Issue Downloads
In the Virtual Extension
To ensure the timely publication of articles, Communications created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format. VE articles undergo the same ...
Security advice; malvertisements; and CS education in Qatar
features more than a dozen bloggers in the community. In each issue of Communications, we'll publish selected posts or excerpts. Follow us on . Greg Linden discusses security advice and the cost of user ...
School grades need improvement
Much has been written over the last decade about the abysmal state of the education arms race in the U.S., particularly in the STEM disciplines. Two recent reports show how little has been done to redirect that trend and what will happen if the spiral ...
The eyes have it
Eye-tracking control for mobile phones might lead to a new era of context-aware user interfaces.
Topic models vs. unstructured data
With topic modeling, scientists can explore and understand huge collections of unlabeled information.
CSEdWeek expands its reach
The second Computer Science Education Week is showing students, parents, and educators why computer science is important.
The new face of war
With the introduction of the sophisticated Stuxnet worm, the stakes of cyberwarfare have increased immeasurably.
A matter of privacy
Do consumers have enough control over their personal information or is more government regulation needed?
The coming African tsunami of information insecurity
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.
IBM's single-processor supercomputer efforts
Insights on the pioneering IBM Stretch and ACS projects.
The role of Hispanic-serving institutions in contributing to an educated work force
Improving inclusiveness in computing education.
The long quest for universal information access
Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.
We need a research data census
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.
The role of conference publications in CS
A bibliometric view of the publishing frequency and impact of conference proceedings compared to archival journal publication.
The role of conference publications in computer science is controversial. Conferences have the undeniable advantages of ...
A conversation with Ed Catmull
Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.
The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness
These days, cybercriminals are looking to steal more than just banking information.
Certified software
Only if the programmer can prove (through formal machine-checkable proofs) it is free of bugs with respect to a claim of dependability.
Business impact of Web 2.0 technologies
What do wikis, blogs, podcasts, social networks, virtual worlds, and the rest do for corporate productivity and management?
IT 2008: the history of a new computing discipline
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline.
The early 1990s saw the emergence of the Internet from the environs of the technical cognoscenti into the dot-com world with an ...
A global collaboration to deploy help to China
A firsthand account of an international team effort to install the Sahana disaster-management system in Chengdu, Sichuan after an earthquake.
On Monday May 12, 2008, an earthquake measuring 7.9 on the Richter scale struck in Sichuan Province in ...
Bayesian networks
What are Bayesian networks and why are their applications growing across all fields?
CoSaMP: iterative signal recovery from incomplete and inaccurate samples
Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. It is based on the principle that many types of vector-space data are compressible, which is a term of art in mathematical signal processing. The key ideas are that ...
QIP = PSPACE
The interactive proof system model of computation has been studied extensively in computational complexity theory and theoretical cryptography for more than 25 years, and has driven the development of interesting new techniques and insights in those ...
Puzzled: Solutions and sources
It's amazing how little we know about the simple, ordinary, axis-aligned rectangle. Last month (p. 112) we posted a trio of brainteasers, including one as yet unsolved, concerning rectangles galore. Here, we offer solutions to at least two of them. How ...
Future Tense: Rebirth of worlds
Future Tense, one of the revolving features on this page, presents stories and essays from the intersection of computational science and technological speculation, their boundaries limited only by our ability to imagine what will and could be.
Build a ...