COLUMN:
The business of software
The Difference Engine
Observations on cognitive diversity and team performance.
Phillip G. Armour
Pages 33-34
COLUMN:
Historical reflections
The IBM PC: From Beige Box to Industry Standard
Looking back at three decades of PC platform evolution.
Thomas Haigh
Pages 35-37
COLUMN:
Interview
An Interview with Stephen A. Cook
Stephen A. Cook, winner of the 1982 A.M. Turing Award, reflects on his career.
Philip L. Frana
Pages 41-46
SECTION:
Practice
Creating Languages in Racket
Sometimes you just have to make a better mousetrap.
Matthew Flatt
Pages 48-56
Bufferbloat: Dark Buffers in the Internet
Networks without effective AQM may again be vulnerable to congestion collapse.
Jim Gettys, Kathleen Nichols
Pages 57-65
I/O Virtualization
Decoupling a logical device from its physical implementation offers many compelling advantages.
Carl Waldspurger, Mendel Rosenblum
Pages 66-73
SECTION:
Contributed articles
The State of Phishing Attacks
Looking past the systems people use, they target the people using the systems.
Jason Hong
Pages 74-81
Flexible Experimentation in Wireless Sensor Networks
Virtual testbeds model them by seamlessly integrating physical, simulated, and emulated sensor nodes and radios in real time.
Geoff Coulson, Barry Porter, Ioannis Chatzigiannakis, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner
Pages 82-90
Long-Term Confidentiality of PKI
How to guarantee files encrypted and transmitted today stay confidential for years to come.
Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu
Pages 91-95
SECTION:
Review articles
(Computer) Vision Without Sight
Computer vision holds the key for the blind or visually impaired to explore the visual world.
Roberto Manduchi, James Coughlan
Pages 96-104
Where Do People Draw Lines?
This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.
Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas Funkhouser, Szymon Rusinkiewicz
Pages 107-115
Networking Named Content
Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. We present Content-Centric Networking which uses content chunks as a primitive …
Van Jacobson, Diana K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, Rebecca Braynard
Pages 117-124
COLUMN:
Last byte
Future Tense: The Near Cloud
Wish I never pulled the plug…
Daniel H. Wilson
Pages 136-ff