Journal: Communications of the ACM

Volume 54, Issue 9

5 -- 0Moshe Y. Vardi. Are you talking to me?
10 -- 11Jeannette M. Wing, Valerie Barr. Jeannette M. Wing @ PCAST; Barbara Liskov keynote
13 -- 15Kirk L. Kroeker. A breakthrough in algorithm design
16 -- 18Gary Anthes. Invasion of the mobile apps
19 -- 21Neil Savage. Remaking American medicine
25 -- 27Martin Campbell-Kelly. In praise of Wilkes, Wheeler, and Gill
28 -- 30Ron Babin, Steve Briggs, Brian Nicholson. Corporate social responsibility and global IT outsourcing
31 -- 33Peter J. Denning, Ritu Raj. Managing time, part 2
34 -- 37Ben Shneiderman, Jennifer Preece, Peter Pirolli. Realizing the value of social media requires innovative computing research
38 -- 41Paul Vixie. Arrogance in business planning
42 -- 44Poul-Henning Kamp. The most expensive one-byte mistake
45 -- 53Mache Creeger. ACM CTO roundtable on mobile devices in the enterprise
54 -- 61Stephen J. Lukasik. Protecting users of the cyber commons
62 -- 68Craig Partridge. Realizing the future of wireless data communications
69 -- 77Leonardo Mendonça de Moura, Nikolaj Bjørner. Satisfiability modulo theories: introduction and applications
78 -- 87Patricia Bouyer, Uli Fahrenberg, Kim G. Larsen, Nicolas Markey. Quantitative analysis of real-time systems using priced timed automata
90 -- 0Christopher Kruegel. Making browser extensions secure: technical perspective
91 -- 99Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett. Vetting browser extensions for security vulnerabilities with VEX
100 -- 0Olivier Danvy, Jan Midtgaard. Abstracting abstract machines: technical perspective
101 -- 109David Van Horn, Matthew Might. Abstracting abstract machines: a systematic approach to higher-order program analysis
110 -- 0Peter Winkler. Puzzled
112 -- 0Leah Hoffmann. Q&A
121 -- 130Murray Cantor. Calculating and improving ROI in software and system programs