DEPARTMENT: Tapia conference letter
Created as a supportive networking environment for underrepresented groups in computing and information technology, the Richard Tapia Celebration of Diversity in …
David A. Patterson
DEPARTMENT: Letters to the editor
As an editor of The Fourth Paradigm
and someone who subscribes to Jim Gray's vision that there are now four fundamental scientific methodologies, I feel I must respond to Moshe Y. Vardi's Editor's Letter "Science Has Only Two …
The following synopses are from Virtual Extension articles that are now available in their entirety to ACM members via the Digital Library.
Greg Linden discusses security advice and the cost of user effort, Jason Hong considers the increase in malvertisements, and Mark Guzdial writes about gender and CS education in Qatar.
Greg Linden, Jason Hong, Mark Guzdial
DEPARTMENT: CACM online
Much has been written over the last decade about the abysmal state of the education arms race in the U.S., particularly in the STEM disciplines. Two recent reports show how …
Eye-tracking control for mobile phones might lead to a new era of context-aware user interfaces.
With topic modeling, scientists can explore and understand huge collections of unlabeled information.
The second Computer Science Education Week is showing students, parents, and educators why computer science is important.
With the introduction of the sophisticated Stuxnet worm, the stakes of cyberwarfare have increased immeasurably.
Do consumers have enough control over their personal information or is more government regulation needed?
COLUMN: Emerging markets
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.
Seymour Goodman, Andrew Harris
COLUMN: Historical reflections
Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is the ACS-1 supercomputer designed more than 40 years ago.
Mark Smotherman, Dag Spicer
COLUMN: Broadening participation
In order to thrive and even survive in the worldwide marketplace of ideas and innovation, the U.S. must aggressively meet the challenge of increasing the number of students …
Ann Quiroz Gates
COLUMN: The profession of IT
Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.
Peter J. Denning, Robert E. Kahn
COLUMN: Kode Vicious
While it is true that "programmers aren't English majors," there are many days that I wish they were, or that they knew one and offered to help with …
George V. Neville-Neil
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.
SECTION: Virtual extension
A bibliometric view of the publishing frequency and impact of conference proceedings compared to archival journal publication.
Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.
These days, cybercriminals are looking to steal more than just banking information.
SECTION: Contributed articles
Only if the programmer can prove (through formal machine-checkable proofs) it is free of bugs with respect to a claim of dependability.
What do wikis, blogs, podcasts, social networks, virtual worlds, and the rest do for corporate productivity and management?
Stephen J. Andriole
SECTION: Virtual extension
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline.
Barry Lunt, J. Ekstrom, Han Reichgelt, Michael Bailey, Richard Leblanc
A firsthand account of an international team effort to install the Sahana disaster-management system in Chengdu, Sichuan after an earthquake.
Ralph Morelli, Chamindra de Silva, Trishan de Lanerolle, Rebecca Curzon, Xin Sheng Mao
SECTION: Review articles
What are Bayesian networks and why are their applications growing across all fields?
SECTION: Research highlights
You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict it. Sounds familiar? This is the …
Michael Elad, Raja Giryes
Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible signal from the reduced representation acquired by the sampling …
Deanna Needell, Joel A. Tropp
It is now clear that for a wide range of problems, quantum computers offer little or no advantage over their classical counterparts.
The collection of computational problems having quantum interactive proof systems consists precisely of those problems solvable with an ordinary classical computer using at most a polynomial amount of memory (or QIP = PSPACE …
Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous
COLUMN: Last byte
It's amazing how little we know about the simple, ordinary, axis-aligned rectangle. Last month (p. 112) we posted a trio of brainteasers, including one as yet unsolved, concerning rectangles galore. Here, we offer solutions to …
Build a digital library of pioneering virtual worlds as a living laboratory of history and social science.