Journal: Communications of the ACM

Volume 53, Issue 2

5 -- 0Diane Crawford. An issue of teamwork
10 -- 11Valerie Barr. Connecting women and technology
12 -- 0David Roman. Where the data is
13 -- 15Kirk L. Kroeker. Alternate interface technologies emerge
16 -- 17Alex Wright. Type theory comes of age
18 -- 20Sarah Underwood. Improving disaster management
22 -- 25M. Angela Sasse. Not seeing the crime for the cameras?
26 -- 28Dennis P. Groth, Jeffrey K. MacKie-Mason. Why an informatics degree?
29 -- 31W. Douglas Maughan. The need for a national cybersecurity research and development agenda
32 -- 34Michel Beaudouin-Lafon. Open access to scientific publications
35 -- 36George V. Neville-Neil. Taking your network s temperature
37 -- 42Dennis Shasha. An interview with Michael Rabin
44 -- 48Eric Saxe. Power-efficient software
49 -- 57Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev. Managing contention for shared resources on multicore processors
58 -- 64Steven P. Miller, Michael W. Whalen, Darren D. Cofer. Software model checking takes off
66 -- 75Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler. A few billion lines of code later: using static analysis to find bugs in the real world
76 -- 83Eric Benhamou, Jon Eisenberg, Randy H. Katz. Assessing the changing U.S. IT R&D ecosystem
84 -- 93Dave Bacon, Wim van Dam. Recent progress in quantum algorithms
96 -- 0Sanjoy Dasgupta. Strange effects in high dimension
97 -- 104Nir Ailon, Bernard Chazelle. Faster dimension reduction
105 -- 0Shekhar Y. Borkar. Want to be a bug buster?
106 -- 113Sung-Boem Park, Subhasish Mitra. Post-silicon bug localization for processors using IFRA
120 -- 0Peter Winkler. Breaking chocolate bars
121 -- 126Dongmin Kim, Izak Benbasat. Designs for effective implementation of trust assurances in internet stores
127 -- 133Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons. Reversing the landslide in computer-related degree programs
134 -- 138Tim Chenoweth, Robert P. Minch, Sharon Tabor. Wireless insecurity: examining user security behavior on public networks
139 -- 143Farheen Altaf, David Schuff. Taking a flexible approach to ASPs
144 -- 148John Minor Ross. Informatics creativity: a role for abductive reasoning?
149 -- 154Damien Joseph, Soon Ang, Roger H. L. Chang, Sandra Slaughter. Practical intelligence in IT: assessing soft skills of IT professionals
155 -- 159Vijay K. Gurbani, Anita Garvert, James D. Herbsleb. Managing a corporate open source software asset
160 -- 164Nikhil Mehta, Anju Mehta. It takes two to tango: how relational investments improve IT outsourcing partnerships