I recently attended a rather theoretical computer-science conference, and sat, as is my habit, in the front row. The speaker was trying to convey the fine details of a rather …
Moshe Y. Vardi
Page 5
DEPARTMENT: Letters to the editor
Moshe Y. Vardi's Editor's Letter "Solving the Unsolvable" (July 2011) raised an important point — that we should reconsider the meaning of unsolvability. Even though a problem …
CACM Staff
Page 7
To ensure the timely publication of articles,
Communications created the Virtual Extension to bring readers high-quality articles in an online-only format. The following articles are now available in their entirety to ACM members …
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
Jeannette M. Wing discusses her PCAST presentation about the importance of computer science and its impact. Valerie Barr shares highlights from Barbara Liskov's keynote at Grace Hopper.
Jeannette M. Wing, Valerie Barr
Pages 10-11
COLUMN: News
Computer scientists at Carnegie Mellon University have devised an algorithm that might be able to solve a certain class of linear systems much more quickly than today's fastest solvers.
Kirk L. Kroeker
Pages 13-15
The market model pioneered by Apple and others is transforming the software world — and has profound implications for software companies and their customers.
Gary Anthes
Pages 16-18
Developing an IT ecosystem for health could improve — and transform — the practice of medicine.
Neil Savage
Pages 19-21
COLUMN: Law and technology
Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.
Rebecca Tushnet
Pages 22-24
COLUMN: Historical reflections
Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming:
The Preparation of Programs for an Electronic Digital Computer. It was a publication that spearheaded the software revolution …
Martin Campbell-Kelly
Pages 25-27
COLUMN: Emerging markets
How to improve IT outsourcing relationships while doing good for society.
Ron Babin, Steve Briggs, Brian Nicholson
Pages 28-30
COLUMN: The profession of IT
Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.
Peter J. Denning, Ritu Raj
Pages 31-33
COLUMN: Viewpoint
How social media are expanding traditional research and development topics for computer and information scientists.
Ben Shneiderman, Jennifer Preece, Peter Pirolli
Pages 34-37
SECTION: Practice
Technology business plans that assume no competition — ever.
Paul Vixie
Pages 38-41
Did Ken, Dennis, and Brian choose wrong with NUL-terminated text strings?
Poul-Henning Kamp
Pages 42-44
Finding solutions as growth and fragmentation complicate mobile device support.
Mache Creeger
Pages 45-53
SECTION: Contributed articles
Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.
Stephen J. Lukasik
Pages 54-61
Technologies are available to unlock radio spectrum as consumers need it.
Craig Partridge
Pages 62-68
Checking the satisfiability of logical formulas, SMT solvers scale orders of magnitude beyond custom ad hoc solvers.
Leonardo De Moura, Nikolaj Bjørner
Pages 69-77
SECTION: Review articles
Timed automata and their extensions allow for analysis of a wide range of performance and optimization problems.
Patricia Bouyer, Uli Fahrenberg, Kim G. Larsen, Nicolas Markey
Pages 78-87
SECTION: Research highlights
Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security of Web users and, ultimately, earn money …
Christopher Kruegel
Page 90
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that target browsers, vulnerabilities in browser extensions have received …
Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett
Pages 91-99
Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice of runtime properties; (3) associate a "relevant" …
Olivier Danvy, Jan Midtgaard
Page 100
Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs remains a difficult and error-prone process for modern high-level …
David Van Horn, Matthew Might
Pages 101-109
COLUMN: Last byte
Last month we posted a trio of brainteasers, including one as yet unsolved, concerning divisibility of numbers. Here, we offer solutions to two of them and a remark about the third. How did you do?
Peter Winkler
Page 110
Eric Brewer talks about infrastructure, connectivity, and computing for developing nations.
Leah Hoffmann
Pages 112-ff
SECTION: Contributed articles: Virtual extension
Exploring the factors that may lead to the inability of professionals to adapt or cope with emerging IS in a healthy manner.
Monideepa Tarafdar, Qiang Tu, T. S. Ragu-Nathan, Bhanu S. Ragu-Nathan
Pages 113-120
The investment value of innovation follows from a technology's uncertain net present value and derived ROI calculations.
Murray Cantor
Pages 121-130