DEPARTMENT: Education letter
The student enrollment crisis in computer science has propelled the need to re-examine all aspects of computing education on a global scale.
DEPARTMENT: Letters to the editor
The contributed article "The Topology of Dark Networks" by Jennifer Xu and Hsinchun Chen (Oct. 2008) ignored sensitive cultural issues while addressing a subject that might by itself offend some people in Muslim societies, including …
DEPARTMENT: CACM online
The new Communications Web site went live last month after several weeks of intense beta testing. While we gleaned many valuable insights and lessons in this process, several highlights and user comments do stand out.
Active learning algorithms are producing substantial savings in label complexity over passive learning approaches.
With sentiment analysis algorithms, companies can identify and assess the wide variety of opinions found online and create computational models of human opinion.
Doctors are saving lives with virtual, 3D exams that are less invasive than a conventional optical colonoscopy.
A diverse, international group of more than 200 attendees met at the Rebooting Computing Summit to address the problems confronting computer science.
Experts warn the U.S. may soon relinquish its leadership role in IT research and development.
How can information technology be best applied to address problems and provide opportunities for inhabitants of the world's poorest countries?
Every system change has to have some benefit to users, but every time you add a new responsibility a system is tweaked in some way, which usually has unintended side effects.
How the axiom of survival of the fittest applies in the context of a global economic downturn.
College students must be shown that computer science is social, relevant, important, and caring. The way computer science is taught can hold students' interest by encouraging them to develop solutions to socially relevant problems …
Reassessing the assessment criteria and techniques traditionally used in evaluating computer science research effectiveness.
The ecosystem of purpose-built languages is a key part of systems development.
Web-based malware attacks are more insidious than ever. What can be done to stem the tide?
Dynamic languages offer a taste of object-relational mapping that eases application code.
SECTION: Contributed articles
Comprehensive knowledge bases would tap the Web's deepest information sources and relationships to address questions beyond today's keyword-based search engines.
The Roofline model offers insight on how to improve the performance of multicore microprocessors whose design diversity exacerbates the jobs of programmers, compiler writers, and architects.
SECTION: Review articles
Who could fault an approach that offers greater credibility at reduced cost?
SECTION: Research highlights
Large disk arrays are everywhere. When we shop at an Internet retailer, the product and account data come from a disk array in a data center. Our email, banking, payroll, …
Relative fitness is a new approach to modeling the performance of storage devices. In contrast to a conventional model, which predicts the performance of an application's I/O on a given device, a relative fitness model predicts …
Flash memory nowadays seems to be in every discussion about system architecture. Sure enough, flash memory boasts multiple qualities and advantages over traditional mass storage …
In this paper, we examine the use of Flash storage in the server domain. Wear-out has the potential to limit the use of Flash in this domain. To seriously consider Flash in the server domain, architectural support must exist …
COLUMN: Last byte
Wendy Hall discusses her plans to increase ACM's membership and to create task forces in China, India, and Europe.
SECTION: Virtual extension
Vitual teams are becoming ubiquitous. Therefore, it is important to understand how to make virtual teams effective.
The prevailing business culture in the U.S. undoubtedly encouraged the rapid and radical changes prescribed with Business Process Re-engineering (BPR). However, America's egalitarianism and individualism also created a need for …
The internet is becoming a commodity in organizations with an increase in accessibility by professionals from their own work desks. Vault.com conducted a survey in 1999 with 1,244 respondents, and found that 84% of employees …
What does object language communicate about IT professionals? Can the messages conveyed by object language be used to offset the stereotypical image of a "computer geek?"
Internet use has been growing steadily for the past decade. In a recent report, the Pew Internet & American Life Project survey found that 75% of American adults use the Internet. As more citizens turn to the Internet as a medium …
In June 2005, a unit of lexis-nexis discovered the theft of 310,000 customer records containing sensitive information such as customer names, addresses, and social security numbers. This incident followed closely on ChoicePoint's …
During the past six years the rapid proliferation of mobile devices, particularly cellular phones, has presented an opportunity to develop new interactive classroom systems which have the potential to enhance students' learning …
The number of online auctions that don't result in valid transactions is astonishing, which leads us to call for a better understanding about unsuccessful auctions. Why are there so many of them and what can be done about it?