acm-header
Sign In

Communications of the ACM

Table of Contents


From the Presidents of the IEEE Computer Society and ACM

As most members of our organizations probably know, there is a great deal of overlap between the products and services offered by the IEEE CS and ACM. In fact, about 27% of ACM members belong to IEEE CS.
DEPARTMENT: Letters to the editor

A Policy that Deters Violation of Security Policy

In their article "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Qing Hu et al. (June 2011) analyzed deterrence of employee violation of …

In the Virtual Extension

To ensure the timely publication of articles, Communications created the Virtual Extension (VE) to bring readers high-quality articles in an online-only format. The following articles are now available to ACM members via the …
DEPARTMENT: BLOG@CACM

Stonebraker on NoSQL and Enterprises

Michael Stonebraker discusses several reasons why NoSQL has not caught on with enterprise users.
DEPARTMENT: CACM online

Why You Should Be Happy to Sign In!

For many, the five dreaded words "This article is premium content" is a frustration. Many in the community would prefer all publications be made freely …
COLUMN: News

A New Benchmark For Artificial Intelligence

Computers are unable to defeat the world's best Go players, but that may change with the application of a new strategy that promises to revolutionize artificial intelligence.

Supercomputing's Exaflop Target

The twin challenges of parallelism and energy consumption are enlivening supercomputers' progress.

Life, Translated

The Holy Grail of language translation is to develop a machine-based system that can handle the task transparently and accurately.
COLUMN: Economic and business dimensions

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.
COLUMN: Education

From Interests to Values

Computer science is not that difficult but wanting to learn it is.
COLUMN: Privacy and security

As Simple As Possible ? But Not More So

An assessment of the U.S. government's EINSTEIN project.
COLUMN: Kode Vicious

Storage Strife

Beware keeping data in binary format.
COLUMN: Viewpoint

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice in CS has been to publish in a conference …
SECTION: Practice

The Robustness Principle Reconsidered

In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a good proposition for implementing network …

Computing Without Processors

Heterogeneous systems allow us to target our programming to the appropriate environment.

The Pain of Implementing LINQ Providers

It's no easy task for NoSQL.
SECTION: Contributed articles

Cognitive Computing

Unite neuroscience, supercomputing, and nanotechnology to discover, demonstrate, and deliver the brain's core algorithms.

Gender and Computing Conference Papers

Women increasingly publish in ACM conference proceedings and are notably productive authors.

Reputation Systems For Open Collaboration

Algorithmic-based user incentives ensure the trustworthiness of evaluations of Wikipedia entries and Google Maps business information.
SECTION: Review articles

An Overview of Business Intelligence Technology

BI technologies are essential to running today's businesses and this technology is going through sea changes.
SECTION: Research highlights

Technical Perspective: Sketches Get Sketchier

Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive datasets? The answer to this question is a firm …

Theory and Applications of b-Bit Minwise Hashing

Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications in information retrieval and data management. One common …

Technical Perspective: Skintroducing the Future

Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for interacting, more real estate is generally better. This …

Skinput: Appropriating the Skin as an Interactive Canvas

Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve the location of finger taps on the arm and hand using a novel …
COLUMN: Last byte

Puzzled: Uncommon Divisors

Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In fact, this time it's a famously unsolved problem.
SECTION: Contributed articles: Virtual extension

Should Privacy Impact Assessments Be Mandatory?

Privacy impact assessments should be integrated into the overall approach to risk management with other strategic planning instruments.

Cyberwarfare: Connecting the Dots in Cyber Intelligence

Cyberwarfare is a potent weapon in political conflicts, espionage, and propaganda. Difficult to detect a priori, it is often recognized only after significant damage has been done. Gaining offensive capability on the cyber battlefield …