Journal: Communications of the ACM

Volume 52, Issue 11

5 -- 0Moshe Y. Vardi. Is the image crisis over?
10 -- 11Ramana Rao, Greg Linden. Computer science curriculum, deceptive advertising
12 -- 0David Roman. Internet addiction: it s spreading, but is it real?
13 -- 14Gary Anthes. Deep data dives discover natural laws
15 -- 17Kirk L. Kroeker. Electronic paper s next chapter
18 -- 20Leah Hoffmann. Implementing electronic medical records
21 -- 23Gregory Goth. Exploring new frontiers
25 -- 27Butler W. Lampson. Privacy and security - Usable security: how to get it
28 -- 30Pamela Samuelson. Legally speaking - Are business methods patentable?
31 -- 33Shane Greenstein. Economic and business dimensions - The broadband price is not right
34 -- 35Jonathan M. Smith. Viewpoint - On public service and computer science
42 -- 47Whitfield Diffie, Susan Landau. Communications surveillance: privacy and security at risk
48 -- 53Katie Shilton. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
54 -- 58Paul Stachour, David Collier-Brown. You don t know jack about software maintenance
60 -- 67Mitchel Resnick, John Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay S. Silver, Brian Silverman, Yasmin B. Kafai. Scratch: programming for all
68 -- 73Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao. Why IT managers don t go for cyber-insurance products
74 -- 84Edmund M. Clarke, E. Allen Emerson, Joseph Sifakis. Model checking: algorithmic verification and debugging
86 -- 0Peter Druschel. Technical perspective - Narrowing the semantic gap in distributed programming
87 -- 95Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica. Declarative networking
96 -- 0John Shawe-Taylor. Technical perspective - Machine learning for complex predictions
97 -- 104Thorsten Joachims, Thomas Hofmann, Yisong Yue, Chun-Nam John Yu. Predicting structured objects with support vector machines
112 -- 0Peter Winkler. Puzzled - Covering the plane
113 -- 117Lara Khansa, Divakaran Liginlal. Quantifying the benefits of investing in information security
118 -- 124Wei-Lun Chang, Soe-Tsyr Yuan, Eldon Y. Li. iCare home portal: an extended model of quality aging e-services
125 -- 131Aakash Taneja, Anil Singh, M. K. Raja. Computing journals and their emerging roles in knowledge exchange
132 -- 135Rudy Hirschheim. Offshoring and the new world order
136 -- 140Cristiana Bolchini, Carlo Curino, Giorgio Orsi, Elisa Quintarelli, Rosalba Rossato, Fabio A. Schreiber, Letizia Tanca. And what can context do for data?
141 -- 145Frank McCown, Catherine C. Marshall, Michael L. Nelson. Why web sites are lost (and how they re sometimes found)
146 -- 149Ralph Westfall. If your pearls of wisdom fall in a forest..