Journal: Communications of the ACM

Volume 52, Issue 9

5 -- 0Moshe Y. Vardi. The financial meltdown and computing
12 -- 13Michael Stonebraker, Jason Hong. Saying good-bye to DBMSs, designing effective interfaces
14 -- 0David Roman. What you read on your summer vacation
15 -- 17Gregory Goth. Entering a parallel universe
18 -- 19Kirk L. Kroeker. Medical nanobots
20 -- 22Samuel Greengard. Facing an age-old problem
23 -- 0Karen A. Frenkel. Computer Science meets environmental science
24 -- 26Paul M. Schwartz. Law and technology - Keeping track of telecommunications surveillance
27 -- 29Peter J. Denning, Paul S. Rosenbloom. The profession of IT - Computing: the fourth great domain of science
33 -- 35Cameron Wilson, Peter Harsha. IT policy - The long road to Computer Science education reform
36 -- 38Anwar M. Ghuloum. Viewpoint - Face the inevitable, embrace parallelism
39 -- 42David P. Anderson. Interview - An interview with Maurice Wilkes
44 -- 48Bruce Johnson. Reveling in constraints
49 -- 55Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan. Monitoring and control of large systems with MonALISA
56 -- 62Bryan O Sullivan. Making sense of revision-control systems
64 -- 70Varun Bhagwan, Tyrone Grandison, Daniel Gruhl. Sound index: charts for the people, by the people
71 -- 76James Boyle. What intellectual property law should learn from software
78 -- 86Lance Fortnow. The status of the P versus NP problem
88 -- 0Katherine A. Yelick. Technical perspective - Abstraction for parallelism
89 -- 97Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew. Optimistic parallelism requires abstractions
98 -- 0Marc Dacier. Technical perspective - They do click, don t they?
99 -- 107Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. Spamalytics: an empirical analysis of spam marketing conversion
110 -- 0Peter Winkler. Puzzled - Solutions and sources
112 -- 0Jaron Lanier. Future tense - Confusions of the hive mind
113 -- 117Achita Muthitacharoen, Khawaja A. Saeed. Examining user involvement in continuous software development: (a case of error reporting system)
118 -- 122Alexander A. Pasko, Valery Adzhiev. Constructive function-based modeling in multilevel education
123 -- 128Hongwei Zhu 0002, Stuart E. Madnick. One size does not fit all: legal protection for non-copyrightable data
128 -- 132Eleanor T. Loiacono, Nicholas C. Romano Jr., Scott McCoy. The state of corporate website accessibility
133 -- 137Robert Willison, Mikko T. Siponen. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
138 -- 142Mu Xia, Yun Huang, Wenjing Duan, Andrew B. Whinston. Ballot box communication in online communities
143 -- 148Dinesh Batra. Modified agile practices for outsourced software projects
149 -- 150James E. Katz, Ronald E. Rice. Technical opinion - Falling into the net: main street America playing games and making friends online

Volume 52, Issue 8

5 -- 0Steve Bourne, Bryan Cantrill. ::::Communications:::: and the practitioner
7 -- 0Scott E. Delman. Responding to the blogosphere
12 -- 13Jeannette M. Wing, Daniel Reed, Mark Guzdial. An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing
14 -- 0David Roman. The new searchers
15 -- 17Don Monroe. Just for you
18 -- 19Kirk L. Kroeker. Face recognition breakthrough
20 -- 0Tom Geller. IT drives policy---and vice versa
21 -- 22Leah Hoffmann. Learning through games
23 -- 0Gregory Goth. U.S. unveils cybersecurity plan
27 -- 29Wanda Dann, Stephen Cooper. Education - Alice 3: concrete to abstract
30 -- 32Brian D. Snow, Clinton Brooks. Privacy and security - An ethics code for U.S. intelligence officers
33 -- 35Lance Fortnow. Viewpoint - Time for computer science to grow up
36 -- 44Adam Jacobs. The pathologies of big data
45 -- 49Charles Reis, Adam Barth, Carlos Pizano. Browser security: lessons from Google Chrome
50 -- 56Mache Creeger. CTO roundtable: cloud computing
58 -- 66Kristen Shinohara, Josh D. Tenenberg. A blind person s interactions with technology
67 -- 75Ralph Morelli, Allen B. Tucker, Norman Danner, Trishan R. de Lanerolle, Heidi J. C. Ellis, Ozgur Izmirli, Danny Krizanc, Gary Parker. Revitalizing computing education through free and open source software for humanity
76 -- 82Sharad Malik, Lintao Zhang. Boolean satisfiability from theoretical hardness to practical success
84 -- 0James D. Herbsleb. Technical perspective - Maintaining quality in the face of distributed development
85 -- 93Christian Bird, Nachiappan Nagappan, Premkumar T. Devanbu, Harald Gall, Brendan Murphy. Does distributed development affect software quality?: an empirical case study of Windows Vista
94 -- 0Sachin S. Sapatnekar. Technical perspective - Where the chips may fall
95 -- 100Michael Orshansky, Wei-Shen Wang. Statistical analysis of circuit timing using majorization
104 -- 0Peter Winkler. Puzzled - Probability and intuition
105 -- 110Hoon S. Cha, David E. Pingry, Matt E. Thatcher. What determines IT spending priorities?
111 -- 116Andrew Lim, Hong Ma, Qi Wen, Zhou Xu, Brenda Cheang. Distinguishing citation quality for journal impact assessment
117 -- 121Thomas A. Gerace, Huseyin Cavusoglu. The critical elements of the patch management process
122 -- 126Rajiv Kohli, Nigel Melville. Learning to build an IT innovation platform
127 -- 131Eoin Ó Conchúir, Pär J. Ågerfalk, Helena Holmström Olsson, Brian Fitzgerald. Global software development: where are the benefits?
132 -- 136Rohit Kaul, Yeogirl Yun, Seong-Gon Kim. Ranking billions of web pages using diodes
137 -- 140Roli Varma. Attracting Native Americans to computing
141 -- 143Indranil Bose, Alvin Chung Man Leung. Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks?

Volume 52, Issue 7

5 -- 0Moshe Y. Vardi. Open, closed, or clopen access?
6 -- 7Scott E. Delman. ::::Communications :::: annual report card
10 -- 11Mark Guzdial, Greg Linden, Tessa Lau. Sharing ideas, writing apps, and creating a professional web presence
12 -- 0David Roman. Moving forward and backward
13 -- 15Alex Wright. Contemporary approaches to fault tolerance
16 -- 17Kirk L. Kroeker. Toward native web execution
18 -- 19Samuel Greengard. Are we losing our ability to think critically?
20 -- 22Karen A. Frenkel. Liskov s creative joy
23 -- 0Alan Joch. Master of connections
25 -- 0. ACM award winners
28 -- 30Pamela Samuelson. Legally speaking - The dead souls of the Google book search settlement
31 -- 33Mari Sako. Technology strategy and management - Globalization of knowledge-intensive professional services
34 -- 36Phillip G. Armour. The business of software - The cliché defense
37 -- 40Matthias Felleisen, Shriram Krishnamurthi. Viewpoint - Why computer science doesn t matter
41 -- 45Robert Dewar, Owen L. Astrachan. Point/counterpoint - CS education in the U.S.: heading in the wrong direction?
48 -- 59Goetz Graefe. The five-minute rule 20 years later (and how flash memory changes the rules)
60 -- 65Jonathan M. Smith. Fighting physics: a tough battle
66 -- 75Erol Gelenbe. Steps toward self-aware networks
76 -- 84Rick Kazman, Hong-Mei Chen. The metropolis model a new logic for development of crowdsourced systems
86 -- 94Nilesh N. Dalvi, Christopher Ré, Dan Suciu. Probabilistic databases: diamonds in the dirt
96 -- 0Stuart Russell, Lawrence K. Saul. Technical perspective - The ultimate pilot program
97 -- 105Adam Coates, Pieter Abbeel, Andrew Y. Ng. Apprenticeship learning for helicopter control
106 -- 0Greg Morrisett. Technical perspective - A compiler s story
107 -- 115Xavier Leroy. Formal verification of a realistic compiler
120 -- 0Leah Hoffmann. Q&A - Liskov on Liskov
121 -- 125Benjamin Fabian, Oliver Günther. Security challenges of the EPCglobal network
126 -- 129James L. Parrish Jr., James F. Courtney Jr.. Churchman s inquirers as design templates for knowledge management systems
130 -- 134Arvind Malhotra, Claudia Kubowicz Malhotra. A relevancy-based services view for driving adoption of wireless web services in the U.S
135 -- 138Johann Rost, Robert L. Glass. The impact of subversive stakeholders on software projects
139 -- 142Sandip C. Patel, Ganesh D. Bhatt, James H. Graham. Improving the cyber security of SCADA communication networks
143 -- 146Anat Hovav, Ciprian P. Popoviciu. Adoption leadership and early planners: Comcast s IP upgrade strategy
147 -- 152Richard W. Woolridge, David P. Hale, Joanne E. Hale, Shane Sharpe. Software project scope alignment: an outcome-based approach
153 -- 155Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li. Technical opinion - The ethics of IT professionals in China

Volume 52, Issue 6

5 -- 0Elaine J. Weyuker. ACM-W celebrates women in computing
10 -- 11Tessa Lau, Daniel Reed. Speech-activated user interfaces and climbing Mt. Exascale
12 -- 0David Roman. Making that connection
13 -- 15Don Monroe. Micromedicine to the rescue
16 -- 17Leah Hoffmann. Content control
18 -- 20Gregory Goth. Autonomous helicopters
21 -- 0Bob Violino. Looking backward and forward
22 -- 24Eugene H. Spafford. Privacy and security - Answering the wrong questions is no answer
25 -- 27Kevin Fu. Inside risks - Reducing risks of implantable medical devices
28 -- 30Peter J. Denning. The profession of IT - Beyond computational thinking
31 -- 33Richard M. Stallman. Viewpoint - Why open source misses the point of free software
34 -- 35George Neville-Neil. Kode vicious - Obvious truths
38 -- 45Jon G. Elerath. Hard-disk drives: the good, the bad, and the ugly
46 -- 50Mike O Dell. Network front-end processors, yet again
51 -- 55George V. Neville-Neil. Whither sockets?
56 -- 65Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, AnHai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Henry F. Korth, Donald Kossmann, Samuel Madden, Roger Magoulas, Beng Chin Ooi, Tim O Reilly, Raghu Ramakrishnan, Sunita Sarawagi, Michael Stonebraker, Alexander S. Szalay, Gerhard Weikum. The Claremont report on database research
66 -- 73Kenneth L. Kraemer, Jason L. Dedrick, Prakul Sharma. One laptop per child: vision vs. reality
74 -- 80M. Bernardine Dias, Eric A. Brewer. How computer science serves the developing world
82 -- 0Andrew Myers. Technical perspective - Reframing security for the web
83 -- 91Adam Barth, Collin Jackson, John C. Mitchell. Securing frame communication in browsers
92 -- 0Norman P. Jouppi. Technical perspective - Software and hardware support for deterministic replay of parallel programs
93 -- 100Derek Hower, Pablo Montesinos, Luis Ceze, Mark D. Hill, Josep Torrellas. Two hardware-based approaches for deterministic multiprocessor replay
103 -- 0Peter Winkler. Puzzled - Solutions and sources
113 -- 117Jonghun Park, Kwanho Kim. Hyperlinking the work for self-management of flexible workflows
118 -- 121Steven M. Thompson, Matthew D. Dean. Advancing information technology in health care
122 -- 126Amar Gupta. Deriving mutual benefits from offshore outsourcing
127 -- 131Mark Lycett, Christopher Partridge. The challenge of epistemic divergence in IS development
132 -- 135Nena Lim, Anne Khoo. Forensics of computers and handheld devices: identical or fraternal twins?
136 -- 140Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan. Re-tuning the music industry: can they re-attain business resonance?
141 -- 145Dursun Delen, Suliman Al-Hawamdeh. A holistic framework for knowledge discovery and management
146 -- 148T. P. Liang, Andrew J. Czaplewski, Gary Klein, James J. Jiang. Technical opinion - Leveraging first-mover advantages in internet-based consumer services

Volume 52, Issue 5

5 -- 0Moshe Y. Vardi. Conferences vs. journals in computing research
7 -- 9. Logic of lemmings in compiler innovation
10 -- 11. Recommendation algorithms, online privacy, and more
12 -- 0David Roman. The print-web partnership turns the page
13 -- 15Kirk L. Kroeker. Rethinking signal processing
16 -- 17David Essex. Matchmaker, matchmaker
18 -- 19Samuel Greengard. Learning goes global
21 -- 0. Liskov wins Turing award
22 -- 24Pierre Larouche. Law and technology - The network neutrality debate hits Europe
28 -- 30Martin Campbell-Kelly. Historical reflections - The rise, fall, and resurrection of software as a service
31 -- 33Mark Guzdial. Education - Teaching computing to everyone
34 -- 37Ken Birman, Fred B. Schneider. Viewpoint - Program committee overload in systems
40 -- 45Thomas Wadlow, Vlad Gorelik. Security in the browser
46 -- 56Michi Henning. API design matters
57 -- 60Eric Schrock. Debugging AJAX in production
62 -- 69James R. Larus. Spending Moore s dividend
70 -- 79Edward A. Lee. Computing needs time
80 -- 88Corrado Priami. Algorithmic systems biology
90 -- 0Ross Anderson. Technical perspective - A chilly sense of security
91 -- 98J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten. Lest we remember: cold-boot attacks on encryption keys
99 -- 0Maurice Herlihy. Technical perspective - Highly concurrent data structures
100 -- 111William N. Scherer III, Doug Lea, Michael L. Scott. Scalable synchronous queues
112 -- 0Peter Winkler. Puzzled - Understanding relationships among numbers
113 -- 116J. Drew Procaccino, June M. Verner. Software developers views of end-users and project success
117 -- 123Karlene Cousins, Upkar Varshney. Designing ubiquitous computing environments to support work life balance
124 -- 127Stuart D. Galup, Ronald Dattero, Jim J. Quan, Sue Conger. An overview of IT service management
128 -- 130Robert K. Plice, Nigel Melville, Oleg V. Pavlov. Toward an information-compatible anti-spam strategy
131 -- 134James A. McCart, Varol O. Kayhan, Anol Bhattacherjee. Cross-bidding in simultaneous online auctions
135 -- 139Carol Xiaojuan Ou, Choon-Ling Sia. To trust or to distrust, that is the question: investigating the trust-distrust paradox
140 -- 144Gary W. Brock. Reflections today prevent failures tomorrow
145 -- 146Michael Rebstock. Technical opinion - Semantic ambiguity: Babylon, Rosetta or beyond?

Volume 52, Issue 4

5 -- 0Andrew D. McGettrick. Computing education matters
9 -- 0. What role for computer science in the war on terror?
10 -- 0David Roman. An ongoing study in usability
11 -- 13Graeme Stemp-Morlock. Learning more about active learning
14 -- 15Alex Wright. Our sentiments, exactly
16 -- 18David Essex. Did somebody say virtual colonoscopy?
19 -- 0Bob Violino. Time to reboot
20 -- 0Alan Joch. IT ecosystem in peril
22 -- 24Richard B. Heeks. Emerging markets - IT and the world s bottom billion
25 -- 26George Neville-Neil. Kode vicious - System changes and side effects
27 -- 28Michael A. Cusumano. Technology strategy and management - Strategies for difficult (and Darwinian) economic times
29 -- 30Michael Buckley. Viewpoint - Computing as social science
31 -- 34Bertrand Meyer, Christine Choppy, Jørgen Staunstrup, Jan van Leeuwen. Viewpoint - Research evaluation for computer science
36 -- 41Mike Shapiro. Purpose-built languages
42 -- 47Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis. Cybercrime 2.0: when the cloud turns dark
48 -- 55Chris Richardson. ORM in dynamic languages
56 -- 64Gerhard Weikum, Gjergji Kasneci, Maya Ramanath, Fabian M. Suchanek. Database and information-retrieval methods for knowledge discovery
65 -- 76Samuel Williams, Andrew Waterman, David A. Patterson. Roofline: an insightful visual performance model for multicore architectures
78 -- 88Daniel Jackson. A direct path to dependable software
90 -- 0Arif Merchant. Technical perspective - Disk array models for automating storage management
91 -- 96Michael P. Mesnier, Matthew Wachs, Raja R. Sambasivan, Alice X. Zheng, Gregory R. Ganger. Relative fitness modeling
97 -- 0Goetz Graefe. Technical perspective - Integrating flash devices
98 -- 103David Roberts, Taeho Kgil, Trevor N. Mudge. Integrating NAND flash devices onto servers
113 -- 117Jay F. Nunamaker Jr., Bruce A. Reinig, Robert O. Briggs. Principles for effective virtual teamwork
118 -- 123Maris G. Martinsons, Robert M. Davison, Valdis Martinsons. How culture influences IT-enabled organizational change and information systems
124 -- 128Gee-Woo Bock, Swee Ling Ho. Non-work related computing (NWRC)
129 -- 131Kevin P. Scheibe, James C. McElroy, Paula C. Morrow. Object language and impression management
132 -- 135France Belanger, Lemuria Carter. The impact of the digital divide on e-government use
136 -- 141Zeinab Karake Shalhoub. Analysis of industry-specific concentration of CPOs in Fortune 500 companies
142 -- 146Eusebio Scornavacca Jr., Sid L. Huff, Stephen Marshall. Mobile phones in the classroom: if you can t beat them, join them
147 -- 149Paulo Goes, Yanbin Tu, Y. Alex Tung. Technical opinion - Online auctions hidden metrics

Volume 52, Issue 3

5 -- 0Moshe Y. Vardi. Yes, it can be done
7 -- 0Scott E. Delman. ::::Communications:::: web site to launch in March
8 -- 9. Children s magic won t deliver the semantic web
12 -- 0David Roman. Prepare for launch
13 -- 15Gregory Goth. Betting on ideas
16 -- 17Leah Hoffmann. Crowd control
18 -- 20Kirk L. Kroeker. The evolution of virtualization
21 -- 0Karen A. Frenkel. A difficult, unforgettable idea
24 -- 26Peter J. Denning, Richard D. Riehle. The profession of IT - Is software engineering engineering?
27 -- 29Pamela Samuelson. Legally speaking - When is a license really a sale?
30 -- 33David A. Patterson. Viewpoint - Your students are your legacy
34 -- 37Jeffrey D. Ullman. Viewpoint - Advising students for success
38 -- 41Len Shustek. Interview - An interview with C.A.R. Hoare
42 -- 47Walker M. White, Christoph Koch, Johannes Gehrke, Alan J. Demers. Better scripts, better games
48 -- 56Jim Larson. Erlang for concurrent programming
58 -- 66Abigail Sellen, Yvonne Rogers, Richard H. R. Harper, Tom Rodden. Reflecting human values in the digital age
67 -- 75David Harel. Statecharts in the making: a personal account
76 -- 84Madhu Sudan. Probabilistically checkable proofs
86 -- 0Daniel A. Spielman. Technical perspective - The beauty of error-correcting codes
87 -- 95Venkatesan Guruswami, Atri Rudra. Error correction up to the information-theoretic limit
96 -- 0Bud Mishra. Technical perspective - Where biology meets computing
97 -- 105Radu Grosu, Scott A. Smolka, Flavio Corradini, Anita Wasilewska, Emilia Entcheva, Ezio Bartocci. Learning and detecting emergent behavior in networks of cardiac myocytes
111 -- 0Peter Winkler. Puzzled - Solutions and sources
112 -- 0Joel Garreau. Future tense - Radical evolution
113 -- 116Alexandre Sacchi, Emerson Giannini, Regiane Bochic, Nicolau Reinhard, Alexandre B. Lopes. Digital inclusion with the McInternet: would you like fries with that?
117 -- 125Clyde W. Holsapple. A new map for knowledge dissemination channels
126 -- 130Mary J. Culnan, Thomas J. Carlin. Online privacy practices in higher education: making the grade?
131 -- 134Kenneth R. Fleischmann, William A. Wallace. Ensuring transparency in computational modeling
135 -- 139Florian Mann, Benedikt von Walter, Thomas Hess, Rolf T. Wigand. Open access publishing in science
140 -- 144Greg Linden, Kenneth L. Kraemer, Jason L. Dedrick. Who captures value in a global innovation network?: the case of Apple s iPod
145 -- 149Anna Formica. Concept similarity by evaluating information contents and feature vectors: a combined approach
150 -- 152Alfred Loo. Technical opinion - Security threats of smart phones and Bluetooth

Volume 52, Issue 2

5 -- 0Eugene H. Spafford. USACM s policy role
10 -- 0David Roman. The dot-org difference
11 -- 13Kirk L. Kroeker. Photography s bright future
14 -- 15Alex Wright. Making sense of sensors
16 -- 18Samuel Greengard. The first internet president
19 -- 0Kirk L. Kroeker. SIGGRAPH debuts in Asia
20 -- 22Ashish Arora, Matej Drev, Chris Forman. Economic and business dimensions - The extent of globalization of software innovation
23 -- 25George H. L. Fletcher, James J. Lu. Education - Human computing skills: rethinking the K-12 experience
26 -- 28Kristina Irion. Privacy and security - International communications surveillance
29 -- 0Peter G. Neumann. Inside risks - U.S. election after-math
31 -- 37Barbara van Schewick, David Farber. Point/Counterpoint - Network neutrality nuances
38 -- 43Ulrich Drepper. Parallel programming with transactional memory
44 -- 51Tom Leighton. Improving performance on the internet
52 -- 59T. V. Raman. Toward 2:::::::W:::::::, beyond web 2.0
60 -- 67Mary Hall, David A. Padua, Keshav Pingali. Compiler research: the next 50 years
68 -- 76Maria M. Klawe, Telle Whitney, Caroline Simard. Women in computing - take 2
78 -- 0Dan S. Wallach. Technical perspective - Tools for information to flow securely and Swift-ly
79 -- 87Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng. Building secure web applications with automatic partitioning
88 -- 0Ehud Kalai. Technical perspective - The complexity of computing Nash equilibrium
89 -- 97Constantinos Daskalakis, Paul W. Goldberg, Christos H. Papadimitriou. The complexity of computing a Nash equilibrium
104 -- 0Peter Winkler. Puzzled - Will my algorithm terminate?
105 -- 109Pamela E. Carter, Gina Green. Networks of contextualized data: a framework for cyberinfrastructure data management
110 -- 114Xiao-Bai Li, Luvai F. Motiwalla. For sale by owner online: who gets the saved commission?
115 -- 118Ergin Elmacioglu, Dongwon Lee. Oracle, where shall I submit my papers?
119 -- 123Shlomo Argamon, Moshe Koppel, James W. Pennebaker, Jonathan Schler. Automatically profiling the author of an anonymous text
124 -- 129Sandy Behrens. Shadow systems: the good, the bad and the ugly
130 -- 133Arik Ragowsky, David Gefen. Why IS management is in trouble and how to save it: lessons learned in the automotive industry
134 -- 138M. Eric Johnson, Dan McGuire, Nicholas D. Willey. Why file sharing networks are dangerous?
139 -- 141Raquel Benbunan-Fich, Gregory E. Truman. Technical opinion - Multitasking with laptops during meetings

Volume 52, Issue 12

0 -- 0Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality
5 -- 0Chris Stephenson. It is a pivotal time for K--12 computer science
8 -- 9Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality
12 -- 0David Roman. Crowdsourcing and the question of expertise
13 -- 15Gary Anthes. Blueprints for self-assembly
16 -- 17Alex Wright. Ready for a Web OS?
18 -- 19Samuel Greengard. Making automation work
20 -- 0Leah Hoffmann. Problem solvers
22 -- 24Richard E. Ladner. Broadening participation - Opening remarks
25 -- 27Orna Berry, Yigal Grayeff. Emerging markets - Israel s technology industry as an economic growth engine
28 -- 30Peter J. Denning, Peter A. Freeman. The profession of IT - Computing s paradigm
31 -- 32George V. Neville-Neil. Kode Vicious - Broken builds
33 -- 37Savas Parastatidis, Evelyne Viegas, Tony Hey. Viewpoint - A smart cyberinfrastructure for research
38 -- 42Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O Leary, Jim Waldo. A threat analysis of RFID passports
43 -- 47Paul Vixie. What DNS is not
48 -- 57Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto. Maximizing power efficiency with asymmetric multicore systems
58 -- 65Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic. The Bulk Multicore architecture for improved programmability
66 -- 72Michael Zyda. Computer science in the conceptual age
74 -- 78Kelvin Sung. Computer games and traditional CS courses
80 -- 0James A. Landay. Technical perspective - Design tools for the rest of us
81 -- 88Yuki Igarashi, Takeo Igarashi. Designing plush toys with a computer
89 -- 0Pat Hanrahan. Technical perspective - A graphical sense of touch
90 -- 98Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton. ThinSight: a thin form-factor interactive surface technology
111 -- 0Peter Winkler. Puzzled - Solutions and sources
113 -- 115Niki Panteli, Robert J. Tucker. Power and trust in global virtual teams
116 -- 120Sun Sun Lim, Hichang Cho, Milagros Rivera Sanchez. Online privacy, government surveillance and national ID cards
121 -- 125Ganesh Vaidyanathan, Steven Mautone. Security in dynamic web content management systems applications
126 -- 129Lou Hafer, Arthur E. Kirkpatrick. Assessing open source software as a scholarly contribution
130 -- 134Narciso Cerpa, June M. Verner. Why did your project fail?
135 -- 140Karen Renaud, Antonella De Angeli. Visual passwords: cure-all or snake-oil?
141 -- 144Nir Kshetri. Positive externality, increasing returns, and the rise in cybercrimes
145 -- 147Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila. Technical opinion - Are employees putting your company at risk by not following information security policies?

Volume 52, Issue 11

5 -- 0Moshe Y. Vardi. Is the image crisis over?
10 -- 11Ramana Rao, Greg Linden. Computer science curriculum, deceptive advertising
12 -- 0David Roman. Internet addiction: it s spreading, but is it real?
13 -- 14Gary Anthes. Deep data dives discover natural laws
15 -- 17Kirk L. Kroeker. Electronic paper s next chapter
18 -- 20Leah Hoffmann. Implementing electronic medical records
21 -- 23Gregory Goth. Exploring new frontiers
25 -- 27Butler W. Lampson. Privacy and security - Usable security: how to get it
28 -- 30Pamela Samuelson. Legally speaking - Are business methods patentable?
31 -- 33Shane Greenstein. Economic and business dimensions - The broadband price is not right
34 -- 35Jonathan M. Smith. Viewpoint - On public service and computer science
42 -- 47Whitfield Diffie, Susan Landau. Communications surveillance: privacy and security at risk
48 -- 53Katie Shilton. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
54 -- 58Paul Stachour, David Collier-Brown. You don t know jack about software maintenance
60 -- 67Mitchel Resnick, John Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay S. Silver, Brian Silverman, Yasmin B. Kafai. Scratch: programming for all
68 -- 73Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao. Why IT managers don t go for cyber-insurance products
74 -- 84Edmund M. Clarke, E. Allen Emerson, Joseph Sifakis. Model checking: algorithmic verification and debugging
86 -- 0Peter Druschel. Technical perspective - Narrowing the semantic gap in distributed programming
87 -- 95Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica. Declarative networking
96 -- 0John Shawe-Taylor. Technical perspective - Machine learning for complex predictions
97 -- 104Thorsten Joachims, Thomas Hofmann, Yisong Yue, Chun-Nam John Yu. Predicting structured objects with support vector machines
112 -- 0Peter Winkler. Puzzled - Covering the plane
113 -- 117Lara Khansa, Divakaran Liginlal. Quantifying the benefits of investing in information security
118 -- 124Wei-Lun Chang, Soe-Tsyr Yuan, Eldon Y. Li. iCare home portal: an extended model of quality aging e-services
125 -- 131Aakash Taneja, Anil Singh, M. K. Raja. Computing journals and their emerging roles in knowledge exchange
132 -- 135Rudy Hirschheim. Offshoring and the new world order
136 -- 140Cristiana Bolchini, Carlo Curino, Giorgio Orsi, Elisa Quintarelli, Rosalba Rossato, Fabio A. Schreiber, Letizia Tanca. And what can context do for data?
141 -- 145Frank McCown, Catherine C. Marshall, Michael L. Nelson. Why web sites are lost (and how they re sometimes found)
146 -- 149Ralph Westfall. If your pearls of wisdom fall in a forest..

Volume 52, Issue 10

5 -- 0Wendy Hall. ACM Europe
8 -- 9Greg Linden, Michael Conover, Judy Robertson. The Netflix prize, computer science outreach, and Japanese mobile phones
11 -- 13David Lindley. Managing data
14 -- 15Alan Joch. Debating net neutrality
16 -- 18Tom Geller. Shaping the future
19 -- 20Phillip G. Armour. The business of software - Contagious craziness, spreading sanity
21 -- 22Martin Campbell-Kelly. Historical reflections - Computing in the depression era
23 -- 24Phillip A. Porras. Inside risks - Reflections on Conficker
25 -- 27Michael A. Cusumano. Technology strategy and management - Dealing with the venture capital crisis
28 -- 29George V. Neville-Neil. Kode Vicious - Kode reviews 101
30 -- 32C. A. R. Hoare. Viewpoint - Retrospective: an axiomatic basis for computer programming
34 -- 41James C. Phillips, John E. Stone. Probing biomolecular machines with graphics processors
42 -- 47Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best. Unifying biological image formats with HDF5
56 -- 67Krste Asanovic, Rastislav Bodík, James Demmel, Tony Keaveny, Kurt Keutzer, John Kubiatowicz, Nelson Morgan, David A. Patterson, Koushik Sen, John Wawrzynek, David Wessel, Katherine A. Yelick. A view of the parallel computing landscape
68 -- 74Jane Cleland-Huang, Horatiu Dumitru, Chuan Duan, Carlos Castro-Herrera. Automated support for managing feature requests in open forums
76 -- 84Daniel A. Spielman, Shang-Hua Teng. Smoothed analysis: an attempt to explain the behavior of algorithms in practice
86 -- 0Surajit Chaudhuri. Technical perspective - Relational query optimization: data management meets statistical estimation
87 -- 95Kevin S. Beyer, Rainer Gemulla, Peter J. Haas, Berthold Reinwald, Yannis Sismanis. Distinct-value synopses for multiset operations
96 -- 0Johannes Gehrke. Technical perspective - Data stream processing: when you only get one look
97 -- 105Graham Cormode, Marios Hadjieleftheriou. Finding the frequent items in streams of data
112 -- 0Leah Hoffmann. Q&A - The networker
113 -- 117Richard J. Goeke, Robert H. Faley. Technical opinion - Do SAP successes outperform themselves and their competitors?
118 -- 121Girish H. Subramanian, Gary Klein, James J. Jiang, Chien-Lung Chan. Balancing four factors in system development projects
122 -- 126Sridhar R. Papagari Sangareddy, Sanjeev Jha, Chen Ye, Kevin C. Desouza. Attaining superior complaint resolution
127 -- 130Vivienne Waller, Robert B. Johnston. Making ubiquitous computing available
131 -- 134Donal J. Flynn, Gary S. C. Pan, Mark Keil, Magnus Mähring. De-escalating IT projects: the DMM model
135 -- 138Francisco Casacuberta, Jorge Civera, Elsa Cubel, Antonio L. Lagarda, Guy Lapalme, Elliott Macklovitch, Enrique Vidal. Human interaction for high-quality machine translation
139 -- 143Jacques Savoy, Ljiljana Dolamic. How effective is Google s translation service in search?
144 -- 147Nan Hu, Jie Zhang, Paul A. Pavlou. Overcoming the J-shaped distribution of product reviews

Volume 52, Issue 1

5 -- 0Moshe Y. Vardi. How are we doing?
6 -- 0. True seeds of open source software
8 -- 0David Roman. ::::Communications:::: preps web-enhanced articles
9 -- 11David Lindley. Calculating the future
12 -- 14Jeff Kanipe. The universe in your computer
15 -- 16Alex Wright. Get smart
17 -- 0Michael Ross. A pioneer woman
18 -- 20Jonathan Zittrain. Law and technology: The end of the generative internet
21 -- 22Alex E. Bell. From the front lines: Ground control to Architect Tom…
23 -- 24Phillip G. Armour. The business of software: The ontology of paper
25 -- 26Michael A. Cusumano. Technology strategy and management: The legacy of Bill Gates
27 -- 30Jon Crowcroft, S. Keshav, Nick McKeown. Viewpoint: Scaling the academic publication process to internet scale
33 -- 37Stuart I. Feldman. ACM s annual report
40 -- 44Werner Vogels. Eventually consistent
45 -- 53John R. Mashey. The long road to 64 bits
54 -- 63Tapan S. Parikh. Engineering rural development
64 -- 69Dawn N. Jutla, Dimitri Kanevsky. ::::wise::::Pad services for vision-, hearing-, and speech-impaired users
70 -- 74Joan Feigenbaum, David C. Parkes, David M. Pennock. Computational challenges in e-commerce
76 -- 0Harry Shum. Technical perspective: Customizing media to displays
77 -- 85Ariel Shamir, Shai Avidan. Seam carving for media retargeting
87 -- 97Jeffrey Heer, Fernanda B. Viégas, Martin Wattenberg. Voyagers and voyeurs: Supporting asynchronous collaborative visualization
113 -- 117Erik T. Mueller. Automating commonsense reasoning using the event calculus
118 -- 121Nanda Kumar, Roumen Vragov. Active citizen participation using ICT tools
122 -- 125Yogesh Kumar Dwivedi, Zahir Irani. Understanding the adopters and non-adopters of broadband
126 -- 129Allen C. Johnston, Ron Hale. Improved security through information security governance
130 -- 135Judith Gebauer, Mark Ginsburg. Exploring the black box of task-technology fit
136 -- 140Hillol Bala, Viswanath Venkatesh, Srinivasan Venkatraman, Jack Bates, Steven H. Brown. Disaster response in health care: A design extension for enterprise data warehouse
141 -- 144Parag C. Pendharkar, James A. Rodger. The relationship between software development team size and software development cost
145 -- 148Carol Xiaojuan Ou, Robert M. Davison. Technical opinion: Why eBay lost to TaoBao in China: the global advantage