India has 1.2 billion individuals, of which about 400 million are in the 1–15 age group and another about 400 million in the 15–35 age group. India, therefore, has the …
P. J. Narayanan, Anand Deshpanda
Page 5
DEPARTMENT: Letters to the editor
Nir Shavit's article "Data Structures in the Multicore Age" (Mar. 2011) was a thrill to read. I was especially intrigued by his exposition on concurrent objects. Also important …
CACM Staff
Page 6
To ensure the timely publication of articles,
Communications created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format. …
CACM Staff
Page 7
DEPARTMENT: BLOG@CACM
Daniel Reed writes about design and disruptive technologies. Mark Guzdial discusses the tension between teaching and research at U.S. universities. Judy Robertson argues in favor of educational video games in the classroom.
Daniel Reed, Mark Guzdial, Judy Robertson
Pages 8-9
DEPARTMENT: CACM online
If you're one of the more than 1,000,000 scientists, practitioners, educators, or students who regularly read
Communications of the ACM in print or
video. …
Scott E. Delman
Page 10
COLUMN: News
Researchers have developed a new networking algorithm, modeled after the neurological development of the fruit fly, to help distributed networks self-organize more efficiently.
Kirk L. Kroeker
Pages 11-13
Leslie Valiant talks about machine learning; parallel computing, and his quest for simplicity.
Gary Anthes
Pages 14-15
New screen materials could lead to portable devices that are anything but rectangular, flat, and unbendable.
Tom Geller
Pages 16-18
M. Frans Kaashoek discusses systems work, "undo computing," and what he learned from Andrew S. Tanenbaum.
Gregory Goth
Page 19
Personalized news promises to make daily journalism profitable again, but technical and cultural obstacles have slowed the industry's adoption of automated personalization.
Marina Krakovsky
Pages 20-21
COLUMN: Privacy and security
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the Internet.
Ari Schwartz
Pages 22-24
COLUMN: The profession of IT
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey
Pages 25-27
COLUMN: The business of software
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by Larry Putnam, Sr., this model shares with …
Phillip G. Armour
Pages 28-30
COLUMN: Inside risks
Good software design is never easy, but stopping too soon makes the job more difficult.
David Lorge Parnas
Pages 31-33
COLUMN: Kode Vicious
Kode Vicious's thoughts on forking, config files, and using internal wikis.
George V. Neville-Neil
Pages 34-35
COLUMN: Viewpoint
Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass
Pages 36-38
SECTION: Practice
In today's humongous database systems, clarity may be relaxed, but business needs can still be met.
Pat Helland
Pages 40-47
How do large-scale sites and applications remain SQL-based?
Michael Rys
Pages 48-53
Methods for evaluating and effectively managing the security behavior of employees.
Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling
Pages 54-60
SECTION: Contributed articles
Before building the network or its components, first understand the home and the behavior of its human inhabitants.
W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall
Pages 62-71
Partition data and operations, keep administration simple, do not assume one size fits all.
Michael Stonebraker, Rick Cattell
Pages 72-80
Can a programming language really help programmers write better programs?
Mike Barnett, Manuel Fähndrich, K. Rustan M. Leino, Peter MÜller, Wolfram Schulte, Herman Venter
Pages 81-91
SECTION: Review articles
The roots of Google's PageRank can be traced back to several early, and equally remarkable, ranking techniques.
Massimo Franceschet
Pages 92-101
SECTION: Research highlights
The interaction between computation and logic goes back to the beginnings of computer science with the development of computability theory in the 1930s. In recent decades, the interaction between computation …
Phokion G. Kolaitis
Page 103
We give a logical characterization of the polynomial-time properties of graphs with excluded minors.
Martin Grohe
Pages 104-112
The importance of data analysis has never been clearer. Globe-spanning scientific collaborations are exploring data-intensive questions at a scale …
Michael J. Franklin
Pages 113-13
Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables …
Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis
Pages 114-123
COLUMN: Last byte
Last month (May 2011, p. 120) we posted a trio of brainteasers, including one as yet unsolved, concerning games and their roles and turns, with randomness either removed or inserted. Here, we offer solutions to two of them. How …
Peter Winkler
Page 126
Leslie Valiant discusses machine learning, parallel computing, and computational neuroscience.
Leah Hoffmann
Pages 128-ff
SECTION: Contributed articles: Virtual extension
Decision-making procedures in online social networks should reflect participants' political influence within the network.
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Sebastiano Vigna
Pages 129-137
Business continuity plans for the wireless world must address solar activity.
Denise Mcmanus, Houston Carr, Benjamin Adams
Pages 138-143