Journal: ACM Queue

Volume 7, Issue 9

10 -- 0Jim Waldo, Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O Leary. A Threat Analysis of RFID Passports
20 -- 0Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best. Unifying Biological Image Formats with HDF5
30 -- 0James C. Phillips, John E. Stone. Probing Biomolecular Machines with Graphics Processors
40 -- 0Samantha Kleinberg, Bud Mishra. Metamorphosis: the Coming Transformation of Translational Systems Biology
50 -- 0Paul Stachour, David Collier-Brown. You Don t Know Jack About Software Maintenance
60 -- 62George Neville-Neil. Merge Early, Merge Often

Volume 7, Issue 8

10 -- 0Whitfield Diffie, Susan Landau. Communications Surveillance: Privacy and Security at Risk

Volume 7, Issue 7

10 -- 0Marshall K. McKusick, Sean Quinlan. GFS: Evolution on Fast-forward
20 -- 22George V. Neville-Neil. The Meaning of Maintenance
30 -- 0Bryan O Sullivan. Making Sense of Revision-control Systems
40 -- 0Katie Shilton. Four Billion Little Brothers?: Privacy, mobile phones, and ubiquitous data collection

Volume 7, Issue 6

10 -- 0Adam Jacobs. The Pathologies of Big Data
20 -- 24Stan Kelly-Bootle. Words Fail Them
30 -- 0Bruce Johnson. Reveling in Constraints
40 -- 0Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan. Monitoring and Control of Large Systems with MonALISA

Volume 7, Issue 5

2 -- 0Mache Creeger. Cloud Computing: An Overview
3 -- 0Charles Reis, Adam Barth, Carlos Pizano. Browser Security: Lessons from Google Chrome

Volume 7, Issue 4

34 -- 35George V. Neville-Neil. Whither Sockets?
77 -- 80Stan Kelly-Bootle. One Peut-Être, Two Peut-Être, Three Peut-Être, More

Volume 7, Issue 3

0 -- 0Charles Beeler, Craig Partridge. All-Optical Computing and All-Optical Networks are Dead
20 -- 21Jonathan M. Smith. Fighting Physics: A Tough Battle
28 -- 29Mike O Dell. Network Front-end Processors, Yet Again

Volume 7, Issue 2

5 -- 0James Maurer. Introducing...acmqueue
6 -- 9George V. Neville-Neil. Don t be Typecast as a Software Developer
40 -- 41Thomas Wadlow, Vlad Gorelik. Security in the Browser
46 -- 47Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis. Cybercrime 2.0: When the Cloud Turns Dark
54 -- 55Ian Foster, Savas Parastatidis, Paul Watson, Mark McKeown. How Do I Model State? Let Me Count the Ways
75 -- 0Matt Zandstra, Robert Martin. Book Reviews

Volume 7, Issue 11

1 -- 3Stan Kelly-Bootle. Some Rules and Restrictions May Apply
20 -- 0Julian Hyde. Data in Flight
30 -- 0Adam Leventhal. Triple-Parity RAID and Beyond
40 -- 43George Neville-Neil. Standards Advice

Volume 7, Issue 10

10 -- 0Paul Vixie. What DNS Is Not
20 -- 0Stephen Petschulat. Other People's Data
30 -- 0Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto. Maximizing Power Efficiency with Asymmetric Multicore Systems

Volume 7, Issue 1

0 -- 0Eric Schrock. Featured Article: Debugging AJAX in Production
0 -- 0Peter Christy. Commentary: A Trip Without a Roadmap
6 -- 7George V. Neville-Neil. Pride and Prejudice: (The ::::Vasa::::)
8 -- 16John Stanik. A Conversation with Van Jacobson
18 -- 24Mike Shapiro. Purpose-Built Languages
26 -- 35Mache Creeger. Virtualization: Part One
36 -- 39Benjamin Boer. The Obama Campaign: A Programmer s Perspective
40 -- 0Alessandro Berni. Review of "Wireless Ad Hoc and Sensor Networks (1st ED.) by Houda Labiod, " John Wiley & Sons, Inc., 2008, ISBN 1848210035
40 -- 0S. Balaraman. Review of Pro Web 2.0 Application Development with GWT by S. Balaraman, Jeff Dwyer, Apress, 2008, ISBN 9781590599853
41 -- 0John Stanik. Calendar
42 -- 45Stan Kelly-Bootle. The Flaws of Nature