
Page 5
Communications' Virtual Extension brings more quality articles to ACM members. These articles are now available in the ACM Digital Library.
CACM Staff
Page 6
DEPARTMENT: Letters to the editor
IRBs need computer scientists, a point highlighted by the Viewpoint "Institutional Review Boards and Your Research" by Simson L. Garfinkel and Lorrie Faith Cranor (June 2010) …
CACM Staff
Page 7
DEPARTMENT: BLOG@CACM
Greg Linden asks if spammers have been defeated; Michael Bernstein discusses Clay Shirky's keynote speech at CSCW 2010; and Erika S. Poole writes about how the digital world can help parents cope with the death of a child.
Greg Linden, Michael Bernstein, Erika Shehan Poole
Pages 8-9
DEPARTMENT: CACM online
The world of
Communications is not contained in the pages of a monthly magazine. Like other publications, it has expanded over time into a variety of electronic formats for …
David Roman
Page 10
COLUMN: News
A field emerging from economics is teaming up with computer science to improve auctions, supply chains, and communication protocols.
Gary Anthes
Pages 11-13
Researchers working in vision and graphics are attempting to develop new techniques and technologies to overcome the current limitations in stereoscopic 3D.
Kirk L. Kroeker
Pages 14-16
Data captured by sensors worn on the human body and analyzed in near real-time could transform our understanding of human behavior, health, and society.
Sarah Underwood
Pages 17-18
The PLATO@50 Conference marked the semicentennial of the computer system that was the forerunner of today's social media and interactive education.
Kirk L. Kroeker
Pages 19-20
Sanjeev Arora, Joseph S.B. Mitchell, and other researchers are recognized for their contributions to computer science.
Jack Rosenberger
Page 21
COLUMN: Economic and business dimensions
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband adoption; and the debate over network neutrality. Interestingly …
Christopher S. Yoo
Pages 24-26
COLUMN: Education
Robotics will inspire dramatic changes in the CS curriculum.
David S. Touretzky
Pages 27-29
COLUMN: Emerging markets
An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Ping Gao, Jiang Yu
Pages 30-32
COLUMN: Kode Vicious
The what, the how, and the why of giving an effective presentation.
George V. Neville-Neil
Pages 33-34
COLUMN: Privacy and security
Recalling malware milestones.
Eugene H. Spafford
Pages 35-37
COLUMN: Viewpoint
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.
Samir Chopra
Pages 38-40
COLUMN: Interview
The computer science luminary, in one of his last interviews before his death in 2002, reflects on a programmer's life.
Philip L. Frana, Thomas J. Misa
Pages 41-47
SECTION: Practice
Could ubiquitous hand-drawn code map diagrams become a thing of the past?
Robert DeLine, Gina Venolia, Kael Rowan
Pages 48-54
Leading experts debate how virtualization and clouds impact network service architectures.
Mache Creeger
Pages 55-62
Everything you always wanted to know but were afraid to ask about the decision-making process.
Jan Damsgaard, Jan Karlsbjerg
Pages 63-71
SECTION: Contributed articles
Safe, modern programming languages let Microsoft rethink the architectural trade-offs in its experimental operating system.
James Larus, Galen Hunt
Pages 72-79
Early patterns of Digg diggs and YouTube views reflect long-term user interest.
Gabor Szabo, Bernardo A. Huberman
Pages 80-88
SECTION: Review articles
Solving the memory model problem will require an ambitious and cross-disciplinary research direction.
Sarita V. Adve, Hans-J. Boehm
Pages 90-101
SECTION: Research highlights
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider many real-world systems are constantly evolving.
Helen Wang
Page 104
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target Web server logic and are based on a new …
Hristo Bojinov, Elie Bursztein, Dan Boneh
Pages 105-113
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of it dead code? Can I replace that code fragment with …
Fritz Henglein
Page 114
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis time. While such unknown values need to be treated …
Isil Dillig, Thomas Dillig, Alex Aiken
Pages 115-123
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.
Peter Winkler
Page 128
SECTION: Virtual extension
The service sector is becoming increasingly important to the economies of many countries, especially developed countries. OECD recently released a report noting that government policy in developed countries has not been attuned …
Wei-Fung Tung, Soe-Tsyr Yuan
Pages 129-134
Software development practices have evolved substantially during the past decade. As so called "agile" approaches have gained more acceptance, the service-oriented approach to IT architecture has become an important alternative …
Marc N. Haines, Marcus A. Rothenberger
Pages 135-140
The growth both in quantity and diversity of online communities across the World Wide Web, along with a number of new technologies that enhance both social interaction and content management, have bred an array of increasingly …
Eugenio Tisselli
Pages 141-145
Software developers during their work face a multitude of options. There are methodological choices and technological choices. While solid research is available on some methodological topics, there is hardly any high-quality …
Lutz Prechelt
Pages 146-149