Journal: Communications of the ACM

Volume 51, Issue 9

5 -- 0Wendy Hall. ACM s place in the global picture
7 -- 0Scott E. Delman. 50 Years young
9 -- 0. Knuth s art of recovering from errors
10 -- 0David Roman. Current features
11 -- 13Kirk L. Kroeker. Finding diamonds in the rough
14 -- 16Logan Kugler. Ubiquitous video
17 -- 18Samuel Greengard. Privacy matters
19 -- 0Leah Hoffmann. Wisdom from Randy Pausch
22 -- 24Michael A. Cusumano. Technology strategy and management: The puzzle of Apple
25 -- 26George Neville-Neil. Kode vicious: Pride and prejudice (the ::::Vasa::::)
27 -- 29Cameron Wilson, Peter Harsha. IT policy: Science policy isn t always about science
30 -- 32Richard G. Baraniuk, C. Sidney Burrus. Viewpoint: Global warming toward open educational resources
34 -- 41Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown. How do I model state?: Let me count the ways
34 -- 41Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown. How do I model state?: Let me count the ways
42 -- 46Matthew Garrett. Powering down
47 -- 52Mache Creeger. CTO storage roundtable, part two
54 -- 59Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria. Software engineering and formal methods
60 -- 65Dmitri Roussinov, Weiguo Fan, Jose Antonio Robles-Flores. Beyond keywords: Automated question answering on the web
66 -- 71Bertrand Meyer. Design and code reviews in the age of the internet
72 -- 79Philip A. Bernstein, Laura M. Haas. Information integration in the enterprise
83 -- 91Christopher J. Rossbach, Hany E. Ramadan, Owen S. Hofmann, Donald E. Porter, Bhandari Aditya, Emmett Witchel. TxLinux and MetaTM: transactional memory and the operating system
93 -- 99Fabian Kuhn, Thomas Locher, Roger Wattenhofer. Distributed selection: a missing piece of data aggregation
105 -- 109Robin S. Poston. Using and fixing biased rating schemes
110 -- 114Kannan Mohan, Radhika Jain. Using traceability to mitigate cognitive biases in software development
115 -- 118Alexander P. Pons, Peter Polak. Understanding user perspectives on biometric technology
119 -- 122Lina Zhou, Dongsong Zhang. Following linguistic footprints: automatic deception detection in online communication
123 -- 127Julia Kotlarsky, Ilan Oshri, Kuldeep Kumar, Jos van Hillegersberg. Towards agility in design in global component-based development
128 -- 131Neset Hikmet, Eileen Z. Taylor, Christopher J. Davis. The student productivity paradox: technology mediated learning in schools
132 -- 135Patrick Y. K. Chau, Fujun Lai, Dahui Li. What factors drive the assimilation of internet technologies in China?

Volume 51, Issue 8

5 -- 0Stuart I. Feldman. A new beginning, a fond farewell
8 -- 0David Roman. Small changes hint at bigger things
9 -- 11Hal R. Varian. Designing the perfect auction
12 -- 14Peggy Aycinena. Access for all
15 -- 17Sarah Underwood. Challenging poverty
18 -- 0Michael Ross. Remembering Jim
38 -- 44Jim Waldo. Scaling in games and virtual worlds
45 -- 51Mache Creeger. CTO storage roundtable
52 -- 57Michi Henning. The rise and fall of CORBA
58 -- 67Luis von Ahn, Laura Dabbish. Designing games with a purpose
68 -- 73Diomidis Spinellis, Panagiotis Louridas. The collaborative organization of knowledge
74 -- 79Yoav Shoham. Computer science and game theory
83 -- 89Stephen M. Blackburn, Kathryn S. McKinley, Robin Garner, Chris Hoffmann, Asjad M. Khan, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony L. Hosking, Maria Jump, Han Lee, J. Eliot B. Moss, Aashish Phansalkar, Darko Stefanovic, Thomas VanDrunen, Daniel von Dincklage, Ben Wiedermann. Wake up and smell the coffee: evaluation methodology for the 21st century
91 -- 100Tim Harris, Simon Marlow, Simon L. Peyton Jones, Maurice Herlihy. Composable memory transactions

Volume 51, Issue 7

5 -- 0Moshe Y. Vardi. Where do you come from? and where are you going?
7 -- 0Scott E. Delman. The art and business of revitalizing a 50-year-old science and technology magazine
8 -- 0David Roman. Your attention, please
9 -- 11Brian Hayes. Cloud computing
12 -- 13Michael Ross, Mark Oskin. Quantum computing
14 -- 16Leah Hoffmann. In search of dependable design
40 -- 46Erik Wilde, Robert J. Glushko. XML fever
47 -- 51Adam Leventhal. Flash storage memory
52 -- 58Margo I. Seltzer. Beyond relational databases
60 -- 69James A. Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel J. Weitzner. Web science: an interdisciplinary approach to understanding the web
70 -- 78Mark Oskin. The revolution inside the box
80 -- 88James R. Larus, Christos Kozyrakis. Transactional memory
91 -- 97David E. Shaw, Martin M. Deneroff, Ron O. Dror, Jeffrey Kuskin, Richard H. Larson, John K. Salmon, Cliff Young, Brannon Batson, Kevin J. Bowers, Jack C. Chao, Michael P. Eastwood, Joseph Gagliardo, John P. Grossman, Richard C. Ho, Doug Ierardi, István Kolossváry, John L. Klepeis, Timothy Layman, Christine McLeavey, Mark A. Moraes, Rolf Mueller, Edward C. Priest, Yibing Shan, Jochen Spengler, Michael Theobald, Brian Towles, Stanley C. Wang. Anton, a special-purpose machine for molecular dynamics simulation
99 -- 106Philip Levis, Eric A. Brewer, David E. Culler, David Gay, Samuel Madden, Neil Patel, Joseph Polastre, Scott Shenker, Robert Szewczyk, Alec Woo. The emergence of a networking primitive in wireless sensor networks

Volume 51, Issue 6

5 -- 6Diane Crawford. Editorial pointers
9 -- 11Diane Crawford. Forum
15 -- 20Hal Berghel. BRAP forensics
21 -- 22Robert L. Glass. Software design and the monkey s brain
23 -- 25Arik Ragowsky, Paul S. Licker, David Gefen. Give me information, not technology
26 -- 30Roel Vertegaal, Ivan Poupyrev. Introduction
32 -- 36Hiroshi Ishii. The tangible user interface and its evolution
38 -- 44Jun Rekimoto. Organic interaction technologies: from stone to skin
45 -- 47Elise Co, Nikita Pashenkov. Emerging display technologies for organic user interfaces
48 -- 55David Holman, Roel Vertegaal. Organic user interfaces: designing computers in any way, shape, or form
56 -- 57Eli Blevis. Sustainability implications of organic user interface technologies: an inky problem
58 -- 65Amanda J. Parkes, Ivan Poupyrev, Hiroshi Ishii. Designing kinetic interactions for organic user interfaces
67 -- 69Carsten Schwesig. What makes an interface feel organic?
70 -- 78Kas Oosterhuis, Nimish Biloria. Interactions with proactive architectural spaces: the muscle projects
79 -- 81Sachiko Kodama. Dynamic ferrofluid sculpture: organic shape-changing art forms
82 -- 87Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James A. Hendler, Gerald Jay Sussman. Information accountability
89 -- 94Charalambos L. Iacovou, Robbie Nakatsu. A risk profile of offshore-outsourced development projects
95 -- 99Chon Abraham, Richard T. Watson, Marie-Claude Boudreau. Ubiquitous access: on the front lines of patient care and safety
101 -- 104Wayne Wei Huang, Jonathon Greene, John Day. Outsourcing and the decrease of IS program enrollment
112 -- 0Jim Horning, Peter G. Neumann. Risks of neglecting infrastructure

Volume 51, Issue 5

5 -- 6Diane Crawford. Editorial pointers
7 -- 8. News track
9 -- 11Diane Crawford. Forum
15 -- 18Jacques Cohen. The crucial role of CS in systems and synthetic biology
19 -- 21Meg McGinity Shannon. This menu has changed
22 -- 31. 2008 ACM Elections
32 -- 40Wingyan Chung. Web searching in a multilingual world
41 -- 46Irit Hadar, Uri Leron. How intuitive is object-oriented design?
47 -- 52Dov Dori. Words from pictures for dual-channel processing
53 -- 58Silvana Trimi, Hong Sheng. Emerging trends in M-government
59 -- 64Kannan Mohan, Peng Xu, Balasubramaniam Ramesh. Improving the change-management process
66 -- 73Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya. Coordination in emergency response management
75 -- 81Alessandro Garcia, Carlos José Pereira de Lucena. Taming heterogeneous agent architectures
83 -- 87Oded Nov, Bharat Rao. Technology-facilitated Give According to Your Abilities, Receive According to Your Needs
89 -- 97Bezalel Gavish, Christopher Tucci. Reducing internet auction fraud
98 -- 100Edgar A. Whitley, Ian Hosein. Departmental influences on policy design
104 -- 0Steven M. Bellovin. The physical world and the real world

Volume 51, Issue 4

5 -- 6Diane Crawford. Editorial pointers
10 -- 0Diane Crawford. Forum
13 -- 17Hal Berghel. Faith-based security
19 -- 24Peter J. Denning, Peter Yaholkovsky. Getting to we
25 -- 26. Call for nominations for advanced member grades in the ACM
31 -- 33Daniel Kunkle, Gene Cooperman. Solving Rubik s Cube: disk is the new RAM
34 -- 40Ryan West. The psychology of security
41 -- 46Richard T. Watson, Marie-Claude Boudreau, Paul T. York, Martina E. Greiner, Donald W. Wynn Jr.. The business of open source
47 -- 51Ziqi Liao, Michael Tow Cheung. Measuring consumer satisfaction in internet banking: a core framework
52 -- 58Luc Moreau, Paul T. Groth, Simon Miles, Javier Vázquez-Salceda, John Ibbotson, Sheng Jiang, Steve Munroe, Omer F. Rana, Andreas Schreiber, Victor Tan, László Zsolt Varga. The provenance of electronic data
59 -- 63Hsiu-Ping Yueh, Shihkuan Hsu. Designing a learning management system to support instruction
64 -- 68Lawrence D. Bodin, Lawrence A. Gordon, Martin P. Loeb. Information security and risk management
69 -- 74Dawn G. Gregg, Judy E. Scott. A typology of complaints about eBay sellers
76 -- 81Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks. Missing links: building critical social ties for global collaborative teamwork
83 -- 88Ivy Chan, Chee-Kwong Chao. Knowledge management in small and medium-sized enterprises
89 -- 94Mohamed Khalifa, Kathy Ning Shen. Demographic changes in IS research productivity and impact
96 -- 102Pamela Whitten, Deirdre Mylod, Goran Gavran, Howard Sypher. Most Wired Hospitals rate patient satisfaction
107 -- 109Chuck Litecky, Bipin Prabhakar, Kirk P. Arnett. The size of the IT job market
112 -- 0Lauren Weinstein. A current affair

Volume 51, Issue 3

5 -- 6Diane Crawford. Editorial pointers
7 -- 8. News track
13 -- 16Phillip G. Armour. The inaccurate conception
17 -- 18Robert L. Glass. Managing for innovation
19 -- 21Chenglie Hu. Just say A Class Defines a Data Type
24 -- 33Dana Cuff, Mark H. Hansen, Jerry Kang. Urban sensing: out of the woods
35 -- 39Jason O. B. Soh, Bernard C. Y. Tan. Mobile gaming
40 -- 46Liping Zhao. Patterns, symmetry, and symmetry breaking
47 -- 50Robert Pinsker, Shaomin Li. Costs and benefits of XBRL adoption: early evidence
51 -- 55Bernd Carsten Stahl, Carole Brooke. The contribution of critical IS research
56 -- 63David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta. The illusion of security
65 -- 69Iris A. Junglas, Richard T. Watson. Location-based services
71 -- 76Robert LaRose, Nora J. Rifon, Richard J. Enbody. Promoting personal responsibility for internet safety
77 -- 82Frank Safayeni, P. Robert Duimering, Kimberley Zheng, Natalia Derbentseva, Christopher Poile, Bing Ran. Requirements engineering in new product development
83 -- 88Kwangsu Cho, Tingting Rachel Chung, William R. King, Christian Schunn. Peer-based computer-supported knowledge refinement: an empirical investigation
89 -- 91Dinesh K. Gauri, Amit Bhatnagar, H. Raghav Rao. Role of word of mouth in online store loyalty
104 -- 0Xiaoming Lu, George Ledin Jr.. Wireless sensor networks and the risks of vigilance

Volume 51, Issue 2

5 -- 6Diane Crawford. Editorial pointers
9 -- 11Diane Crawford. Forum
14 -- 0Diane Crawford. SIGs announce candidates for election
15 -- 17Michael A. Cusumano. Managing software development in globally distributed teams
19 -- 20Andy Oram. Peer to patent needs your expertise
21 -- 25Pamela Samuelson, Jerome Reichman, Graeme Dinwoodie. How to achieve (some) balance in anti-circumvention laws
27 -- 34Stuart I. Feldman. ACM annual report for FY07
36 -- 42Jeffrey Y. Kim, Jonathan P. Allen, Elan Lee. Alternate reality gaming
43 -- 48Eric Shih, Kenneth L. Kraemer, Jason L. Dedrick. IT diffusion in developing countries
49 -- 52Mark T. Keane, Maeve O Brien, Barry Smyth. Are people biased in their use of search engines?
53 -- 58Nolan J. Taylor, Eleanor T. Loiacono, Richard T. Watson. Alternative scenarios to the banner years
60 -- 65Peter V. Marks, Peter Polak, Scott McCoy, Dennis F. Galletta. Sharing knowledge
66 -- 71Alfred Loo. The myths and truths of wireless security
72 -- 80Munir Mandviwalla, Abhijit Jain, Julie Fesenmaier, Jeff Smith, Paul Weinberg, Greg Meyers. Municipal broadband wireless networks
81 -- 84Vicki R. McKinney, Darryl D. Wilson, Nita Brooks, Anne O Leary-Kelly, Bill C. Hardgrave. Women and men in the IT profession
85 -- 89Bing Liu, Alexander Tuzhilin. Managing large collections of data mining models
91 -- 94Min-Yen Kan, Yee Fan Tan. Record matching in digital library metadata
104 -- 0Pascal Meunier. Software transparency and purity

Volume 51, Issue 12

5 -- 0Ronald F. Boisvert, Holly E. Rushmeier. ACM publications: access and sustainability
7 -- 0Scott E. Delman. Looking back and forward
8 -- 0. Apple builds great platforms, too, not just products
10 -- 0David Roman. Previewing the new CACM web site
11 -- 13Kirk L. Kroeker. Living machines
14 -- 16Ted Selker. Touching the future
17 -- 19Samuel Greengard. Upwardly mobile
20 -- 0Leah Hoffmann. Making a difference
21 -- 23Alok Aggarwal. Emerging markets - Labor supply in the Indian IT industry
24 -- 26Cameron Wilson, Peter Harsha. IT policy - Advising policymakers is more than just providing advice
27 -- 28George Neville-Neil. Kode vicious - Permanence and change
29 -- 31Peter J. Denning, Chris Gunderson, Frederick Hayes-Roth. The profession of IT - Evolutionary system development
32 -- 35James R. Hamilton. Interview - Database dialogue with Pat Selinger
43 -- 49Mache Creeger. CTO virtualization roundtable, part II
50 -- 56Francine Berman. Got data?: a guide to data preservation in the information age
58 -- 67Ian Horrocks. Ontologies and the semantic web
68 -- 74Oren Etzioni, Michele Banko, Stephen Soderland, Daniel S. Weld. Open information extraction from the web
76 -- 0Michael Stonebraker. Technical perspective - One size fits all: an idea whose time has come and gone
77 -- 85Peter A. Boncz, Martin L. Kersten, Stefan Manegold. Breaking the memory wall in MonetDB
86 -- 0Martin C. Rinard. Technical perspective - Patching program errors
87 -- 95Gene Novark, Emery D. Berger, Benjamin G. Zorn. Exterminator: Automatically correcting memory errors with high probability
118 -- 0Peter Winkler. Puzzled - Solutions and sources
120 -- 0Cory Doctorow. Future tense - Pester power
121 -- 127Peter Duchessi, InduShobha N. Chengalur-Smith. Enhancing business performance via vendor managed inventory applications
128 -- 132Chee Wei Phang, Atreyi Kankanhalli. A framework of ICT exploitation for e-participation initiatives
133 -- 137Michael J. Davern, Carla Wilkin. Evolving innovations through design and use
138 -- 142Michael Näf, David A. Basin. Two approaches to an information security laboratory
143 -- 146Patrick Stacey, Joe Nandhakumar. Opening up to agile games development
147 -- 150Ross A. Malaga. Worst practices in search engine optimization
151 -- 154Pierre R. Berthon, Leyland F. Pitt, Richard T. Watson. From Genesis to Revelations: the technology diaspora
155 -- 157Vivien K. G. Lim, Thompson S. H. Teo, Jen Yuin Chin. Technical opinion - Bosses and their e-manners

Volume 51, Issue 11

5 -- 0John R. White. On the 10th anniversary of ACM s Digital Library
7 -- 0Diane Crawford. Jim Gray: humble visionary
10 -- 0David Roman. A first look at the redesigned site
11 -- 13Leah Hoffmann. Damage control
14 -- 16Bill Howard. Analyzing online social networks
17 -- 19David Lindley. The limits of computability
22 -- 24Avi Goldfarb, Catherine Tucker. Economic and business dimensions: Search engine advertising
25 -- 26Susan Landau. Privacy and security: A multidimensional problem
27 -- 29Pamela Samuelson. Legally speaking: Quantafying the value of patent exhaustion
31 -- 33Joanna Goode. Education: Reprogramming college preparatory computer science
34 -- 39Bryan Cantrill, Jeff Bonwick. Real-world concurrency
40 -- 46Calin Cascaval, Colin Blundell, Maged M. Michael, Harold W. Cain, Peng Wu, Stefanie Chiras, Siddhartha Chatterjee. Software transactional memory: why is it only a research toy?
47 -- 53Mache Creeger. CTO roundtable on virtualization
54 -- 57Michael Stonebraker, David J. DeWitt. A tribute to Jim Gray
66 -- 72Jon M. Kleinberg. The convergence of social and technological networks
75 -- 84Chris Stolte, Diane Tang, Pat Hanrahan. Polaris: a system for query, analysis, and visualization of multidimensional databases
86 -- 95Ramakrishna Kotla, Allen Clement, Edmund L. Wong, Lorenzo Alvisi, Michael Dahlin. Zyzzyva: speculative Byzantine fault tolerance
112 -- 0Peter Winkler. Puzzled: Circular food
113 -- 117DaeSoo Kim, Terence T. Ow, Minjoon Jun. SME strategies: an assessment of high vs. low performers
118 -- 120Claudio Feijóo, José Luis Gómez Barroso, David Rojo-Alonso. A European perspective of VoIP in market competition
121 -- 124Judy E. Scott. Technology acceptance and ERP documentation usability
125 -- 129Faiz Currim, Sudha Ram. Conceptually modeling windows and bounds for space and time in database constraints
130 -- 135Quan Z. Sheng, Boualem Benatallah, Zakaria Maamar. User-centric services provisioning in wireless environments
136 -- 139DongBack Seo, Ariel I. La Paz. Exploring the dark side of IS in achieving organizational agility
140 -- 144Srinivasan Venkatraman, Hillol Bala, Viswanath Venkatesh, Jack Bates. Six strategies for electronic medical records systems

Volume 51, Issue 10

5 -- 0Moshe Y. Vardi. Let us---together---make CACM exciting
7 -- 0Scott E. Delman. The softer side of ::::Communications::::
8 -- 9. Prep students for irreversible software trends
10 -- 0David Roman. ::::Communications:::: site to launch in January
14 -- 15Alex Wright. Searching the deep web
19 -- 0Leah Hoffmann. An inspiring legacy
21 -- 23Martin Campbell-Kelly. Historical reflections: Will the future of software be open source?
24 -- 26Deborah G. Johnson. Computing ethics: Computer experts: guns-for-hire or professionals?
27 -- 28Alex E. Bell. From the front lines: DOA with SOA
29 -- 33David L. Dill, Daniel Castro. Point/counterpoint: The U.S. should ban paperless electronic voting machines
36 -- 41George Neville-Neil. Code spelunking redux
43 -- 49Erik Wilde, Robert J. Glushko. Document design matters
50 -- 57Kayvon Fatahalian, Mike Houston. A closer look at GPUs
58 -- 65Jennifer Jie Xu, Hsinchun Chen. The topology of dark networks
66 -- 70Jacob Slonim, Sam Scully, Michael McAllister. Crossroads for Canadian CS enrollment
72 -- 83Lila Kari, Grzegorz Rozenberg. The many facets of natural computing
87 -- 94James Hays, Alexei A. Efros. Scene completion using millions of photographs
96 -- 105Sanjeev Arora, Satish Rao, Umesh V. Vazirani. Geometry, flows, and graph-partitioning algorithms
112 -- 0Leah Hoffmann. Q&A: A complex thinker
113 -- 116Mary C. Jones. Large scale project team building: beyond the basics
117 -- 122Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta, Robert J. Kauffman. Understanding evolution in technology ecosystems
123 -- 126Seokwoo Song, Sridhar P. Nerur, James T. C. Teng. Understanding the influence of network positions and knowledge processing styles
127 -- 131Brian L. Dos Santos, Lars S. Smith. RFID in the supply chain: panacea or Pandora s box?
132 -- 136Chen Ye, Kevin C. Desouza, Sridhar R. Papagari Sangareddy, Sanjeev Jha. Switching between consumer technologies
137 -- 140Mary Darking, Edgar A. Whitley, Paolo Dini. Governing diversity in the digital ecosystem
141 -- 145Amrit Tiwana, Ashley A. Bush, Hiroshi Tsuji, Kenichi Yoshida, Akito Sakurai. Myths and paradoxes in Japanese IT offshoring

Volume 51, Issue 1

5 -- 0Diane Crawford. Editorial pointers
7 -- 9Diane Crawford. Forum
13 -- 15Phillip G. Armour. Digging CACM
17 -- 19Meg McGinity Shannon. Happy anniversary, CACM
21 -- 22Peter A. Freeman. Back to experimentation
23 -- 0Stuart I. Feldman. Fifty years and still growing
24 -- 26Diane Crawford. Introduction
26 -- 29Calvin C. Gotlieb. A time to retrospect and prospect
30 -- 32M. Stuart Lynn. The battle of the covers
33 -- 34Robert L. Ashenhurst. The battle behind the scenes
35 -- 39Peter J. Denning. Déjà vu all over again
41 -- 43Jacques Cohen. From academia to the editorship
44 -- 48Moshe Y. Vardi. CACM: past, present, and future
50 -- 51Andrew Rosenbloom. Introduction
52 -- 54Jon Louis Bentley. In the realm of insight and creativity
55 -- 57Whitfield Diffie. Information security: 50 years behind, 50 years ahead
58 -- 60Jeannette M. Wing. Five deep questions in computing
61 -- 62Eugene H. Spafford. Inspiration and trust
63 -- 64Rodney A. Brooks. The next 50 years
65 -- 67Pamela Samuelson. Hacking intellectual property law
67 -- 0Stephen B. Jenkins. Ode to code
68 -- 70Gul Agha. Computing in pervasive cyberspace
71 -- 73Gregory J. Conti. Could googling take down a president?
74 -- 77Jon Crowcroft. Toward a network architecture that does everything
78 -- 80Peter G. Neumann. Reflections on computer-related risks
82 -- 85Jason Leigh, Maxine D. Brown. Cyber-commons: merging real and virtual worlds
86 -- 94Gordon Bell. Bell s law for the birth and death of computer classes
95 -- 100Greta L. Polites, Richard T. Watson. The centrality and prestige of CACM
104 -- 0Diane Crawford. Introduction
105 -- 0David A. Patterson. Technical perspective: the data center is the computer
107 -- 113Jeffrey Dean, Sanjay Ghemawat. MapReduce: simplified data processing on large clusters
115 -- 0Bernard Chazelle. Technical perspective: finding a good neighbor, near and fast
117 -- 122Alexandr Andoni, Piotr Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions