Networks without effective AQM may again be vulnerable to congestion collapse.Jim Gettys, Kathleen Nichols From Communications of the ACM | January 2012
Astronomers are collecting more data than ever. What practices can keep them ahead of the flood?G. Bruce Berriman, Steven L. Groom From Communications of the ACM | December 2011
Applying lessons from software languages to hardware languages using Bluespec SystemVerilog.Rishiyur S. Nikhil From Communications of the ACM | October 2011
In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a...Eric Allman From Communications of the ACM | August 2011
How the embeddability of Lua impacted its design.Roberto Ierusalimschy, Luiz Henrique De Figueiredo, Waldemar Celes From Communications of the ACM | July 2011
In today's humongous database systems, clarity may be relaxed, but business needs can still be met.
Pat Helland From Communications of the ACM | June 2011
Methods for evaluating and effectively managing the security behavior of employees.Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling From Communications of the ACM | June 2011