acm-header
Sign In

Communications of the ACM

Latest Practice


Latest Practice Practice Archive Refine your search:
subjectManagement
authorJim Waldo

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?

From Communications of the ACM

Scaling in Games and Virtual Worlds

Online games and virtual worlds have familiar scaling requirements, but don't be fooled: Everything you know is wrong.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account