One of the main insights developed at the "Publication Culture in Computing Research" workshop, held in November 2012, was that the computing-research publishing ecosystem — both conferences and journals — has simply failed to …
Moshe Y. Vardi
Page 5
DEPARTMENT: From the president
I have just returned from a trip to Warsaw where I had the opportunity to visit the Copernicus Science Museum. The facility houses an amazing array of interactive exhibits. As I encountered these fascinating experiences, I …
Vinton G. Cerf
Page 7
In accordance with the Constitution and Bylaws of the ACM, the Nominating Committee hereby submits the following slate of nominees for ACM's officers.
CACM Staff
Page 8
FY'13 was an exceptional year for ACM. Membership reached a record high for the 11th consecutive year, solidifying ACM's lead as the world's largest educational and scientific society in computing.
CACM Staff
Pages 9-14
DEPARTMENT: Letters to the Editor
In his editor's letter "The End of The American Network" (Nov. 2013), Moshe Y. Vardi made a startling statement that is untrue on several levels.
CACM Staff
Pages 16-17
DEPARTMENT: BLOG@CACM
Mark Guzdial assesses the first full year of massive open online courses, while Joel C. Adams considers the employment outlook for CS grads.
Mark Guzdial, Joel C. Adams
Pages 18-19
COLUMN: News
New method can crack certain cryptosystems far faster than earlier alternatives.
Gary Anthes
Pages 21-23
Interfaces can sense your mood, if you let them.
Tom Geller
Pages 24-26
Ushahidi — or "testimony" in Swahili — has played a central role in coordinating responses to crises around the globe.
Paul Hyman
Pages 27-29
COLUMN: Technology strategy and management
Assessing the positive and negative components of the second Microsoft CEO's tenure.
Michael A. Cusumano
Pages 30-32
COLUMN: Law and technology
Seeking better integration of the insights from the fields of law and technology.
Christopher S. Yoo
Pages 33-35
COLUMN: Historical reflections
Separating the origins of computer science and technology.
Thomas Haigh
Pages 36-41
COLUMN: The business of software
Reconciling agile approaches and project estimates.
Phillip G. Armour
Pages 42-43
COLUMN: Viewpoint
A proposal to address the problem of too many conference submissions and not enough time for reviewers to carefully evaluate each one.
Doug Terry
Pages 44-46
SECTION: Practice
Dante's tale, as experienced by a software architect.
Alex E. Bell
Pages 48-53
Enterprise computing in the public cloud.
Jason Lango
Pages 54-60
What if all the software layers in a virtual appliance were compiled within the same safe, high-level language framework?
Anil Madhavapeddy, David J. Scott
Pages 61-69
SECTION: Contributed articles
Touchless interaction with medical images lets surgeons maintain sterility during surgical procedures.
Kenton O'Hara, Gerardo Gonzalez, Abigail Sellen, Graeme Penney, Andreas Varnavas, Helena Mentis, Antonio Criminisi, Robert Corish, Mark Rouncefield, Neville Dastur, Tom Carrell
Pages 70-77
The Japanese government tweeted to calm public fear, as the public generally listened to tweets expressing alarm.
Jessica Li, Arun Vishwanath, H. Raghav Rao
Pages 78-85
Control transactions without compromising their simplicity for the sake of expressiveness, application concurrency, or performance.
Vincent Gramoli, Rachid Guerraoui
Pages 86-93
SECTION: Review articles
What do we know now that we did not know 40 years ago?
Xuedong Huang, James Baker, Raj Reddy
Pages 94-103
SECTION: Research highlights
Moore's Law has been the mainstay of semiconductor electronics since the invention of the transistor and its application to the integrated circuit. Implicit in this evolution is the assumption that we can print these circuits …
Subramanian S. Iyer
Page 106
Three-dimensional integrated circuit (3D IC) with through-silicon-via (TSV) is believed to offer new levels of efficiency, power, performance, and form-factor advantages over the conventional 2D IC.
Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim
Pages 107-115
COLUMN: Last byte
Even cosmic enlightenment can involve unwelcome contact.
Seth Shostak
Pages 128-ff