Journal: Communications of the ACM

Volume 52, Issue 12

0 -- 0Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality
5 -- 0Chris Stephenson. It is a pivotal time for K--12 computer science
8 -- 9Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality
12 -- 0David Roman. Crowdsourcing and the question of expertise
13 -- 15Gary Anthes. Blueprints for self-assembly
16 -- 17Alex Wright. Ready for a Web OS?
18 -- 19Samuel Greengard. Making automation work
20 -- 0Leah Hoffmann. Problem solvers
22 -- 24Richard E. Ladner. Broadening participation - Opening remarks
25 -- 27Orna Berry, Yigal Grayeff. Emerging markets - Israel s technology industry as an economic growth engine
28 -- 30Peter J. Denning, Peter A. Freeman. The profession of IT - Computing s paradigm
31 -- 32George V. Neville-Neil. Kode Vicious - Broken builds
33 -- 37Savas Parastatidis, Evelyne Viegas, Tony Hey. Viewpoint - A smart cyberinfrastructure for research
38 -- 42Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O Leary, Jim Waldo. A threat analysis of RFID passports
43 -- 47Paul Vixie. What DNS is not
48 -- 57Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto. Maximizing power efficiency with asymmetric multicore systems
58 -- 65Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic. The Bulk Multicore architecture for improved programmability
66 -- 72Michael Zyda. Computer science in the conceptual age
74 -- 78Kelvin Sung. Computer games and traditional CS courses
80 -- 0James A. Landay. Technical perspective - Design tools for the rest of us
81 -- 88Yuki Igarashi, Takeo Igarashi. Designing plush toys with a computer
89 -- 0Pat Hanrahan. Technical perspective - A graphical sense of touch
90 -- 98Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton. ThinSight: a thin form-factor interactive surface technology
111 -- 0Peter Winkler. Puzzled - Solutions and sources
113 -- 115Niki Panteli, Robert J. Tucker. Power and trust in global virtual teams
116 -- 120Sun Sun Lim, Hichang Cho, Milagros Rivera Sanchez. Online privacy, government surveillance and national ID cards
121 -- 125Ganesh Vaidyanathan, Steven Mautone. Security in dynamic web content management systems applications
126 -- 129Lou Hafer, Arthur E. Kirkpatrick. Assessing open source software as a scholarly contribution
130 -- 134Narciso Cerpa, June M. Verner. Why did your project fail?
135 -- 140Karen Renaud, Antonella De Angeli. Visual passwords: cure-all or snake-oil?
141 -- 144Nir Kshetri. Positive externality, increasing returns, and the rise in cybercrimes
145 -- 147Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila. Technical opinion - Are employees putting your company at risk by not following information security policies?