DEPARTMENT:
Editorial pointers
Editorial Pointers
Diane Crawford
Page 5
DEPARTMENT:
News track
News Track
CACM Staff
Pages 7-8
COLUMN:
The profession of IT
Computing Is a Natural Science
Information processes and computation continue to be found abundantly in the deep structures of many fields. Computing is not---in fact, never was---a science only of the artificial.
Peter J. Denning
Pages 13-18
COLUMN:
Technology strategy and management
The Changing Labyrinth of Software Pricing
Exploring the malleable revenue pathways among the different varieties of pricing strategies.
Michael A. Cusumano
Pages 19-22
COLUMN:
Viewpoint
Public vs. Private Interest on the Internet
Why network owners should not be the sole arbiters of access to networks, including the Internet.
Abbe Mowshowitz, Nanda Kumar
Pages 23-25
SPECIAL ISSUE:
Creating a science of games
Introduction
The same technology that makes interactive 3D games so entertaining in the physical action domain is just as effective in education, training, and other more serious applications.
Michael Zyda
Pages 26-29
Games For Science and Engineering Education
Video games can teach science and engineering better than lectures. Are they a cure for a numbing 200-person class?
Merrilea J. Mayo
Pages 30-35
Games For Training
DARPA simulations teach habits of thought so soldiers respond on the first day of combat as if they had been there a week. More often than not, it's don't shoot, talk instead.
Ralph E. Chatham
Pages 36-43
How to Build Serious Games
Like a discovery game that requires players to earn the right to take on new challenges, Immune Attack compels its players to learn the rules of the immune system before it reveals deeper biological insight.
Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper
Pages 44-49
Carnegie Mellon's Entertainment Technology Center: Combining the Left and Right Brain
This professional master's degree program puts artists and technologists together on interdisciplinary teams to create interactive experiences.
Randy Pausch, Don Marinelli
Pages 50-57
Using Storytelling to Motivate Programming
Using the Storytelling Alice programming environment to create computer-animated movies inspires middle school girls' interest in learning to program computers.
Caitlin Kelleher, Randy Pausch
Pages 58-64
Real-Time Sound Synthesis and Propagation For Games
Simulating the complete process of sound synthesis and propagation by exploiting aural perception makes the experience of playing games much more realistic and immersive.
Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin
Pages 66-73
Evaluating the Efficacy of a Terrorism Question/Answer System
The TARA Project examined how a trio of modified chatterbots could be used to disseminate terrorism-related information to the general public.
Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen
Pages 74-80
An Architecture For a Next-Generation Holistic E-Recruiting System
Online recruiting has revolutionized the way businesses worldwide hire employees. The next step is to seamlessly integrate existing systems to create a comprehensive---and complex---corporate career center.
In Lee
Pages 81-85
Collaborative Structuring: Organizing Document Repositories Effectively and Efficiently
Improving how documents are managed and data is storedand exchanged in systems.
Harris Wu, Michael Gordon
Pages 86-91
Examining RFID Applications in Supply Chain Management
Technology infrastructure, business process, and managerial issues must be addressed by IT practitioners as they adapt to the business changes associated with the diffusion of RFID technology in the supply chain.
Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon
Pages 92-101
A Knowledge Architecture For IT Security
The major benefits of knowledge management, particularly as it pertains to security measures, makes it critical that organizations have a mechanism for defining and identifying knowledge needs.
Someswar Kesh, Pauline Ratnasingam
Pages 103-108
A Roadmap For Comprehensive Online Privacy Policy Management
A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized.
Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu
Pages 109-116
The Effects of Web-Based Technologies on Knowledge Transfer
Does using enhanced Web-based services increase problem-solving skills?
Waymond Rodgers, Solomon Negash
Pages 117-122
COLUMN:
Technical opinion
Conferences Under Scrutiny
Considering some of the perceived vagaries of the conference peer-review process and proposing ways to improve evaluation procedures.
Sabah Al-Fedaghi
Pages 123-126
DEPARTMENT:
Hot Links
Top 10 Downloads from ACM's Digital Library
Page 135
COLUMN:
Inside risks
Disasters Evermore?
Charles Perrow
Page 136