DEPARTMENT: Policy letter
ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.
DEPARTMENT: Letters to the editor
E-voting can be as secure and confidential as paper-based voting, as discussed in "The U.S. Should Ban Paperless Electronic Voting Machines" (Oct. 2008). However, to work properly …
DEPARTMENT: CACM online
One of the first things you'll notice about the new Communications
Web site (cacm.acm.org
) is that it has different content than the monthly magazine. A distinctive …
Researchers working in computational photography are using computer vision, computer graphics, and applied optics to bring a vast array of new capabilities to digital cameras.
Researchers are recognizing the potential of position sensors to help them overcome the limitations of traditional user interfaces.
Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact will never be the same.
ACM's premier computer graphics conference hosts its first-ever graphics event in Asia, with a more global focus.
Will the software development laboratories follow the production mills?
Establishing the fundamentals of computational thinking is essential to improving computer science education.
Governments concerned with national-security threats use the Internet to gather intelligence from communications traffic that transits local facilities. This surveillance is expanding — to the detriment of communications privacy …
Recounting problems still associated with election integrity, transparency, and accountability.
A discussion of divergent paths to unrestricted access of content and applications via the Internet.
While still primarily a research project, transactional memory shows promise for making parallel programming easier.
Given the Internet's bottlenecks, how can we build fast, scalable, content-delivery systems?
SECTION: Contributed articles
2W is a result of the exponentially growing Web building on itself to move from a Web of content to a Web of applications.
Four recommendations address the major challenges to keeping compilers and high-level languages vibrant.
SECTION: Review articles
What strategies can employers and educators use to successfully recruit, retain, and inspire women in computing?
SECTION: Research highlights
Back in the old days of the Web (before 1995), Web browsers were fairly simple devices. The server's Web interface was simple enough that an auditor could at least look at it and reason about its security. Today, it's a different …
Swift is a new, principled approach to building Web applications that are secure by construction.
Swift automatically partitions application code while providing assurance that the resulting placement is secure and efficient. …
Computer science and game theory go back to the same individual, John von Neumann, and both subjects deal with the mathematization of rational decision making. Yet, for many …
Traditionally, computational problems fall into two classes: those that have a polynomial-time algorithm and those that are NP-hard. However, the concept of NP-hardness cannot be applied to the rare problems where "every instance …
COLUMN: Last byte
Welcome to three new challenging mathematical puzzles. Solutions to the first two will be published next month; the third is as yet unsolved. In them all, I concentrate on algorithm termination, outlining some simple procedures …
SECTION: Virtual extension