While the new ideas generated at the ACM Strategic Planning Retreat are likely to have a significant impact on ACM's activities going forward, I view them as defining only a relatively short-term agenda not fully addressing some …
Alexander L. Wolf
Page 5
The second Heidelberg Laureate Forum was even better than the first, if that is possible.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
British philosopher and social theorist Jeremy Bentham would have wholeheartedly endorsed many of the accountability mechanisms Stefan Bechtold and Adrian Perrig outlined in "Accountability in Future Internet Architectures" …
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
Mark Guzdial suggests computer science education needs to be aimed at adults before teaching it to children; Lawrence M. Fisher finds the volunteer spirit behind ACM Special Interest Groups.
Mark Guzdial, Lawrence M. Fisher
Pages 10-11
COLUMN: News
Parallel computing has become increasingly important as chipmakers put more and more processor cores on individual chips.
Gary Anthes
Pages 13-15
New apps and pods improve the virtual and actual retail experiences by ensuring clothing and cosmetics look good on you before you buy them.
Esther Shein
Pages 16-19
As online reviews become increasingly important to e-commerce and social media sites, computer scientists work on ways to ensure their authenticity.
Logan Kugler
Pages 20-23
COLUMN: Economic and business dimensions
Improving the sharing economy will require addressing myriad problems.
Arvind Malhotra, Marshall Van Alstyne
Pages 24-27
COLUMN: Legally speaking
Recapping influential U.S. Supreme Court decisions rendered earlier this year.
Pamela Samuelson
Pages 28-30
COLUMN: Computing ethics
Recognizing the inherent limitations of consent and anonymity.
Solon Barocas, Helen Nissenbaum
Pages 31-33
COLUMN: Education
Seeking to address the most important issues facing the computer education research community.
Steve Cooper, Shuchi Grover, Mark Guzdial, Beth Simon
Pages 34-36
COLUMN: Privacy and security
Considering recent privacy- and security-related events through this column.
Susan Landau
Pages 37-39
COLUMN: Viewpoint
A critical review of open innovation systems.
Mark Klein, Gregorio Convertino
Pages 40-42
How to encourage better user security practices and behavior
Terrence August, Robert August, Hyoduk Shin
Pages 43-46
SECTION: Practice
Better education needed to develop the discipline.
Ellen Chisa
Pages 48-52
Conditional dependency resolution.
Alex Liu
Pages 53-59
Looking at the design and benefits of X10.
John T. Richards, Jonathan Brezin, Calvin B. Swart, Christine A. Halverson
Pages 60-66
SECTION: Contributed articles
Pixels labeled with a scene's semantics and geometry let computers describe what they see.
Stephen Gould, Xuming He
Pages 68-77
Strong ties connect individuals in the same community; weak ties connect individuals in different communities.
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti
Pages 78-84
SECTION: Review articles
It's not just about being fair.
Beryl Nelson
Pages 86-95
SECTION: Research highlights
For years, graphics programs have simulated fabric as a collection of fibers, requiring tweaks to algorithms for each new fabric. "Building Volumetric Appearance Models of Fabric Using Micro CT Imaging" solves this problem in …
Szymon Rusinkiewicz
Page 97
Visualizing and rendering cloth has been an important area of graphics research for decades. This paper proposes a new approach to acquiring volume models, based on density data from CT scans and appearance data from photographs …
Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita Bala
Pages 98-105
COLUMN: Last byte
Peter Winkler's mathematically elegant, often whimsical puzzles have been a joy to read and wrestle with. My columns now embark on a different path. Each will come in two parts: one quite doable, the other an "upstart," or insolent …
Dennis Shasha
Page 120