Volume 52, Number 12, December 2009 (EE)
Technical opinion - Are employees putting your company at risk by not following information security policies?

Mikko T. Siponen M. Adam Mahmood Seppo Pahnila

Positive externality, increasing returns, and the rise in cybercrimes.

Nir Kshetri

Visual passwords: cure-all or snake-oil?

Karen Renaud Antonella De Angeli

Why did your project fail?

Narciso Cerpa June M. Verner

Assessing open source software as a scholarly contribution.

Lou Hafer Arthur E. Kirkpatrick

Security in dynamic web content management systems applications.

Ganesh Vaidyanathan Steven Mautone

Online privacy, government surveillance and national ID cards.

Sun Sun Lim Hichang Cho Milagros Rivera Sánchez

Power and trust in global virtual teams.

Niki Panteli Robert J. Tucker

Future tense - Mightier than the pen.

Joe Haldeman

Puzzled - Solutions and sources.

Peter Winkler

ThinSight: a thin form-factor interactive surface technology.

Shahram Izadi Steve Hodges Alex Butler Darren West Alban Rrustemi Mike Molloy William Buxton

Technical perspective - A graphical sense of touch.

Pat Hanrahan

Designing plush toys with a computer.

Yuki Igarashi Takeo Igarashi

Technical perspective - Design tools for the rest of us.

James A. Landay

Computer games and traditional CS courses.

Kelvin Sung

Computer science in the conceptual age.

Michael Zyda

The Bulk Multicore architecture for improved programmability.

Josep Torrellas Luis Ceze James Tuck Calin Cascaval Pablo Montesinos Wonsun Ahn Milos Prvulovic

Maximizing power efficiency with asymmetric multicore systems.

Alexandra Fedorova Juan Carlos Saez Daniel Shelepov Manuel Prieto

What DNS is not.

Paul Vixie

A threat analysis of RFID passports.

Alan Ramos Weina Scott William Scott Doug Lloyd Katherine O&aposLeary Jim Waldo

Viewpoint - A "smart" cyberinfrastructure for research.

Savas Parastatidis Evelyne Viegas Tony Hey

Kode Vicious - Broken builds.

George V. Neville-Neil

The profession of IT - Computing's paradigm.

Peter J. Denning Peter A. Freeman

Emerging markets - Israel's technology industry as an economic growth engine.

Orna Berry Yigal Grayeff

Broadening participation - Opening remarks.

Richard E. Ladner

Problem solvers.

Leah Hoffmann

Making automation work.

Samuel Greengard

Ready for a Web OS?

Alex Wright

Blueprints for self-assembly.

Gary Anthes

Crowdsourcing and the question of expertise.

David Roman

In the virtual extension.

CS woes: deadline-driven research, academic inequality.

Jeannette M. Wing Mark Guzdial

In CS education, educate the educators first.

It is a pivotal time for K--12 computer science.

Chris Stephenson


Volume 52, Number 11, November 2009 (EE)
Technical opinion - Steering self-learning distance algorithms.

Frank Nielsen

If your pearls of wisdom fall in a forest...

Ralph Westfall

Why web sites are lost (and how they're sometimes found).

Frank McCown Catherine C. Marshall Michael L. Nelson

And what can context do for data?

Cristiana Bolchini Carlo Curino Giorgio Orsi Elisa Quintarelli Rosalba Rossato Fabio Alberto Schreiber Letizia Tanca

Offshoring and the new world order.

Rudy Hirschheim

Computing journals and their emerging roles in knowledge exchange.

Aakash Taneja Anil Singh M. K. Raja

iCare home portal: an extended model of quality aging e-services.

Wei-Lun Chang Soe-Tsyr Yuan Eldon Y. Li

Quantifying the benefits of investing in information security.

Lara Khansa Divakaran Liginlal

Puzzled - Covering the plane.

Peter Winkler

Predicting structured objects with support vector machines.

Thorsten Joachims Thomas Hofmann Yisong Yue Chun-Nam John Yu

Technical perspective - Machine learning for complex predictions.

John Shawe-Taylor

Declarative networking.

Boon Thau Loo Tyson Condie Minos N. Garofalakis David E. Gay Joseph M. Hellerstein Petros Maniatis Raghu Ramakrishnan Timothy Roscoe Ion Stoica

Technical perspective - Narrowing the semantic gap in distributed programming.

Peter Druschel

Model checking: algorithmic verification and debugging.

Edmund M. Clarke E. Allen Emerson Joseph Sifakis

Why IT managers don't go for cyber-insurance products.

Tridib Bandyopadhyay Vijay S. Mookerjee Ram C. Rao

Scratch: programming for all.

Mitchel Resnick John Maloney Andrés Monroy-Hernández Natalie Rusk Evelyn Eastmond Karen Brennan Amon Millner Eric Rosenbaum Jay S. Silver Brian Silverman Yasmin B. Kafai

You don't know jack about software maintenance.

Paul D. Stachour David Collier-Brown

Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection.

Katie Shilton

Communications surveillance: privacy and security at risk.

Whitfield Diffie Susan Landau

Interview - An interview with Ping Fu.

Bob Cramblitt

Viewpoint - On public service and computer science.

Jonathan M. Smith

Economic and business dimensions - The broadband price is not right.

Shane Greenstein

Legally speaking - Are business methods patentable?

Pamela Samuelson

Privacy and security - Usable security: how to get it.

Butler W. Lampson

Exploring new frontiers.

Gregory Goth

Implementing electronic medical records.

Leah Hoffmann

Electronic paper's next chapter.

Kirk L. Kroeker

Deep data dives discover natural laws.

Gary Anthes

Internet addiction: it's spreading, but is it real?

David Roman

Computer science curriculum, deceptive advertising.

Ramana Rao Greg Linden

In the virtual extension.

Pay for editorial independence.

Is the image crisis over?

Moshe Y. Vardi


Volume 52, Number 10, October 2009 (EE)
Overcoming the J-shaped distribution of product reviews.

Nan Hu Jie Zhang Paul A. Pavlou

How effective is Google's translation service in search?

Jacques Savoy Ljiljana Dolamic

Human interaction for high-quality machine translation.

Francisco Casacuberta Jorge Civera Elsa Cubel Antonio L. Lagarda Guy Lapalme Elliott Macklovitch Enrique Vidal

De-escalating IT projects: the DMM model.

Donal J. Flynn Gary S. C. Pan Mark Keil Magnus Mähring

Making ubiquitous computing available.

Vivienne Waller Robert B. Johnston

Attaining superior complaint resolution.

Sridhar R. Papagari Sangareddy Sanjeev Jha Chen Ye Kevin C. Desouza

Balancing four factors in system development projects.

Girish H. Subramanian Gary Klein James J. Jiang Chien-Lung Chan

Technical opinion - Do SAP successes outperform themselves and their competitors?

Richard J. Goeke Robert H. Faley

Q&A - The networker.

Leah Hoffmann

Finding the frequent items in streams of data.

Graham Cormode Marios Hadjieleftheriou

Technical perspective - Data stream processing: when you only get one look.

Johannes Gehrke

Distinct-value synopses for multiset operations.

Kevin S. Beyer Rainer Gemulla Peter J. Haas Berthold Reinwald Yannis Sismanis

Technical perspective - Relational query optimization: data management meets statistical estimation.

Surajit Chaudhuri

Smoothed analysis: an attempt to explain the behavior of algorithms in practice.

Daniel A. Spielman Shang-Hua Teng

Automated support for managing feature requests in open forums.

Jane Cleland-Huang Horatiu Dumitru Chuan Duan Carlos Castro-Herrera

A view of the parallel computing landscape.

Krste Asanovic Rastislav Bodík James Demmel Tony Keaveny Kurt Keutzer John Kubiatowicz Nelson Morgan David A. Patterson Koushik Sen John Wawrzynek David Wessel Katherine A. Yelick

A conversation with David E. Shaw.

Unifying biological image formats with HDF5.

Matthew T. Dougherty Michael J. Folk Erez Zadok Herbert J. Bernstein Frances C. Bernstein Kevin W. Eliceiri Werner Benger Christoph Best

Probing biomolecular machines with graphics processors.

James C. Phillips John E. Stone

Viewpoint - Retrospective: an axiomatic basis for computer programming.

C. A. R. Hoare

Kode Vicious - Kode reviews 101.

George V. Neville-Neil

Technology strategy and management - Dealing with the venture capital crisis.

Michael A. Cusumano

Inside risks - Reflections on Conficker.

Phillip A. Porras

Historical reflections - Computing in the depression era.

Martin Campbell-Kelly

The business of software - Contagious craziness, spreading sanity.

Phillip G. Armour

Shaping the future.

Tom Geller

Debating net neutrality.

Alan Joch

Managing data.

David Lindley

Following the leaders.

The Netflix prize, computer science outreach, and Japanese mobile phones.

Greg Linden Michael D. Conover Judy Robertson

In the Virtual Extension.

Time and computing.

ACM Europe.

Wendy Hall


Volume 52, Number 9, September 2009 (EE)
Technical opinion - Falling into the net: main street America playing games and making friends online.

James E. Katz Ronald E. Rice

Modified agile practices for outsourced software projects.

Dinesh Batra

Ballot box communication in online communities.

Mu Xia Yun Huang Wenjing Duan Andrew B. Whinston

Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.

Robert Willison Mikko T. Siponen

The state of corporate website accessibility.

Eleanor T. Loiacono Nicholas C. Romano Jr. Scott McCoy

One size does not fit all: legal protection for non-copyrightable data.

Hongwei Zhu Stuart E. Madnick

Constructive function-based modeling in multilevel education.

Alexander A. Pasko Valery Adzhiev

Examining user involvement in continuous software development: (a case of error reporting system).

Achita Muthitacharoen Khawaja Asjad Saeed

Future tense - Confusions of the hive mind.

Jaron Lanier

Puzzled - Solutions and sources.

Peter Winkler

Spamalytics: an empirical analysis of spam marketing conversion.

Chris Kanich Christian Kreibich Kirill Levchenko Brandon Enright Geoffrey M. Voelker Vern Paxson Stefan Savage

Technical perspective - They do click, don't they?

Marc Dacier

Optimistic parallelism requires abstractions.

Milind Kulkarni Keshav Pingali Bruce Walter Ganesh Ramanarayanan Kavita Bala L. Paul Chew

Technical perspective - Abstraction for parallelism.

Katherine A. Yelick

The status of the P versus NP problem.

Lance Fortnow

What intellectual property law should learn from software.

James Boyle

Sound index: charts for the people, by the people.

Varun Bhagwan Tyrone Grandison Daniel Gruhl

Making sense of revision-control systems.

Bryan O&aposSullivan

Monitoring and control of large systems with MonALISA.

Iosif Legrand Ramiro Voicu Catalin Cirstoiu Costin Grigoras Latchezar Betev Alexandru Costan

Reveling in constraints.

Bruce Johnson

Interview - An interview with Maurice Wilkes.

David P. Anderson

Viewpoint - Face the inevitable, embrace parallelism.

Anwar M. Ghuloum

IT policy - The long road to Computer Science education reform.

Cameron Wilson Peter Harsha

Emerging markets - How ICT advances might help developing nations.

Mark Cleverley

The profession of IT - Computing: the fourth great domain of science.

Peter J. Denning Paul S. Rosenbloom

Law and technology - Keeping track of telecommunications surveillance.

Paul M. Schwartz

Computer Science meets environmental science.

Karen A. Frenkel

Facing an age-old problem.

Samuel Greengard

Medical nanobots.

Kirk L. Kroeker

Entering a parallel universe.

Gregory Goth

What you read on your summer vacation.

David Roman

Saying good-bye to DBMSs, designing effective interfaces.

Michael Stonebraker Jason Hong

In the Virtual Extension.

Computer Science does matter.

The financial meltdown and computing.

Moshe Y. Vardi


Volume 52, Number 8, August 2009 (EE)
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks?

Indranil Bose Alvin Chung Man Leung

Attracting Native Americans to computing.

Roli Varma

Ranking billions of web pages using diodes.

Rohit Kaul Yeogirl Yun Seong-Gon Kim

Global software development: where are the benefits?

Eoin Ó Conchúir Pär J. Ågerfalk Helena Holmström Olsson Brian Fitzgerald

Learning to build an IT innovation platform.

Rajiv Kohli Nigel Melville

The critical elements of the patch management process.

Thomas A. Gerace Huseyin Cavusoglu

Distinguishing citation quality for journal impact assessment.

Andrew Lim Hong Ma Qi Wen Zhou Xu Brenda Cheang

What determines IT spending priorities?

Hoon S. Cha David E. Pingry Matt E. Thatcher

Puzzled - Probability and intuition.

Peter Winkler

Statistical analysis of circuit timing using majorization.

Michael Orshansky Wei-Shen Wang

Technical perspective - Where the chips may fall.

Sachin S. Sapatnekar

Does distributed development affect software quality?: an empirical case study of Windows Vista.

Christian Bird Nachiappan Nagappan Premkumar T. Devanbu Harald C. Gall Brendan Murphy

Technical perspective - Maintaining quality in the face of distributed development.

James D. Herbsleb

Boolean satisfiability from theoretical hardness to practical success.

Sharad Malik Lintao Zhang

Revitalizing computing education through free and open source software for humanity.

Ralph Morelli Allen B. Tucker Norman Danner Trishan R. de Lanerolle Heidi J. C. Ellis Özgür Izmirli Danny Krizanc Gary Parker

A blind person's interactions with technology.

Kristen Shinohara Josh D. Tenenberg

CTO roundtable: cloud computing.

Mache Creeger

Browser security: lessons from Google Chrome.

Charles Reis Adam Barth Carlos Pizano

The pathologies of big data.

Adam Jacobs

Viewpoint - Time for computer science to grow up.

Lance Fortnow

Privacy and security - An ethics code for U.S. intelligence officers.

Brian D. Snow Clinton Brooks

Education - Alice 3: concrete to abstract.

Wanda Dann Stephen Cooper

Economic and business dimensions - Entrepreneurship during a slump.

Tim Draper

U.S. unveils cybersecurity plan.

Gregory Goth

Learning through games.

Leah Hoffmann

IT drives policy---and vice versa.

Tom Geller

Face recognition breakthrough.

Kirk L. Kroeker

Just for you.

Don Monroe

The new searchers.

David Roman

An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing.

Jeannette M. Wing Daniel Reed Mark Guzdial

In the virtual extension.

Why invention and innovation diverge.

Responding to the blogosphere.

Scott E. Delman

Communications and the practitioner.

Steve Bourne Bryan Cantrill


Volume 52, Number 6, June 2009 (EE)
Technical opinion - Leveraging first-mover advantages in internet-based consumer services.

Ting-Peng Liang Andrew J. Czaplewski Gary Klein James J. Jiang

A holistic framework for knowledge discovery and management.

Dursun Delen Suliman Al-Hawamdeh

Re-tuning the music industry: can they re-attain business resonance?

Sudip Bhattacharjee Ram D. Gopal James R. Marsden Ramesh Sankaranarayanan

Forensics of computers and handheld devices: identical or fraternal twins?

Nena Lim Anne Khoo

The challenge of epistemic divergence in IS development.

Mark Lycett Christopher Partridge

Deriving mutual benefits from offshore outsourcing.

Amar Gupta

Advancing information technology in health care.

Steven M. Thompson Matthew D. Dean

Hyperlinking the work for self-management of flexible workflows.

Jonghun Park Kwanho Kim

Future tense - Webmind says hello.

Robert J. Sawyer

Puzzled - Solutions and sources.

Peter Winkler

Two hardware-based approaches for deterministic multiprocessor replay.

Derek Hower Pablo Montesinos Luis Ceze Mark D. Hill Josep Torrellas

Technical perspective - Software and hardware support for deterministic replay of parallel programs.

Norman P. Jouppi

Securing frame communication in browsers.

Adam Barth Collin Jackson John C. Mitchell

Technical perspective - Reframing security for the web.

Andrew C. Myers

How computer science serves the developing world.

M. Bernardine Dias Eric A. Brewer

One laptop per child: vision vs. reality.

Kenneth L. Kraemer Jason L. Dedrick Prakul Sharma

The Claremont report on database research.

Rakesh Agrawal Anastasia Ailamaki Philip A. Bernstein Eric A. Brewer Michael J. Carey Surajit Chaudhuri AnHai Doan Daniela Florescu Michael J. Franklin Hector Garcia-Molina Johannes Gehrke Le Gruenwald Laura M. Haas Alon Y. Halevy Joseph M. Hellerstein Yannis E. Ioannidis Henry F. Korth Donald Kossmann Samuel Madden Roger Magoulas Beng Chin Ooi Tim O&aposReilly Raghu Ramakrishnan Sunita Sarawagi Michael Stonebraker Alexander S. Szalay Gerhard Weikum

Whither sockets?

George V. Neville-Neil

Network front-end processors, yet again.

Mike O&aposDell

Hard-disk drives: the good, the bad, and the ugly.

Jon G. Elerath

Kode vicious - Obvious truths.

George V. Neville-Neil

Viewpoint - Why "open source" misses the point of free software.

Richard M. Stallman

The profession of IT - Beyond computational thinking.

Peter J. Denning

Inside risks - Reducing risks of implantable medical devices.

Kevin Fu

Privacy and security - Answering the wrong questions is no answer.

Eugene H. Spafford

Looking backward and forward.

Bob Violino

Autonomous helicopters.

Gregory Goth

Content control.

Leah Hoffmann

Micromedicine to the rescue.

Don Monroe

Making that connection.

David Roman

Speech-activated user interfaces and climbing Mt. Exascale.

Tessa Lau Daniel Reed

Share the threats.

ACM-W celebrates women in computing.

Elaine J. Weyuker


Volume 52, Number 5, May 2009 (EE)
Technical opinion - Semantic ambiguity: Babylon, Rosetta or beyond?

Michael Rebstock

Reflections today prevent failures tomorrow.

Gary W. Brock Denise Johnson McManus Joanne E. Hale

To trust or to distrust, that is the question: investigating the trust-distrust paradox.

Carol Xiaojuan Ou Choon-Ling Sia

Cross-bidding in simultaneous online auctions.

James A. McCart Varol O. Kayhan Anol Bhattacherjee

Toward an information-compatible anti-spam strategy.

Robert K. Plice Nigel Melville Oleg V. Pavlov

An overview of IT service management.

Stuart Diaz Galup Ronald Dattero Jim J. Quan Sue Conger

Designing ubiquitous computing environments to support work life balance.

Karlene Cousins Upkar Varshney

Software developers' views of end-users and project success.

J. Drew Procaccino June M. Verner

Puzzled - Understanding relationships among numbers.

Peter Winkler

Scalable synchronous queues.

William N. Scherer III Doug Lea Michael L. Scott

Technical perspective - Highly concurrent data structures.

Maurice Herlihy

Lest we remember: cold-boot attacks on encryption keys.

J. Alex Halderman Seth D. Schoen Nadia Heninger William Clarkson William Paul Joseph A. Calandrino Ariel J. Feldman Jacob Appelbaum Edward W. Felten

Technical perspective - A chilly sense of security.

Ross J. Anderson

Algorithmic systems biology.

Corrado Priami

Computing needs time.

Edward A. Lee

Spending Moore's dividend.

James R. Larus

Debugging AJAX in production.

Eric Schrock

API design matters.

Michi Henning

Security in the browser.

Thomas Wadlow Vlad Gorelik

Viewpoint - Program committee overload in systems.

Ken Birman Fred B. Schneider

Education - Teaching computing to everyone.

Mark Guzdial

Historical reflections - The rise, fall, and resurrection of software as a service.

Martin Campbell-Kelly

Economic and business dimensions - Increasing gender diversity in the IT work force.

LeAnne Coder Joshua L. Rosenbloom Ronald A. Ash Brandon R. Dupont

Law and technology - The network neutrality debate hits Europe.

Pierre Larouche

Liskov wins Turing award.

Learning goes global.

Samuel Greengard

Matchmaker, matchmaker.

David Essex

Rethinking signal processing.

Kirk L. Kroeker

The print-web partnership turns the page.

David Roman

Recommendation algorithms, online privacy, and more.

Logic of lemmings in compiler innovation.

Conferences vs. journals in computing research.

Moshe Y. Vardi


Volume 52, Number 4, April 2009 (EE)
Technical opinion - Online auctions hidden metrics.

Paulo B. Góes Yanbin Tu Y. Alex Tung

Mobile phones in the classroom: if you can't beat them, join them.

Eusebio Scornavacca Jr. Sid L. Huff Stephen Marshall

Analysis of industry-specific concentration of CPOs in Fortune 500 companies.

Zeinab Karake Shalhoub

The impact of the digital divide on e-government use.

France Bélanger Lemuria D. Carter

Object language and impression management.

Kevin P. Scheibe James C. McElroy Paula C. Morrow

Non-work related computing (NWRC).

Gee-Woo Bock Swee Ling Ho

How culture influences IT-enabled organizational change and information systems.

Maris G. Martinsons Robert M. Davison Valdis Martinsons

Principles for effective virtual teamwork.

Jay F. Nunamaker Jr. Bruce A. Reinig Robert O. Briggs

Q&A - Our dame commander.

Leah Hofmann

Integrating NAND flash devices onto servers.

David Roberts Taeho Kgil Trevor N. Mudge

Technical perspective - Integrating flash devices.

Goetz Graefe

Relative fitness modeling.

Michael P. Mesnier Matthew Wachs Raja R. Sambasivan Alice X. Zheng Gregory R. Ganger

Technical perspective - Disk array models for automating storage management.

Arif Merchant

A direct path to dependable software.

Daniel Jackson

Roofline: an insightful visual performance model for multicore architectures.

Samuel Williams Andrew Waterman David A. Patterson

Database and information-retrieval methods for knowledge discovery.

Gerhard Weikum Gjergji Kasneci Maya Ramanath Fabian M. Suchanek

ORM in dynamic languages.

Chris Richardson

Cybercrime 2.0: when the cloud turns dark.

Niels Provos Moheeb Abu Rajab Panayiotis Mavrommatis

Purpose-built languages.

Mike Shapiro

Viewpoint - Research evaluation for computer science.

Bertrand Meyer Christine Choppy Jørgen Staunstrup Jan van Leeuwen

Viewpoint - Computing as social science.

Michael Buckley

Technology strategy and management - Strategies for difficult (and Darwinian) economic times.

Michael A. Cusumano

Kode vicious - System changes and side effects.

George V. Neville-Neil

Emerging markets - IT and the world's "bottom billion".

Richard Heeks

IT ecosystem in peril.

Alan Joch

Time to reboot.

Bob Violino

Did somebody say virtual colonoscopy?

David Essex

Our sentiments, exactly.

Alex Wright

Learning more about active learning.

Graeme Stemp-Morlock

An ongoing study in usability.

David Roman

What role for computer science in the war on terror?

Computing education matters.

Andrew D. McGettrick


Volume 52, Number 3, March 2009 (EE)
Technical opinion - Security threats of smart phones and Bluetooth.

Alfred Loo

Concept similarity by evaluating information contents and feature vectors: a combined approach.

Anna Formica

Who captures value in a global innovation network?: the case of Apple's iPod.

Greg Linden Kenneth L. Kraemer Jason L. Dedrick

Open access publishing in science.

Florian Mann Benedikt von Walter Thomas Hess Rolf T. Wigand

Ensuring transparency in computational modeling.

Kenneth R. Fleischmann William A. Wallace

Online privacy practices in higher education: making the grade?

Mary J. Culnan Thomas J. Carlin

A new map for knowledge dissemination channels.

Clyde W. Holsapple

Digital inclusion with the McInternet: would you like fries with that?

Alexandre Sacchi Emerson Giannini Regiane Bochic Nicolau Reinhard Alexandre B. Lopes

Future tense - Radical evolution.

Joel Garreau

Puzzled - Solutions and sources.

Peter Winkler

Learning and detecting emergent behavior in networks of cardiac myocytes.

Radu Grosu Scott A. Smolka Flavio Corradini Anita Wasilewska Emilia Entcheva Ezio Bartocci

Technical perspective - Where biology meets computing.

Bud Mishra

Error correction up to the information-theoretic limit.

Venkatesan Guruswami Atri Rudra

Technical perspective - The beauty of error-correcting codes.

Daniel A. Spielman

Probabilistically checkable proofs.

Madhu Sudan

Statecharts in the making: a personal account.

David Harel

Reflecting human values in the digital age.

Abigail Sellen Yvonne Rogers Richard H. R. Harper Tom Rodden

Erlang for concurrent programming.

Jim Larson

Better scripts, better games.

Walker M. White Christoph Koch Johannes Gehrke Alan J. Demers

Interview - An interview with C.A.R. Hoare.

Len Shustek

Viewpoint - Advising students for success.

Jeffrey D. Ullman

Viewpoint - Your students are your legacy.

David A. Patterson

Legally speaking - When is a "license" really a sale?

Pamela Samuelson

The profession of IT - Is software engineering engineering?

Peter J. Denning Richard D. Riehle

ACM Fellows honored.

A difficult, unforgettable idea.

Karen A. Frenkel

The evolution of virtualization.

Kirk L. Kroeker

Crowd control.

Leah Hoffmann

Betting on ideas.

Gregory Goth

Prepare for launch.

David Roman

Children's magic won't deliver the semantic web.

Communications' web site to launch in March.

Scott E. Delman

"Yes, it can be done".

Moshe Y. Vardi


Volume 52, Number 2, February 2009 (EE)
Technical opinion - Multitasking with laptops during meetings.

Raquel Benbunan-Fich Gregory E. Truman

Why file sharing networks are dangerous?

M. Eric Johnson Dan McGuire Nicholas D. Willey

Why IS management is in trouble and how to save it: lessons learned in the automotive industry.

Arik Ragowsky David Gefen

Shadow systems: the good, the bad and the ugly.

Sandy Behrens

Automatically profiling the author of an anonymous text.

Shlomo Argamon Moshe Koppel James W. Pennebaker Jonathan Schler

Oracle, where shall I submit my papers?

Ergin Elmacioglu Dongwon Lee

For sale by owner online: who gets the saved commission?

Xiao-Bai Li Luvai F. Motiwalla

Networks of contextualized data: a framework for cyberinfrastructure data management.

Pamela E. Carter Gina Green

Puzzled - Will my algorithm terminate?

Peter Winkler

The complexity of computing a Nash equilibrium.

Constantinos Daskalakis Paul W. Goldberg Christos H. Papadimitriou

Technical perspective - The complexity of computing Nash equilibrium.

Ehud Kalai

Building secure web applications with automatic partitioning.

Stephen Chong Jed Liu Andrew C. Myers Xin Qi K. Vikram Lantian Zheng Xin Zheng

Technical perspective - Tools for information to flow securely and Swift-ly.

Dan S. Wallach

Women in computing - take 2.

Maria M. Klawe Telle Whitney Caroline Simard

Compiler research: the next 50 years.

Mary W. Hall David A. Padua Keshav Pingali

Toward 2W, beyond web 2.0.

T. V. Raman

Improving performance on the internet.

Tom Leighton

Parallel programming with transactional memory.

Ulrich Drepper

Point/Counterpoint - Network neutrality nuances.

Barbara van Schewick David Farber

Inside risks - U.S. election after-math.

Peter G. Neumann

Privacy and security - International communications surveillance.

Kristina Irion

Education - Human computing skills: rethinking the K-12 experience.

George H. L. Fletcher James J. Lu

Economic and business dimensions - The extent of globalization of software innovation.

Ashish Arora Matej Drev Chris Forman

SIGGRAPH debuts in Asia.

Kirk L. Kroeker

The first internet president.

Samuel Greengard

Making sense of sensors.

Alex Wright

Photography's bright future.

Kirk L. Kroeker

The dot-org difference.

David Roman

Seven principles for secure e-voting.

USACM's policy role.

Eugene H. Spafford


Volume 52, Number 1, January 2009 (EE)
Technical opinion: Why eBay lost to TaoBao in China: the global advantage.

Carol Xiaojuan Ou Robert M. Davison

The relationship between software development team size and software development cost.

Parag C. Pendharkar James A. Rodger

Disaster response in health care: A design extension for enterprise data warehouse.

Hillol Bala Viswanath Venkatesh Srinivasan Venkatraman Jack Bates Steven H. Brown

Exploring the black box of task-technology fit.

Judith Gebauer Mark Ginsburg

Improved security through information security governance.

Allen C. Johnston Ron Hale

Understanding the adopters and non-adopters of broadband.

Yogesh Kumar Dwivedi Zahir Irani

Active citizen participation using ICT tools.

Nanda Kumar Roumen Vragov

Automating commonsense reasoning using the event calculus.

Erik T. Mueller

Voyagers and voyeurs: Supporting asynchronous collaborative visualization.

Jeffrey Heer Fernanda B. Viégas Martin Wattenberg

Seam carving for media retargeting.

Ariel Shamir Shai Avidan

Technical perspective: Customizing media to displays.

Harry Shum

Computational challenges in e-commerce.

Joan Feigenbaum David C. Parkes David M. Pennock

wisePad services for vision-, hearing-, and speech-impaired users.

Dawn N. Jutla Dimitri Kanevsky

Engineering rural development.

Tapan S. Parikh

The long road to 64 bits.

John R. Mashey

Eventually consistent.

Werner Vogels

ACM's annual report.

Stuart I. Feldman

Viewpoint: Scaling the academic publication process to internet scale.

Jon Crowcroft Srinivasan Keshav Nick McKeown

Technology strategy and management: The legacy of Bill Gates.

Michael A. Cusumano

The business of software: The ontology of paper.

Phillip G. Armour

From the front lines: Ground control to Architect Tom….

Alex E. Bell

Law and technology: The end of the generative internet.

Jonathan Zittrain

A pioneer woman.

Michael Ross

Get smart.

Alex Wright

The universe in your computer.

Jeff Kanipe

Calculating the future.

David Lindley

Communications preps web-enhanced articles.

David Roman

True seeds of open source software.

How are we doing?

Moshe Y. Vardi