ACM Europe was launched in October 2009 in Paris. Since then, the ACM Europe Council has grown to 21 members with a good mix of nationality (although mostly European, of course), gender, and research interests.
Fabrizio Gagliardi
Page 5
DEPARTMENT: Letters to the editor
I agree with Bertrand Meyer's blog "Fixing the Process of Computer Science Refereeing" (Nov. 2011) and "Why I Sign My Reviews" in favor of open reviewing but suggest we go further with the quality of refereeing by rewarding …
CACM Staff
Pages 6-7
DEPARTMENT: BLOG@CACM
Michael Stonebraker issues a call to arms about research groups' data-management problems. Jason Hong discusses the nature of functionality with respect to design.
Michael Stonebraker, Jason Hong
Pages 10-11
COLUMN: News
Researchers are exploring networked computational analysis, formal classification, and topic modeling to better identify relevant scientists, ideas, and trends.
Gregory Goth
Pages 13-15
Increasingly sophisticated botnets have emerged during the last several years. However, security researchers, businesses, and governments are attacking botnets from a number of different angles — and sometimes winning.
Samuel Greengard
Pages 16-18
Researchers are trying to build robots capable of working together with minimal human supervision. But will they ever learn to get along?
Alex Wright
Pages 19-21
Forty-six men and women are recognized as 2011 ACM Fellows.
CACM Staff
Page 23
COLUMN: Economic and business dimensions
Reallocating valuable wireless spectrum can generate billions of dollars in revenue to the U.S. federal government while also benefiting consumers.
Gregory Rosston
Pages 24-26
COLUMN: Education
How the computing education community can learn from physics education.
Beth Simon, Quintin Cutts
Pages 27-29
COLUMN: Inside risks
Considering the unexpected risks associated with seemingly minor technological changes.
Donald A. Norman
Pages 30-32
COLUMN: Kode Vicious
Keep your debug messages clear, useful, and not annoying.
George V. Neville-Neil
Pages 33-34
COLUMN: Privacy and security
Examining the role of human emotional response in making complex security-related decisions.
Rose McDermott
Pages 35-37
COLUMN: Viewpoint
Upon closer examination, everything old appears to be new again in the realm of software engineering.
Marvin V. Zelkowitz
Pages 38-39
SECTION: Practice
A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and Jim Gettys.
CACM Staff
Pages 40-47
Data races are evil.
Hans-J. Boehm, Sarita V. Adve
Pages 48-54
Logs contain a wealth of information to help manage systems.
Adam Oliner, Archana Ganapathi, Wei Xu
Pages 55-61
SECTION: Contributed articles
Statistical techniques help public leaders turn text in unstructured citizen feedback into responsive e-democracy.
Nicholas Evangelopoulos, Lucian Visinescu
Pages 62-69
Avoid premature commitment, seek design alternatives, and automatically generate performance-optimized software.
Holger H. Hoos
Pages 70-80
Globus Online manages fire-and-forget file transfers for big-data, high-performance scientific collaborations.
Bryce Allen, John Bresnahan, Lisa Childers, Ian Foster, Gopi Kandaswamy, Raj Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke
Pages 81-88
SECTION: Review articles
Vehicle area networks form the backbone of future intelligent transportation systems.
Miad Faezipour, Mehrdad Nourani, Adnan Saeed, Sateesh Addepalli
Pages 90-100
SECTION: Research highlights
The following paper by Viktor Kuncak et al. integrates declarative programming into a general-purpose language, allowing one to escape the host language when a subproblem can be solved declaratively.
Rastislav Bodik
Page 102
Automated synthesis of program fragments from specifications can make programs easier to write and easier to reason about. To integrate synthesis into programming languages, software synthesis algorithms should behave in a predictable …
Viktor Kuncak, Mikaƫl Mayer, Ruzica Piskac, Philippe Suter
Pages 103-111
Data in high dimension is difficult to visualize and understand. This has always been the case and is even more apparent now with the availability of large high-dimensional datasets and the need to make sense of them.
Santosh S. Vempala
Page 112
The Gaussian mixture model is one of the oldest and most widely used statistical models. Our work focuses on the case where the mixture consists of a small but unknown number of Gaussian "components" that may overlap
Adam Tauman Kalai, Ankur Moitra, Gregory Valiant
Pages 113-120
COLUMN: Last byte
Welcome to three new puzzles. The theme is Venn diagrams, those ubiquitous but useful pictures, usually consisting of two or three intersecting circles that illustrate how sets meet.
Peter Winkler
Page 128