CACM - volume 52 - 2009 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Mikko T. Siponen M. Adam Mahmood Seppo Pahnila
Positive externality, increasing returns, and the rise in cybercrimes. Visual passwords: cure-all or snake-oil?Karen Renaud Antonella De Angeli
Why did your project fail? Assessing open source software as a scholarly contribution.Lou Hafer Arthur E. Kirkpatrick
Security in dynamic web content management systems applications.Ganesh Vaidyanathan Steven Mautone
Online privacy, government surveillance and national ID cards.Sun Sun Lim Hichang Cho Milagros Rivera Sánchez
Power and trust in global virtual teams. Future tense - Mightier than the pen. Puzzled - Solutions and sources. ThinSight: a thin form-factor interactive surface technology.Shahram Izadi Steve Hodges Alex Butler Darren West Alban Rrustemi Mike Molloy William Buxton
Technical perspective - A graphical sense of touch. Designing plush toys with a computer. Technical perspective - Design tools for the rest of us. Computer games and traditional CS courses. Computer science in the conceptual age. The Bulk Multicore architecture for improved programmability.Josep Torrellas Luis Ceze James Tuck Calin Cascaval Pablo Montesinos Wonsun Ahn Milos Prvulovic
Maximizing power efficiency with asymmetric multicore systems.Alexandra Fedorova Juan Carlos Saez Daniel Shelepov Manuel Prieto
What DNS is not. A threat analysis of RFID passports.Alan Ramos Weina Scott William Scott Doug Lloyd Katherine O&aposLeary Jim Waldo
Viewpoint - A "smart" cyberinfrastructure for research.Savas Parastatidis Evelyne Viegas Tony Hey
Kode Vicious - Broken builds. The profession of IT - Computing's paradigm.Peter J. Denning Peter A. Freeman
Emerging markets - Israel's technology industry as an economic growth engine. Broadening participation - Opening remarks. Problem solvers. Making automation work. Ready for a Web OS? Blueprints for self-assembly. Crowdsourcing and the question of expertise. In the virtual extension.CS woes: deadline-driven research, academic inequality.
Jeannette M. Wing Mark Guzdial
In CS education, educate the educators first.It is a pivotal time for K--12 computer science.
Frank McCown Catherine C. Marshall Michael L. Nelson
And what can context do for data?Cristiana Bolchini Carlo Curino Giorgio Orsi Elisa Quintarelli Rosalba Rossato Fabio Alberto Schreiber Letizia Tanca
Offshoring and the new world order. Computing journals and their emerging roles in knowledge exchange.Aakash Taneja Anil Singh M. K. Raja
iCare home portal: an extended model of quality aging e-services.Wei-Lun Chang Soe-Tsyr Yuan Eldon Y. Li
Quantifying the benefits of investing in information security.Lara Khansa Divakaran Liginlal
Puzzled - Covering the plane. Predicting structured objects with support vector machines.Thorsten Joachims Thomas Hofmann Yisong Yue Chun-Nam John Yu
Technical perspective - Machine learning for complex predictions. Declarative networking.Boon Thau Loo Tyson Condie Minos N. Garofalakis David E. Gay Joseph M. Hellerstein Petros Maniatis Raghu Ramakrishnan Timothy Roscoe Ion Stoica
Technical perspective - Narrowing the semantic gap in distributed programming. Model checking: algorithmic verification and debugging.Edmund M. Clarke E. Allen Emerson Joseph Sifakis
Why IT managers don't go for cyber-insurance products.Tridib Bandyopadhyay Vijay S. Mookerjee Ram C. Rao
Scratch: programming for all.Mitchel Resnick John Maloney Andrés Monroy-Hernández Natalie Rusk Evelyn Eastmond Karen Brennan Amon Millner Eric Rosenbaum Jay S. Silver Brian Silverman Yasmin B. Kafai
You don't know jack about software maintenance.Paul D. Stachour David Collier-Brown
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection. Communications surveillance: privacy and security at risk. Interview - An interview with Ping Fu. Viewpoint - On public service and computer science. Economic and business dimensions - The broadband price is not right. Legally speaking - Are business methods patentable? Privacy and security - Usable security: how to get it. Exploring new frontiers. Implementing electronic medical records. Electronic paper's next chapter. Deep data dives discover natural laws. Internet addiction: it's spreading, but is it real? Computer science curriculum, deceptive advertising. In the virtual extension.Pay for editorial independence.
Is the image crisis over?
Nan Hu Jie Zhang Paul A. Pavlou
How effective is Google's translation service in search?Jacques Savoy Ljiljana Dolamic
Human interaction for high-quality machine translation.Francisco Casacuberta Jorge Civera Elsa Cubel Antonio L. Lagarda Guy Lapalme Elliott Macklovitch Enrique Vidal
De-escalating IT projects: the DMM model.Donal J. Flynn Gary S. C. Pan Mark Keil Magnus Mähring
Making ubiquitous computing available.Vivienne Waller Robert B. Johnston
Attaining superior complaint resolution.Sridhar R. Papagari Sangareddy Sanjeev Jha Chen Ye Kevin C. Desouza
Balancing four factors in system development projects.Girish H. Subramanian Gary Klein James J. Jiang Chien-Lung Chan
Technical opinion - Do SAP successes outperform themselves and their competitors?Richard J. Goeke Robert H. Faley
Q&A - The networker. Finding the frequent items in streams of data.Graham Cormode Marios Hadjieleftheriou
Technical perspective - Data stream processing: when you only get one look. Distinct-value synopses for multiset operations.Kevin S. Beyer Rainer Gemulla Peter J. Haas Berthold Reinwald Yannis Sismanis
Technical perspective - Relational query optimization: data management meets statistical estimation. Smoothed analysis: an attempt to explain the behavior of algorithms in practice.Daniel A. Spielman Shang-Hua Teng
Automated support for managing feature requests in open forums.Jane Cleland-Huang Horatiu Dumitru Chuan Duan Carlos Castro-Herrera
A view of the parallel computing landscape.Krste Asanovic Rastislav Bodík James Demmel Tony Keaveny Kurt Keutzer John Kubiatowicz Nelson Morgan David A. Patterson Koushik Sen John Wawrzynek David Wessel Katherine A. Yelick
A conversation with David E. Shaw.Unifying biological image formats with HDF5.
Matthew T. Dougherty Michael J. Folk Erez Zadok Herbert J. Bernstein Frances C. Bernstein Kevin W. Eliceiri Werner Benger Christoph Best
Probing biomolecular machines with graphics processors.James C. Phillips John E. Stone
Viewpoint - Retrospective: an axiomatic basis for computer programming. Kode Vicious - Kode reviews 101. Technology strategy and management - Dealing with the venture capital crisis. Inside risks - Reflections on Conficker. Historical reflections - Computing in the depression era. The business of software - Contagious craziness, spreading sanity. Shaping the future. Debating net neutrality. Managing data. Following the leaders.The Netflix prize, computer science outreach, and Japanese mobile phones.
Greg Linden Michael D. Conover Judy Robertson
In the Virtual Extension.Time and computing.
ACM Europe.
Mu Xia Yun Huang Wenjing Duan Andrew B. Whinston
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.Robert Willison Mikko T. Siponen
The state of corporate website accessibility.Eleanor T. Loiacono Nicholas C. Romano Jr. Scott McCoy
One size does not fit all: legal protection for non-copyrightable data. Constructive function-based modeling in multilevel education.Alexander A. Pasko Valery Adzhiev
Examining user involvement in continuous software development: (a case of error reporting system).Achita Muthitacharoen Khawaja Asjad Saeed
Future tense - Confusions of the hive mind. Puzzled - Solutions and sources. Spamalytics: an empirical analysis of spam marketing conversion.Chris Kanich Christian Kreibich Kirill Levchenko Brandon Enright Geoffrey M. Voelker Vern Paxson Stefan Savage
Technical perspective - They do click, don't they? Optimistic parallelism requires abstractions.Milind Kulkarni Keshav Pingali Bruce Walter Ganesh Ramanarayanan Kavita Bala L. Paul Chew
Technical perspective - Abstraction for parallelism. The status of the P versus NP problem. What intellectual property law should learn from software. Sound index: charts for the people, by the people.Varun Bhagwan Tyrone Grandison Daniel Gruhl
Making sense of revision-control systems. Monitoring and control of large systems with MonALISA.Iosif Legrand Ramiro Voicu Catalin Cirstoiu Costin Grigoras Latchezar Betev Alexandru Costan
Reveling in constraints. Interview - An interview with Maurice Wilkes. Viewpoint - Face the inevitable, embrace parallelism. IT policy - The long road to Computer Science education reform. Emerging markets - How ICT advances might help developing nations. The profession of IT - Computing: the fourth great domain of science.Peter J. Denning Paul S. Rosenbloom
Law and technology - Keeping track of telecommunications surveillance. Computer Science meets environmental science. Facing an age-old problem. Medical nanobots. Entering a parallel universe. What you read on your summer vacation. Saying good-bye to DBMSs, designing effective interfaces.Michael Stonebraker Jason Hong
In the Virtual Extension.Computer Science does matter.
The financial meltdown and computing.
Indranil Bose Alvin Chung Man Leung
Attracting Native Americans to computing. Ranking billions of web pages using diodes.Rohit Kaul Yeogirl Yun Seong-Gon Kim
Global software development: where are the benefits?Eoin Ó Conchúir Pär J. Ågerfalk Helena Holmström Olsson Brian Fitzgerald
Learning to build an IT innovation platform. The critical elements of the patch management process.Thomas A. Gerace Huseyin Cavusoglu
Distinguishing citation quality for journal impact assessment.Andrew Lim Hong Ma Qi Wen Zhou Xu Brenda Cheang
What determines IT spending priorities?Hoon S. Cha David E. Pingry Matt E. Thatcher
Puzzled - Probability and intuition. Statistical analysis of circuit timing using majorization.Michael Orshansky Wei-Shen Wang
Technical perspective - Where the chips may fall. Does distributed development affect software quality?: an empirical case study of Windows Vista.Christian Bird Nachiappan Nagappan Premkumar T. Devanbu Harald C. Gall Brendan Murphy
Technical perspective - Maintaining quality in the face of distributed development. Boolean satisfiability from theoretical hardness to practical success. Revitalizing computing education through free and open source software for humanity.Ralph Morelli Allen B. Tucker Norman Danner Trishan R. de Lanerolle Heidi J. C. Ellis Özgür Izmirli Danny Krizanc Gary Parker
A blind person's interactions with technology.Kristen Shinohara Josh D. Tenenberg
CTO roundtable: cloud computing. Browser security: lessons from Google Chrome.Charles Reis Adam Barth Carlos Pizano
The pathologies of big data. Viewpoint - Time for computer science to grow up. Privacy and security - An ethics code for U.S. intelligence officers. Education - Alice 3: concrete to abstract. Economic and business dimensions - Entrepreneurship during a slump. U.S. unveils cybersecurity plan. Learning through games. IT drives policy---and vice versa. Face recognition breakthrough. Just for you. The new searchers. An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing.Jeannette M. Wing Daniel Reed Mark Guzdial
In the virtual extension.Why invention and innovation diverge.
Responding to the blogosphere. Communications and the practitioner.
Ting-Peng Liang Andrew J. Czaplewski Gary Klein James J. Jiang
A holistic framework for knowledge discovery and management.Dursun Delen Suliman Al-Hawamdeh
Re-tuning the music industry: can they re-attain business resonance?Sudip Bhattacharjee Ram D. Gopal James R. Marsden Ramesh Sankaranarayanan
Forensics of computers and handheld devices: identical or fraternal twins? The challenge of epistemic divergence in IS development.Mark Lycett Christopher Partridge
Deriving mutual benefits from offshore outsourcing. Advancing information technology in health care.Steven M. Thompson Matthew D. Dean
Hyperlinking the work for self-management of flexible workflows. Future tense - Webmind says hello. Puzzled - Solutions and sources. Two hardware-based approaches for deterministic multiprocessor replay.Derek Hower Pablo Montesinos Luis Ceze Mark D. Hill Josep Torrellas
Technical perspective - Software and hardware support for deterministic replay of parallel programs. Securing frame communication in browsers.Adam Barth Collin Jackson John C. Mitchell
Technical perspective - Reframing security for the web. How computer science serves the developing world.M. Bernardine Dias Eric A. Brewer
One laptop per child: vision vs. reality.Kenneth L. Kraemer Jason L. Dedrick Prakul Sharma
The Claremont report on database research.Rakesh Agrawal Anastasia Ailamaki Philip A. Bernstein Eric A. Brewer Michael J. Carey Surajit Chaudhuri AnHai Doan Daniela Florescu Michael J. Franklin Hector Garcia-Molina Johannes Gehrke Le Gruenwald Laura M. Haas Alon Y. Halevy Joseph M. Hellerstein Yannis E. Ioannidis Henry F. Korth Donald Kossmann Samuel Madden Roger Magoulas Beng Chin Ooi Tim O&aposReilly Raghu Ramakrishnan Sunita Sarawagi Michael Stonebraker Alexander S. Szalay Gerhard Weikum
Whither sockets? Network front-end processors, yet again. Hard-disk drives: the good, the bad, and the ugly. Kode vicious - Obvious truths. Viewpoint - Why "open source" misses the point of free software. The profession of IT - Beyond computational thinking. Inside risks - Reducing risks of implantable medical devices. Privacy and security - Answering the wrong questions is no answer. Looking backward and forward. Autonomous helicopters. Content control. Micromedicine to the rescue. Making that connection. Speech-activated user interfaces and climbing Mt. Exascale. Share the threats.ACM-W celebrates women in computing.
Gary W. Brock Denise Johnson McManus Joanne E. Hale
To trust or to distrust, that is the question: investigating the trust-distrust paradox.Carol Xiaojuan Ou Choon-Ling Sia
Cross-bidding in simultaneous online auctions.James A. McCart Varol O. Kayhan Anol Bhattacherjee
Toward an information-compatible anti-spam strategy.Robert K. Plice Nigel Melville Oleg V. Pavlov
An overview of IT service management.Stuart Diaz Galup Ronald Dattero Jim J. Quan Sue Conger
Designing ubiquitous computing environments to support work life balance.Karlene Cousins Upkar Varshney
Software developers' views of end-users and project success.J. Drew Procaccino June M. Verner
Puzzled - Understanding relationships among numbers. Scalable synchronous queues.William N. Scherer III Doug Lea Michael L. Scott
Technical perspective - Highly concurrent data structures. Lest we remember: cold-boot attacks on encryption keys.J. Alex Halderman Seth D. Schoen Nadia Heninger William Clarkson William Paul Joseph A. Calandrino Ariel J. Feldman Jacob Appelbaum Edward W. Felten
Technical perspective - A chilly sense of security. Algorithmic systems biology. Computing needs time. Spending Moore's dividend. Debugging AJAX in production. API design matters. Security in the browser. Viewpoint - Program committee overload in systems. Education - Teaching computing to everyone. Historical reflections - The rise, fall, and resurrection of software as a service. Economic and business dimensions - Increasing gender diversity in the IT work force.LeAnne Coder Joshua L. Rosenbloom Ronald A. Ash Brandon R. Dupont
Law and technology - The network neutrality debate hits Europe. Liskov wins Turing award.Learning goes global. Matchmaker, matchmaker. Rethinking signal processing. The print-web partnership turns the page. Recommendation algorithms, online privacy, and more.
Logic of lemmings in compiler innovation.
Conferences vs. journals in computing research.
Paulo B. Góes Yanbin Tu Y. Alex Tung
Mobile phones in the classroom: if you can't beat them, join them.Eusebio Scornavacca Jr. Sid L. Huff Stephen Marshall
Analysis of industry-specific concentration of CPOs in Fortune 500 companies. The impact of the digital divide on e-government use.France Bélanger Lemuria D. Carter
Object language and impression management.Kevin P. Scheibe James C. McElroy Paula C. Morrow
Non-work related computing (NWRC). How culture influences IT-enabled organizational change and information systems.Maris G. Martinsons Robert M. Davison Valdis Martinsons
Principles for effective virtual teamwork.Jay F. Nunamaker Jr. Bruce A. Reinig Robert O. Briggs
Q&A - Our dame commander. Integrating NAND flash devices onto servers.David Roberts Taeho Kgil Trevor N. Mudge
Technical perspective - Integrating flash devices. Relative fitness modeling.Michael P. Mesnier Matthew Wachs Raja R. Sambasivan Alice X. Zheng Gregory R. Ganger
Technical perspective - Disk array models for automating storage management. A direct path to dependable software. Roofline: an insightful visual performance model for multicore architectures.Samuel Williams Andrew Waterman David A. Patterson
Database and information-retrieval methods for knowledge discovery.Gerhard Weikum Gjergji Kasneci Maya Ramanath Fabian M. Suchanek
ORM in dynamic languages. Cybercrime 2.0: when the cloud turns dark.Niels Provos Moheeb Abu Rajab Panayiotis Mavrommatis
Purpose-built languages. Viewpoint - Research evaluation for computer science.Bertrand Meyer Christine Choppy Jørgen Staunstrup Jan van Leeuwen
Viewpoint - Computing as social science. Technology strategy and management - Strategies for difficult (and Darwinian) economic times. Kode vicious - System changes and side effects. Emerging markets - IT and the world's "bottom billion". IT ecosystem in peril. Time to reboot. Did somebody say virtual colonoscopy? Our sentiments, exactly. Learning more about active learning. An ongoing study in usability. What role for computer science in the war on terror?Computing education matters.
Greg Linden Kenneth L. Kraemer Jason L. Dedrick
Open access publishing in science.Florian Mann Benedikt von Walter Thomas Hess Rolf T. Wigand
Ensuring transparency in computational modeling.Kenneth R. Fleischmann William A. Wallace
Online privacy practices in higher education: making the grade?Mary J. Culnan Thomas J. Carlin
A new map for knowledge dissemination channels. Digital inclusion with the McInternet: would you like fries with that?Alexandre Sacchi Emerson Giannini Regiane Bochic Nicolau Reinhard Alexandre B. Lopes
Future tense - Radical evolution. Puzzled - Solutions and sources. Learning and detecting emergent behavior in networks of cardiac myocytes.Radu Grosu Scott A. Smolka Flavio Corradini Anita Wasilewska Emilia Entcheva Ezio Bartocci
Technical perspective - Where biology meets computing. Error correction up to the information-theoretic limit.Venkatesan Guruswami Atri Rudra
Technical perspective - The beauty of error-correcting codes. Probabilistically checkable proofs. Statecharts in the making: a personal account. Reflecting human values in the digital age.Abigail Sellen Yvonne Rogers Richard H. R. Harper Tom Rodden
Erlang for concurrent programming. Better scripts, better games.Walker M. White Christoph Koch Johannes Gehrke Alan J. Demers
Interview - An interview with C.A.R. Hoare. Viewpoint - Advising students for success. Viewpoint - Your students are your legacy. Legally speaking - When is a "license" really a sale? The profession of IT - Is software engineering engineering?Peter J. Denning Richard D. Riehle
ACM Fellows honored.A difficult, unforgettable idea. The evolution of virtualization. Crowd control. Betting on ideas. Prepare for launch. Children's magic won't deliver the semantic web.
Communications' web site to launch in March. "Yes, it can be done".
Raquel Benbunan-Fich Gregory E. Truman
Why file sharing networks are dangerous?M. Eric Johnson Dan McGuire Nicholas D. Willey
Why IS management is in trouble and how to save it: lessons learned in the automotive industry. Shadow systems: the good, the bad and the ugly. Automatically profiling the author of an anonymous text.Shlomo Argamon Moshe Koppel James W. Pennebaker Jonathan Schler
Oracle, where shall I submit my papers? For sale by owner online: who gets the saved commission?Xiao-Bai Li Luvai F. Motiwalla
Networks of contextualized data: a framework for cyberinfrastructure data management. Puzzled - Will my algorithm terminate? The complexity of computing a Nash equilibrium.Constantinos Daskalakis Paul W. Goldberg Christos H. Papadimitriou
Technical perspective - The complexity of computing Nash equilibrium. Building secure web applications with automatic partitioning.Stephen Chong Jed Liu Andrew C. Myers Xin Qi K. Vikram Lantian Zheng Xin Zheng
Technical perspective - Tools for information to flow securely and Swift-ly. Women in computing - take 2.Maria M. Klawe Telle Whitney Caroline Simard
Compiler research: the next 50 years.Mary W. Hall David A. Padua Keshav Pingali
Toward 2W, beyond web 2.0. Improving performance on the internet. Parallel programming with transactional memory. Point/Counterpoint - Network neutrality nuances.Barbara van Schewick David Farber
Inside risks - U.S. election after-math. Privacy and security - International communications surveillance. Education - Human computing skills: rethinking the K-12 experience.George H. L. Fletcher James J. Lu
Economic and business dimensions - The extent of globalization of software innovation.Ashish Arora Matej Drev Chris Forman
SIGGRAPH debuts in Asia. The first internet president. Making sense of sensors. Photography's bright future. The dot-org difference. Seven principles for secure e-voting.USACM's policy role.
Carol Xiaojuan Ou Robert M. Davison
The relationship between software development team size and software development cost.Parag C. Pendharkar James A. Rodger
Disaster response in health care: A design extension for enterprise data warehouse.Hillol Bala Viswanath Venkatesh Srinivasan Venkatraman Jack Bates Steven H. Brown
Exploring the black box of task-technology fit. Improved security through information security governance. Understanding the adopters and non-adopters of broadband.Yogesh Kumar Dwivedi Zahir Irani
Active citizen participation using ICT tools. Automating commonsense reasoning using the event calculus. Voyagers and voyeurs: Supporting asynchronous collaborative visualization.Jeffrey Heer Fernanda B. Viégas Martin Wattenberg
Seam carving for media retargeting. Technical perspective: Customizing media to displays. Computational challenges in e-commerce.Joan Feigenbaum David C. Parkes David M. Pennock
wisePad services for vision-, hearing-, and speech-impaired users.Dawn N. Jutla Dimitri Kanevsky
Engineering rural development. The long road to 64 bits. Eventually consistent. ACM's annual report. Viewpoint: Scaling the academic publication process to internet scale.Jon Crowcroft Srinivasan Keshav Nick McKeown
Technology strategy and management: The legacy of Bill Gates. The business of software: The ontology of paper. From the front lines: Ground control to Architect Tom…. Law and technology: The end of the generative internet. A pioneer woman. Get smart. The universe in your computer. Calculating the future. Communications preps web-enhanced articles. True seeds of open source software.How are we doing?