Technology Has Social Consequences
A conference paper submission constitutes privileged communication. In theory, reviewers should immediately "forget" what they have read. How could a program committee member …
Moshe Y. Vardi
Page 5
DEPARTMENT:
Letters to the editor
Preserve Privacy in Statistical Correlations
Many thanks for Cynthia Dwork's article "A Firm Foundation for Private Data Analysis" (Jan. 2011), explaining why, in trying to formalize what is perfect privacy, we cannot …
CACM Staff
Pages 6-7
In the Virtual Extension
To ensure the timely publication of articles, Communications created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format.
CACM Staff
Page 9
DEPARTMENT:
[email protected]
Stonebraker on Data Warehouses
Data warehouses are not only increasing in size and complexity, but also in their importance to business. Michael Stonebraker shares 10 key ideas on the topic.
Michael Stonebraker
Pages 10-11
DEPARTMENT:
CACM online
Let ACM Help You Find Your Next Job 'Online'
For the most coveted jobs and for organizations looking to hire experienced and talented workers, few online resources are more valuable than ACM's own Career and Job Center (http://jobs.acm.org), the engine driving the Careers …
Scott E. Delman
Page 12
COLUMN:
News
Sorting Through Photos
Teaching computers to understand pictures could lead to search engines capable of identifying and organizing large datasets of visual information.
Neil Savage
Pages 13-15
I, Domestic Robot
With recent advances in laser rangefinders, faster algorithms, and open source robotic operating systems, researchers are increasing domestic robots' semantic and situational awareness.
Gregory Goth
Pages 16-17
Data Optimization in Developing Nations
Artificial intelligence and machine learning could expand access to health care, improve the quality of education, and respond effectively to natural disasters in the developing world.
Leah Hoffmann
Pages 18-20
Deus Ex Machina
Computational metaphysics is helping philosophers answer age-old questions, such as whether God exists.
Marina Krakovsky
Page 22
Web Science Meets Network Science
A pair of divergent scientific communities discusses their similarities and differences, and search for common ground.
Alex Wright
Page 23
COLUMN:
Economic and business dimensions
Online Advertising, Behavioral Targeting, and Privacy
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.
Avi Goldfarb, Catherine E. Tucker
Pages 25-27
COLUMN:
Education
Reaching Learners Beyond Our Hallowed Halls
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.
Brian Dorn
Pages 28-30
COLUMN:
Law and technology
Bell Labs and Centralized Innovation
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was an engineer at Bell Labs, and his invention was, …
Tim Wu
Pages 31-33
COLUMN:
Interview
An Interview with Steve Furber
Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.
Jason Fitzpatrick
Pages 34-39
COLUMN:
Viewpoint
The Importance of Reviewing the Code
Highlighting the significance of the often overlooked underlying software used to produce research results.
Juan A. Añel
Pages 40-41
SECTION:
Practice
The One-Second War
Finding a lasting solution to the leap seconds problem has become increasingly urgent.
Poul-Henning Kamp
Pages 44-48
Mobile Application Development: Web vs. Native
Web apps are cheaper to develop and deploy than native apps, but can they match the native user experience?
Andre Charland, Brian Leroux
Pages 49-53
Weapons of Mass Assignment
A Ruby on Rails app highlights some serious, yet easily avoided, security vulnerabilities.
Patrick McKenzie
Pages 54-59
SECTION:
Contributed articles
Brain-Computer Interfaces For Communication and Control
The brain's electrical signals enable people without muscle control to physically interact with the world.
Dennis J. McFarland, Jonathan R. Wolpaw
Pages 60-66
The Future of Microprocessors
Energy efficiency is the new fundamental limiter of processor performance, way beyond numbers of processors.
Shekhar Borkar, Andrew A. Chien
Pages 67-77
Privacy-Preserving Network Forensics
Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.
Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker
Pages 78-87
SECTION:
Contributed articles: Virtual extension
Challenges and Business Models For Mobile Location-Based Services and Advertising
Mobile advertising will become more pervasive and profitable, but not before addressing key technical and business challenges.
Subhankar Dhar, Upkar Varshney
Pages 121-128
Is Open Source Security a Myth?
We became accustomed to acquiring software by procuring licenses for a proprietary, immaterial object. However, in recent years, this habit has begun to be …
Guido Schryen
Pages 130-140
Invisible Work in Standard Bibliometric Evaluation of Computer Science
Most of a computer scientist's production can go uncounted if a standard bibliographic service is used.
Jacques Wainer, Siome Goldenstein, Cleo Billa
Pages 141-146
SECTION:
Review articles
Proving Program Termination
In contrast to popular belief, proving termination is not always impossible.
Byron Cook, Andreas Podelski, Andrey Rybalchenko
Pages 88-98
SECTION:
Research highlights
Technical Perspective: Complex Financial Products: Caveat Emptor
CDOs are examples of financial derivatives, with a value that depends on the underlying assets with which they are linked. These kinds of complex financial products are the cause célèbre of the financial crisis, and many have …
David C. Parkes
Page 100
Computational Complexity and Information Asymmetry in Financial Products
Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives have attracted criticism, but others say …
Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge
Pages 101-107
Technical Perspective: Images Everywhere Looking For Models
About 5,000 images per minute are uploaded to the photo-sharing site http://www.flickr.com/; over 7,000,000 a day. Such images often look …
Guillermo Sapiro
Page 108
Self-Similarity-Based Image Denoising
The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication of the recently proposed methods, most algorithms have not yet …
Antoni Buades, Bartomeu Coll, Jean-Michel Morel
Pages 109-117
COLUMN:
Last byte
Puzzled: Games, Roles, Turns
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is (as yet) unsolved. In each, the issue is how your intuition matches up with the mathematics.
Peter Winkler
Page 120