


Остановите войну!
for scientists:


default search action
Communications of the ACM (CACM), Volume 53, 2010
Volume 53, Number 1, January 2010 (EE)
- Moshe Y. Vardi:
More debate, please! 5
- Software still as much an art as science. 7
- In the Virtual Extension. 8
- Wendy Hall:
ACM's annual report. 9-13
- Greg Linden, Ruben Ortega, Jason I. Hong:
Software engineering, smartphones and health systems, and security warnings. 16-17
- David Roman:
The corollary of empowerment. 18
- Tom Geller:
Rebuilding for eternity. 19-21 - Leah Hoffmann:
Amir Pnueli: ahead of his time. 22-23 - Gary Anthes:
Automated translation of Indian languages. 24-26 - Neil Savage:
New search challenges and opportunities. 27-28 - Kirk L. Kroeker:
Future Internet design summit. 29 - Karen A. Frenkel:
Robert Lovett Ashenhurst: 1929--2009. 30 - Samuel Greengard:
ACM and India. 31
- Michael A. Cusumano:
Technology strategy and management - The evolution of platform thinking. 32-34 - Phillip G. Armour:
The business of software - In praise of bad programmers. 35-36 - Arti Rai:
Law and technology - Unstandard standardization: the case of biology. 37-39 - Bjarne Stroustrup:
Viewpoint - What should we teach new software developers? Why? 40-42 - William Aspray, Len Shustek, Norbert Ryska:
Computer museum series - Great computing museums of the world, part one. 43-46
- Julian Hyde:
Data in flight. 48-52 - Stephen Petschulat:
Other people's data. 53-57 - Adam Leventhal:
Triple-parity RAID and beyond. 58-63
- Michael Stonebraker, Daniel J. Abadi, David J. DeWitt, Samuel Madden, Erik Paulson, Andrew Pavlo, Alexander Rasin:
MapReduce and parallel DBMSs: friends or foes? 64-71 - Jeffrey Dean, Sanjay Ghemawat:
MapReduce: a flexible data processing tool. 72-77
- Raz Lin, Sarit Kraus:
Can automated agents proficiently negotiate with humans? 78-88
- Dan S. Wallach:
Technical perspective - Native Client: a clever alternative. 90 - Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:
Native Client: a sandbox for portable, untrusted x86 native code. 91-99 - Alon Y. Halevy:
Technical perspective - Schema mappings: rules for mixing data. 100 - Balder ten Cate, Phokion G. Kolaitis:
Structural characterizations of schema-mapping languages. 101-110
- Leah Hoffmann:
Q&A - HP's running man. 120-
- Dongback Seo, King-Tim Mak:
Using the thread-fabric perspective to analyze industry dynamics. 121-125 - Randal C. Burns
, Zachary N. J. Peterson:
Security constructs for regulatory-compliant storage. 126-130 - Wonchang Hur, Dongsoo Kim:
The future of digital imaging. 131-135 - Seongwoon Kim, Inseong Lee, Kiho Lee, Seungki Jung, Joonah Park, Yeun-Bae Kim, Sang Ryong Kim, Jinwoo Kim:
Mobile Web 2.0 with multi-display buttons. 136-141 - Paul D. Witman, Terry Ryan:
Think big for reuse. 142-147 - Vijay Khatri, Carol V. Brown:
Designing data governance. 148-152 - Vittorio Miori, Dario Russo
, Massimo Aliberti:
Domotic technologies incompatibility becomes user transparent. 153-157 - Zvi Drezner:
Technical opinion - Random selection from a stream of events. 158-159
Volume 53, Number 2, February 2010 (EE)
- Diane Crawford:
An issue of teamwork. 5 - In the Virtual Extension. 9
- Valerie Barr:
Connecting women and technology. 10-11
- David Roman:
Where the data is. 12
- Kirk L. Kroeker:
Alternate interface technologies emerge. 13-15 - Alex Wright:
Type theory comes of age. 16-17 - Sarah Underwood:
Improving disaster management. 18-20 - ACM Fellows honored. 21
- Martina Angela Sasse:
Not seeing the crime for the cameras? 22-25
- Dennis P. Groth, Jeffrey K. MacKie-Mason
:
Why an informatics degree? 26-28
- W. Douglas Maughan:
The need for a national cybersecurity research and development agenda. 29-31 - Michel Beaudouin-Lafon:
Open access to scientific publications. 32-34
- George V. Neville-Neil:
Taking your network's temperature. 35-36
- Dennis E. Shasha:
An interview with Michael Rabin. 37-42 - Eric Saxe:
Power-efficient software. 44-48 - Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev:
Managing contention for shared resources on multicore processors. 49-57 - Steven P. Miller, Michael W. Whalen, Darren D. Cofer:
Software model checking takes off. 58-64 - Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler:
A few billion lines of code later: using static analysis to find bugs in the real world. 66-75 - Eric Benhamou, Jon Eisenberg, Randy H. Katz:
Assessing the changing U.S. IT R&D ecosystem. 76-83 - Dave Bacon, Wim van Dam:
Recent progress in quantum algorithms. 84-93 - Sanjoy Dasgupta:
Strange effects in high dimension. 96 - Nir Ailon, Bernard Chazelle:
Faster dimension reduction. 97-104 - Shekhar Y. Borkar:
Want to be a bug buster? 105 - Sung-Boem Park, Subhasish Mitra:
Post-silicon bug localization for processors using IFRA. 106-113
- Peter Winkler:
Breaking chocolate bars. 120
- Dongmin Kim, Izak Benbasat:
Designs for effective implementation of trust assurances in internet stores. 121-126 - Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons:
Reversing the landslide in computer-related degree programs. 127-133 - Tim Chenoweth, Robert P. Minch, Sharon W. Tabor:
Wireless insecurity: examining user security behavior on public networks. 134-138 - Farheen Altaf, David Schuff:
Taking a flexible approach to ASPs. 139-143 - John Minor Ross:
Informatics creativity: a role for abductive reasoning? 144-148 - Damien Joseph
, Soon Ang, Roger H. L. Chang, Sandra Slaughter:
Practical intelligence in IT: assessing soft skills of IT professionals. 149-154 - Vijay K. Gurbani, Anita Garvert, James D. Herbsleb
:
Managing a corporate open source software asset. 155-159 - Nikhil Mehta, Anju Mehta:
It takes two to tango: how relational investments improve IT outsourcing partnerships. 160-164
Volume 53, Number 3, March 2010 (EE)
- Moshe Y. Vardi:
Revisiting the publication culture in computing research. 5
- Too much debate? 6-7
- In the Virtual Extension. 8
- Mark Guzdial
, Judy Robertson
:
Too much programming too soon? 10-11
- David Roman:
Granting a second life. 12
- Gregory Goth:
CS and biology's growing pains. 13-15 - Kirk L. Kroeker:
Engineering the web's third decade. 16-18 - Samuel Greengard:
Tracking garbage. 19-20 - Katayanagi prizes and other CS awards. 21
- Tim Chang:
Gaming will save us all. 22-24
- Pamela Samuelson:
Only technological processes are patentable. 25-27
- Rachelle Hollander:
The ethics beat. 28-29
- Peter J. Denning, Fernando Flores, Peter Luzmore:
Orchestrating coordination in pluralistic networks. 30-32
- Richard A. Tapia:
Hiring and developing minority faculty at research universities. 33-35
- Cameron Wilson, Peter Harsha:
Making the case for computing. 36-38
- Kieron O'Hara
, Nigel Shadbolt:
Privacy on the data web. 39-41
- Kirk McKusick, Sean Quinlan:
GFS: evolution on fast-forward. 42-49 - David J. Brown, Charles Reams:
Toward energy-efficient computing. 50-58 - Sia Siew Kien, Christina Soh, Peter Weill:
Global IT management: structuring for scale, responsiveness, and innovation. 59-64
- Thomas Lengauer, André Altmann
, Alexander Thielen, Rolf Kaiser:
Chasing the AIDS virus. 66-74 - Cameron Seay, Gary Tucker:
Virtual computing initiative at a small public university. 75-83
- Vincent Conitzer:
Making decisions based on the preferences of multiple agents. 84-94
- Daniele Micciancio
:
A first glimpse of cryptography's Holy Grail. 96 - Craig Gentry:
Computing arbitrary functions of encrypted data. 97-105 - Pietro Perona:
Seeing the trees, the forest, and much more. 106 - Antonio Torralba, Kevin P. Murphy, William T. Freeman:
Using the forest to see the trees: exploiting context for visual object detection and localization. 107-114
- Peter Winkler
:
Puzzled. 118 - Ari Juels:
Future tense. 120-
- Fabio Arduini, Vincenzo Morabito:
Business continuity and the banking industry. 121-125 - Sherrie Drye Cannoy, Al F. Salam:
A framework for health care information assurance policy and compliance. 126-131 - Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Jiung-Yee Lee:
Is stickiness profitable for electronic retailers? 132-136 - Ramanath Subramanyam, Fei Lee Weisstein, Mayuram S. Krishnan:
User participation in software development projects. 137-141 - S. T. Parkinson, Robert M. Hierons
, Mark Lycett, M. Norman:
Practitioner-based measurement: a collaborative approach. 142-147 - Del Nagy, Areej M. Yassin, Anol Bhattacherjee:
Organizational adoption of open source software: barriers and remedies. 148-151 - John H. Benamati, Zafer D. Ozdemir, H. Jeff Smith:
Aligning undergraduate IS curricula with industry needs. 152-156 - Hing Kai Chan
:
Agent-oriented embedded electronic measuring systems. 157-162
Volume 53, Number 4, April 2010 (EE)
- Calvin C. Gotlieb, James J. Horning:
The work of ACM's awards committee. 5
- Computing paradigm not a branch of science. 6-7
- In the Virtual Extension. 8
- Michael Stonebraker:
SQL databases v. NoSQL databases. 10-11
- David Roman:
Going mobile. 12
- Alex Wright:
Data streaming 2.0. 13-14 - Gary Anthes:
Robots gear up for disaster response. 15-16 - Samuel Greengard:
Spies among us? 17-19
- Richard Heeks
:
Development 2.0: the IT-enabled transformation of international development. 22-24
- Martin Campbell-Kelly:
Be careful what you wish for. 25-26
- Michael A. Cusumano:
Cloud computing and SaaS as new computing platforms. 27-29
- Paul Ohm:
When network neutrality met privacy. 30-32
- George V. Neville-Neil:
The data-structure canon. 33-34
- Andy Woods:
Cooling the data center. 36-42 - Mache Creeger:
CTO roundtable: malware defense. 43-49 - Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph
, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia:
A view of cloud computing. 50-58
- Parthasarathy Ranganathan:
Recipe for efficiency: principles of power-aware computing. 60-67 - Sergey Yekhanin:
Private information retrieval. 68-73
- Sergio Antoy, Michael Hanus
:
Functional logic programming. 74-85
- Padhraic Smyth
, Charles Elkan:
Technical perspective - Creativity helps influence prediction precision. 88 - Yehuda Koren:
Collaborative filtering with temporal dynamics. 89-97 - Leslie Pack Kaelbling:
Technical perspective - New bar set for intelligent vehicles. 98 - Sebastian Thrun:
Toward robotic cars. 99-106
- Leah Hoffmann:
Q&A. 112
- Pak-Lok Poon
, Sau-Fun Tang, T. H. Tse
, Tsong Yueh Chen
:
CHOC'LATE: a framework for specification-based testing. 113-118 - Robert J. Aalberts, Percy Poon, Paul D. Thistle:
A tale of two internet service providers. 119-123 - Keith Wright:
Capstone programming courses considered harmful. 124-127