For almost 50 years we have been riding Moore's Law's exponential curve. Oh, what a ride it has been! No other technology has ever improved at a geometric rate for decades …
Moshe Y. Vardi
Page 5
DEPARTMENT: Letters to the editor
The computer science community is deeply concerned over the fate of Masaud Jahromi, chairman of the Department of Computer Science and Engineering at Ahlia University in Bahrain …
CACM Staff
Pages 6-7
To ensure the timely publication of articles,
Communications created the Virtual Extension to bring readers high-quality articles in an online-only format. The following article is now available in its entirety to ACM members …
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
Bertrand Meyer writes about his long-standing decision not to provide anonymous reviews. Greg Linden considers how educational practices could be improved through the data mining of students' schoolwork.
Bertrand Meyer, Greg Linden
Pages 12-13
DEPARTMENT: CACM online
A new service, named the ACM Author-Izer, is a unique tool that enables ACM authors to generate and post links on either their home page or institutional repository that will …
Scott E. Delman
Page 14
COLUMN: News
Scientists say improvements to extreme-weather prediction are possible with new weather models and a reinvention of the modeling technologies used to process them.
Kirk L. Kroeker
Pages 15-17
Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?
Alex Wright
Pages 18-19
Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?
Leah Hoffmann
Pages 20-22
COLUMN: Privacy and security
Sounding the alert on emergency calling system deficiencies.
Hannes Tschofenig
Pages 23-25
COLUMN: Economic and business dimensions
"U.S. broadband is terrible" has become a familiar meme. Given the growing importance of broadband Internet connections, a poor broadband infrastructure would indeed be cause for concern. As it turns out, however, much of this …
Scott Wallsten
Pages 26-28
COLUMN: Legally speaking
Assessing the implications of the Google Book Search settlement.
Pamela Samuelson
Pages 29-31
COLUMN: Computing ethics
Considering whether software engineering and engineering can share a profession.
Michael Davis
Pages 32-34
COLUMN: Education
Nine teacher-oriented faculty in computer science departments at research universities in the U.S. or Canada describe how their positions work, how they contribute to education, and how departmental policies can influence their …
SIGCSE Teaching-Oriented Faculty Working Group
Pages 35-37
COLUMN: Viewpoint
Using the past 10 years of Taulbee Survey data to evaluate female student enrollment across varied academic institutions and departments.
Douglas Baumann, Susanne Hambrusch, Jennifer Neville
Pages 38-42
SECTION: Practice
The time has come for software liability laws.
Poul-Henning Kamp
Pages 44-47
Difficult technical problems and tough business challenges.
Li Gong
Pages 48-52
Why the next language you learn should be functional.
Yaron Minsky
Pages 53-58
SECTION: Contributed articles
Users will speak rather than type, watch video rather than read, and use technology socially rather than alone.
Marti A. Hearst
Pages 60-67
Insightful implementers refocus user ambivalence and resistance toward trust and acceptance of new systems.
DongBack Seo, Albert Boonstra, Marjolein Offenbeek
Pages 68-73
HPF pioneered a high-level approach to parallel programming but failed to win over a broad user community.
Ken Kennedy, Charles Koelbel, Hans Zima
Pages 74-82
SECTION: Review articles
Technology able to create devices the size of a human cell calls for new protocols.
Ian F. Akyildiz, Josep Miquel Jornet, Massimiliano Pierobon
Pages 84-89
SECTION: Research highlights
The following paper combines two important themes in secure computing:
assurance and information
flow control. For high assurance, a system's Trusted Computing Base needs to be small and the policy simple. Flow control is one …
Butler Lampson
Page 92
Features of the new HiStar operating system permit several novel applications, including privacy-preserving, untrusted virus scanners and a dynamic Web server with only a few thousand lines of trusted code.
Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières
Pages 93-101
In a breakthrough contribution, the authors of the paper that follows have developed an efficient way to find approximate nearest neighbors for the case of database patches within image data.
William T. Freeman
Page 102
This paper presents a new randomized algorithm for quickly finding approximate nearest neighbor matches between image patches. Our algorithm offers substantial performance improvements over the previous state of the art.
Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein
Pages 103-110
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is as yet (famously) unsolved.
Peter Winkler
Page 120
SECTION: Viewpoints: Virtual extension
How to address user information needs amidst a preponderance of data.
Hector Garcia-Molina, Georgia Koutrika, Aditya Parameswaran
Pages 121-130