Journal: Communications of the ACM

Volume 53, Issue 9

5 -- 0Moshe Y. Vardi. Science has only two legs
8 -- 9Ed H. Chi, Ruben Ortega. Expanding CS education; improving software development
12 -- 0David Roman. More ::::Communications::::
13 -- 15David Lindley. Brains and bytes
16 -- 17Neil Savage. Cycling through data
18 -- 19Marina Krakovsky. Degrees, distance, and dollars
20 -- 0Tom Geller. ACM China nearing launch
21 -- 0Jack Rosenberger. Kyoto prize and other CS awards
23 -- 25Phillip G. Armour. Return at risk
26 -- 28Robert A. Hillman, Maureen A. O Rourke. Principles of the law of software contracts
29 -- 31Peter J. Denning, Dorothy E. Denning. Discussing cyber attack
32 -- 35Mordechai Ben-Ari. Objects never?: well, hardly ever!
36 -- 40Jennifer Rexford, Constantine Dovrolis. Future Internet architecture: clean-slate versus evolutionary research
42 -- 47Stephen V. Cantrill. Computers in patient care: the promise and the challenge
55 -- 60Cary V. Millsap. Thinking clearly about performance, part 1
62 -- 67Dag I. K. Sjøberg. Confronting the myth of rapid obsolescence in computing research
68 -- 75Joe Armstrong. Erlang
76 -- 85Christel Baier, Boudewijn R. Haverkort, Holger Hermanns, Joost-Pieter Katoen. Performance evaluation and model checking join forces
89 -- 97Frank McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis
98 -- 0Mark Jerrum. Constraint satisfaction problems and computational complexity: technical persepctive
99 -- 106Andrei A. Bulatov, Dániel Marx. Constraint satisfaction problems and global cardinality constraints
110 -- 0Peter Winkler. Puzzled
112 -- 0Greg Bear. Future tense

Volume 53, Issue 8

5 -- 0Victor Vianu. ::::JACM:::: at the start of a new decade
8 -- 9Greg Linden, Michael S. Bernstein, Erika Shehan Poole. The war against spam: and more
10 -- 0David Roman. Print is not just ink anymore
11 -- 13Gary Anthes. Mechanism design meets computer science
14 -- 16Kirk L. Kroeker. Looking beyond stereoscopic 3D s revival
17 -- 18Sarah Underwood. Making sense of real-time behavior
19 -- 20Kirk L. Kroeker. Celebrating the legacy of PLATO
21 -- 0Jack Rosenberger. Gödel Prize and other CS awards
24 -- 26Christopher S. Yoo. Is the Internet a maturing market?
27 -- 29David S. Touretzky. Preparing computer science students for the robotics revolution
30 -- 32Ping Gao, Jiang Yu. Has China caught up in IT?
33 -- 34George V. Neville-Neil. Presenting your project
35 -- 37Eugene H. Spafford. Remembrances of things pest
38 -- 40Samir Chopra. Rights for autonomous artificial agents?
41 -- 47Thomas J. Misa. An interview with Edsger W. Dijkstra
48 -- 54Robert DeLine, Gina Venolia, Kael Rowan. Software development with code maps
55 -- 62Mache Creeger. Moving to the edge: a CTO roundtable on network virtualization
63 -- 71Jan Damsgaard, Jan Karlsbjerg. Seven principles for selecting software packages
72 -- 79James R. Larus, Galen C. Hunt. The Singularity system
80 -- 88Gábor Szabó, Bernardo A. Huberman. Predicting the popularity of online content
90 -- 101Sarita V. Adve, Hans-Juergen Boehm. Memory models: a case for rethinking parallel languages and hardware
104 -- 0Helen J. Wang. Attacks target Web server logic and prey on XCS weaknesses: technical persepctive
105 -- 113Hristo Bojinov, Elie Bursztein, Dan Boneh. The emergence of cross channel scripting
114 -- 0Fritz Henglein. Large-scale sound and precise program analysis: technical persepctive
115 -- 123Isil Dillig, Thomas Dillig, Alex Aiken. Reasoning about the unknown in static analysis
128 -- 0Peter Winkler. Puzzled
129 -- 134Wei-Fung Tung, Soe-Tsyr Yuan. Intelligent service machine
135 -- 140Marc N. Haines, Marcus A. Rothenberger. How a service-oriented architecture may change the software development process
141 -- 145Eugenio Tisselli. thinkflickrthink: a case study on strategic tagging
146 -- 149Lutz Prechelt. Plat_Forms: is there one best web development technology?

Volume 53, Issue 7

5 -- 0Moshe Y. Vardi. Hypercriticality
10 -- 11Ruben Ortega, Mark Guzdial, Daniel Reed. Software development and crunch time; and more
12 -- 0David Roman. In case you missed it
13 -- 15David Lindley. Sharing computational perspectives
16 -- 18Samuel Greengard. Censored!
19 -- 21Kirk L. Kroeker. Mainstreaming augmented reality
22 -- 23Gary Anthes. Committed to success
24 -- 0Gregory Goth. Eric Brewer: change agent
25 -- 0Sarah Underwood. Visions of the future
27 -- 29Mari Sako. Outsourcing versus shared services
30 -- 31Jason Borenstein. Work life in the robotic age
32 -- 34Pamela Samuelson. Should the Google book settlement be approved?
35 -- 36Valerie E. Taylor. Cultivating cultural diversity in information technology
37 -- 39Gonzalo Génova. Is computer science truly scientific?
40 -- 41Marc Snir, Telle Whitney. Advice to members seeking ACM distinction
42 -- 47Eugene Loh. The ideal HPC programming language
48 -- 54Brendan Gregg. Visualizing system latency
55 -- 59Poul-Henning Kamp. You re doing it wrong
60 -- 70Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert McCartney, Kate Sanders, Beth Simon, Tammy VanDeGrift. Commonsense understanding of concurrency: computing students and concert tickets
71 -- 77Takeo Igarashi. Computer graphics for all
78 -- 86Tim Roughgarden. Algorithmic game theory
88 -- 0Hans-Juergen Boehm. A solid foundation for x86 shared memory: technical perspective
89 -- 97Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa Nardelli, Magnus O. Myreen. x86-TSO: a rigorous and usable programmer s model for x86 multiprocessors
98 -- 0Mary Jane Irwin. Technology scaling redirects main memories: technical perspective
99 -- 106Benjamin C. Lee, Engin Ipek, Onur Mutlu, Doug Burger. Phase change memory architecture and the quest for scalability
112 -- 0Leah Hoffmann. Q&A
113 -- 117Yurong Yao, Edward Watson, Beverly K. Kahn. Application service providers: market and adoption decisions
118 -- 121Jorge A. Romero, Nirup Menon, Rajiv D. Banker, Mark Anderson. ERP: drilling for profit in the oil and gas industry
122 -- 127Wei-Lun Chang, Soe-Tsyr Yuan, Carol W. Hsu. Creating the experience economy in e-commerce
128 -- 131Oded Nov, Chen Ye. Why do people tag?: motivations for photo tagging
132 -- 137Domenico Talia, Paolo Trunfio. How distributed data mining tasks can thrive as knowledge services
138 -- 141Alan R. Dennis, Thomas M. Duffy, Hasan Cakir. IT programs in high schools: lessons from the Cisco Networking Academy program
142 -- 144John C. Ruhnka, John W. Bagby. Using ESI discovery teams to manage electronic data discovery

Volume 53, Issue 6

5 -- 0Patricia Ryan. A tour of ACM's HQ
10 -- 11Greg Linden, Ed H. Chi, Mark Guzdial. The chaos of the internet as an external brain; and more
12 -- 0David Roman. Interact naturally
13 -- 15Neil Savage. Straightening out heavy tails
16 -- 17Tom Geller. Beyond the smart grid
18 -- 19Leah Hoffmann. Mine your business
20 -- 21Leah Hoffmann. Robin Milner: the elegant pragmatist
22 -- 0Jack Rosenberger. CS and technology leaders honored
24 -- 26Arvind Narayanan, Vitaly Shmatikov. Myths and fallacies of personally identifiable information
27 -- 29Stuart S. Shapiro. Privacy by design: moving from art to practice
30 -- 32Peter J. Denning, Jack B. Dennis. The resurgence of parallelism
33 -- 34George V. Neville-Neil. Plotting away
35 -- 37François Lévêque. Intel's rebates: above board or below the belt?
38 -- 40Simson L. Garfinkel, Lorrie Faith Cranor. Institutional review boards and your research
41 -- 45Len Shustek. An interview with Ed Feigenbaum
52 -- 58George Phillips. Simplicity betrayed
59 -- 67Jeffrey Heer, Michael Bostock, Vadim Ogievetsky. A tour through the visualization zoo
68 -- 78Anastasia Ailamaki, Verena Kantere, Debabrata Dash. Managing scientific data
79 -- 83Jilin Chen, Joseph A. Konstan. Conference paper selectivity and impact
84 -- 94Kristen Grauman. Efficiently searching for similar images
96 -- 0Vivek Sarkar. Building confidence in multicore software
97 -- 105Jacob Burnim, Koushik Sen. Asserting and checking determinism for multithreaded programs
106 -- 0K. Rustan M. Leino. Learning to do program verification
107 -- 115Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood. seL4: formal verification of an operating-system kernel
118 -- 0Peter Winkler. Puzzled
120 -- 0David Brin. Future tense
121 -- 125Jun Sun, Marshall Scott Poole. Beyond connection: situated wireless communities
126 -- 130Sergio de Cesare, Mark Lycett, Robert D. Macredie, Chaitali Patel, Ray J. Paul. Examining perceptions of agility in software development practice
131 -- 134Alexander Nill, John Schibrowsky, James W. Peltier. Factors that influence software piracy: a view from Germany
135 -- 138Jan Kietzmann, Ian Angell. Panopticon revisited
139 -- 143Benoit Baudry, Sudipto Ghosh, Franck Fleurey, Robert B. France, Yves Le Traon, Jean-Marie Mottu. Barriers to systematic model transformation testing
144 -- 148Kevin P. Gallagher, Kate M. Kaiser, Judith C. Simon, Cynthia Beath, Tim Goles. The requisite variety of skills for IT professionals
149 -- 153Sandra A. Vannoy, Prashant Palvia. The social influence model of technology adoption
154 -- 157Cheul Rhee, G. Lawrence Sanders, Natalie C. Simpson. I, myself and e-myself

Volume 53, Issue 5

5 -- 0Moshe Y. Vardi. ::::Globalization and Offshoring of Software:::: revisited
10 -- 11Jeannette M. Wing, Daniel Reed. NSF funding advice: 21st century innovation
12 -- 0David Roman. Looking for control
13 -- 15Jeff Kanipe. Modeling the astronomical
16 -- 17Gary Anthes. Happy Birthday, RDBMS!
18 -- 20Samuel Greengard. Cloud computing and developing nations
21 -- 0Jack Rosenberger. Thacker wins Turing Award
32 -- 34Erik Brynjolfsson, Paul Hofmann, John Jordan. Cloud computing and electricity: beyond the utility model
35 -- 37Cameron Wilson, Mark Guzdial. How to make progress in computing education
38 -- 40Roman Beck. Can IT lean against the wind?
41 -- 43Ofir Turel, Alexander Serenko. Is mobile email addiction overlooked?
45 -- 49William Aspray. Great computing museums of the world, part two
50 -- 53Peter Phillips. Enhanced debugging with traces
54 -- 61Julien Ridoux, Darryl Veitch. Principles of robust timing over the internet
70 -- 77Abigail Sellen, Steve Whittaker. Beyond total capture: a constructive critique of lifelogging
78 -- 85Clayton Lewis, Michele H. Jackson, William M. Waite. Student and faculty attitudes and beliefs about computer science
86 -- 96Susanne Albers. Energy-efficient algorithms
98 -- 0Peter L. Bartlett. Learning to act in uncertain environments: technical perspective
99 -- 107Kuzman Ganchev, Yuriy Nevmyvaka, Michael Kearns, Jennifer Wortman Vaughan. Censored exploration and the dark pool problem
108 -- 0Mark Harman. Automated patching techniques: the fix is in: technical perspective
109 -- 116Westley Weimer, Stephanie Forrest, Claire Le Goues, ThanhVu Nguyen. Automatic program repair with evolutionary computation
120 -- 0Peter Winkler. Puzzled
121 -- 125Paul P. Tallon. Understanding the dynamics of information management costs
126 -- 129Blaize Horner Reich, Chris Sauer. Roles of the external IT project manager
130 -- 133Wonil Hwang, Gavriel Salvendy. Number of people required for usability evaluation: the 10+/-2 rule
134 -- 137Charles E. Downing. Is web-based supply chain integration right for your company?
138 -- 141Demin Wang, Dharma P. Agrawal, Wassana Toruksa, Chaichana Chaiwatpongsakorn, Mingming Lu, Tim C. Keener. Monitoring ambient air quality with carbon monoxide sensor-based wireless network
142 -- 146Theophanis C. Stratopoulos, Jee-Hae Lim. IT innovation persistence: an oxymoron?
147 -- 150E. Vance Wilson, Bengisu Tulu. The rise of a health-IT academic focus
151 -- 156Hyeyoung Kim, Jae-Nam Lee, Jaemin Han. The role of IT in business ecosystems

Volume 53, Issue 4

5 -- 0Calvin C. Gotlieb, James J. Horning. The work of ACM s awards committee
10 -- 11Michael Stonebraker. SQL databases v. NoSQL databases
12 -- 0David Roman. Going mobile
13 -- 14Alex Wright. Data streaming 2.0
15 -- 16Gary Anthes. Robots gear up for disaster response
17 -- 19Samuel Greengard. Spies among us?
22 -- 24Richard Heeks. Development 2.0: the IT-enabled transformation of international development
25 -- 26Martin Campbell-Kelly. Be careful what you wish for
27 -- 29Michael A. Cusumano. Cloud computing and SaaS as new computing platforms
30 -- 32Paul Ohm. When network neutrality met privacy
33 -- 34George V. Neville-Neil. The data-structure canon
36 -- 42Andy Woods. Cooling the data center
43 -- 49Mache Creeger. CTO roundtable: malware defense
50 -- 58Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia. A view of cloud computing
60 -- 67Parthasarathy Ranganathan. Recipe for efficiency: principles of power-aware computing
68 -- 73Sergey Yekhanin. Private information retrieval
74 -- 85Sergio Antoy, Michael Hanus. Functional logic programming
88 -- 0Padhraic Smyth, Charles Elkan. Technical perspective - Creativity helps influence prediction precision
89 -- 97Yehuda Koren. Collaborative filtering with temporal dynamics
98 -- 0Leslie Pack Kaelbling. Technical perspective - New bar set for intelligent vehicles
99 -- 106Sebastian Thrun. Toward robotic cars
112 -- 0Leah Hoffmann. Q&A
113 -- 118Pak-Lok Poon, Sau-Fun Tang, T. H. Tse, Tsong Yueh Chen. CHOC LATE: a framework for specification-based testing
119 -- 123Robert J. Aalberts, Percy Poon, Paul D. Thistle. A tale of two internet service providers
124 -- 127Keith Wright. Capstone programming courses considered harmful
128 -- 133Surya Rebbapragada, Amit Basu, John Semple. Data mining and revenue management methodologies in college admissions
134 -- 138Dawn G. Gregg. Designing for collective intelligence
139 -- 143Stefano Ferretti, Marco Furini, Claudio E. Palazzi, Marco Roccetti, Paola Salomoni. WWW recycling for a better world
144 -- 146Rhoda C. Joseph. Individual resistance to IT innovations

Volume 53, Issue 3

5 -- 0Moshe Y. Vardi. Revisiting the publication culture in computing research
10 -- 11Mark Guzdial, Judy Robertson. Too much programming too soon?
12 -- 0David Roman. Granting a second life
13 -- 15Gregory Goth. CS and biology s growing pains
16 -- 18Kirk L. Kroeker. Engineering the web s third decade
19 -- 20Samuel Greengard. Tracking garbage
22 -- 24Tim Chang. Gaming will save us all
25 -- 27Pamela Samuelson. Only technological processes are patentable
28 -- 29Rachelle Hollander. The ethics beat
30 -- 32Peter J. Denning, Fernando Flores, Peter Luzmore. Orchestrating coordination in pluralistic networks
33 -- 35Richard A. Tapia. Hiring and developing minority faculty at research universities
36 -- 38Cameron Wilson, Peter Harsha. Making the case for computing
39 -- 41Kieron O Hara, Nigel Shadbolt. Privacy on the data web
42 -- 49Kirk McKusick, Sean Quinlan. GFS: evolution on fast-forward
50 -- 58David J. Brown, Charles Reams. Toward energy-efficient computing
59 -- 64Sia Siew Kien, Christina Soh, Peter Weill. Global IT management: structuring for scale, responsiveness, and innovation
66 -- 74Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser. Chasing the AIDS virus
75 -- 83Cameron Seay, Gary Tucker. Virtual computing initiative at a small public university
96 -- 0Daniele Micciancio. A first glimpse of cryptography s Holy Grail
97 -- 105Craig Gentry. Computing arbitrary functions of encrypted data
106 -- 0Pietro Perona. Seeing the trees, the forest, and much more
107 -- 114Antonio B. Torralba, Kevin P. Murphy, William T. Freeman. Using the forest to see the trees: exploiting context for visual object detection and localization
118 -- 0Peter Winkler. Puzzled
120 -- 0Ari Juels. Future tense
121 -- 125Fabio Arduini, Vincenzo Morabito. Business continuity and the banking industry
126 -- 131Sherrie Drye Cannoy, A. F. Salam. A framework for health care information assurance policy and compliance
132 -- 136Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Lee. Is stickiness profitable for electronic retailers?
137 -- 141Ramanath Subramanyam, Fei Lee Weisstein, Mayuram S. Krishnan. User participation in software development projects
142 -- 147S. T. Parkinson, Robert M. Hierons, Mark Lycett, M. Norman. Practitioner-based measurement: a collaborative approach
148 -- 151Del Nagy, Areej M. Yassin, Anol Bhattacherjee. Organizational adoption of open source software: barriers and remedies
152 -- 156John H. Benamati, Zafer D. Ozdemir, H. Jeff Smith. Aligning undergraduate IS curricula with industry needs
157 -- 162Hing Kai Chan. Agent-oriented embedded electronic measuring systems

Volume 53, Issue 2

5 -- 0Diane Crawford. An issue of teamwork
10 -- 11Valerie Barr. Connecting women and technology
12 -- 0David Roman. Where the data is
13 -- 15Kirk L. Kroeker. Alternate interface technologies emerge
16 -- 17Alex Wright. Type theory comes of age
18 -- 20Sarah Underwood. Improving disaster management
22 -- 25M. Angela Sasse. Not seeing the crime for the cameras?
26 -- 28Dennis P. Groth, Jeffrey K. MacKie-Mason. Why an informatics degree?
29 -- 31W. Douglas Maughan. The need for a national cybersecurity research and development agenda
32 -- 34Michel Beaudouin-Lafon. Open access to scientific publications
35 -- 36George V. Neville-Neil. Taking your network s temperature
37 -- 42Dennis Shasha. An interview with Michael Rabin
44 -- 48Eric Saxe. Power-efficient software
49 -- 57Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev. Managing contention for shared resources on multicore processors
58 -- 64Steven P. Miller, Michael W. Whalen, Darren D. Cofer. Software model checking takes off
66 -- 75Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler. A few billion lines of code later: using static analysis to find bugs in the real world
76 -- 83Eric Benhamou, Jon Eisenberg, Randy H. Katz. Assessing the changing U.S. IT R&D ecosystem
84 -- 93Dave Bacon, Wim van Dam. Recent progress in quantum algorithms
96 -- 0Sanjoy Dasgupta. Strange effects in high dimension
97 -- 104Nir Ailon, Bernard Chazelle. Faster dimension reduction
105 -- 0Shekhar Y. Borkar. Want to be a bug buster?
106 -- 113Sung-Boem Park, Subhasish Mitra. Post-silicon bug localization for processors using IFRA
120 -- 0Peter Winkler. Breaking chocolate bars
121 -- 126Dongmin Kim, Izak Benbasat. Designs for effective implementation of trust assurances in internet stores
127 -- 133Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons. Reversing the landslide in computer-related degree programs
134 -- 138Tim Chenoweth, Robert P. Minch, Sharon Tabor. Wireless insecurity: examining user security behavior on public networks
139 -- 143Farheen Altaf, David Schuff. Taking a flexible approach to ASPs
144 -- 148John Minor Ross. Informatics creativity: a role for abductive reasoning?
149 -- 154Damien Joseph, Soon Ang, Roger H. L. Chang, Sandra Slaughter. Practical intelligence in IT: assessing soft skills of IT professionals
155 -- 159Vijay K. Gurbani, Anita Garvert, James D. Herbsleb. Managing a corporate open source software asset
160 -- 164Nikhil Mehta, Anju Mehta. It takes two to tango: how relational investments improve IT outsourcing partnerships

Volume 53, Issue 12

5 -- 0David A. Patterson. Diverse connections
10 -- 11Greg Linden, Jason Hong, Mark Guzdial. Security advice; malvertisements; and CS education in Qatar
12 -- 0David Roman. School grades need improvement
13 -- 15Gregory Goth. The eyes have it
16 -- 18Gary Anthes. Topic models vs. unstructured data
19 -- 0Marina Krakovsky. CSEdWeek expands its reach
20 -- 22Samuel Greengard. The new face of war
23 -- 0David Lindley. A matter of privacy
24 -- 27Seymour E. Goodman, Andrew Harris. The coming African Tsunami of information insecurity
28 -- 30Mark Smotherman, Dag Spicer. IBM s single-processor supercomputer efforts
31 -- 33Ann Q. Gates. The role of Hispanic-serving institutions in contributing to an educated work force
34 -- 36Peter J. Denning, Robert E. Kahn. The long quest for universal information access
37 -- 38George V. Neville-Neil. Literate coding
39 -- 41Francine Berman. We need a research data census
48 -- 55Mache Creeger. The theft of business innovation: an ACM-BCS roundtable on threats to global competitiveness
56 -- 66Zhong Shao. Certified software
67 -- 79Stephen J. Andriole. Business impact of Web 2.0 technologies
80 -- 90Adnan Darwiche. Bayesian networks
92 -- 0Michael Elad, Raja Giryes. Iterative signal recovery from incomplete samples: technical perspective
93 -- 100Deanna Needell, Joel A. Tropp. CoSaMP: iterative signal recovery from incomplete and inaccurate samples
102 -- 109Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous. QIP = PSPACE
126 -- 0Peter Winkler. Puzzled: Solutions and sources
129 -- 132Massimo Franceschet. The role of conference publications in CS
133 -- 141Barry M. Lunt, Joseph J. Ekstrom, Han Reichgelt, Michael Bailey, Richard J. LeBlanc. IT 2008: the history of a new computing discipline
142 -- 149Ralph Morelli, Chamindra de Silva, Trishan R. de Lanerolle, Rebecca Curzon, Xin Sheng Mao. A global collaboration to deploy help to China

Volume 53, Issue 11

0 -- 0Freyne, Jill, Coyle, Lorcan, Smyth, Barry, Cunningham, Padraig. Relative status of journal and conference publications in computer science
10 -- 11Tessa Lau. Rethinking the systems review process
12 -- 0David Roman. A preference for PDF
13 -- 15Gregory Goth. Turning data into knowledge
16 -- 18Gary Anthes. Security in the cloud
19 -- 21Leah Hoffmann. Career opportunities
23 -- 0Neil Savage. Wide open spaces
24 -- 25Pablo Boczkowski. The divergent online news preferences of journalists and readers
27 -- 29Stephen Cooper, Lance C. Pérez, Daphne Rainey. K--12 computational learning
30 -- 32Pamela Samuelson. Why do software startups patent (or not)?
36 -- 39Matt Welsh. Sensor networks for the sciences
42 -- 46Brian W. Fitzpatrick, J. J. Lueck. The case against data lock-in
47 -- 55David S. H. Rosenthal. Keeping bits safe: how hard can it be?
56 -- 57Poul-Henning Kamp. Sir, please step away from the ASR-33!
58 -- 66Michael Garland, David B. Kirk. Understanding throughput-oriented architectures
67 -- 72Patrick Vogl, Michael Barrett. Regulating the information gatekeepers
74 -- 82Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra. Using complexity to protect elections
84 -- 0Sarita V. Adve. Data races are evil with no exceptions: technical perspective
85 -- 92Tayfun Elmas, Shaz Qadeer, Serdar Tasiran. Goldilocks: a race-aware Java runtime
93 -- 101Cormac Flanagan, Stephen N. Freund. FastTrack: efficient and precise dynamic race detection
112 -- 0Peter Winkler. Puzzled
113 -- 115Duncan A. Buell. In support of computer science teachers and the CSTA
116 -- 123Massimo Ficco, Roberto Pietrantuono, Stefano Russo. Supporting ubiquitous location information in interworking 3G and wireless networks
124 -- 132Jill Freyne, Lorcan Coyle, Barry Smyth, Padraig Cunningham. Relative status of journal and conference publications in computer science

Volume 53, Issue 10

5 -- 0Alain Chesnais. ACM is built on volunteers shoulders
8 -- 9Michael Stonebraker. In search of database consistency
10 -- 0David Roman. The mobile road ahead
11 -- 13Alex Wright. Linear logic
14 -- 15Graeme Stemp-Morlock. Personal fabrication
16 -- 17Dennis McCafferty. Should code be released?
19 -- 21Martin Campbell-Kelly. Victorian data processing
22 -- 24Michael A. Cusumano. Platforms and services: understanding the resurgence of Apple
25 -- 27David Lorge Parnas. Risks of undisciplined development
28 -- 29George V. Neville-Neil. Version aversion
30 -- 31Michael W. Hicks, Jeffrey S. Foster. SCORE: agile research group management
39 -- 45Cary V. Millsap. Thinking clearly about performance, part 2
46 -- 52Kevin Montagne. Tackling architectural complexity with modeling
54 -- 61Thomas Serre, Tomaso Poggio. A neuromorphic approach to computer vision
62 -- 70Prasanna Tambe, Lorin M. Hitt. How offshoring affects IT workers
72 -- 82Rodrigo Rodrigues, Peter Druschel. Peer-to-peer systems
84 -- 0Carl A. Waldspurger. A VM Engine that makes a difference: technical perspective
85 -- 93Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat. Difference engine: harnessing memory redundancy in virtual machines
94 -- 0Yair Weiss, Judea Pearl. Belief propagation: technical perspective
95 -- 103Erik B. Sudderth, Alexander T. Ihler, Michael Isard, William T. Freeman, Alan S. Willsky. Nonparametric belief propagation
112 -- 0Leah Hoffmann. Q&A

Volume 53, Issue 1

9 -- 13Wendy Hall. ACM s annual report
16 -- 17Greg Linden, Ruben Ortega, Jason Hong. Software engineering, smartphones and health systems, and security warnings
18 -- 0David Roman. The corollary of empowerment
19 -- 21Tom Geller. Rebuilding for eternity
22 -- 23Leah Hoffmann. Amir Pnueli: ahead of his time
24 -- 26Gary Anthes. Automated translation of Indian languages
27 -- 28Neil Savage. New search challenges and opportunities
29 -- 0Kirk L. Kroeker. Future Internet design summit
30 -- 0Karen A. Frenkel. Robert Lovett Ashenhurst: 1929--2009
31 -- 0Samuel Greengard. ACM and India
32 -- 34Michael A. Cusumano. Technology strategy and management - The evolution of platform thinking
35 -- 36Phillip G. Armour. The business of software - In praise of bad programmers
40 -- 42Bjarne Stroustrup. Viewpoint - What should we teach new software developers? Why?
43 -- 46William Aspray, Len Shustek, Norbert Ryska. Computer museum series - Great computing museums of the world, part one
48 -- 52Julian Hyde. Data in flight
53 -- 57Stephen Petschulat. Other people's data
58 -- 63Adam Leventhal. Triple-parity RAID and beyond
64 -- 71Michael Stonebraker, Daniel J. Abadi, David J. DeWitt, Samuel Madden, Erik Paulson, Andrew Pavlo, Alexander Rasin. MapReduce and parallel DBMSs: friends or foes?
72 -- 77Jeffrey Dean, Sanjay Ghemawat. MapReduce: a flexible data processing tool
78 -- 88Raz Lin, Sarit Kraus. Can automated agents proficiently negotiate with humans?
90 -- 0Dan S. Wallach. Technical perspective - Native Client: a clever alternative
91 -- 99Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar. Native Client: a sandbox for portable, untrusted x86 native code
100 -- 0Alon Y. Halevy. Technical perspective - Schema mappings: rules for mixing data
101 -- 110Balder ten Cate, Phokion G. Kolaitis. Structural characterizations of schema-mapping languages
120 -- 0Leah Hoffmann. Q&A - HP s running man
121 -- 125DongBack Seo, King-Tim Mak. Using the thread-fabric perspective to analyze industry dynamics
126 -- 130Randal C. Burns, Zachary N. J. Peterson. Security constructs for regulatory-compliant storage
131 -- 135Wonchang Hur, Dongsoo Kim. The future of digital imaging
136 -- 141Seongwoon Kim, Inseong Lee, Kiho Lee, Seungki Jung, Joonah Park, Yeun-Bae Kim, Sang Ryong Kim, Jinwoo Kim. Mobile Web 2.0 with multi-display buttons
142 -- 147Paul D. Witman, Terry Ryan. Think big for reuse
148 -- 152Vijay Khatri, Carol V. Brown. Designing data governance
153 -- 157Vittorio Miori, Dario Russo, Massimo Aliberti. Domotic technologies incompatibility becomes user transparent
158 -- 159Zvi Drezner. Technical opinion - Random selection from a stream of events