Openism, IPism, Fundamentalism, and Pragmatism
Ownership of intellectual property is fast becoming a battleground in the 21st century, with today's economy being increasingly driven by large corporations dependent on these intangible assets.
Moshe Y. Vardi
Page 5
ACM and the Professional Programmer
ACM has not grown in a way commensurate with the evident growth of programmers in the profession. The question is whether and how ACM can adapt its activities and offerings to increase the participation of these professionals …
Vinton G. Cerf
Page 7
DEPARTMENT:
BLOG@CACM
Why the U.S. Is Not Ready For Mandatory CS Education
Mark Guzdial considers the consequences of requiring all schoolchildren to study computer science.
Mark Guzdial
Pages 8-9
COLUMN:
News
Researchers Probe Security Through Obscurity
Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
Chris Edwards
Pages 11-13
Surgical Robots Deliver Care More Precisely
Computer-controlled robotic surgical systems and tumor-targeting radiation systems provide a greater level of precision in treatment than doctors alone can provide.
Keith Kirkpatrick
Pages 14-16
Hello, My Name Is . . .
Facial recognition and privacy concerns.
Erica Klarreich
Pages 17-19
COLUMN:
Privacy and security
Can You Engineer Privacy?
The challenges and potential approaches to applying privacy research in engineering practice.
Seda GÜrses
Pages 20-23
COLUMN:
Education
Fostering Computational Literacy in Science Classrooms
An agent-based approach to integrating computing in secondary-school science courses.
Uri Wilensky, Corey E. Brady, Michael S. Horn
Pages 24-28
COLUMN:
Global computing
Private Then Shared?
Designing for the mobile phone to shared PC pipeline.
Chris Coward
Pages 29-30
COLUMN:
Kode Vicious
Forked Over
Shortchanged by open source.
George V. Neville-Neil
Pages 31-32
COLUMN:
Viewpoint
Researching the Robot Revolution
Considering a program for cross-disciplinary research between computer scientists and economists studying the effects of computers on work.
Frank Levy, Richard J. Murnane
Pages 33-35
Slow Search
Seeking to enrich the search experience by allowing for extra time and alternate resources.
Jaime Teevan, Kevyn Collins-Thompson, Ryen W. White, Susan Dumais
Pages 36-38
SECTION:
Practice
Bringing Arbitrary Compute to Authoritative Data
Many disparate use cases can be satisfied with a single storage system.
Mark Cavage, David Pacheco
Pages 40-48
Quality Software Costs Money - Heartbleed Was Free
How to generate funding for free and open source software.
Poul-Henning Kamp
Pages 49-51
Undergraduate Software Engineering
Addressing the needs of professional software development.
Michael J. Lutz, J. Fernando Naveda, James R. Vallino
Pages 52-58
SECTION:
Contributed articles
Reshaping Terrorist Networks
To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally reduce lethality.
Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes
Pages 60-69
Example-Based Learning in Computer-Aided STEM Education
Example-based reasoning techniques developed for programming languages also help automate repetitive tasks in education.
Sumit Gulwani
Pages 70-80
SECTION:
Review articles
Efficient Maximum Flow Algorithms
Though maximum flow algorithms have a long history, revolutionary progress is still being made.
Andrew V. Goldberg, Robert E. Tarjan
Pages 82-89
SECTION:
Research highlights
Technical Perspective: Getting Consensus For Data Replication
The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most recent writes.
Philip A. Bernstein
Page 92
Quantifying Eventual Consistency with PBS
Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate that eventually consistent systems regularly return consistent …
Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica
Pages 93-102
COLUMN:
Last byte
Puzzled: Paths and Matchings
Consider two simple games played by Alice and Bob on a checkerboard or, more generally, on a graph. The games look different, but, as we know, looks can be deceiving . . .
Peter Winkler
Page 104