DEPARTMENT:
Editor's letter
Let Us - Together - Make CACM Exciting
It's been four months since we launched the "new CACM." By now, I hope it is quite clear to our readers that the revamped flagship publication of ACM has undergone a rather dramatic transformation in both appearance and content …
Moshe Y. Vardi
Page 5
DEPARTMENT:
Publisher's corner
The Softer Side of Communications
Much has already been written about the expanded editorial scope of the new Communications. For most of these changes we have Editor-in-Chief Moshe Y. Vardi and his distinguished Editorial Board to thank.
Scott E. Delman
Page 7
DEPARTMENT:
Letters to the editor
Letters to the Editor: Prep Students For Irreversible Software Trends
Stephen J. Andriole and Eric Roberts debated how to educate the next generation of technology professionals in the Viewpoint Point/Counterpoint "Technology Curriculum for the Early 21st Century" (July 2008). Here, they offer …
CACM Staff
Pages 8-9
DEPARTMENT:
Cacm online
Communications Site to Launch in January
The redesigned Communications Web site, slated to launch in January, will post material from this magazine, as well as from other ACM publications, including Computers in Entertainment (cie.acm.org).
David Roman
Page 10
COLUMN:
News
Green Computing
Are you ready for a personal energy meter?
Patrick Kurp
Pages 11-13
Searching the Deep Web
While the Semantic Web may be a long time coming, Deep Web search strategies offer the promise of a semantic Web.
Alex Wright
Pages 14-15
Clean Elections
With end-to-end auditable voting, a voter can verify whether his or her vote was tallied correctly and whether all of the votes were properly tabulated.
Cyrus Farivar
Pages 16-18
An Inspiring Legacy
Admired and respected by his students and colleagues, Randy Pausch will be remembered as a devoted teacher and innovative researcher.
Leah Hoffmann
Page 19
COLUMN:
Viewpoints
Historical Reflections: Will the Future of Software Be Open Source?
Tracing the course of influential computing developments and considering possible paths to new paradigms.
Martin Campbell-Kelly
Pages 21-23
Computer Experts: Guns-For-Hire or Professionals?
Considering the responsibilities of those who build systems fundamental to significant social functions, institutions, and values.
Deborah G. Johnson
Pages 24-26
From the Front Lines: DOA with SOA
Diagnosing the symptoms of failing to accommodate critical software architecture properties that often result in the demise of projects.
Alex E. Bell
Pages 27-28
Point/Counterpoint: The U.S. Should Ban Paperless Electronic Voting Machines
Debating the public policy issues involved in proposed efforts toward improving voting systems while considering the range of technical and societal challenges.
David L. Dill, Daniel Castro
Pages 29-33
SECTION:
Practice
Code Spelunking Redux
Is it getting any easier to understand other people's code?
George V. Neville-Neil
Pages 36-41
Document Design Matters
How do we apply the concept of resource orientation by designing representations to support interactions?
Erik Wilde, Robert J. Glushko
Pages 43-49
A Closer Look at GPUs
As the line between GPUs and CPUs begins to blur, it's important to understand what makes GPUs tick.
Kayvon Fatahalian, Mike Houston
Pages 50-57
SECTION:
Contributed articles
The Topology of Dark Networks
Knowing the structure of criminal and terrorist networks could provide the technical insight needed to disrupt their activities.
Jennifer Xu, Hsinchun Chen
Pages 58-65
Crossroads For Canadian CS Enrollment
What should be done to reverse falling CS enrollment in the Canadian education system?
Jacob Slonim, Sam Scully, Michael McAllister
Pages 66-70
SECTION:
Review articles
The Many Facets of Natural Computing
Natural computing builds a bridge between computer science and natural sciences.
Lila Kari, Grzegorz Rozenberg
Pages 72-83
SECTION:
Research highlights
Technical Perspective: Computational Photography on Large Collections of Images
This paper wil strike a familiar chord with anyone who has ever taken a picture. The problem is easy to understand— replacing unwanted parts of a photograph.
Marc Levoy
Page 86
Scene Completion Using Millions of Photographs
What can you do with a million images? In this paper, we present a new image completion algorithm powered by a huge database of photographs gathered from the Web.
James Hays, Alexei A. Efros
Pages 87-94
Technical Perspective: New Developments in Graph Partitioning
Arora, Rao, and Vazirani discuss the most important developments in approximation algorithms over the last two decades.
Éva Tardos
Page 95
Geometry, Flows, and Graph-Partitioning Algorithms
"Graph partitioning" refers to a family of computational problems in which the vertices of a graph have to be partitioned into two (or more) large pieces while minimizing the number …
Sanjeev Arora, Satish Rao, Umesh Vazirani
Pages 96-105
COLUMN:
Last byte
Q&A: A Complex Thinker
Daphne Koller discusses probabilistic relational modeling, artificial intelligence, and her new work with biologists.
Leah Hoffmann
Pages 112-ff
SECTION:
Virtual extension
Large Scale Project Team Building: Beyond the Basics
Much has been written in the last few years about the success, or usually, failure of enterprise resource planning (ERP) projects. Many guidelines for success have been given including …
Mary C. Jones
Pages 113-116
Understanding Evolution in Technology Ecosystems
The current environment of information technology can be a complex place for analysts and firms to navigate, especially when making decisions about new product development, technology …
Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta, Robert J. Kauffman
Pages 117-122
Understanding the Influence of Network Positions and Knowledge Processing Styles
In today's turbulent business environment, an organization's ability to sustain its growth and competitive edge depends on how well it manages its stock of knowledge. Recognizing that knowledge is paramount to the success of …
Seokwoo Song, Sridhar Nerur, James T. C. Teng
Pages 123-126
RFID in the Supply Chain: Panacea or Pandora's Box?
Today, it is widely believed that the use of radio frequency identification (RFID) technology will enable substantive supply chain transformations. RFID can help reduce counterfeiting, theft, and the bullwhip effect; it can improve …
Brian L. Dos Santos, Lars S. Smith
Pages 127-131
Switching Between Consumer Technologies
Scholars in marketing and consumer behavior have identified several factors that influence consumer switching in general. However, examining switching behavior between technology …
Chen Ye, Kevin C. Desouza, Sridhar R. Papagari Sangareddy, Sanjeev Jha
Pages 132-136
Governing Diversity in the Digital Ecosystem
The concept of ecosystem is about to be brought into the digital age where, instead of plants and animals, the digital species who roam the landscape include software components …
Mary Darking, Edgar A. Whitley, Paolo Dini
Pages 137-140
Myths and Paradoxes in Japanese IT Offshoring
Nothing captures Japanese offshoring practices better than the old Japanese proverb "Tap the stone bridge before crossing." As global IT offshoring continues to grow at an astounding pace, the seemingly impenetrable Japaneseappear …
Amrit Tiwana, Ashley A. Bush, Hiroshi Tsuji, Kenichi Yoshida, Akito Sakurai
Pages 141-145
Technical Opinion: Which Data Warehouse Architecture Is Best?
Over the past 15 years, companies have spent billions of dollars on data marts and warehouses. Despite this experience, there is an important design decision that still causes heated …
Thilini Ariyachandra, Hugh J. Watson
Pages 146-147