Volume 53,
Number 1,
January 2010 (EE)
Amir Pnueli:
Ahead of His Time Editor's letter
Letters to the editor
- Software still as much an art as science.
7
In the Virtual Extension
- In the Virtual Extension.
8
ACM's FY09 annual report
blog@CACM
CACM online
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
- Dan S. Wallach:
Technical perspective - Native Client: a clever alternative.
90
- Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:
Native Client: a sandbox for portable, untrusted x86 native code.
91-99
- Alon Y. Halevy:
Technical perspective - Schema mappings: rules for mixing data.
100
- Balder ten Cate, Phokion G. Kolaitis:
Structural characterizations of schema-mapping languages.
101-110
Last byte
Virtual extension
- Dongback Seo, King-Tim Mak:
Using the thread-fabric perspective to analyze industry dynamics.
121-125
- Randal C. Burns, Zachary N. J. Peterson:
Security constructs for regulatory-compliant storage.
126-130
- Wonchang Hur, Dongsoo Kim:
The future of digital imaging.
131-135
- Seongwoon Kim, Inseong Lee, Kiho Lee, Seungki Jung, Joonah Park, Yeun-Bae Kim, Sang Ryong Kim, Jinwoo Kim:
Mobile Web 2.0 with multi-display buttons.
136-141
- Paul D. Witman, Terry Ryan:
Think big for reuse.
142-147
- Vijay Khatri, Carol V. Brown:
Designing data governance.
148-152
- Vittorio Miori, Dario Russo, Massimo Aliberti:
Domotic technologies incompatibility becomes user transparent.
153-157
- Zvi Drezner:
Technical opinion - Random selection from a stream of events.
158-159
Volume 53,
Number 2,
February 2010 (EE)
BLOG@CACM
CACM online
News
Privacy and security
Education
Inside risks
- W. Douglas Maughan:
The need for a national cybersecurity research and development agenda.
29-31
Kode Vicious
Interview
- Eric Saxe:
Power-efficient software.
44-48
- Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev:
Managing contention for shared resources on multicore processors.
49-57
- Steven P. Miller, Michael W. Whalen, Darren D. Cofer:
Software model checking takes off.
58-64
- Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler:
A few billion lines of code later: using static analysis to find bugs in the real world.
66-75
- Eric Benhamou, Jon Eisenberg, Randy H. Katz:
Assessing the changing U.S. IT R&D ecosystem.
76-83
- Dave Bacon, Wim van Dam:
Recent progress in quantum algorithms.
84-93
- Sanjoy Dasgupta:
Strange effects in high dimension.
96
- Nir Ailon, Bernard Chazelle:
Faster dimension reduction.
97-104
- Shekhar Y. Borkar:
Want to be a bug buster?
105
- Sung-Boem Park, Subhasish Mitra:
Post-silicon bug localization for processors using IFRA.
106-113
Last byte:
Puzzled
Virtual Extension
- Dongmin Kim, Izak Benbasat:
Designs for effective implementation of trust assurances in internet stores.
121-126
- Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons:
Reversing the landslide in computer-related degree programs.
127-133
- Tim Chenoweth, Robert P. Minch, Sharon Tabor:
Wireless insecurity: examining user security behavior on public networks.
134-138
- Farheen Altaf, David Schuff:
Taking a flexible approach to ASPs.
139-143
- John Minor Ross:
Informatics creativity: a role for abductive reasoning?
144-148
- Damien Joseph, Soon Ang, Roger H. L. Chang, Sandra Slaughter:
Practical intelligence in IT: assessing soft skills of IT professionals.
149-154
- Vijay K. Gurbani, Anita Garvert, James D. Herbsleb:
Managing a corporate open source software asset.
155-159
- Nikhil Mehta, Anju Mehta:
It takes two to tango: how relational investments improve IT outsourcing partnerships.
160-164
Volume 53,
Number 3,
March 2010 (EE)
- Moshe Y. Vardi:
Revisiting the publication culture in computing research.
5
Letters to the Editor
- In the Virtual Extension.
8
BLOG@CACM
CACM online
News
Economic and business dimensions
Legally speaking
Computing ethics
The profession of IT
Broadening participation
- Richard Tapia:
Hiring and developing minority faculty at research universities.
33-35
IT policy
Viewpoint
Practice
Contributed articles
Review article
- Vincent Conitzer:
Making decisions based on the preferences of multiple agents.
84-94
Research highlights
Last byte
Virtual extension
- Fabio Arduini, Vincenzo Morabito:
Business continuity and the banking industry.
121-125
- Sherrie Drye Cannoy, A. F. Salam:
A framework for health care information assurance policy and compliance.
126-131
- Lin Lin, Paul Jen-Hwa Hu, Olivia R. Liu Sheng, Johnny Lee:
Is stickiness profitable for electronic retailers?
132-136
- Ramanath Subramanyam, Fei Lee Weisstein, Mayuram S. Krishnan:
User participation in software development projects.
137-141
- S. T. Parkinson, Robert M. Hierons, Mark Lycett, M. Norman:
Practitioner-based measurement: a collaborative approach.
142-147
- Del Nagy, Areej M. Yassin, Anol Bhattacherjee:
Organizational adoption of open source software: barriers and remedies.
148-151
- John H. Benamati, Zafer D. Ozdemir, H. Jeff Smith:
Aligning undergraduate IS curricula with industry needs.
152-156
- Hing Kai Chan:
Agent-oriented embedded electronic measuring systems.
157-162
Copyright © Fri Mar 12 17:24:59 2010
by Michael Ley (ley@uni-trier.de)