Journal: Communications of the ACM

Volume 52, Issue 6

5 -- 0Elaine J. Weyuker. ACM-W celebrates women in computing
10 -- 11Tessa Lau, Daniel Reed. Speech-activated user interfaces and climbing Mt. Exascale
12 -- 0David Roman. Making that connection
13 -- 15Don Monroe. Micromedicine to the rescue
16 -- 17Leah Hoffmann. Content control
18 -- 20Gregory Goth. Autonomous helicopters
21 -- 0Bob Violino. Looking backward and forward
22 -- 24Eugene H. Spafford. Privacy and security - Answering the wrong questions is no answer
25 -- 27Kevin Fu. Inside risks - Reducing risks of implantable medical devices
28 -- 30Peter J. Denning. The profession of IT - Beyond computational thinking
31 -- 33Richard M. Stallman. Viewpoint - Why open source misses the point of free software
34 -- 35George Neville-Neil. Kode vicious - Obvious truths
38 -- 45Jon G. Elerath. Hard-disk drives: the good, the bad, and the ugly
46 -- 50Mike O Dell. Network front-end processors, yet again
51 -- 55George V. Neville-Neil. Whither sockets?
56 -- 65Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, AnHai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Henry F. Korth, Donald Kossmann, Samuel Madden, Roger Magoulas, Beng Chin Ooi, Tim O Reilly, Raghu Ramakrishnan, Sunita Sarawagi, Michael Stonebraker, Alexander S. Szalay, Gerhard Weikum. The Claremont report on database research
66 -- 73Kenneth L. Kraemer, Jason L. Dedrick, Prakul Sharma. One laptop per child: vision vs. reality
74 -- 80M. Bernardine Dias, Eric A. Brewer. How computer science serves the developing world
82 -- 0Andrew Myers. Technical perspective - Reframing security for the web
83 -- 91Adam Barth, Collin Jackson, John C. Mitchell. Securing frame communication in browsers
92 -- 0Norman P. Jouppi. Technical perspective - Software and hardware support for deterministic replay of parallel programs
93 -- 100Derek Hower, Pablo Montesinos, Luis Ceze, Mark D. Hill, Josep Torrellas. Two hardware-based approaches for deterministic multiprocessor replay
103 -- 0Peter Winkler. Puzzled - Solutions and sources
113 -- 117Jonghun Park, Kwanho Kim. Hyperlinking the work for self-management of flexible workflows
118 -- 121Steven M. Thompson, Matthew D. Dean. Advancing information technology in health care
122 -- 126Amar Gupta. Deriving mutual benefits from offshore outsourcing
127 -- 131Mark Lycett, Christopher Partridge. The challenge of epistemic divergence in IS development
132 -- 135Nena Lim, Anne Khoo. Forensics of computers and handheld devices: identical or fraternal twins?
136 -- 140Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan. Re-tuning the music industry: can they re-attain business resonance?
141 -- 145Dursun Delen, Suliman Al-Hawamdeh. A holistic framework for knowledge discovery and management
146 -- 148T. P. Liang, Andrew J. Czaplewski, Gary Klein, James J. Jiang. Technical opinion - Leveraging first-mover advantages in internet-based consumer services