As most members of our organizations probably know, there is a great deal of overlap between the products and services offered by the IEEE CS and ACM. In fact, about 27% of ACM members belong to IEEE CS.
Sorel Reisman, Alain Chesnais
Page 5
DEPARTMENT: Letters to the editor
In their article "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Qing Hu et al. (June 2011) analyzed deterrence of employee violation of …
CACM Staff
Page 7
To ensure the timely publication of articles,
Communications created the Virtual Extension (VE) to bring readers high-quality articles in an online-only format. The following articles are now available to ACM members via the …
CACM Staff
Page 8
DEPARTMENT: BLOG@CACM
Michael Stonebraker discusses several reasons why NoSQL has not caught on with enterprise users.
Michael Stonebraker
Pages 10-11
DEPARTMENT: CACM online
For many, the five dreaded words "This article is premium content" is a frustration. Many in the community would prefer all publications be made freely …
Scott E. Delman
Page 12
COLUMN: News
Computers are unable to defeat the world's best Go players, but that may change with the application of a new strategy that promises to revolutionize artificial intelligence.
Kirk L. Kroeker
Pages 13-15
The twin challenges of parallelism and energy consumption are enlivening supercomputers' progress.
Tom Geller
Pages 16-18
The Holy Grail of language translation is to develop a machine-based system that can handle the task transparently and accurately.
Samuel Greengard
Pages 19-21
COLUMN: Economic and business dimensions
Just because a team is virtual, it doesn't mean geography is dead.
Jonathon N. Cummings
Pages 24-26
COLUMN: Education
Computer science is not that difficult but wanting to learn it is.
Betsy DiSalvo, Amy Bruckman
Pages 27-29
COLUMN: Privacy and security
An assessment of the U.S. government's EINSTEIN project.
S. M. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford
Pages 30-33
COLUMN: Kode Vicious
Beware keeping data in binary format.
George V. Neville-Neil
Pages 34-35
COLUMN: Viewpoint
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice in CS has been to publish in a conference …
Joseph Y. Halpern, David C. Parkes
Pages 36-38
SECTION: Practice
In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a good proposition for implementing network …
Eric Allman
Pages 40-45
Heterogeneous systems allow us to target our programming to the appropriate environment.
Satnam Singh
Pages 46-54
It's no easy task for NoSQL.
Oren Eini
Pages 55-61
SECTION: Contributed articles
Unite neuroscience, supercomputing, and nanotechnology to discover, demonstrate, and deliver the brain's core algorithms.
Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony J. Sherbondy, Raghavendra Singh
Pages 62-71
Women increasingly publish in ACM conference proceedings and are notably productive authors.
J. McGrath Cohoon, Sergey Nigai, Joseph "Jofish" Kaye
Pages 72-80
Algorithmic-based user incentives ensure the trustworthiness of evaluations of Wikipedia entries and Google Maps business information.
Luca De Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler
Pages 81-87
SECTION: Review articles
BI technologies are essential to running today's businesses and this technology is going through sea changes.
Surajit Chaudhuri, Umeshwar Dayal, Vivek Narasayya
Pages 88-98
SECTION: Research highlights
Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive datasets? The answer to this question is a firm …
Peter J. Haas
Page 100
Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications in information retrieval and data management. One common …
Ping Li, Arnd Christian König
Pages 101-109
Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for interacting, more real estate is generally better. This …
Scott Klemmer
Page 110
Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve the location of finger taps on the arm and hand using a novel …
Chris Harrison, Desney Tan, Dan Morris
Pages 111-118
COLUMN: Last byte
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In fact, this time it's a famously unsolved problem.
Peter Winkler
Page 120
SECTION: Contributed articles: Virtual extension
Privacy impact assessments should be integrated into the overall approach to risk management with other strategic planning instruments.
David Wright
Pages 121-131
Cyberwarfare is a potent weapon in political conflicts, espionage, and propaganda. Difficult to detect a priori, it is often recognized only after significant damage has been done. Gaining offensive capability on the cyber battlefield …
Sanjay Goel
Pages 132-140