[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 53, Issue 12December 2010
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0001-0782
EISSN:1557-7317
Published In:
cacm
Reflects downloads up to 17 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Free
In the Virtual Extension

To ensure the timely publication of articles, Communications created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format. VE articles undergo the same ...

DEPARTMENT: BLOG@CACM
research-article
Free
Security advice; malvertisements; and CS education in Qatar

features more than a dozen bloggers in the community. In each issue of Communications, we'll publish selected posts or excerpts. Follow us on . Greg Linden discusses security advice and the cost of user ...

DEPARTMENT: CACM online
column
Free
School grades need improvement

Much has been written over the last decade about the abysmal state of the education arms race in the U.S., particularly in the STEM disciplines. Two recent reports show how little has been done to redirect that trend and what will happen if the spiral ...

COLUMN: News
department
Free
The eyes have it

Eye-tracking control for mobile phones might lead to a new era of context-aware user interfaces.

department
Free
Topic models vs. unstructured data

With topic modeling, scientists can explore and understand huge collections of unlabeled information.

department
Free
CSEdWeek expands its reach

The second Computer Science Education Week is showing students, parents, and educators why computer science is important.

department
Free
The new face of war

With the introduction of the sophisticated Stuxnet worm, the stakes of cyberwarfare have increased immeasurably.

department
Free
A matter of privacy

Do consumers have enough control over their personal information or is more government regulation needed?

COLUMN: Emerging markets
research-article
Free
The coming African tsunami of information insecurity

As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.

COLUMN: Historical reflections
research-article
Free
IBM's single-processor supercomputer efforts

Insights on the pioneering IBM Stretch and ACS projects.

COLUMN: The profession of IT
research-article
Free
The long quest for universal information access

Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.

COLUMN: Kode Vicious
research-article
Free
Literate coding

Spelling and grammar do matter.

COLUMN: Viewpoint
research-article
Free
We need a research data census

The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.

SECTION: Virtual extension
research-article
Free
The role of conference publications in CS

A bibliometric view of the publishing frequency and impact of conference proceedings compared to archival journal publication.

The role of conference publications in computer science is controversial. Conferences have the undeniable advantages of ...

SECTION: Practice
research-article
Free
A conversation with Ed Catmull

Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.

research-article
Free
The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness

These days, cybercriminals are looking to steal more than just banking information.

SECTION: Contributed articles
research-article
Free
Certified software

Only if the programmer can prove (through formal machine-checkable proofs) it is free of bugs with respect to a claim of dependability.

research-article
Free
Business impact of Web 2.0 technologies

What do wikis, blogs, podcasts, social networks, virtual worlds, and the rest do for corporate productivity and management?

SECTION: Virtual extension
research-article
Free
IT 2008: the history of a new computing discipline

The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline.

The early 1990s saw the emergence of the Internet from the environs of the technical cognoscenti into the dot-com world with an ...

research-article
Free
A global collaboration to deploy help to China

A firsthand account of an international team effort to install the Sahana disaster-management system in Chengdu, Sichuan after an earthquake.

On Monday May 12, 2008, an earthquake measuring 7.9 on the Richter scale struck in Sichuan Province in ...

SECTION: Review articles
research-article
Free
Bayesian networks

What are Bayesian networks and why are their applications growing across all fields?

SECTION: Research highlights
research-article
Free
CoSaMP: iterative signal recovery from incomplete and inaccurate samples

Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. It is based on the principle that many types of vector-space data are compressible, which is a term of art in mathematical signal processing. The key ideas are that ...

research-article
Free
QIP = PSPACE

The interactive proof system model of computation has been studied extensively in computational complexity theory and theoretical cryptography for more than 25 years, and has driven the development of interesting new techniques and insights in those ...

COLUMN: Last byte
department
Free
Puzzled: Solutions and sources

It's amazing how little we know about the simple, ordinary, axis-aligned rectangle. Last month (p. 112) we posted a trio of brainteasers, including one as yet unsolved, concerning rectangles galore. Here, we offer solutions to at least two of them. How ...

department
Free
Future Tense: Rebirth of worlds

Future Tense, one of the revolving features on this page, presents stories and essays from the intersection of computational science and technological speculation, their boundaries limited only by our ability to imagine what will and could be.

Build a ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.