The age of open access is upon us. Increasingly, the consensus of authors and their funding institutions is that the fruits of taxpayer-supported research should be freely available. This is a compelling argument and a noble …
Ronald F. Boisvert, Jack W. Davidson
Page 5
DEPARTMENT: From the president
I have been thinking about the demographics of the computing profession and wondering what steps ACM and its members might take to increase interest in this career across a full spectrum of potential candidates.
Vinton G. Cerf
Page 7
DEPARTMENT: BLOG@CACM
Bertrand Meyer wonders why malicious reviews run rampant in computer science.
Bertrand Meyer
Pages 8-9
COLUMN: News
Computational models are tackling the complexity of biology, from single-celled microbes to human organs.
Neil Savage
Pages 11-13
The new Mars rover has attracted plenty of attention for its planetary gymnastics, but the big breakthroughs are under the hood.
Alex Wright
Pages 14-16
Computer modeling is radically redefining healthcare and epidemiology by providing new tools for understanding the impact of different intervention strategies.
Samuel Greengard
Pages 17-19
COLUMN: Privacy and security
Seeking to protect the fundamental privacy of network interactions.
Eben Moglen
Pages 20-22
COLUMN: Inside risks
My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In addition, I reflect on the collateral effects of Hurricane Sandy …
Peter G. Neumann
Pages 23-25
COLUMN: Kode Vicious
Is there a "best used by" date for software?
George V. Neville-Neil
Pages 26-27
COLUMN: Education
New possibilities in online education create new challenges.
Steve Cooper, Mehran Sahami
Pages 28-30
COLUMN: Economic and business dimensions
Applying a centuries-old technique to modern cost estimation.
Ana Aizcorbe, Samuel Kortum, Unni Pillai
Pages 31-32
COLUMN: Viewpoint
How to address the lack of transparency, trust, and acceptance in cloud services.
Ali Sunyaev, Stephan Schneider
Pages 33-36
Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.
Anita Jones
Pages 37-39
SECTION: Practice
Our authentication system is lacking. Is improvement possible?
William Cheswick
Pages 40-44
The USE method addresses shortcomings in other commonly used methodologies.
Brendan Gregg
Pages 45-51
Open source security foundations for mobile and embedded devices.
Robert N. M. Watson
Pages 52-63
SECTION: Contributed articles
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
Ari Juels, Alina Oprea
Pages 64-73
Software techniques that tolerate latency variability are vital to building responsive large-scale Web services.
Jeffrey Dean, Luiz André Barroso
Pages 74-80
SECTION: Review articles
The challenges — and great promise — of modern symbolic execution techniques, and the tools to help implement them.
Cristian Cadar, Koushik Sen
Pages 82-90
SECTION: Research highlights
The microprocessor chip R&D community has been well aware of the so-called "power wall" challenge for over a decade. The following work by Esmaeilzadeh et al. is a landmark paper that opens our eyes to the unrelenting power challenge …
Pradip Bose
Page 92
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases continue, the per-transistor speed and energy efficiency improvements …
Hadi Esmaeilzadeh, Emily Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger
Pages 93-102
COLUMN: Last byte
These puzzles involve computing probabilities associated with dice.
Peter Winkler
Page 112