Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.134",
%%%     date            = "18 October 2023",
%%%     time            = "11:05:26 MDT",
%%%     filename        = "cacm2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     checksum        = "12904 73789 296424 2929563",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography, BibTeX, CACM, Communications of
%%%                        the ACM",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of
%%%                        Communications of the ACM (CODEN CACMA2, ISSN
%%%                        0001-0782 (print), 1557-7317 (electronic)),
%%%                        covering the decade 2010--2019.
%%%
%%%                        The ACM maintains Web pages with journal
%%%                        tables of contents for 1985--date at:
%%%
%%%                            http://www.acm.org/pubs/contents/journals/cacm/
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J79
%%%
%%%                        At version 1.134, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2010 ( 383)    2014 ( 273)    2018 ( 295)
%%%                             2011 ( 349)    2015 ( 277)    2019 ( 286)
%%%                             2012 ( 309)    2016 ( 300)
%%%                             2013 ( 275)    2017 ( 279)
%%%
%%%                             Article:       3026
%%%
%%%                             Total entries: 3026
%%%
%%%                        The size of the original cacm.bib file
%%%                        covering 1958--1996 became too large (about
%%%                        4000 entries) for BibTeX and TeX to handle,
%%%                        so at version 1.44, it was split into
%%%                        cacm1950.bib, cacm1960.bib, cacm1970.bib,
%%%                        cacm1980.bib, and cacm1990.bib, each covering
%%%                        the decade starting with the year embedded in
%%%                        the filename.  Version numbers for these
%%%                        files begin at 2.00.
%%%
%%%                        Volumes from the 1990s average more than 200
%%%                        articles yearly, so a complete bibliography
%%%                        for this journal could contain more than 6000
%%%                        entries from 1958 to 2000.
%%%
%%%                        These bibliographies also include ACM
%%%                        Algorithms 1--492.  For Algorithms 493--686,
%%%                        including Algorithm 568, published in ACM
%%%                        Transactions on Programming Languages and
%%%                        Systems (TOPLAS), see the companion
%%%                        bibliographies, toms.bib and toplas.bib.
%%%
%%%                        All published Remarks and Corrigenda are
%%%                        cross-referenced in both directions, so
%%%                        that citing a paper will automatically
%%%                        generate citations for those Remarks and
%%%                        Corrigenda.  Cross-referenced entries are
%%%                        duplicated in cacm19*.bib and toms.bib, so
%%%                        that each is completely self-contained.
%%%
%%%                        Source code for ACM Algorithms from 380
%%%                        onwards, with some omissions, is available
%%%                        via the Netlib service at
%%%                        http://netlib.ornl.gov/, and
%%%                        ftp://netlib.bell-labs.com/netlib/toms.
%%%
%%%                        There is a World Wide Web search facility
%%%                        for articles published in this journal from
%%%                        1959 to 1979 at
%%%                        http://ciir.cs.umass.edu/cgi-bin/web_query_form/public/cacm2.1.
%%%
%%%                        The journal's Web site data has been
%%%                        automatically converted to BibTeX form,
%%%                        corrected for spelling and page number
%%%                        errors, and merged into this file.  Thus, the
%%%                        journal coverage from 1985 to date should be
%%%                        complete.
%%%
%%%                        The initial draft of entries for 1981--1990
%%%                        was extracted from the ACM Computing Archive
%%%                        CD ROM for the 1980s, with manual corrections
%%%                        and additions.  Additions were then made from
%%%                        all of the bibliographies in the TeX User
%%%                        Group collection, from bibliographies in the
%%%                        author's personal files, from tables of
%%%                        contents information at
%%%                        http://www.acm.org/pubs/cacm/, from
%%%                        Zentralblatt fur Mathematik Mathematics
%%%                        Abstracts at
%%%                        http://www.emis.de/cgi-bin/MATH/, from
%%%                        bibliographies at Internet host
%%%                        netlib.bell-labs.com, and from the computer science
%%%                        bibliography collection on ftp.ira.uka.de in
%%%                        /pub/bibliography to which many people of
%%%                        have contributed.  The snapshot of this
%%%                        collection was taken on 5-May-1994, and it
%%%                        consists of 441 BibTeX files, 2,672,675
%%%                        lines, 205,289 entries, and 6,375
%%%                        <at>String{} abbreviations, occupying 94.8MB
%%%                        of disk space.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order within each journal,
%%%                        using bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
  "\input bibnames.sty " #
  "\input path.sty " #
  "\def \TM {${}^{\sc TM}$} " #
  "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
  "\hyphenation{ }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-CACM                  = "Communications of the ACM"}

%%% ====================================================================
%%% Bibliography entries (cross-references in notes may necessitate
%%% inclusion of a few additional entries published elsewhere):
@Article{Vardi:2010:ELM,
  author =       "Moshe Y. Vardi",
  title =        "{Editor}'s letter: More debate, please!",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629176",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LES,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: Software still as much an art
                 as science",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629178",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEa,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "8--8",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629179",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Communications' {\em Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hall:2010:AAR,
  author =       "Wendy Hall",
  title =        "{ACM}'s annual report",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "9--13",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629180",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Linden:2010:BSE,
  author =       "Greg Linden and Ruben Ortega and Jason Hong",
  title =        "{blog@CACM}: Software engineering, smartphones and
                 health systems, and security warnings",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "16--17",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629181",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish excerpts from
                 selected posts.

                 twitter Follow us on Twitter at
                 http://twitter.com/blogCACM

                 Greg Linden writes about frequent software deployments,
                 Ruben Ortega reports on smartphones and health systems
                 research, and Jason Hong discusses designing effective
                 security warnings.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COCa,
  author =       "David Roman",
  title =        "{CACM} online: The corollary of empowerment",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "18--18",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629182",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2010:NRE,
  author =       "Tom Geller",
  title =        "News: Rebuilding for eternity",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "19--21",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629185",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Researchers use computer vision techniques to preserve
                 culturally significant sites as high-resolution 3D
                 models.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:NAP,
  author =       "Leah Hoffmann",
  title =        "News: {Amir Pnueli}: ahead of his time",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "22--23",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629187",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Remembering a legacy of practical and theoretical
                 innovation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NAT,
  author =       "Gary Anthes",
  title =        "News: Automated translation of {Indian} languages",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "24--26",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629184",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "India faces a daunting task trying to manually
                 translate among 22 official languages, but assistance,
                 in the form of advanced technology enabled by a lot of
                 hard work, is on the way.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2010:NNS,
  author =       "Neil Savage",
  title =        "News: New search challenges and opportunities",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "27--28",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629183",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "If search engines can extract more meaning from text
                 and better understand what people are looking for, the
                 Web's resources could be accessed more effectively.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NFI,
  author =       "Kirk L. Kroeker",
  title =        "News: Future {Internet} design summit",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "29--29",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629186",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The National Science Foundation's meeting on Internet
                 architectures focused on designs related to emerging
                 social and economic realities.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Frenkel:2010:NRL,
  author =       "Karen A. Frenkel",
  title =        "News: {Robert Lovett Ashenhurst: 1929--2009}",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "30--30",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629188",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NAI,
  author =       "Samuel Greengard",
  title =        "News: {ACM} and {India}",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "31--31",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2010:VTS,
  author =       "Michael Cusumano",
  title =        "Viewpoints: Technology strategy and management: The
                 evolution of platform thinking",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "32--34",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629189",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "How platform adoption can be an important determinant
                 of product and technological success.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2010:VBS,
  author =       "Phillip G. Armour",
  title =        "Viewpoints: The business of software: In praise of bad
                 programmers",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "35--36",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629190",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A tale illustrating the difference between individual
                 and team skills.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rai:2010:VLT,
  author =       "Arti Rai",
  title =        "Viewpoints: Law and technology: Unstandard
                 standardization: the case of biology",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "37--39",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629191",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "How applicable are the approaches adopted by
                 information and communication technology
                 standards-setting organizations to biological
                 standards?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stroustrup:2010:VWS,
  author =       "Bjarne Stroustrup",
  title =        "Viewpoint: What should we teach new software
                 developers? Why?",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "40--42",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629192",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Fundamental changes to computer science education are
                 required to better address the needs of industry.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Aspray:2010:VCM,
  author =       "William Aspray and Len Shustek and Norbert Ryska",
  title =        "Viewpoints: Computer museum series: Great computing
                 museums of the world, part one",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "43--46",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629193",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The first of a two-part series highlighting several of
                 the world's museums dedicated to preserving,
                 exhibiting, and elucidating computing history.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hyde:2010:DF,
  author =       "Julian Hyde",
  title =        "Data in flight",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "48--52",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629195",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "How streaming SQL technology can help solve the Web
                 2.0 data crunch.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Petschulat:2010:OPD,
  author =       "Stephen Petschulat",
  title =        "Other people's data",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "53--57",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629196",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Companies have access to more types of external data
                 than ever before. How can they integrate it most
                 effectively?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Leventhal:2010:TPR,
  author =       "Adam Leventhal",
  title =        "Triple-parity {RAID} and beyond",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "58--63",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629194",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "As hard-drive capacities continue to outpace their
                 throughput, the time has come for a new level of
                 RAID.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2010:MPD,
  author =       "Michael Stonebraker and Daniel Abadi and David J.
                 DeWitt and Sam Madden and Erik Paulson and Andrew Pavlo
                 and Alexander Rasin",
  title =        "{MapReduce} and parallel {DBMSs}: friends or foes?",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "64--71",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629197",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "MapReduce complements DBMSs since databases are not
                 designed for extract-transform-load tasks, a MapReduce
                 specialty.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dean:2010:MFD,
  author =       "Jeffrey Dean and Sanjay Ghemawat",
  title =        "{MapReduce}: a flexible data processing tool",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "72--77",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629198",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "MapReduce advantages over parallel databases include
                 storage-system independence and fine-grain fault
                 tolerance for large jobs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lin:2010:CAA,
  author =       "Raz Lin and Sarit Kraus",
  title =        "Can automated agents proficiently negotiate with
                 humans?",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "78--88",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wallach:2010:TPN,
  author =       "Dan Wallach",
  title =        "Technical perspective: {Native Client}: a clever
                 alternative",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "90--90",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629202",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Yee:2010:NCS,
  author =       "Bennet Yee and David Sehr and Gregory Dardyk and J.
                 Bradley Chen and Robert Muth and Tavis Ormandy and
                 Shiki Okasaka and Neha Narula and Nicholas Fullagar",
  title =        "{Native Client}: a sandbox for portable, untrusted x86
                 native code",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "91--99",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629203",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Halevy:2010:TPS,
  author =       "Alon Halevy",
  title =        "Technical perspective: Schema mappings: rules for
                 mixing data",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "100--100",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629200",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{tenCate:2010:SCS,
  author =       "Balder ten Cate and Phokion G. Kolaitis",
  title =        "Structural characterizations of schema-mapping
                 languages",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "101--110",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629201",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:LBQa,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: {HP}'s running man",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "120--ff",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1645394",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Prith Banerjee discusses collaborating with
                 universities, his startup experiences, and
                 Hewlett--Packard Lab's approach to research and
                 development.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Seo:2010:UTF,
  author =       "Dongback Seo and King-Tim Mak",
  title =        "Using the thread-fabric perspective to analyze
                 industry dynamics",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "121--125",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629205",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Rapid advances in technology pose severe challenges to
                 organizations that are dependent on their technology
                 for day-to-day operations as well as strategic renewal.
                 For example, one major challenge is the decision of
                 which new technology to adopt and when to adopt it. If
                 an organization implements a technology too early and
                 its industry takes up another technology later as the
                 standard, the organization will have wasted resources
                 and must expend more in order to switch or make its
                 technology compatible. If the organization waits for a
                 standard to emerge, it will lose any benefits of being
                 the first mover. Organizations struggle to predict the
                 shape of tomorrow's industry, especially more dynamic
                 industries like wireless communications.\par

                 Current business theories are limited in their ability
                 to explain phenomena happening in these dynamic
                 industries. They are also weak in their ability to
                 predict the totality of these types of industries.
                 Theories like the resource-based view of the firm and
                 dynamic capabilities can assess an individual firm's
                 competitiveness and analyze competition between one
                 firm and another under preordained and well-ordered
                 industrial structures, but they cannot explain the
                 total shape of an industry and the positioning of firms
                 within the industry. For example, the analysis and
                 comparison of organizations in the wireless industry,
                 such as Nokia, Samsung, Qualcomm, Vodafone, Hutchison,
                 and Verizon, can assess a company's resources and
                 capabilities and its superiority over another in its
                 resources or capabilities. But these theories do not
                 explain the whole picture of the industry, why
                 companies are pursuing different technologies, why and
                 how they ally with one another, or how companies with
                 fewer resources or capabilities can compete with those
                 with more, for example.\par

                 They also fail to account for how organizations and
                 industries change constantly through internal and
                 external forces. In fairly static industries like the
                 traditional auto industry, companies operated on the
                 same stable supply chains and other systems for
                 decades, thus it was fair to detach two or more
                 organizations from the same shared industrial context
                 to compare them. However, we cannot separate
                 organizations from their industrial context in current
                 dynamic industries like information technology, because
                 organizations and the industry in which they belong
                 co-evolve rapidly by affecting each other. None of the
                 standard business theories can give us clear answers to
                 how, for example, Qualcomm and Korean electronics
                 companies, that started with few resources,
                 capabilities and market share, could create and then
                 expand their territory in the GSM-dominated wireless
                 industry led by Nokia.\par

                 More broadly, the nature of modern business competition
                 appears to be undergoing a fundamental change. To
                 explore the new industrial dynamics, we use the
                 intuitive ideas of {\em threads, fabric\/} and {\em
                 weaving\/} to develop a perspective which promises to
                 greatly facilitate the description and analysis of
                 highly competitive and dynamic industries such as the
                 wireless industry. The Thread-Fabric view perceives
                 organizations and industries as organic entities rather
                 than as rigid and mechanical units. The proposed
                 perspective also differs from existing theories in that
                 it allows a way to observe industries and predict the
                 future not only at the level of individual firms but
                 also from the scope of entire industries. For industry,
                 we hope this theory can support managers and
                 decision-makers to understand the fast-changing
                 business environment and build strategies and tactics
                 to achieve their business goals. For academia, we hope
                 our proposal shows a new way to analyze and understand
                 how industries transform in this day and age.\par

                 Here, we describe our framework and clarify its details
                 by applying it to the example of the global wireless
                 industry. We use this framework to analyze current
                 dynamics in the wireless industry: the fight for
                 third-generation technology standards, and within that,
                 the competition over wireless Internet platform
                 standards. We also discuss the possible use of this
                 framework to predict future directions in industries.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Burns:2010:SCR,
  author =       "Randal Burns and Zachary Peterson",
  title =        "Security constructs for regulatory-compliant storage",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "126--130",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629206",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "In response to a growing body of electronic records
                 legislation, the storage community has enhanced data
                 stores to include privacy, auditability, and a
                 `chain-of-custody' for data. There are currently over
                 4,000 federal, state, and local regulations that govern
                 the storage, management, and retrieval of electronic
                 records. Most notably, the Sarbanes--Oxley Act of 2002,
                 which regulates corporate financial records. Storage
                 vendors provide `compliance' platforms that store and
                 manage data in accordance with regulations, which aids
                 customers in meeting compliance guidelines. Examples
                 include: EMC Centera Compliance Edition,\TM{} NetApp
                 SnapLock,\TM{} and IBM Tivoli Security Compliance
                 Manage.\TM{}\par

                 Many of these platforms add storage management policy
                 to existing systems. Vendors start with systems that
                 manage versions of files or volumes. They add
                 immutability to past versions by preventing writes by
                 policy. They also enforce data retention guidelines by
                 not allowing the deletion of protected files. Enhanced
                 metadata allows users and auditors to examine the store
                 at any point-in-time and investigate the manner in
                 which data have changed throughout their
                 history.\par

                 While these features aid organizations in complying
                 with regulations, they do not provide strong evidence
                 of compliance. By following storage management
                 policies, data are versioned and retained for mandated
                 periods. However, there are many opportunities and
                 motivations to subvert such storage policies. In fact,
                 the file system owner represents the most likely
                 attacker. For example, a corporation might alter or
                 destroy data after the corporation comes under
                 suspicion of malfeasance. The shredding of Enron audit
                 documents at Arthur Anderson in 2001 provides a notable
                 paper analog. Similarly, a hospital or private medical
                 practice might attempt to amend or delete a patient's
                 medical records to hide evidence of malpractice. In
                 policy-based storage systems, past data may be altered
                 or destroyed by reverse engineering file system formats
                 and editing the file data on disk--a common and well
                 understood data forensics task.\par

                 We assert that these features need to be
                 cryptographically strong, providing irrefutable
                 evidence of compliance with regulations. This can be
                 achieved for data retention and chain of custody. A
                 storage system commits to a version history so that, at
                 a later time, an auditor may access past data and gain
                 conclusive evidence that the data have been retained
                 and are unmodified. Further, all data should be bound
                 to the users that modify, create, or delete that data.
                 Such constructs improve the evidentiary value of
                 electronic records within the courts, increase an
                 auditor's confidence in the veracity of the information
                 on which they report (and for which they are
                 responsible), and enhance an organization's quality of
                 data management.\par

                 To these ends, we review three security constructs for
                 versioning file systems. {\em Digital audit trails\/}
                 allow a file system to prove to an independent auditor
                 that it stored data in conformance with regulated
                 retention guidelines. {\em Fine-grained, secure
                 deletion\/} allows a system to efficiently delete
                 individual versions of files to meet confidentiality
                 requirements, limit liability, and allow data to be
                 redacted. {\em Per-block authenticated encryption\/}
                 adds authenticity guarantees to the confidentiality
                 provided by encryption. We also include a distillation
                 of requirements based on a review of relevant
                 legislation and a brief characterization of the
                 performance impact of these techniques based on their
                 implementation within the ext3cow file system.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hur:2010:FDI,
  author =       "Wonchang Hur and Dongsoo Kim",
  title =        "The future of digital imaging",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "131--135",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629207",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Traditionally, radiology is a support department that
                 provides imaging services to other hospital
                 departments. In this conventional framework, the
                 primary concerns of a radiology department were how to
                 enhance the productivity of imaging workflows. Most
                 efforts have been made principally to remove
                 unnecessary communications and thereby reduce report
                 turnaround time. The introduction of information
                 systems such as PACS (Picture Archiving and
                 Communication System) and RIS (Radiology Information
                 System) are typical examples of such efforts.\par

                 Over the past decades, imaging technologies have
                 advanced remarkably, and have led to the proliferation
                 of digital imaging services. Many imaging solution
                 providers are offering various off-the-shelf software
                 programs at more affordable prices. Those programs are
                 equipped with sophisticated imaging functions, and can
                 easily manipulate the large amounts of image data
                 generated from high-performance imaging modalities. As
                 a result, the number of imaging centers providing
                 diagnostic imaging services has grown considerably, and
                 competition between them has intensified.\par

                 In this evolving environment, enhanced productivity of
                 imaging workflow is not sufficient to guarantee a
                 competitive and successful imaging business. Rather,
                 more diversified perspectives of customer satisfaction
                 must be considered, and technological advancements must
                 be leveraged for the quality and the competitiveness as
                 well as the productivity of imaging services.\par

                 In this article, we envision digital imaging services
                 in radiology, with emphasis on the recent advancements
                 in digital imaging technology and its future direction.
                 Specifically, we focus on the four major issues
                 prevailing in current imaging business practices:
                 specialization, flexibility, reliability, and
                 usability. We investigate the kinds of technologies
                 pertaining to each issue, as well as the ways in which
                 such technologies have enabled the invention of
                 innovative services in diagnostic imaging practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kim:2010:MWM,
  author =       "Seongwoon Kim and Inseong Lee and Kiho Lee and Seungki
                 Jung and Joonah Park and Yeun Bae Kim and Sang Ryong
                 Kim and Jinwoo Kim",
  title =        "{Mobile Web 2.0} with multi-display buttons",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "136--141",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629208",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "User-Generated Content (UGC) is a burgeoning social
                 phenomenon being watched in today's world with keen
                 interest. UGC is an online new-media content created by
                 users rather than by conventional media such as
                 broadcasters. A typical example would be Flickr, an
                 online photo-sharing site with 37 million images, to
                 which its 1.2 million members add up to 200,000 images
                 daily. UGC is shifting the paradigm of Internet use
                 away from the one-way propagation of media content by
                 companies towards the creation and sharing of media
                 content by and among ordinary users.\par

                 The mobile phone is an especially important means of
                 promoting user generation and exchange of media
                 content. Many mobile phones now have built-in digital
                 cameras and inherent network connectivity. These
                 features have greatly facilitated the creation and
                 sharing of media content. For instance, users can
                 immediately upload photos on Flickr with their mobile
                 phones as well as access Flickr and browse other
                 people's media content.\par

                 However, the constraints of a typical mobile
                 phone---its small display and limited number of
                 buttons---make use of mobile UGC services challenging.
                 Only a few studies have investigated hardware or
                 software alternatives to address these problems. This
                 article presents a new user interface (UI) for mobile
                 phones, one that makes use of UGC services easier and
                 more efficient.\par

                 The new interface has two key characteristics: one
                 pertaining to content structure, and another to content
                 visualization. More specifically, the new UI employs
                 two major mobile Web 2.0 technologies, the tag and the
                 tag cloud, and multi-display buttons increase the
                 display size and flexibility of individual buttons. The
                 interface is dedicated specifically towards supporting
                 exploratory browsing within mobile UGC services,
                 because users of such services are likely to focus on
                 exploratory browsing and serendipitous discovery and be
                 more inclined toward entertainment rather than utility.
                 Here, we describe the new interface and investigate
                 whether it aids in enhancing exploratory browsing
                 within mobile UGC services.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Witman:2010:TBR,
  author =       "Paul D. Witman and Terry Ryan",
  title =        "Think big for reuse",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "142--147",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629209",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Many organizations are successful with software reuse
                 at fine to medium granularities --- ranging from
                 objects, subroutines, and components through software
                 product lines. However, relatively little has been
                 published on very large-grained reuse. One example of
                 this type of large-grained reuse might be that of an
                 entire Internet banking system (applications and
                 infrastructure) reused in business units all over the
                 world. In contrast, `large scale' software reuse in
                 current research generally refers to systems that reuse
                 a large number of smaller components, or that perhaps
                 reuse subsystems. In this article, we explore a case of
                 an organization with an internal development group that
                 has been very successful with large-grained software
                 reuse.\par

                 BigFinancial, and the BigFinancial Technology Center
                 (BTC) in particular, have created a number of software
                 systems that have been reused in multiple businesses
                 and in multiple countries. BigFinancial and BTC thus
                 provided a rich source of data for case studies to look
                 at the characteristics of those projects and why they
                 have been successful, as well as to look at projects
                 that have been less successful and to understand what
                 has caused those results and what might be done
                 differently to prevent issues in the future. The
                 research is focused on technology, process, and
                 organizational elements of the development process,
                 rather than on specific product features and
                 functions.\par

                 Supporting reuse at a large-grained level may help to
                 alleviate some of the issues that occur in more
                 traditional reuse programs, which tend to be
                 finer-grained. In particular, because BigFinancial was
                 trying to gain commonality in business processes and
                 operating models, reuse of large-grained components was
                 more closely aligned with its business goals. This same
                 effect may well not have happened with finer-grained
                 reuse, due to the continued ability of business units
                 to more readily pick and choose components for
                 reuse.\par

                 BTC is a technology development unit of BigFinancial,
                 with operations in both the eastern and western US.
                 Approximately 500 people are employed by BTC, reporting
                 ultimately through a single line manager responsible to
                 the Global Retail Business unit head of BigFinancial.
                 BTC is organized to deliver both products and
                 infrastructure components to BigFinancial, and its
                 product line has through the years included consumer
                 Internet banking services, teller systems, ATM
                 software, and network management tools. BigFinancial
                 has its U.S. operations headquartered in the eastern
                 U.S., and employs more than 8,000 technologists
                 worldwide.\par

                 In cooperation with BTC, we selected three cases for
                 further study from a pool of about 25. These cases were
                 the Java Banking Toolkit (JBT) and its related
                 application systems, the Worldwide Single Signon (WSSO)
                 subsystem, and the BigFinancial Message Switch (BMS).",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Khatri:2010:DDG,
  author =       "Vijay Khatri and Carol V. Brown",
  title =        "Designing data governance",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "148--152",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629210",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Organizations are becoming increasingly serious about
                 the notion of `data as an asset' as they face
                 increasing pressure for reporting a `single version of
                 the truth.' In a 2006 survey of 359 North American
                 organizations that had deployed business intelligence
                 and analytic systems, a program for the governance of
                 data was reported to be one of the five success
                 `practices' for deriving business value from data
                 assets. In light of the opportunities to leverage data
                 assets as well ensure legislative compliance to
                 mandates such as the Sarbanes--Oxley (SOX) Act and
                 Basel II, data governance has also recently been given
                 significant prominence in practitioners' conferences,
                 such as TDWI (The Data Warehousing Institute) World
                 Conference and DAMA (Data Management Association)
                 International Symposium.\par

                 The objective of this article is to provide an overall
                 framework for data governance that can be used by
                 researchers to focus on important data governance
                 issues, and by practitioners to develop an effective
                 data governance approach, strategy and design.
                 Designing data governance requires stepping back from
                 day-to-day decision making and focusing on identifying
                 the fundamental decisions that need to be made and who
                 should be making them. Based on Weill and Ross, we also
                 differentiate between governance and management as
                 follows:\par

                 {\bullet} {\em Governance\/} refers to what decisions
                 must be made to ensure effective management and use of
                 IT ({\em decision domains\/}) and who makes the
                 decisions ({\em locus of accountability for
                 decision-making\/}).\par

                 {\bullet} {\em Management\/} involves making and
                 implementing decisions.\par

                 For example, governance includes establishing who in
                 the organization holds decision rights for determining
                 standards for data quality. Management involves
                 determining the actual metrics employed for data
                 quality. Here, we focus on the former.\par

                 Corporate governance has been defined as a set of
                 relationships between a company's management, its
                 board, its shareholders and other stakeholders that
                 provide a structure for determining organizational
                 objectives and monitoring performance, thereby ensuring
                 that corporate objectives are attained. Considering the
                 synergy between macroeconomic and structural policies,
                 corporate governance is a key element in not only
                 improving economic efficiency and growth, but also
                 enhancing corporate confidence. A framework for linking
                 corporate and IT governance (see Figure 1) has been
                 proposed by Weill and Ross.\par

                 Unlike these authors, however, we differentiate between
                 IT assets and information assets: {\em IT assets\/}
                 refers to technologies (computers, communication and
                 databases) that help support the automation of
                 well-defined tasks, while {\em information assets\/}
                 (or data) are defined as facts having value or
                 potential value that are documented. Note that in the
                 context of this article, we do not differentiate
                 between data and information.\par

                 Next, we use the Weill and Ross framework for IT
                 governance as a starting point for our own framework
                 for data governance. We then propose a set of five data
                 decision domains, why they are important, and
                 guidelines for what governance is needed for each
                 decision domain. By operationalizing the {\em locus of
                 accountability of decision making\/} (the `who') for
                 each decision domain, we create a data governance
                 matrix, which can be used by practitioners to design
                 their data governance. The insights presented here have
                 been informed by field research, and address an area
                 that is of growing interest to the information systems
                 (IS) research and practice community.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Miori:2010:DTI,
  author =       "Vittorio Miori and Dario Russo and Massimo Aliberti",
  title =        "Domotic technologies incompatibility becomes user
                 transparent",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "153--157",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629211",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The potential of current technologies in smart
                 automation has been largely unexploited. Pervasive
                 computing vision is still far from being achieved,
                 especially with regard to Domotics and home
                 applications. In fact, even though many implementations
                 have started to appear in several contexts, few
                 applications have been made available for the home
                 environment and the general public. This is mainly due
                 to the segmentation of standards and proprietary
                 solutions, which are currently confusing the market
                 with a sparse offer of uninteroperable devices and
                 systems.\par

                 Although modern houses are equipped with smart
                 technological appliances, still very few of these
                 appliances can be seamlessly connected to each
                 other.\par

                 Moreover, inter-working capabilities are required
                 beyond house boundaries, towards external services and
                 towards other houses as nodes of a global
                 network.\par

                 Therefore, the main goal of this research is to find
                 solutions to the problem of interoperability that will
                 be in line with open and widely recognized
                 standards.\par

                 The result is a computing framework based on open
                 communication standards, capable of abstracting the
                 peculiarities of underlying heterogeneous technologies,
                 and letting them co-exist and interwork, without
                 eliminating their differences. Interoperability can
                 thus be made potentially feasible between any domotic
                 technology, both currently existing, and still to be
                 defined.\par

                 Currently, domotic technology vendors concentrate on
                 building closed relationships with their customers, and
                 leveraging their economic investments by establishing
                 barriers against new manufacturers entering the
                 market.\par

                 Examples of current domotic protocols are X10, Konnex,
                 LonWorks, UPnP, HAVi, and Jini supporting various
                 communication standards (Ethernet, FireWire, Bluetooth,
                 ZigBee, IrDA and proprietary buses). We believe that no
                 domotic technology currently has the potential to
                 actually play a leading role. Within this wide and
                 heterogeneous framework, the market logic is to tie
                 consumers to a particular domotic protocol, which then
                 forces them to only purchase conforming devices in
                 order to keep a consistent level of
                 interoperability.\par

                 In recent years several interesting and innovative
                 solutions have emerged, with a reasonable level of
                 scalability and dependability, providing
                 interoperability among heterogeneous home
                 systems.\par

                 Twente University has proposed a solution that aims at
                 supporting heterogeneous technologies (including legacy
                 ones) with a `cluster cultures' approach. The
                 architecture outlines a `touch and play' system which,
                 at device registration time, enables a
                 zero-configuration environment for the exchange of
                 credentials among its gateways and to register device
                 services in a hierarchical structure. The architecture
                 provides a high level of security by using
                 cryptographic algorithms.\par

                 Waseda University have proposed a framework designed to
                 easily enable the integration of legacy middleware and
                 legacy services and clients, with a predefined path for
                 the inclusion of new, future, middleware. This is
                 accomplished mainly through the use of a Virtual
                 Service Gateway. This connects one piece of middleware
                 to another by exploiting a Protocol Conversion Manager,
                 whose task is to convert the different middleware
                 protocols into the specific internal protocol used by
                 the Virtual Service Gateway. Information about the
                 location and functions of services is provided by a
                 Virtual Service Repository.\par

                 Another interesting project is the `Domotic House
                 Gateway.' It implements an event-based mechanism which
                 is used to exchange messages between the single device
                 and the system. These events are internally converted
                 into logical events so as to clearly separate the
                 actual physical issues from the semantics that goes
                 beyond the devices and their role within the house. One
                 level of the architecture implements a rule-based core
                 that can be dynamically adapted either by the system
                 itself or manually through external interfaces. Each
                 device needs a device driver, which is responsible for
                 translating its low level or hardware states and
                 activities into events that can be managed by the
                 system.\par

                 Another promising approach, in line with our research,
                 is proposed by the Open Building Information Exchange
                 group who are working to create standard XML and Web
                 Services guidelines to facilitate information exchange
                 among mechanical and electrical systems in building
                 automation.\par

                 One such important European project in this context is
                 Amigo. This project was aimed at Ambient Intelligence
                 features for the networked home environment and the
                 usability of the system was among its main goals and
                 included three major guidelines: user-friendly
                 interfaces, interoperability, and automatic discovery
                 of devices and services.\par

                 All these projects resolved the interoperability
                 problem with several approaches, all of which are
                 different from what we consider, in our vision, as the
                 optimal solutions.\par

                 Lastly, we enlist a prototype previously created by our
                 research laboratory. This solution had the limitation
                 of abstracting each device typology with a Web service
                 implementing their specific functionalities. The
                 implementation of a new ad hoc Web service was needed
                 whenever a new category of device needed to be included
                 in the network. In addition, this prototype solved the
                 problem of cooperation by virtualizing devices
                 belonging to each domotic system onto the others. This
                 solution, however, had a drawback: the same device
                 appeared virtually replicated on every single domotic
                 system, thus creating data replications and possible
                 consistency problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Drezner:2010:TOR,
  author =       "Zvi Drezner",
  title =        "Technical opinion: Random selection from a stream of
                 events",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "158--159",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1646395",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Crawford:2010:IT,
  author =       "Diane Crawford",
  title =        "An issue of teamwork",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646354",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "This column was supposed to write itself. When
                 Editor-in-Chief Moshe Vardi first asked me to tell
                 readers how a typical issue of {\em Communications\/}
                 comes together, I remember thinking `piece of cake.'",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEb,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "9--9",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646357",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "{\em Communications'\/} Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Barr:2010:BCW,
  author =       "Valerie Barr",
  title =        "{blog@CACM}: Connecting women and technology",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "10--11",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646358",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish excerpts from
                 selected posts.

                 twitter: Follow us on Twitter at
                 \url{http://twitter.com/blogCACM}.

                 Guest blogger Valerie Barr writes about highlights of
                 the ninth Grace Hopper Celebration of Women in
                 Computing Conference, including keynote speeches by
                 Megan Smith and Francine Berman.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COW,
  author =       "David Roman",
  title =        "{CACM online}: Where the data is",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "12--12",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646359",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NAI,
  author =       "Kirk L. Kroeker",
  title =        "News: Alternate interface technologies emerge",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "13--15",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646360",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Researchers working in human-computer interaction are
                 developing new interfaces to produce greater
                 efficiencies in personal computing and enhance
                 miniaturization in mobile devices.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2010:NTT,
  author =       "Alex Wright",
  title =        "News: Type theory comes of age",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "16--17",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646361",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Type systems are moving beyond the realm of data
                 structure and into more complex domains like security
                 and networking.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Underwood:2010:NID,
  author =       "Sarah Underwood",
  title =        "News: Improving disaster management",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "18--20",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646362",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Social networking, sophisticated imaging, and dual-use
                 technologies promise improved disaster management, but
                 they must be adopted by governments and aid agencies if
                 more lives are to be saved in the wake of crises.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:NAF,
  author =       "{CACM Staff}",
  title =        "News: {ACM Fellows} honored",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "21--21",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646381",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Forty-seven men and women are inducted as 2009 ACM
                 Fellows.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sasse:2010:PSS,
  author =       "M. Angela Sasse",
  title =        "Privacy and security: Not seeing the crime for the
                 cameras?",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "22--25",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646363",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Why it is difficult---but essential---to monitor the
                 effectiveness of security technologies.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Groth:2010:EWI,
  author =       "Dennis P. Groth and Jeffrey K. MacKie-Mason",
  title =        "Education: Why an informatics degree?",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "26--28",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646364",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Isn't computer science enough?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Maughan:2010:IRN,
  author =       "Douglas Maughan",
  title =        "Inside risks: The need for a national cybersecurity
                 research and development agenda",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "29--31",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646365",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Government-funded initiatives, in cooperation with
                 private-sector partners in key technology areas, are
                 fundamental to cybersecurity technical
                 transformation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Beaudouin-Lafon:2010:OAS,
  author =       "Michel Beaudouin-Lafon",
  title =        "Open access to scientific publications",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "32--34",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646367",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The good, the bad, and the ugly.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:KVT,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: Taking your network's temperature",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "35--36",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646366",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A prescription for capturing data to diagnose and
                 debug a networking problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shasha:2010:IMR,
  author =       "Dennis Shasha",
  title =        "An interview with {Michael Rabin}",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "37--42",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646369",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Michael O. Rabin, co-recipient of the 1976 ACM A. M.
                 Turing Award, discusses his innovative algorithmic work
                 with Dennis Shasha.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Saxe:2010:PES,
  author =       "Eric Saxe",
  title =        "Power-efficient software",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "44--48",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646370",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Power-manageable hardware can help save energy, but
                 what can software developers do to address the
                 problem?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Fedorova:2010:MCS,
  author =       "Alexandra Fedorova and Sergey Blagodurov and Sergey
                 Zhuravlev",
  title =        "Managing contention for shared resources on multicore
                 processors",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "49--57",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646371",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Contention for caches, memory controllers, and
                 interconnects can be eased by contention-aware
                 scheduling algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Miller:2010:SMC,
  author =       "Steven P. Miller and Michael W. Whalen and Darren D.
                 Cofer",
  title =        "Software model checking takes off",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "58--64",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646372",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A translator framework enables the use of model
                 checking in complex avionics systems and other
                 industrial settings.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bessey:2010:FBL,
  author =       "Al Bessey and Ken Block and Ben Chelf and Andy Chou
                 and Bryan Fulton and Seth Hallem and Charles Henri-Gros
                 and Asya Kamsky and Scott McPeak and Dawson Engler",
  title =        "A few billion lines of code later: using static
                 analysis to find bugs in the real world",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "66--75",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646374",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "How Coverity built a bug-finding tool, and a business,
                 around the unlimited supply of bugs in software
                 systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Benhamou:2010:ACU,
  author =       "Eric Benhamou and Jon Eisenberg and Randy H. Katz",
  title =        "Assessing the changing {U.S. IT R\&D} ecosystem",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "76--83",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646373",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The National Academy of Sciences recommends what the
                 U.S. government should do to help maintain American IT
                 leadership.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bacon:2010:RPQ,
  author =       "Dave Bacon and Wim van Dam",
  title =        "Recent progress in quantum algorithms",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "84--93",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646375",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "What quantum algorithms outperform classical
                 computation and how do they do it?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dasgupta:2010:SEH,
  author =       "Sanjoy Dasgupta",
  title =        "Strange effects in high dimension",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "96--96",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646378",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ailon:2010:FDR,
  author =       "Nir Ailon and Bernard Chazelle",
  title =        "Faster dimension reduction",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "97--104",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646379",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Data represented geometrically in high-dimensional
                 vector spaces can be found in many applications. Images
                 and videos, are often represented by assigning a
                 dimension for every pixel (and time). Text documents
                 may be represented in a vector space where each word in
                 the dictionary incurs a dimension. The need to
                 manipulate such data in huge corpora such as the web
                 and to support various query types gives rise to the
                 question of how to represent the data in a
                 lower-dimensional space to allow more space and time
                 efficient computation. Linear mappings are an
                 attractive approach to this problem because the mapped
                 input can be readily fed into popular algorithms that
                 operate on linear spaces (such as principal-component
                 analysis, PCA) while avoiding the curse of
                 dimensionality.\par

                 The fact that such mappings even exist became known in
                 computer science following seminal work by Johnson and
                 Lindenstrauss in the early 1980s. The underlying
                 technique is often called `random projection.' The
                 complexity of the mapping itself, essentially the
                 product of a vector with a dense matrix, did not
                 attract much attention until recently. In 2006, we
                 discovered a way to `sparsify' the matrix via a
                 computational version of Heisenberg's Uncertainty
                 Principle. This led to a significant speedup, which
                 also retained the practical simplicity of the standard
                 Johnson--Lindenstrauss projection. We describe the
                 improvement in this article, together with some of its
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Borkar:2010:WBB,
  author =       "Shekhar Y. Borkar",
  title =        "Want to be a bug buster?",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "105--105",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646376",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Park:2010:PSB,
  author =       "Sung-Boem Park and Subhasish Mitra",
  title =        "Post-silicon bug localization for processors using
                 {IFRA}",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "106--113",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646377",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "IFRA, an acronym for Instruction Footprint Recording
                 and Analysis, overcomes major challenges associated
                 with a very expensive step in post-silicon validation
                 of processors---pinpointing a bug location and the
                 instruction sequence that exposes the bug from a system
                 failure, such as a crash. Special on-chip recorders,
                 inserted in a processor during design, collect
                 instruction footprints---special information about
                 flows of instructions, and what the instructions did as
                 they passed through various microarchitectural blocks
                 of the processor. The recording is done concurrently
                 during the normal operation of the processor in a
                 post-silicon system validation setup. Upon detection of
                 a system failure, the recorded information is scanned
                 out and analyzed offline for bug localization. Special
                 self-consistency-based program analysis techniques,
                 together with the test-program binary of the
                 application executed during post-silicon validation,
                 are used for this purpose. Major benefits of using IFRA
                 over traditional techniques for post-silicon bug
                 localization are (1) it does not require full
                 system-level reproduction of bugs, and (2) it does not
                 require full system-level simulation. Hence, it can
                 overcome major hurdles that limit the scalability of
                 traditional post-silicon validation methodologies.
                 Simulation results on a complex superscalar processor
                 demonstrate that IFRA is effective in accurately
                 localizing electrical bugs with 1\% chip-level area
                 impact.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPa,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Breaking chocolate bars",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "120--120",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646380",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Welcome to three new puzzles. Solutions to the first
                 two will be published next month; the third is (as yet)
                 unsolved. In each, the issue is how your intuition
                 matches up with the mathematics.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kim:2010:DEI,
  author =       "Dongmin Kim and Izak Benbasat",
  title =        "Designs for effective implementation of trust
                 assurances in {Internet} stores",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "121--126",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646386",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Improving customer trust in an Internet store is an
                 important goal in B2C electronic commerce because it
                 leads to outcomes important for the success of an
                 Internet store, such as reduced customer risk
                 perceptions in transacting with the store and increased
                 willingness to buy from the store. Therefore, one of
                 the critical success factors for Internet stores is to
                 convince customers of the store's trustworthiness,
                 which refers to a set of customers' beliefs regarding
                 the ability, integrity, and benevolence of the online
                 merchant. One mechanism by which such perceptions of
                 trustworthiness on the part of stores can be
                 established is to provide trust assurances on a store's
                 Web site. Trust assurance refers to `a claim and its
                 supporting statements used in an Internet store to
                 address trust-related concerns.' An example of trust
                 assurance statements found in Internet stores
                 is:\par

                 {\em We are so confident in our security that we
                 guarantee you'll pay nothing if unauthorized charges
                 are made to your credit card as a result of shopping at
                 circuitcity.com.'\/} (Excerpted from a checkout page of
                 www.circuitcity.com)\par

                 Trust assurances can be provided by an Internet store
                 itself, by customers, or by a third party organization.
                 For example, Simplycheap.com, shown in Figure 1,
                 displays both a store's self-proclaimed assurance (such
                 as `safe shopping our security guarantee') and a
                 third-party assurance (such as Hacker Safe).\par

                 In this article, we first review finding in previous
                 studies regarding trust assurance. Then we provide a
                 snapshot regarding how often Internet stores use trust
                 assurances and what concerns are addressed in such
                 trust assurances by reporting current usage of trust
                 assurances based on observations of 85 Internet stores.
                 We expect that this snapshot will help business
                 managers to understand how other companies use trust
                 assurances. Second, we suggest two design guidelines
                 for effective implementation of trust assurances for
                 Web developers.\par

                 Before reporting our findings based on observations
                 from 85 Internet stores, we briefly review the findings
                 of several previous studies regarding trust
                 assurances.\par

                 First, many studies have reported that displaying trust
                 assurances increases the trustworthiness of an Internet
                 store. A store's own assurance enhances the
                 trustworthiness of an Internet store if they are
                 well-structured. Third-party assurances (or
                 trustmarks), such as TRUSTe and BBBOnLine seals
                 positively influence the favorableness of a store's
                 privacy policies, and are more influential in improving
                 a firm's trustworthiness than a rating by {\em Consumer
                 Reports\/} magazine is. Among third-party assurances,
                 the WebTrust seal appeared to be more influential than
                 BBBOnLine when people chose a vendor. Interestingly,
                 third-party assurances were not considered as important
                 as `security features,' such as SET (Secure Electronic
                 Transaction), SSL (Secure Sockets Layer), and a lock
                 symbol, in customer's decisions to buy on the World
                 Wide Web.\par

                 Second, detailed design/ usability guidelines for
                 building a Web site are already available. For example,
                 best practices in Interaction Design can be accessed at
                 van Welie's Web site (http://www.welie.com/patterns/).
                 In respect to specific implementations of trust
                 assurances, ease of access to assurances was suggested
                 as one of several design considerations. For example,
                 van Duyne et al. suggested that Internet stores needed
                 to make their privacy policy available on each of their
                 Web pages. The finding that only 54\% of licensees of
                 the top 500 Internet consumer Web sites display their
                 privacy seal of approval information on both their home
                 and privacy pages indicates that the other 46\% has
                 room to improve their customers' ease of access to
                 trust assurances.\par

                 In this study, based on van Duyne et al. we examine
                 {\em ease of access\/} to trust assurances. In
                 addition, we examine the application of {\em ease of
                 return\/} to the original checkout screen that customer
                 was working on before accessing trust assurances which
                 is important for customers to easily complete the
                 checkout process. These two implementation issues (for
                 example, ease of access and ease of return) are
                 examined in the assurance delivery modes section.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Becerra-Fernandez:2010:RLC,
  author =       "Irma Becerra-Fernandez and Joyce Elam and Susan
                 Clemmons",
  title =        "Reversing the landslide in computer-related degree
                 programs",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "127--133",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646387",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "There is growing concern that a technologically
                 educated workforce will not be available to meet the
                 needs of the job market in information technology in
                 the coming years, primarily because students are
                 turning away from academic programs in computer-related
                 disciplines, including computer science (CS),
                 information technology (IT), and management information
                 systems (MIS). We will collectively refer to these
                 academic units as Computer and Information
                 Science/Systems (CIS). Numerous surveys have documented
                 the steep decline: as much as 50\% over the last four
                 years of both the number of graduates in these programs
                 as well as the enrollment in courses associated with
                 these degree programs. The popularity of computer
                 science as an intended major among incoming freshmen
                 continues the decline that started in 2000. By 2004, it
                 had further declined by over 60\%. This lack of
                 interest in computer science by incoming students
                 translates to a downward trend in the number of
                 enrolled students and graduates for the foreseeable
                 future.\par

                 The most comprehensive source of information on the
                 production of bachelor, masters, and Ph. D. degrees in
                 computer science and computer engineering is the
                 Taulbee Survey, conducted annually by the Computing
                 Research Association.\par

                 The major findings from the 2006 Taulbee Survey
                 are:\par

                 1. Bachelor degree production was down more than 15\%
                 in 2006, following a 13\% decrease in 2005. Over the
                 last three years, there has been a drop of over
                 40\%.\par

                 2. Master's degree production was down 13\% in 2006,
                 this is reasonably consistent with the 17\% drop in new
                 Master's students reported two years ago.\par

                 3. The proportion of women receiving bachelor's degrees
                 decreased from 17\% in 2003--04 to 14.76\% in 2004--05.
                 The percentage was unchanged in 2006. This trend is not
                 likely to change in the near future, as only 0.3\% of
                 incoming freshmen women in 2004 expressed an interest
                 in majoring in computer science.\par

                 It has been suggested that the same trends reported in
                 this survey are occurring in CIS programs in business
                 schools. In order to validate this assumption, we
                 conducted a survey of large business schools, those
                 with at least 100 faculty members, that offer bachelor
                 and masters degree programs in computer/management
                 information systems. Out of 61 such AACSB-accredited
                 business schools, 23 responded to our survey for a
                 response rate of 38\%. As shown in Figure 1, our
                 findings show similar declines in degree production as
                 those in the Taulbee Survey. The number of
                 undergraduate CIS degrees awarded declined from 2,699
                 in 03--04 to 1,163 in 06--07 --- a drop of 57\%. The
                 percentage of women graduates is higher than that
                 reported in the Taulbee survey, although the percentage
                 declined from 31\% to 21\%. The decline was not as
                 steep for masters degrees awarded. The number of CIS
                 masters degrees awarded declined from 463 in 03--04 to
                 318 in 06--07, a drop of 32\%. The percentage of female
                 graduates held steady at 25\%.\par

                 One of the best ways to gain insight into the declining
                 interest in CIS is to look at this issue from the
                 students' perspective. First, there are the students
                 who, at one time, would have considered a major in CIS
                 but who no longer perceive there are opportunities to
                 build a career in this field. This lack of job market
                 attractiveness is probably tied to the Internet bubble
                 burst, which accompanied the technology stock market
                 crash. The bubble burst caused a temporary glut of
                 experienced IT professionals in the market, squeezing
                 out the jobs from new graduates. However, there are
                 more positions for new graduates today as compared to
                 2002.\par

                 Furthermore, students who may have an interest in CIS
                 are very aware of the growing trend to offshore many
                 low-end, production-oriented IT jobs, which may result
                 in reluctance to commit to a career in an industry that
                 they perceive in decline. In addition, like many
                 technology-oriented fields, enterprise IT is currently
                 undergoing dramatic changes, and IT organizations are
                 reducing their staff and becoming more specialized.
                 Rather than reflecting the new realities of what a CIS
                 career will be, students perceive that the CIS
                 curriculum may be preparing them for jobs which no
                 longer exist, rather than preparing them for emerging
                 IT jobs. As IT becomes more pervasive and central to
                 many disciplines --- from biology to art --- students
                 are drawn to academic programs in these fields that
                 increasingly provide their own CIS courses,
                 specifically tailored for that profession.\par

                 Gender differences in the choice of college majors have
                 been found to be a key contributor to the persistent
                 low number of women CIS enrollments. Some reports
                 attribute this difference to the fact that IT
                 workplaces (and university classrooms) lack
                 interpersonal orientation resulting in an inhospitable
                 male dominated atmosphere. Other reports point out that
                 the influence and attitude towards CIS may be best
                 instilled by a girl's parents and early positive
                 experiences with technology. Shaping their early
                 interests may inspire a more diverse work pool in the
                 future, but does not offer immediate relief in dealing
                 with the impending CIS student decline.\par

                 It is clear that strong interventions are needed if CIS
                 academic units are to maintain their current faculties,
                 academic and research programs, and dominant position
                 as the knowledge leader in computing-related
                 disciplines within the university. The types of
                 interventions needed are multi-dimensional. Clearly,
                 students' perception about the lack of attractive
                 high-paying careers in CIS needs to be addressed. Major
                 changes in curriculum design need to be undertaken.
                 And, we argue that another important necessary change
                 is for CIS academic units to become providers of
                 computer education for those academic disciplines where
                 IT has become an integral part of their
                 curriculum.\par

                 CIS academic units from around the country are looking
                 for ways to respond to the current problem of declining
                 enrollments in different ways. In order to understand
                 how to respond to the declining enrollment phenomena,
                 we turned to the work of Haeckel and its contrast
                 between the make-and-sell' versus the
                 sense-and-respond' organization, which we describe in
                 the next section. We describe the interventions taken
                 at Florida International University (FIU) to address
                 the declining student MIS enrollments and degree
                 production in the business school. We then explore the
                 extent to which Haeckel's model of the
                 sense-and-respond organization could be used to define
                 a new way of operating for academic units. We also
                 discuss the major differences between the two models
                 applied to CIS academic units and conclude with a
                 discussion of the implications of this new operating
                 model as universities seek to respond to the markets of
                 the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chenoweth:2010:WIE,
  author =       "Tim Chenoweth and Robert Minch and Sharon Tabor",
  title =        "Wireless insecurity: examining user security behavior
                 on public networks",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "134--138",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646388",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Altaf:2010:TFA,
  author =       "Farheen Altaf and David Schuff",
  title =        "Taking a flexible approach to {ASPs}",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "139--143",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646389",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "In 2001, subscription-based application service
                 providers (ASPs) represented the new paradigm for
                 application deployment. It was anticipated that ASP
                 spending would reach \$7.8 billion by 2004, and a 2001
                 survey conducted by PMP Research revealed that 23\% of
                 respondents said they would likely use an ASP in the
                 future. However, this turned out not to be the case. By
                 2004, spending on ASPs had increased only to \$4.2
                 billion.\par

                 Over the past few years, there has been a revival of
                 the ASP model through the notion of cloud computing and
                 `software as a service.' The market for cloud-based
                 services was \$16 billion in 2008, and projections
                 estimate the market for spending in this area will
                 reach \$42 billion by 2012. However, this still only
                 would represent 9\% of overall IT spending. These
                 services have traditionally targeted larger companies
                 instead of small or medium-sized businesses (or SMEs).
                 Companies like Oracle, Siebel, and Ariba claim that
                 nearly 60\% of their business comes from companies that
                 have annual revenues exceeding \$1 billion. However,
                 the ASP model provides the same or greater benefits to
                 SMEs, including lower costs, greater choice, simpler
                 installation (and no related fees), and the ability to
                 access applications from any Internet-connected
                 computer. ASP subscribers also often receive `24 by 7'
                 technical support. This access to IT expertise (without
                 maintaining an in-house IT staff) results in further
                 savings for businesses.\par

                 Despite the benefits, small businesses have not readily
                 adopted ASPs. The reasons for this lack of adoption
                 include the reluctance of SMEs to replace their
                 existing systems with untried ASPs and the
                 inappropriateness of the `one-size-fits-all' approach
                 that doesn't take in to consideration specific industry
                 or firm requirements. This makes the SME a significant
                 untapped market for companies operating in this
                 space.\par

                 The purpose of this article is to more fully understand
                 the SME market for ASPs through an analysis of the
                 factors that are most important to likely adopters.
                 While previous work has broadly investigated adoption
                 by SMEs and the general adoption of ASPs, this study
                 combines both perspectives and proposes the new
                 construct of `flexibility' as influential in the
                 adoption decision. We surveyed 101 SMEs that had not
                 yet adopted ASPs and asked them to rate the importance
                 of several factors that would affect their decision.
                 Correlating likelihood of adoption with the importance
                 of those factors yields several important insights into
                 how ASP vendors should position their product
                 offerings.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ross:2010:ICR,
  author =       "John Minor Ross",
  title =        "Informatics creativity: a role for abductive
                 reasoning?",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "144--148",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646390",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Despite the fact that creative problem solving is
                 desirable at all levels, it is constantly in short
                 supply. Technology developers always wish they, and
                 their peers, could devise novel solutions to the
                 problems at hand. Yet too often, common brainstorming
                 efforts generate only fog or drizzle. Part of the
                 problem may be that while some technology trainers
                 advocate the search for creative solutions, the
                 learning side of the equation is little changed by a
                 `be creative' lecture component. This inquiry attempts
                 to equip computer educators, and practitioners, with a
                 broadened approach to fostering creativity, targeted at
                 expanding discovery within Informatics areas.
                 Particularly, it is suggested that promoting abductive
                 reasoning might help computer professionals understand
                 the benefits of wider investigations within an expanded
                 range of topics. Although discussed additionally later,
                 a short overview of the abductive reasoning approach is
                 that `{\em abduction}, or {\em inference to the best
                 explanation}, is a form of inference that goes from
                 data describing something to a hypothesis that best
                 explains or accounts for the data.'\par

                 Few professionals would suggest there is no need for
                 new, creative solutions to the problems they encounter.
                 An example of the recognition of such needs is
                 highlighted in industry. Consider that each year
                 Procter and Gamble spends nearly \$2 billion looking
                 for innovative ideas. This R\&D budget spans 150
                 science areas including biotechnology, imaging, and
                 robotics. Aside from pure research, P\&G pursues
                 `aggressive mining of the scientific literature,' as
                 well as employs upwards of 70 `technology
                 entrepreneurs' around the world who analyze local
                 markets to see what has been created elsewhere that
                 might be acquired, modified, or simply spark new ideas
                 internally.\par

                 Sparking new computing ideas is the intent of this
                 discourse. Various overlapping and synergistic issues
                 come to mind when considering what has been called
                 `discovery informatics.' Concepts suggested therein are
                 extended here to consider the possible value of
                 abductive reasoning in Informatics. Specifically, how
                 might abduction help generate creative approaches to
                 problems as Informatics reaches into the fabric of so
                 many disciplines. Understanding this technique might
                 assist Informatics workers to progress from being data
                 rich and discovery poor, to a state of information
                 wealth, as professionals benefit from applying new
                 ideas.\par

                 In 1990, abductive-related efforts in computing had
                 already been occurring for nearly 20 years. And yet,
                 after another 15 years has passed, the awareness of the
                 potential of abductive reasoning in computing fields
                 remains relatively spotty. The current growth of
                 Informatics programs may offer a chance to change that
                 profile. Since Informatics programs tend to be more
                 cross-disciplinary, it might achieve the goal of that
                 1990 Automated Abduction symposium---to help a wider
                 range of researchers to recognize that `they might
                 benefit from work on abduction by people in other
                 areas.' Overall, it may turn out that this diffusion
                 cycle will be reminiscent of how slowly object-oriented
                 programming came to be understood, let alone
                 embraced.\par

                 We set out to consider the potential of abductive
                 reasoning to promote creativity within the
                 interdisciplinary field of Informatics. As will be
                 presented in the following sections, we believe in the
                 applicability of this reasoning style as a tool for
                 expanding the power of Informatics as it seeks to solve
                 complex problems in a wide range of disciplines.
                 Abductive reasoning is well suited for facing problems
                 that are vague, or even unrecognized. The goal? Turning
                 massive amounts of data lead into tiny, although much
                 more valuable, quantities of information gold.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Joseph:2010:PII,
  author =       "Damien Joseph and Soon Ang and Roger H. L. Chang and
                 Sandra A. Slaughter",
  title =        "Practical intelligence in {IT}: assessing soft skills
                 of {IT} professionals",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "149--154",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646391",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "What qualities make a successful it professional?
                 Certainty strong technical skills are sine qua non. As
                 a result, the technology geek remains the stereotype of
                 an information technology (IT) professional. Indeed,
                 when companies hire IT professionals, their focus is
                 often on the `hard' skills needed to perform the work,
                 such as years of Java programming
                 experience.\par

                 However, there is a growing (and gnawing) awareness
                 that technical skills alone are insufficient for
                 success in IT, particularly in today's dynamic,
                 distributed and complex workplace. Companies are
                 exploring outsourcing and offshoring to become more
                 flexible and contain costs while strategically
                 leveraging IT. Consequently, IT professionals (whether
                 onsite or offshore, in-house or outsourced) must
                 acquire a broader set of skills beyond their
                 traditional technical skills. These broader managerial
                 or interpersonal skills are generically labeled `soft
                 skills.'\par

                 Despite the increasing importance of soft skills, very
                 little systematic research has conceptualized such
                 skills and even less has measured these skills. Given
                 this gap in the literature, this article introduces
                 `practical intelligence' as the overarching concept
                 that could provide a better understanding of this
                 broader set of skills required of IT professionals. We
                 describe the development of the SoftSkills for IT
                 (SSIT) instrument for assessing an IT professional's
                 level of practical intelligence, and report the results
                 of a study that validates this instrument by comparing
                 the practical intelligence of experienced IT
                 professionals versus novices. We conclude by drawing
                 out implications of our study for IT recruitment,
                 training and development, and suggest future research
                 directions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gurbani:2010:MCO,
  author =       "Vijay K. Gurbani and Anita Garvert and James D.
                 Herbsleb",
  title =        "Managing a corporate open source software asset",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "155--159",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646392",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "We define {\em corporate open source\/} (COS) as
                 applying the precepts and methodologies prevalent in
                 the open source development community for creating
                 industrial-strength software projects in a corporation
                 for internal use. It may seem that open source style
                 development - using informal processes, voluntary
                 assignment to tasks, and having few financial
                 incentives - may not be a good match for commercial
                 environments. Our ongoing work, however, demonstrates
                 that under the right circumstances, corporations can
                 benefit from open source development techniques. We
                 present two approaches to managing COS projects, and
                 expand in detail on one of them. Our results indicate
                 that open source approaches require significant
                 adaptation to succeed in commercial settings. In
                 particular, they require substantial support from
                 business divisions within a corporation to successfully
                 leverage the shared asset.\par

                 Our ongoing research has attempted to determine whether
                 corporations can effectively leverage the open source
                 development model to create and manage software
                 projects inside the corporate domain. We have observed
                 how the precepts and methodologies of the open source
                 development had to be adapted in order to create
                 commercial grade software. In particular changes are
                 required in order to accommodate a market-driven
                 schedule and feature decisions that are not wholly
                 amenable to an open source development approach. Our
                 contributions in this article include describing two
                 methods to effectively manage COS assets: an
                 Infrastructure-based COS model, and a Project-specific
                 COS model. We report experiences with the management
                 aspects of the latter COS model, which includes our
                 findings that this model requires a greater amount of
                 support to get a new business division onboard when
                 compared to the minimal support provided by traditional
                 open source projects. However, the benefits of
                 Project-specific COS outweigh the costs once the
                 business division is fully on-board: the development
                 costs are amortized over the number of divisions using
                 the common asset, and the asset itself benefits from
                 contributions from the expanded use.\par

                 Open source practices and tools have proven potential
                 to overcome many of the well-known difficulties of
                 geographically distributed software development, and to
                 allow widely distributed users of software to add
                 features and functionality they want with a minimum of
                 conflict and management overhead.\par

                 Dinkelacker et al. discuss Progressive Open Source as a
                 set of tools and techniques for a corporation to host
                 multiple open source projects within a company and
                 between third parties. In the context of their work,
                 our work on COS corresponds to and furthers their work
                 on what is referred to as `Inner Source' in their
                 paper.\par

                 Our previous work attempted to determine whether open
                 source tools and practices are a good fit for
                 developing commercial-grade software especially in the
                 light of the differences between the two camps: open
                 source development is more iterative in nature when
                 compared to the staged method of software development
                 practiced at many corporations; the incentive structure
                 between the two varies, as does the motivation factor;
                 commercial software is usually characterized by process
                 methodologies (CMMI, ISO, TL9000, among others), that
                 are typically absent in open source development. We
                 reached the conclusion that certain commercial projects
                 can indeed benefit from open source development
                 methodology, especially those projects
                 where:\par

                 {\bullet} a technology is needed by several product
                 groups (hence there is reason to pool
                 resources),\par

                 {\bullet} the technology is relatively immature so that
                 requirements and features are not fully known at the
                 outset (so there is a need to evolve
                 continuously),\par

                 {\bullet} product groups have different needs and
                 specific expertise in customizing the software for
                 their needs (so everyone benefits from the
                 contributions of each group), and\par

                 {\bullet} the initial product has a sound, modular
                 architecture (so that it is feasible to merge all the
                 diverse changes into a single development
                 branch).\par

                 Furthering our previous work, the discussion in this
                 article presents a management view of maintaining a COS
                 asset. We discuss project management and planning
                 aspects that are intrinsic to projects managed in this
                 style.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Mehta:2010:ITT,
  author =       "Nikhil Mehta and Anju Mehta",
  title =        "It takes two to tango: how relational investments
                 improve {IT} outsourcing partnerships",
  journal =      j-CACM,
  volume =       "53",
  number =       "2",
  pages =        "160--164",
  month =        feb,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1646353.1646393",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:13:32 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The IT outsourcing, industry landscape is dotted with
                 broken contracts - results of unsuccessful
                 client-vendor (C-V) partnerships. Approximately 78\%
                 C-V partnerships fail in the long term, inflicting high
                 transition costs on clients. The recent economic
                 downturn has strained C-V partnerships further. Despite
                 the criticality of this issue, there is a relative lack
                 of efforts to understand the issues leading to failed
                 partnerships.\par

                 We discuss these issues in light of the clients' onus
                 towards improving the longevity of C-V
                 partnerships.\par

                 We adopt a two-pronged approach. First, we try to
                 identify the client characteristics that influence
                 their potential to forge a long-term C-V partnership.
                 To that extent, we discuss a partnership maturity curve
                 (PMC), which categorizes clients into three dynamic
                 stages, and predicts their potential for developing
                 mature partnerships based on their outsourcing
                 objectives and their fit with vendors' capabilities
                 (see Figure 1).\par

                 Second, we try to understand vendors' perspective on
                 the issue. We interviewed 21 executives in nine
                 established IT-outsourcing vendors in India. It has
                 been recommended that vendors' perspective is critical
                 to understanding C-V partnerships. Vendors highlighted
                 an interesting mix of their own as well as
                 client-generated issues, which we discuss in light of
                 the client dynamics identified by PMC, to propose
                 guidelines for clients interested in developing
                 successful C-V partnerships. The study confirms
                 existing belief that improving the longevity of C-V
                 partnerships requires relational investments from
                 clients. We identify various areas for clients to make
                 such investments.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2010:RPC,
  author =       "Moshe Y. Vardi",
  title =        "Revisiting the publication culture in computing
                 research",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666421",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LET,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: Too much debate?",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "6--7",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666422",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEc,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "8--8",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666424",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "{\em Communications\/}' Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Guzdial:2010:BTM,
  author =       "Mark Guzdial and Judy Robertson",
  title =        "{BLOG@CACM}: Too much programming too soon?",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "10--11",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666425",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish excerpts from
                 selected posts.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COGa,
  author =       "David Roman",
  title =        "{CACM} online: Granting a second life",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "12--12",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666426",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2010:NCB,
  author =       "Gregory Goth",
  title =        "News: {CS} and biology's growing pains",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "13--15",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666427",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Biologists can benefit from learning and using the
                 tools of computer science, but several real-world
                 obstacles remain.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NEW,
  author =       "Kirk L. Kroeker",
  title =        "News: Engineering the {Web}'s third decade",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "16--18",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666428",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "As Web technologies move beyond two-way interactive
                 capabilities to facilitate more dynamic and pervasive
                 experiences, the Web is quickly advancing toward its
                 third major upgrade.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NTG,
  author =       "Samuel Greengard",
  title =        "News: Tracking garbage",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "19--20",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Researchers are focusing on the so-called `removal
                 chain' in an attempt to save landfill space, improve
                 recycling rates, and trim the flow of toxic materials
                 into the environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:NKP,
  author =       "{CACM Staff}",
  title =        "News: {Katayanagi} prizes and other {CS} awards",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "21--21",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666430",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chang:2010:EBD,
  author =       "Tim Chang",
  title =        "Economic and business dimensions: Gaming will save us
                 all",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "22--24",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666431",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "How gaming, as the first media market to successfully
                 transition toward media-as-a-service, is an exemplar
                 for a similar evolutionary transition of content and
                 entertainment.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2010:LSO,
  author =       "Pamela Samuelson",
  title =        "Legally speaking: Only technological processes are
                 patentable",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "25--27",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666432",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The U.S. Supreme Court will narrow the universe of
                 process innovations that can be patented to those that
                 are `technological,' but what will that mean for
                 software?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hollander:2010:CEE,
  author =       "Rachelle Hollander",
  title =        "Computing ethics: The ethics beat",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "28--29",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666433",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Surveying the increasing variety and nature of ethical
                 challenges encountered by computing researchers and
                 practitioners.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2010:PIO,
  author =       "Peter J. Denning and Fernando Flores and Peter
                 Luzmore",
  title =        "The Profession of {IT}: Orchestrating coordination in
                 pluralistic networks",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "30--32",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666434",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Learning to build virtual teams of people of diverse
                 backgrounds is an urgent challenge.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tapia:2010:BPH,
  author =       "Richard Tapia",
  title =        "Broadening participation: Hiring and developing
                 minority faculty at research universities",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "33--35",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666435",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Emphasizing the importance of creating more programs
                 and investing more funding toward the goal of
                 developing minority faculty at research universities.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wilson:2010:IPM,
  author =       "Cameron Wilson and Peter Harsha",
  title =        "{IT} Policy: Making the case for computing",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "36--38",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666436",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Seeking funding for current and future computing
                 initiatives requires both a strong argument and a broad
                 community of supporters.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{OHara:2010:PPD,
  author =       "Kieron O'Hara and Nigel Shadbolt",
  title =        "Privacy: Privacy on the data web",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "39--41",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666437",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Considering the nebulous question of ownership in the
                 virtual realm.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McKusick:2010:GEF,
  author =       "Kirk McKusick and Sean Quinlan",
  title =        "{GFS}: evolution on fast-forward",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "42--49",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666439",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Kirk McKusick and Sean Quinlan discuss the origin and
                 evolution of the Google File System.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brown:2010:TEE,
  author =       "David J. Brown and Charles Reams",
  title =        "Toward energy-efficient computing",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "50--58",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666438",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "What will it take to make server-side computing more
                 energy efficient?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sia:2010:GIM,
  author =       "Siew Kien Sia and Christina Soh and Peter Weill",
  title =        "Global {IT} management: structuring for scale,
                 responsiveness, and innovation",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "59--64",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666449",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "To succeed on a global scale, businesses should focus
                 on a trio of key elements.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lengauer:2010:CAV,
  author =       "Thomas Lengauer and Andr{\'e} Altmann and Alexander
                 Thielen and Rolf Kaiser",
  title =        "Chasing the {AIDS} virus",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "66--74",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666440",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "With no HIV vaccine in sight, virologists need to know
                 how the virus will react to a given combination drug
                 therapy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Seay:2010:VCI,
  author =       "Cameron Seay and Gary Tucker",
  title =        "Virtual computing initiative at a small public
                 university",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "75--83",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666441",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Student participation and resulting expertise is as
                 valuable as having the high-performance resource
                 itself.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Conitzer:2010:MDB,
  author =       "Vincent Conitzer",
  title =        "Making decisions based on the preferences of multiple
                 agents",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "84--94",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666442",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Computer scientists have made great strides in how
                 decision-making mechanisms are used.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Micciancio:2010:FGC,
  author =       "Daniele Micciancio",
  title =        "A first glimpse of cryptography's {Holy Grail}",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "96--96",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666445",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gentry:2010:CAF,
  author =       "Craig Gentry",
  title =        "Computing arbitrary functions of encrypted data",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "97--105",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666444",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Suppose that you want to delegate the ability to {\em
                 process\/} your data, without giving away {\em
                 access\/} to it. We show that this separation is
                 possible: we describe a `fully homomorphic' encryption
                 scheme that keeps data private, but that allows a
                 worker that {\em does not have the secret decryption
                 key\/} to compute any (still encrypted) result of the
                 data, even when the function of the data is very
                 complex. In short, a third party can perform
                 complicated processing of data without being able to
                 see it. Among other things, this helps make cloud
                 computing compatible with privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Perona:2010:STF,
  author =       "Pietro Perona",
  title =        "Seeing the trees, the forest, and much more",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "106--106",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666443",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Torralba:2010:UFS,
  author =       "A. Torralba and K. P. Murphy and W. T. Freeman",
  title =        "Using the forest to see the trees: exploiting context
                 for visual object detection and localization",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "107--114",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666446",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Recognizing objects in images is an active area of
                 research in computer vision. In the last two decades,
                 there has been much progress and there are already
                 object recognition systems operating in commercial
                 products. However, most of the algorithms for detecting
                 objects perform an exhaustive search across all
                 locations and scales in the image comparing local image
                 regions with an object model. That approach ignores the
                 semantic structure of scenes and tries to solve the
                 recognition problem by brute force. In the real world,
                 objects tend to covary with other objects, providing a
                 rich collection of contextual associations. These
                 contextual associations can be used to reduce the
                 search space by looking only in places in which the
                 object is expected to be; this also increases
                 performance, by rejecting patterns that look like the
                 target but appear in unlikely places.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPb,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "118--118",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666447",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Last month (February 2010, p. 120) we posted a trio of
                 brainteasers, including one as yet unsolved, concerning
                 the breaking of a bar of chocolate.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Juels:2010:LBF,
  author =       "Ari Juels",
  title =        "Last Byte: Future tense: The Primal Cue",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "120--ff",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666448",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Future Tense, one of the revolving features on this
                 page, presents stories and essays from the intersection
                 of computational science and technological speculation,
                 their boundaries limited only by our ability to imagine
                 what will and could be.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Arduini:2010:BCB,
  author =       "Fabio Arduini and Vincenzo Morabito",
  title =        "Business continuity and the banking industry",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "121--125",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Since the September 11$^{th}$ attacks on the World
                 Trade Center, tsunami disaster, and hurricane Katrina,
                 there has been renewed interest in emergency planning
                 in both the private and public sectors. In particular,
                 as managers realize the size of potential exposure to
                 unmanaged risk, insuring `business continuity' (BC) is
                 becoming a key task within all industrial and financial
                 sectors (Figure 1).",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cannoy:2010:FHC,
  author =       "Sherrie Drye Cannoy and A. F. Salam",
  title =        "A framework for health care information assurance
                 policy and compliance",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "126--131",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666453",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "As many as 400 people may have access to one's
                 personal medical information throughout the typical
                 care process. Disclosures of sensitive information such
                 as emotional problems, sexually transmitted diseases,
                 substance abuse, and genetic predispositions to
                 diseases---could cause embarrassment and affect
                 insurability, child custody cases, and employment. A
                 recent survey by IDC found that {\em `Most consumers
                 \ldots{}were uncomfortable with their health plan
                 sharing health information with a hospital, a
                 specialist or their primary care doctor\ldots{} (and)
                 were concerned with who saw their information and were
                 worried that the information could be made available
                 online\ldots{} (and) other respondents said they didn't
                 trust their health plan or hospital to protect their
                 information.'\/} Clearly, patients (consumers) feel
                 that it is critical that their medical information is
                 held in confidence. If patients do not feel that their
                 personal medical information will be kept confidential,
                 they may withhold important medical information from
                 health care providers making it difficult to provide
                 quality and effective health care.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lin:2010:SPE,
  author =       "Lin Lin and Paul Jen-Hwa Hu and Olivia R. Liu Sheng
                 and Johnny Lee",
  title =        "Is stickiness profitable for electronic retailers?",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "132--136",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666454",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Is stickiness the Holy Grail for e-tailing? In
                 general, {\em stickiness\/} refers to the amount of
                 time a person spends on a Web site during a visiting
                 session (such as, {\em session stickiness\/}) or over a
                 specified time period (such as, {\em site
                 stickiness\/}). Zauberman equates stickiness and
                 `within-site lock-in' and uses it to approximate
                 visitors' loyalty to a Web site. The conventional
                 wisdom suggests that stickiness is crucial and can
                 contribute to e-tailers' bottom lines considerably.
                 However, the direct economic impacts of stickiness have
                 not been duly examined empirically, particularly from
                 the perspective of consumers' within-session visiting
                 behaviors.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Subramanyam:2010:UPS,
  author =       "Ramanath Subramanyam and Fei Lee Weisstein and M. S.
                 Krishnan",
  title =        "User participation in software development projects",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "137--141",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666455",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "It is commonly acknowledged that success in IT
                 projects is difficult to achieve. A recent industry
                 survey observed that only 34\% of IT projects were
                 considered successful. Of the several potential factors
                 contributing to this hard-to-achieve success, user
                 involvement was noted as the most important one.
                 Consistent with this notion, both researchers and
                 practitioners have viewed user participation as an
                 important way of improving software quality and
                 increasing user satisfaction and acceptance.
                 Users/customers are often encouraged to participate and
                 directly communicate with developers in the software
                 development process. On the other hand, empirical
                 evidence shows that user participation in the
                 development process can negatively influence project
                 performance since it could make the process more
                 difficult, lengthy, and less effective. Such
                 contradictory findings raise the question of when user
                 participation is actually helpful and when it might
                 negatively impact project performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Parkinson:2010:PBM,
  author =       "S. T. Parkinson and R. M. Hierons and M. Lycett and M.
                 Norman",
  title =        "Practitioner-based measurement: a collaborative
                 approach",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "142--147",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666456",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The established philosophy within the software
                 development industry is that an organization
                 implementing a program to improve software quality can
                 expect to recoup the cost of the implementation many
                 times over through the reduced cost associated with
                 improvements in quality. Measurement initiatives are
                 perceived to provide a key contribution to quality
                 improvement as evidenced by the focus of early
                 measurement based initiatives and the place of
                 measurement in the higher echelons of process
                 initiatives. In general, organizations pursue
                 measurement initiatives from a perspective that,
                 without measurement, control is not possible. While
                 organizations recognize that there are potential
                 benefits to measuring their processes and products,
                 however, they typically find it difficult to structure
                 ad-hoc measures into a formal program --- a situation
                 that is compounded by the significant cost of
                 implementing such programs. Although these problems
                 have led to some organizations moving away from
                 measurement programs, many companies still use
                 measurement programs as illustrated by the continued
                 interest in, for example, the Capability Maturity
                 Model. Given the appetite and potential returns on
                 investment of measurement frameworks and initiatives,
                 ways of successfully implementing them are important.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Nagy:2010:OAO,
  author =       "Del Nagy and Areej M. Yassin and Anol Bhattacherjee",
  title =        "Organizational adoption of open source software:
                 barriers and remedies",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "148--151",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666457",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Perhaps the business case for adopting open source
                 software is an easy sell. After all, the software is
                 free, and can be simply downloaded from the Internet
                 and installed or customized as needed. Organizations
                 interested in reducing the licensing fees of
                 proprietary software, while also avoiding the penalties
                 and legal liabilities associated with their illegal
                 use, can definitely consider open source software a
                 plausible alternative. However, less obvious than the
                 cost savings but equally important are the barriers
                 ('hidden costs') of adopting open source software.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Benamati:2010:AUC,
  author =       "John H. Benamati and Zafer D. Ozdemir and H. Jeff
                 Smith",
  title =        "Aligning undergraduate {IS} curricula with industry
                 needs",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "152--156",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666458",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A paradox is becoming obvious to both information
                 systems (IS) academics and executives: U.S. demand for
                 IS graduates is increasing, but graduation numbers from
                 university IS programs are flat or in decline. As a
                 result, many CIOs are devoting increasing proportions
                 of their organizations' resources to recruiting IS
                 graduates, through outreach programs to both students
                 and faculty. In spite of these efforts, however, many
                 CIOs report continuing frustrations in attracting
                 enough newly-minted IS talent.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chan:2010:AOE,
  author =       "Hing Kai Chan",
  title =        "Agent-oriented embedded electronic measuring systems",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "157--162",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666459",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Agent technology has attracted the attention of
                 academia in many domains in the past decade. It is
                 probably due to the fact that computer systems have
                 been becoming complicated with distribution and
                 openness characteristics. Agent-based systems, or
                 multi-agent systems in general, are contemporary
                 paradigm for software development. Ashri et al. claimed
                 that `the underlying concept of decentralized,
                 autonomous control expressed through agents that are
                 able to communicate and cooperate to achieve goals is
                 especially appealing for applications in heterogeneous
                 and dynamic computing environments.'",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gotlieb:2010:WAA,
  author =       "Calvin Gotlieb and James Horning",
  title =        "The work of {ACM}'s awards committee",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721655",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LECa,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: Computing paradigm not a
                 branch of science",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "6--7",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721657",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEd,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "8--8",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721658",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "{\em Communications\/}' Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2010:BSDa,
  author =       "Michael Stonebraker",
  title =        "{BLOG@CACM}: {SQL} databases v. {NoSQL} databases",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "10--11",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721659",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish excerpts from
                 selected posts.\par

                 Follow us on Twitter at
                 http://twitter.com/blogCACM.\par

                 Michael Stonebraker considers several performance
                 arguments in favor of NoSQL databases---and finds them
                 insufficient.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COGb,
  author =       "David Roman",
  title =        "{CACM} Online: Going mobile",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "12--12",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721660",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2010:NDS,
  author =       "Alex Wright",
  title =        "News: Data streaming 2.0",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "13--14",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721661",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "In today's real-time Web, data streaming applications
                 no longer have the luxury of making multiple passes
                 over a recorded data set.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NRG,
  author =       "Gary Anthes",
  title =        "News: Robots gear up for disaster response",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "15--16",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721662",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "After 15 years of research, robots for search and
                 rescue may be nearing prime time.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NSA,
  author =       "Samuel Greengard",
  title =        "News: Spies among us?",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "17--19",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721663",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Governments' practice of electronic surveillance---and
                 the growing use of warrantless wiretapping---has
                 observers deeply concerned.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Heeks:2010:EMD,
  author =       "Richard Heeks",
  title =        "Emerging Markets: Development 2.0: the {IT}-enabled
                 transformation of international development",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "22--24",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721665",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The fundamental assumptions of international
                 development are changing, increasingly putting the
                 tools for a digital economy into the hands of the
                 world's poor.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Campbell-Kelly:2010:HRC,
  author =       "Martin Campbell-Kelly",
  title =        "Historical reflection: Be careful what you wish for",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "25--26",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721666",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Reflections on the decline of mathematical tables.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2010:TSM,
  author =       "Michael Cusumano",
  title =        "Technology strategy and management: Cloud computing
                 and {SaaS} as new computing platforms",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "27--29",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721667",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ohm:2010:VWN,
  author =       "Paul Ohm",
  title =        "Viewpoint: When network neutrality met privacy",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "30--32",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721669",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:KVD,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: The data-structure canon",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "33--34",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721668",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Woods:2010:CDC,
  author =       "Andy Woods",
  title =        "Cooling the data center",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "36--42",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721671",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Creeger:2010:CRM,
  author =       "Mache Creeger",
  title =        "{CTO} roundtable: malware defense",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "43--49",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721670",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armbrust:2010:VCC,
  author =       "Michael Armbrust and Armando Fox and Rean Griffith and
                 Anthony D. Joseph and Randy Katz and Andy Konwinski and
                 Gunho Lee and David Patterson and Ariel Rabkin and Ion
                 Stoica and Matei Zaharia",
  title =        "A view of cloud computing",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "50--58",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721672",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ranganathan:2010:REP,
  author =       "Parthasarathy Ranganathan",
  title =        "Recipe for efficiency: principles of power-aware
                 computing",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "60--67",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721673",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Yekhanin:2010:PIR,
  author =       "Sergey Yekhanin",
  title =        "Private information retrieval",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "68--73",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721674",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Antoy:2010:FLP,
  author =       "Sergio Antoy and Michael Hanus",
  title =        "Functional logic programming",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "74--85",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721675",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Smyth:2010:TPC,
  author =       "Padhraic Smyth and Charles Elkan",
  title =        "Technical perspective: Creativity helps influence
                 prediction precision",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "88--88",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721678",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Koren:2010:CFT,
  author =       "Yehuda Koren",
  title =        "Collaborative filtering with temporal dynamics",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "89--97",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721677",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kaelbling:2010:TPN,
  author =       "Leslie Pack Kaelbling",
  title =        "Technical perspective New bar set for intelligent
                 vehicles",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "98--98",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721676",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Thrun:2010:TRC,
  author =       "Sebastian Thrun",
  title =        "Toward robotic cars",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "99--106",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721679",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:LBQb,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: Systematic Thinking: {Andrew S.
                 Tanenbaum} talks about {MINIX}, microkernels, and
                 electronic voting systems",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "112--ff",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721680",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/minix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Poon:2010:CFS,
  author =       "Pak-Lok Poon and Sau-Fun Tang and T. H. Tse and T. Y.
                 Chen",
  title =        "{CHOC'LATE}: a framework for specification-based
                 testing",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "113--118",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721687",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Aalberts:2010:TTI,
  author =       "Robert J. Aalberts and Percy S. Poon and Paul D.
                 Thistle",
  title =        "A tale of two {Internet} service providers",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "119--123",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721688",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2010:CPC,
  author =       "Keith Wright",
  title =        "Capstone programming courses considered harmful",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "124--127",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721689",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rebbapragada:2010:DMR,
  author =       "Surya Rebbapragada and Amit Basu and John Semple",
  title =        "Data mining and revenue management methodologies in
                 college admissions",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "128--133",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721690",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gregg:2010:DCI,
  author =       "Dawn G. Gregg",
  title =        "Designing for collective intelligence",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "134--138",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721691",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ferretti:2010:WRB,
  author =       "Stefano Ferretti and Marco Furini and Claudio E.
                 Palazzi and Marco Roccetti and Paola Salomoni",
  title =        "{WWW} recycling for a better world",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "139--143",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721692",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Joseph:2010:IRI,
  author =       "Rhoda C. Joseph",
  title =        "Individual resistance to {IT} innovations",
  journal =      j-CACM,
  volume =       "53",
  number =       "4",
  pages =        "144--146",
  month =        apr,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1721654.1721693",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:14:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2010:GOS,
  author =       "Moshe Y. Vardi",
  title =        "{\em Globalization and Offshoring of Software\/}
                 revisited",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735224",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LER,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: Roots of publication delay",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "6--7",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735226",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEe,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "8--8",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735227",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wing:2010:BNF,
  author =       "Jeannette M. Wing and Daniel Reed",
  title =        "{BLOG@CACM}: {NSF} funding advice: 21st century
                 innovation",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "10--11",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735228",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COL,
  author =       "David Roman",
  title =        "{CACM} Online: Looking for control",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "12--12",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735229",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kanipe:2010:NMA,
  author =       "Jeff Kanipe",
  title =        "News: Modeling the astronomical",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "13--15",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735230",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NHB,
  author =       "Gary Anthes",
  title =        "News: Happy Birthday, {RDBMS!}",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "16--17",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735231",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NCC,
  author =       "Samuel Greengard",
  title =        "News: Cloud computing and developing nations",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "18--20",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735232",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2010:NTW,
  author =       "Jack Rosenberger",
  title =        "News: {Thacker} wins {Turing Award}",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "21--21",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735233",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:AGE,
  author =       "{CACM Staff}",
  title =        "{ACM}'s 2010 general election",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "23--31",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735251",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brynjolfsson:2010:EBD,
  author =       "Erik Brynjolfsson and Paul Hofmann and John Jordan",
  title =        "Economic and business dimensions: Cloud computing and
                 electricity: beyond the utility model",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "32--34",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735234",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wilson:2010:EHM,
  author =       "Cameron Wilson and Mark Guzdial",
  title =        "Education: How to make progress in computing
                 education",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "35--37",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735235",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Beck:2010:VCI,
  author =       "Roman Beck",
  title =        "Viewpoint: Can {IT} lean against the wind?",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "38--40",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735238",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Turel:2010:VME,
  author =       "Ofir Turel and Alexander Serenko",
  title =        "Viewpoint: Is mobile email addiction overlooked?",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "41--43",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735237",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Aspray:2010:CMS,
  author =       "William Aspray",
  title =        "Computer museum series: Great computing museums of the
                 world, part two",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "45--49",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735239",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Phillips:2010:EDT,
  author =       "Peter Phillips",
  title =        "Enhanced debugging with traces",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "50--53",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735240",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ridoux:2010:PRT,
  author =       "Julien Ridoux and Darryl Veitch",
  title =        "Principles of robust timing over the {Internet}",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "54--61",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735241",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Durkee:2010:WCC,
  author =       "Dave Durkee",
  title =        "Why cloud computing will never be free",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "62--69",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735242",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sellen:2010:BTC,
  author =       "Abigail J. Sellen and Steve Whittaker",
  title =        "Beyond total capture: a constructive critique of
                 lifelogging",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "70--77",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735243",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lewis:2010:SFA,
  author =       "Clayton Lewis and Michele H. Jackson and William M.
                 Waite",
  title =        "Student and faculty attitudes and beliefs about
                 computer science",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "78--85",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735244",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Albers:2010:EEA,
  author =       "Susanne Albers",
  title =        "Energy-efficient algorithms",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "86--96",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735245",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bartlett:2010:LAU,
  author =       "Peter L. Bartlett",
  title =        "Learning to act in uncertain environments: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "98--98",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735246",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ganchev:2010:CED,
  author =       "Kuzman Ganchev and Yuriy Nevmyvaka and Michael Kearns
                 and Jennifer Wortman Vaughan",
  title =        "Censored exploration and the dark pool problem",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "99--107",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735247",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Harman:2010:APT,
  author =       "Mark Harman",
  title =        "Automated patching techniques: the fix is in:
                 technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "108--108",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735248",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Weimer:2010:APR,
  author =       "Westley Weimer and Stephanie Forrest and Claire {Le
                 Goues} and ThanhVu Nguyen",
  title =        "Automatic program repair with evolutionary
                 computation",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "109--116",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735249",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPc,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Variations on the {Ham Sandwich
                 Theorem}",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "120--120",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735250",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tallon:2010:UDI,
  author =       "Paul P. Tallon",
  title =        "Understanding the dynamics of information management
                 costs",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "121--125",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735253",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Reich:2010:REI,
  author =       "Blaize Horner Reich and Chris Sauer",
  title =        "Roles of the external {IT} project manager",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "126--129",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735254",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hwang:2010:NPR,
  author =       "Wonil Hwang and Gavriel Salvendy",
  title =        "Number of people required for usability evaluation:
                 the $10 \pm 2$ rule",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "130--133",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735255",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Downing:2010:WBS,
  author =       "Charles E. Downing",
  title =        "Is {Web}-based supply chain integration right for your
                 company?",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "134--137",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735256",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wang:2010:MAA,
  author =       "Demin Wang and Dharma P. Agrawal and Wassana Toruksa
                 and Chaichana Chaiwatpongsakorn and Mingming Lu and Tim
                 C. Keener",
  title =        "Monitoring ambient air quality with carbon monoxide
                 sensor-based wireless network",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "138--141",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735257",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stratopoulos:2010:IIP,
  author =       "Theophanis C. Stratopoulos and Jee-Hae Lim",
  title =        "{IT} innovation persistence: an oxymoron?",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "142--146",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735258",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wilson:2010:RHI,
  author =       "E. Vance Wilson and Bengisu Tulu",
  title =        "The rise of a health-{IT} academic focus",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "147--150",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735259",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kim:2010:RIB,
  author =       "Hyeyoung Kim and Jae-Nam Lee and Jaemin Han",
  title =        "The role of {IT} in business ecosystems",
  journal =      j-CACM,
  volume =       "53",
  number =       "5",
  pages =        "151--156",
  month =        may,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1735223.1735260",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:15:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ryan:2010:TAH,
  author =       "Patricia Ryan",
  title =        "A tour of {ACM}'s {HQ}",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743547",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:WTD,
  author =       "{CACM Staff}",
  title =        "Workflow tools for distributed teams?",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "6--7",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743549",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEf,
  author =       "{CACM Staff}",
  title =        "In the Virtual Extension",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "8--8",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743550",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "{\em Communications'\/} Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Linden:2010:CIE,
  author =       "Greg Linden and Ed H. Chi and Mark Guzdial",
  title =        "The chaos of the {Internet} as an external brain; and
                 more",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "10--11",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743551",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COI,
  author =       "David Roman",
  title =        "{CACM} online: Interact naturally",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "12--12",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743552",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2010:NSH,
  author =       "Neil Savage",
  title =        "News: Straightening out heavy tails",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "13--15",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743553",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A better understanding of heavy-tailed probability
                 distributions can improve activities from Internet
                 commerce to the design of server farms.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2010:NBS,
  author =       "Tom Geller",
  title =        "News: Beyond the {Smart Grid}",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "16--17",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743554",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Sensor networks monitor residential and institutional
                 devices, motivating energy conservation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:NMY,
  author =       "Leah Hoffmann",
  title =        "News: Mine your business",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "18--19",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743555",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Researchers are developing new techniques to gauge
                 employee productivity from information flow.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:NRM,
  author =       "Leah Hoffmann",
  title =        "News: {Robin Milner}: the elegant pragmatist",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "20--21",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743556",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Remembering a rich legacy in verification, languages,
                 and concurrency.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2010:NCT,
  author =       "Jack Rosenberger",
  title =        "News: {CS} and technology leaders honored",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "22--22",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743557",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Narayanan:2010:PSM,
  author =       "Arvind Narayanan and Vitaly Shmatikov",
  title =        "Privacy and security: Myths and fallacies of
                 `personally identifiable information'",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "24--26",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743558",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Developing effective privacy protection technologies
                 is a critical challenge for security and privacy
                 research as the amount and variety of data collected
                 about individuals increase exponentially.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shapiro:2010:IRP,
  author =       "Stuart S. Shapiro",
  title =        "Inside risks: Privacy by design: moving from art to
                 practice",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "27--29",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743559",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Designing privacy into systems at the beginning of the
                 development process necessitates the effective
                 translation of privacy principles, models, and
                 mechanisms into system requirements.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2010:PIR,
  author =       "Peter J. Denning and Jack B. Dennis",
  title =        "The profession of {IT}: The resurgence of
                 parallelism",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "30--32",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743560",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Parallel computation is making a comeback after a
                 quarter century of neglect. Past research can be put to
                 quick use today.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:KVPa,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: Plotting away",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "33--34",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743561",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Tips and tricks for visualizing large data sets.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Leveque:2010:LTI,
  author =       "Fran{\c{c}}ois L{\'e}v{\^e}que",
  title =        "Law and technology: {Intel}'s rebates: above board or
                 below the belt?",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "35--37",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743562",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Over several years, Intel paid billions of dollars to
                 its customers. Was it to force them to boycott products
                 developed by its rival AMD or so they could sell its
                 microprocessors at lower prices?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Garfinkel:2010:VIR,
  author =       "Simson L. Garfinkel and Lorrie Faith Cranor",
  title =        "Viewpoint: Institutional review boards and your
                 research",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "38--40",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743563",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A proposal for improving the review procedures for
                 research projects that involve human subjects and their
                 associated identifiable private information.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shustek:2010:IIE,
  author =       "Len Shustek",
  title =        "Interview: An interview with {Ed Feigenbaum}",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "41--45",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743564",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "ACM Fellow and A. M. Turing Award recipient Edward A.
                 Feigenbaum, a pioneer in the field of expert systems,
                 reflects on his career.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Owens:2010:SEC,
  author =       "Dustin Owens",
  title =        "Securing elasticity in the cloud",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "46--51",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743565",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Elastic computing has great potential, but many
                 security challenges remain.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Phillips:2010:SB,
  author =       "George Phillips",
  title =        "Simplicity betrayed",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "52--58",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743566",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Emulating a video system shows how even a simple
                 interface can be more complex---and capable---than it
                 appears.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Heer:2010:TTV,
  author =       "Jeffrey Heer and Michael Bostock and Vadim
                 Ogievetsky",
  title =        "A tour through the visualization zoo",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "59--67",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743567",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A survey of powerful visualization techniques, from
                 the obvious to the obscure.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ailamaki:2010:MSD,
  author =       "Anastasia Ailamaki and Verena Kantere and Debabrata
                 Dash",
  title =        "Managing scientific data",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "68--78",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743568",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Needed are generic, rather than one-off, DBMS
                 solutions automating storage and analysis of data from
                 scientific collaborations.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chen:2010:CPS,
  author =       "Jilin Chen and Joseph A. Konstan",
  title =        "Conference paper selectivity and impact",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "79--83",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743569",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Conference acceptance rate signals future impact of
                 published conference papers.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Grauman:2010:ESS,
  author =       "Kristen Grauman",
  title =        "Efficiently searching for similar images",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "84--94",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743570",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "New algorithms provide the ability for robust but
                 scalable image search.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sarkar:2010:BCM,
  author =       "Vivek Sarkar",
  title =        "Building confidence in multicore software",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "96--96",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743571",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Burnim:2010:ACD,
  author =       "Jacob Burnim and Koushik Sen",
  title =        "Asserting and checking determinism for multithreaded
                 programs",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "97--105",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743572",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Leino:2010:LDP,
  author =       "K. Rustan M. Leino",
  title =        "Learning to do program verification",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "106--106",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743573",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Klein:2010:SFV,
  author =       "Gerwin Klein and June Andronick and Kevin Elphinstone
                 and Gernot Heiser and David Cock and Philip Derrin and
                 Dhammika Elkaduwe and Kai Engelhardt and Rafal Kolanski
                 and Michael Norrish and Thomas Sewell and Harvey Tuch
                 and Simon Winwood",
  title =        "{seL4}: formal verification of an operating-system
                 kernel",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "107--115",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743574",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPd,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "118--118",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743575",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Last month (May 2010, p. 120) we posted a trio of
                 brainteasers, including one as yet unsolved, concerning
                 variations on the Ham Sandwich Theorem.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brin:2010:LBF,
  author =       "David Brin",
  title =        "Last Byte: Future tense: How the {Net} ensures our
                 cosmic survival",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "120, 119",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743576",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Future Tense, one of the revolving features on this
                 page, presents stories and essays from the intersection
                 of computational science and technological speculation,
                 their boundaries limited only by our ability to imagine
                 what will and could be. Give adolescent wonder an
                 evolutionary jolt.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sun:2010:BCS,
  author =       "Jun Sun and Marshall Scott Poole",
  title =        "Beyond connection: situated wireless communities",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "121--125",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743579",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{deCesare:2010:EPA,
  author =       "Sergio de Cesare and Mark Lycett and Robert D.
                 Macredie and Chaitali Patel and Ray Paul",
  title =        "Examining perceptions of agility in software
                 development practice",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "126--130",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743580",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Nill:2010:FIS,
  author =       "Alexander Nill and John Schibrowsky and James W.
                 Peltier",
  title =        "Factors that influence software piracy: a view from
                 {Germany}",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "131--134",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743581",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kietzmann:2010:PR,
  author =       "Jan Kietzmann and Ian Angell",
  title =        "{Panopticon} revisited",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "135--138",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743582",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Baudry:2010:BSM,
  author =       "Benoit Baudry and Sudipto Ghosh and Franck Fleurey and
                 Robert France and Yves Le Traon and Jean-Marie Mottu",
  title =        "Barriers to systematic model transformation testing",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "139--143",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743583",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gallagher:2010:RVS,
  author =       "Kevin P. Gallagher and Kate M. Kaiser and Judith C.
                 Simon and Cynthia M. Beath and Tim Goles",
  title =        "The requisite variety of skills for {IT}
                 professionals",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "144--148",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743584",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vannoy:2010:SIM,
  author =       "Sandra A. Vannoy and Prashant Palvia",
  title =        "The social influence model of technology adoption",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "149--153",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743585",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Human innovation, in combination with the Internet,
                 networking, and communications technologies have
                 produced a new platform for social and business
                 networking, formation of community, and communication.
                 This emerging phenomenon is generally known as social
                 computing. While there is no widely accepted definition
                 of social computing, we define it as: {\em intra-group
                 social and business actions practiced through group
                 consensus, group cooperation, and group authority,
                 where such actions are made possible through the
                 mediation of information technologies, and where group
                 interaction causes members to conform and influences
                 others to join the group}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rhee:2010:MM,
  author =       "Cheul Rhee and G. Lawrence Sanders and Natalie C.
                 Simpson",
  title =        "{I}, myself and e-myself",
  journal =      j-CACM,
  volume =       "53",
  number =       "6",
  pages =        "154--157",
  month =        jun,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1743546.1743586",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 21 12:34:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The Internet has revolutionized the manner in which
                 people interact. Once regarded as merely a convenient
                 platform for the collection and dissemination of
                 information, the Internet is increasingly used for
                 intensely personal and creative purposes. Web 2.0
                 applications supporting Web-based social networking
                 through blogs, wikis and folksonomies have proven
                 potent in changing users' perception and use of the
                 Internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2010:H,
  author =       "Moshe Y. Vardi",
  title =        "Hypercriticality",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785415",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LED,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: Don't ignore security offshore,
                 or in the cloud",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "6--7",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785417",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEg,
  author =       "{CACM Staff}",
  title =        "In the Virtual Extension",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "9--9",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785418",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Communications' {\em Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.\/}",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ortega:2010:BSD,
  author =       "Ruben Ortega and Mark Guzdial and Daniel Reed",
  title =        "{BLOG@CACM}: Software development and crunch time; and
                 more",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "10--11",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785419",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish selected posts or
                 excerpts.

                 twitter Follow us on Twitter at
                 http://twitter.com/blogCACM

                 Ruben Ortega discusses developers and crunch time; Mark
                 Guzdial considers the impact of open source practices
                 on computing education; and Daniel Reed writes about
                 the technological shift from computational paucity to
                 computational plethora.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COCb,
  author =       "David Roman",
  title =        "{CACM} online: In case you missed it",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "12--12",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785420",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lindley:2010:NSC,
  author =       "David Lindley",
  title =        "News: Sharing computational perspectives",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "13--15",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785421",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Computer scientists are now making intellectual
                 contributions to a wide range of other disciplines,
                 including evolutionary theory, physics, and
                 economics.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NC,
  author =       "Samuel Greengard",
  title =        "News: Censored!",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "16--18",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785423",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Countries use Internet censorship to dominate the
                 political dialogue, but also to create favorable
                 conditions for government-controlled businesses.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NMA,
  author =       "Kirk L. Kroeker",
  title =        "News: Mainstreaming augmented reality",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "19--21",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785422",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Advancements in computer vision, object recognition,
                 and related technologies are leading to new levels of
                 sophistication in augmented-reality applications and
                 presenting new ways for humans to relate to the natural
                 world.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NCS,
  author =       "Gary Anthes",
  title =        "News: Committed to success",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "22--23",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785424",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Charles P. Thacker talks about the importance of
                 simplicity, reusable tools, thinking broadly, and his
                 practice of Tom Sawyering.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2010:NEB,
  author =       "Gregory Goth",
  title =        "News: {Eric Brewer}: change agent",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "24--24",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785425",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Eric Brewer's latest project involves designing and
                 deploying low-cost wireless infrastructure in
                 developing regions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Underwood:2010:NVF,
  author =       "Sarah Underwood",
  title =        "News: Visions of the future",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "25--25",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785426",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "ACM joined forces with the British Computer Society to
                 deliver its first academic research conference in
                 Europe.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sako:2010:OVS,
  author =       "Mari Sako",
  title =        "Outsourcing versus shared services",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "27--29",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785427",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Choosing between outsourcing and shared services has
                 significant implications for long-term corporate
                 strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Borenstein:2010:CEW,
  author =       "Jason Borenstein",
  title =        "Computing ethics: Work life in the robotic age",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "30--31",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785428",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Technological change results in changes in
                 expectations, in this case affecting the workplace.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2010:LSS,
  author =       "Pamela Samuelson",
  title =        "Legally speaking: Should the {Google} book settlement
                 be approved?",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "32--34",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Considering the precedent that could be established by
                 approval of the controversial Google book settlement.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Taylor:2010:BPC,
  author =       "Valerie E. Taylor",
  title =        "Broadening participation: Cultivating cultural
                 diversity in information technology",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "35--36",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785430",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introducing CMD-IT, a new center focused on
                 synergistic activities related to ethnic minorities and
                 people with disabilities.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Genova:2010:VCS,
  author =       "Gonzalo G{\'e}nova",
  title =        "Viewpoint: Is computer science truly scientific?",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "37--39",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785431",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Reflections on the (experimental) scientific method in
                 computer science.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Snir:2010:DMA,
  author =       "Marc Snir and Telle Whitney",
  title =        "Distinguished members: Advice to members seeking {ACM}
                 distinction",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785432",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Loh:2010:IHP,
  author =       "Eugene Loh",
  title =        "The ideal {HPC} programming language",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "42--47",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785433",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Maybe it's Fortran. Or maybe it just doesn't matter.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gregg:2010:VSL,
  author =       "Brendan Gregg",
  title =        "Visualizing system latency",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "48--54",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785435",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Heat maps are a unique and powerful way to visualize
                 latency data. Explaining the results, however, is an
                 ongoing challenge.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2010:YDI,
  author =       "Poul-Henning Kamp",
  title =        "You're doing it wrong",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "55--59",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785434",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Think you've mastered the art of server performance?
                 Think again.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lewandowski:2010:CUC,
  author =       "Gary Lewandowski and Dennis J. Bouvier and Tzu-Yi Chen
                 and Robert McCartney and Kate Sanders and Beth Simon
                 and Tammy VanDeGrift",
  title =        "Commonsense understanding of concurrency: computing
                 students and concert tickets",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "60--70",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785438",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Innate understanding of concurrency helps beginners
                 solve CS problems with multiple processes executing at
                 the same time.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Igarashi:2010:CGA,
  author =       "Takeo Igarashi",
  title =        "Computer graphics for all",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "71--77",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785436",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Interactive computer graphics would rival
                 word-processing and presentation programs for everyday
                 communications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roughgarden:2010:AGT,
  author =       "Tim Roughgarden",
  title =        "Algorithmic game theory",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "78--86",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785439",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A new era of theoretical computer science addresses
                 fundamental problems about auctions, networks, and
                 human behavior.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Boehm:2010:SFX,
  author =       "Hans-J. Boehm",
  title =        "A solid foundation for x86 shared memory: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "88--88",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785442",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sewell:2010:XTR,
  author =       "Peter Sewell and Susmit Sarkar and Scott Owens and
                 Francesco Zappa Nardelli and Magnus O. Myreen",
  title =        "{x86-TSO}: a rigorous and usable programmer's model
                 for x86 multiprocessors",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "89--97",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785443",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Exploiting the multiprocessors that have recently
                 become ubiquitous requires high-performance and
                 reliable concurrent systems code, for concurrent data
                 structures, operating system kernels, synchronization
                 libraries, compilers, and so on. However, concurrent
                 programming, which is always challenging, is made much
                 more so by two problems. First, real multiprocessors
                 typically do not provide the sequentially consistent
                 memory that is assumed by most work on semantics and
                 verification. Instead, they have relaxed memory models,
                 varying in subtle ways between processor families, in
                 which different hardware threads may have only loosely
                 consistent views of a shared memory. Second, the public
                 vendor architectures, supposedly specifying what
                 programmers can rely on, are often in ambiguous
                 informal prose (a particularly poor medium for loose
                 specifications), leading to widespread
                 confusion.\par

                 In this paper we focus on x86 processors. We review
                 several recent Intel and AMD specifications, showing
                 that all contain serious ambiguities, some are arguably
                 too weak to program above, and some are simply unsound
                 with respect to actual hardware. We present a new {\em
                 x86-TSO\/} programmer's model that, to the best of our
                 knowledge, suffers from none of these problems. It is
                 mathematically precise (rigorously defined in HOL4) but
                 can be presented as an intuitive abstract machine which
                 should be widely accessible to working programmers. We
                 illustrate how this can be used to reason about the
                 correctness of a Linux spinlock implementation and
                 describe a general theory of data-race freedom for
                 x86-TSO. This should put x86 multiprocessor system
                 building on a more solid foundation; it should also
                 provide a basis for future work on verification of such
                 systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Irwin:2010:TSR,
  author =       "Mary Jane Irwin",
  title =        "Technology scaling redirects main memories: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "98--98",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785440",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lee:2010:PCM,
  author =       "Benjamin C. Lee and Engin Ipek and Onur Mutlu and Doug
                 Burger",
  title =        "Phase change memory architecture and the quest for
                 scalability",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "99--106",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785441",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Memory scaling is in jeopardy as charge storage and
                 sensing mechanisms become less reliable for prevalent
                 memory technologies, such as dynamic random access
                 memory (DRAM). In contrast, phase change memory (PCM)
                 relies on programmable resistances, as well as scalable
                 current and thermal mechanisms. To deploy PCM as a DRAM
                 alternative and to exploit its scalability, PCM must be
                 architected to address relatively long latencies, high
                 energy writes, and finite endurance.\par

                 We propose architectural enhancements that address
                 these limitations and make PCM competitive with DRAM. A
                 baseline PCM system is $ 1.6\times $ slower and
                 requires $ 2.2\times $ more energy than a DRAM system.
                 Buffer reorganizations reduce this delay and energy gap
                 to $ 1.2\times $ and $ 1.0\times $, using narrow rows
                 to mitigate write energy as well as multiple rows to
                 improve locality and write coalescing. Partial writes
                 mitigate limited memory endurance to provide more than
                 10 years of lifetime. Process scaling will further
                 reduce PCM energy costs and improve endurance.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:LBQc,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: From Single Core to Multicore",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "112, 111",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785444",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Charles P. Thacker discusses the legendary Alto
                 personal computer, the invention of the Ethernet, and
                 his current research on multicore architectures.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Yao:2010:ASP,
  author =       "Yurong Yao and Edward Watson and Beverly K. Kahn",
  title =        "Application service providers: market and adoption
                 decisions",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "113--117",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785447",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 IT outsourcing has been a viable business strategy
                 since the late 1950s when companies began to invest
                 significant resources in outside computing services. As
                 IT managers increasingly used time sharing, contract
                 programming, and facilities management, the next few
                 decades saw accompanying increases in efficiency in
                 software applications and services, not to mention
                 decreased operations costs. In 1989, when Kodak
                 outsourced its entire IT department to IBM and EDS, the
                 business world had to scramble to get over its initial
                 shock. Seemingly overnight, `software' and `service'
                 had become strange bedfellows. The rules of the game
                 had radically changed.\par

                 Since the mid-1990s, the explosion in Internet
                 connectivity, increased bandwidth, and the ubiquitous
                 nature of computing have made the delivery of software
                 applications from remote data centers both
                 technologically feasible and economically attractive. A
                 relatively new form of IS outsourcing, Application
                 Services Provision (ASP), provides applications to
                 multiple entities from its data center across a wide
                 area network. Similar to the telephone services model,
                 clients pay a monthly fee to access online applications
                 from an ASP. Advances in encryption and firewall
                 technology remove a client's security concerns for
                 using remotely hosted services. Active research on ASP
                 outsourcing (also called NetSourcing) has attracted
                 academic scholars and business practitioners alike, but
                 few have investigated the specifics of the market and
                 the decision process to adopt the ASP model.\par

                 ASPs today are quite different from what they were five
                 years ago, in large part because this dynamic industry
                 has experienced significant merger and acquisition
                 activity. Forty percent of ASPs active in 2001 were no
                 longer in business in 2004. Traditional software
                 companies also have jumped on the ASP bandwagon,
                 developing new technologies to deliver on-demand
                 services. The scope of hosted applications for ASPs has
                 also shifted significantly as certain applications were
                 scrapped for lack of profitability, for example,
                 overall enterprise system hosting with no specific
                 industrial solutions. However, a Forrester report
                 predicted that as eCommerce continued to grow 30\% -
                 40\% in 2005, the demand for licensed software products
                 would decrease while demand for hosted services
                 increases. This prediction seems to be reality, as ASP
                 hosting solutions are increasingly viable and
                 attractive business models.\par

                 Thus, to update our knowledge of the rapidly changing
                 ASP market and to help practitioners make
                 better-informed ASP adoption decisions, this article
                 addresses two central questions: What is the structure
                 of the current market? And what factors should clients
                 consider in their ASP adoption decisions?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Romero:2010:EDP,
  author =       "Jorge A. Romero and Nirup Menon and Rajiv D. Banker
                 and Mark Anderson",
  title =        "{ERP}: drilling for profit in the oil and gas
                 industry",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "118--121",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785448",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 Most large companies have adopted some form of
                 enterprise resource planning (ERP) system. A survey of
                 IT executives in the U.S. showed that ERP was the
                 second most important key category for investment. In
                 many cases, the implementation of an ERP system was a
                 long and expensive ordeal that involved extensive
                 restructuring of businesses and reengineering of
                 processes.\par

                 While the potential benefits of ERP have been extolled
                 frequently and much has been written about individual
                 company experiences, only limited evidence has been
                 produced that implementation of ERP does, on average,
                 lead to enhanced performance. To the best of our
                 knowledge, this is the first industry analysis on ERP
                 because previous work has been limited to case studies
                 and industry cross-sectional analyses.\par

                 Several research studies have validated that IT
                 provides productivity and profitability advantages.
                 However, questions remain because it is not clear
                 whether advantages from IT contribute, and to what
                 degree they might contribute, to operational efficiency
                 and profitability. For example, if the same IT is
                 implemented by all firms in an industry, will industry
                 profits from IT disappear? Due to the fact that for
                 many years large companies developed their information
                 systems independently, there have been limited
                 opportunities to evaluate the implementation of similar
                 IT infrastructure across companies. This study seeks to
                 extend prior work by performing a longitudinal study of
                 implementation of ERP systems in a specific
                 industry.\par

                 According to Porter, each industry is affected by new
                 information technology in different ways and drawing
                 general conclusions about how new IT affects firms
                 across industries would be a mistake. The oil and gas
                 industry was selected because ERP plays a major role in
                 standardizing business processes in this industry. In
                 this role, ERP helps firms link global operations and
                 supply chains. Also, a commodity-product industry, like
                 the oil and gas industry, helps us control for other
                 influences that may have affected the performance of
                 oil and gas companies during the study period. The ERP
                 adopting firms are those that adopted SAP.\par

                 This research applies a new methodological approach
                 toward understanding ERP implementation because rather
                 than looking at ordinary measures of firm performance,
                 we look at strategic performance measures (SPM) that
                 can only be utilized if one delves into data that is
                 not found on the financial statements. This is the
                 first study that shows the sources of profitability
                 after an ERP implementation, and will help managers
                 understand the strategic and managerial implications of
                 ERP implementations. Our analysis compares performance
                 changes of ERP adopting firms versus non-adopting firms
                 over a fifteen-year period (1990--2005), which is the
                 period when this industry was being transformed by
                 increased use of technology in the oil and gas
                 industry. Therefore, we see how the implementation of
                 ERP affected firm performance during this period in
                 relation to non-adopting firms.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chang:2010:CEE,
  author =       "Wei-Lun Chang and Soe-Tsyr Yuan and Carol W. Hsu",
  title =        "Creating the experience economy in e-commerce",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "122--127",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785449",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 Advances in information technology together with the
                 forces of globalization have accelerated the growth of
                 service industries. In 2003, the OECD reported that
                 service industries now account for over 60\% of both
                 employment and the gross domestic product (GDP) of OECD
                 member countries. The U.S Bureau of Labor Statistics
                 (BLS) has forecast strong employment growth in the
                 American service sector between 2004 and 2014. Although
                 service industries are expanding, Gilmore and Pine
                 argue that, the growing commoditisation of services
                 offered has gradually transformed the competition for
                 market share from focusing on the quality of services
                 to the creation of memorable experiences. As a
                 consequence, the competitive position of a firm now
                 depends to a large extent on its ability to generate
                 impressive experiences through innovative delivery
                 channels.\par

                 In this article, we adopt Gilmore and Pine's view that
                 the economic value of the experience economy lies in
                 co-producing the staging experiences via customer
                 participation and connection. Furthermore, we suggest
                 that current technologies and the growth of the
                 Internet have both enabled and strengthened the
                 opportunities for experience-oriented offerings beyond
                 limitations of time and place. In following sections,
                 we first describe the current practice of experience
                 economy in electronic commerce. Taking the iCare health
                 care service as an example, we demonstrate how
                 collaborative pricing over the Internet can further
                 provide added-value to the production of experiences
                 offered in the electronic marketplace.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Nov:2010:WDP,
  author =       "Oded Nov and Chen Ye",
  title =        "Why do people tag?: motivations for photo tagging",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "128--131",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785450",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 Tagging, or using keywords to add metadata to shared
                 content, is gaining much popularity in recent years.
                 Tags are used to annotate various types of content,
                 including images, videos, bookmarks, and blogs, through
                 web-based systems such as Flickr, YouTube, del.icio.us,
                 and Technorati, respectively. The popularity of tagging
                 is attributed, at least in part, to the benefits users
                 gain from effective sharing and from organization of
                 very large amounts of information.\par

                 As tagging receives increasing attention in both
                 research and business communities, studies have found
                 that users vary substantially in their tag usage, and
                 suggested several factors that motivate user tagging.
                 However, to date no quantitative study has assessed the
                 strength of the effects of each motivation on levels of
                 tag usage. This is surprising, since user participation
                 is critical to the sustainability of content sharing
                 communities, and a collaborative tagging system cannot
                 succeed without higher level of user contribution. In
                 what follows, we address this gap, by studying the
                 strength of relationships between several motivations
                 and users' tagging levels on Flickr, a prominent Web
                 2.0 photo sharing community.\par

                 Currently, there are more than 35 million Flickr users,
                 who have so far uploaded more 3 billion photos. Each
                 Flickr user can upload images and make them viewable by
                 self, by designated friends and family, or by all
                 Flickr users. Flickr users can annotate images with
                 tags - unstructured textual labels; and usually images
                 are tagged only by the user who uploaded them.8 These
                 tags make the images searchable by the uploading user,
                 as well as by others. In addition, each user can
                 designate other users as `contacts,' people whose
                 photos the user follows (contacts are often
                 reciprocal).\par

                 To understand what underlies tagging, we need to find
                 out what motivates sharing in online environments, and
                 in particular, what motivates tagging. Furthermore, we
                 need to measure the degree to which different
                 motivations affect tagging activity. While some studies
                 has identified individual-level motivations for
                 tagging, other studies have looked solely at the social
                 level, focusing on the social presence as a driver of
                 tagging.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Talia:2010:HDD,
  author =       "Domenico Talia and Paolo Trunfio",
  title =        "How distributed data mining tasks can thrive as
                 knowledge services",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "132--137",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785451",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 Computer science applications are becoming more and
                 more network centric, ubiquitous, knowledge intensive,
                 and computing demanding. This trend will result soon in
                 an ecosystem of pervasive applications and services
                 that professionals and end-users can exploit
                 everywhere. Recently, collections of IT services and
                 applications, such as Web services and Cloud computing
                 services, became available opening the way for
                 accessing computing services as public utilities, like
                 water, gas and electricity.\par

                 Key technologies for implementing that perspective are
                 Cloud computing and Web services, semantic Web and
                 ontologies, pervasive computing, P2P systems, Grid
                 computing, ambient intelligence architectures, data
                 mining and knowledge discovery tools, Web 2.0
                 facilities, mashup tools, and decentralized programming
                 models. In fact, it is mandatory to develop solutions
                 that integrate some or many of those technologies to
                 provide future knowledge-intensive software utilities.
                 The Grid paradigm can represent a key component of the
                 future Internet, a cyber infrastructure for efficiently
                 supporting that scenario.\par

                 Grid and Cloud computing are evolved models of
                 distributed computing and parallel processing
                 technologies. The Grid is a distributed computing
                 infrastructure that enables coordinated resource
                 sharing within dynamic organizations consisting of
                 individuals, institutions, and resources. In the area
                 of Grid computing a proposed approach in accordance
                 with the trend outlined above is the Service-Oriented
                 Knowledge Utilities (SOKU) model that envisions the
                 integrated use of a set of technologies that are
                 considered as a solution to information, knowledge and
                 communication needs of many knowledge-based industrial
                 and business applications. The SOKU approach stems from
                 the necessity of providing knowledge and processing
                 capabilities to everybody, thus supporting the advent
                 of a competitive knowledge-based economy. Although the
                 SOKU model is not yet implemented, Grids are
                 increasingly equipped with data management tools,
                 semantic technologies, complex work-flows, data mining
                 features and other Web intelligence approaches. Similar
                 efforts are currently devoted to develop knowledge and
                 intelligent Clouds. These technologies can facilitate
                 the process of having Grids and Clouds as strategic
                 components for supporting pervasive knowledge intensive
                 applications and utilities.\par

                 Grids were originally designed for dealing with
                 problems involving large amounts of data and/or
                 compute-intensive applications. Today, however, Grids
                 enlarged their horizon as they are going to run
                 business applications supporting consumers and
                 end-users. To face those new challenges, Grid
                 environments must support adaptive knowledge management
                 and data analysis applications by offering resources,
                 services, and decentralized data access mechanisms. In
                 particular, according to the service-oriented
                 architecture (SOA) model, data mining tasks and
                 knowledge discovery processes can be delivered as
                 services in Grid-based infrastructures.\par

                 Through a service-based approach we can define
                 integrated services for supporting distributed business
                 intelligence tasks in Grids. Those services can address
                 all the aspects that must be considered in data mining
                 and in knowledge discovery processes such as data
                 selection and transport, data analysis, knowledge
                 models representation and visualization. We worked in
                 this direction for providing Grid-based architectures
                 and services for distributed knowledge discovery such
                 as the Knowledge Grid the Weka4WS toolkit, and mobile
                 Grid services for data mining.\par

                 Here we describe a strategy and a model based on the
                 use of services for the design of distributed knowledge
                 discovery services and discuss how Grid frameworks,
                 such those mentioned above, can be developed as a
                 collection of services and how they can be used to
                 develop distributed data analysis tasks and knowledge
                 discovery processes using the SOA model.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dennis:2010:IPH,
  author =       "Alan R. Dennis and Thomas M. Duffy and Hasan Cakir",
  title =        "{IT} programs in high schools: lessons from the {Cisco
                 Networking Academy} program",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "138--141",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 Student enrollment in college computer science (CS) and
                 information technology (IT) programs are in a downward
                 trend in most developed countries. At the same time,
                 the U.S. Bureau of Labor and their counterparts in
                 other countries forecast an increased need for skilled
                 CS/IT graduates.\par

                 To reverse the downwards trend in college level CS/IT
                 enrollment, ACM launched the Computer Science Teachers
                 Association (csta.acm.org), whose mission is to
                 `directly and passionately' advocate for computer
                 science education in the high school.\par

                 One major initiative is to develop a comprehensive
                 computer science curriculum that educates high school
                 students and informs them about the profession because
                 a major factor in the enrollment decline is a lack of
                 knowledge about possible CS/IT careers. In this
                 article, we examine one CS/IT program (the Cisco
                 Networking Academy that has been offered in high
                 schools since 1978) to understand what lessons we can
                 draw for other CS/IT high school initiatives.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ruhnka:2010:UED,
  author =       "John C. Ruhnka and John W. Bagby",
  title =        "Using {ESI} discovery teams to manage electronic data
                 discovery",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "142--144",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785453",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Introduction\par

                 The importance of electronically stored information
                 (ESI) in litigation has increased greatly over the past
                 decade. Responding to the `discovery' requests made by
                 all litigating parties has become a significant
                 management function and cost center for organizations
                 engaged in litigation. Today, over 92\% of all business
                 records and data are created and stored electronically;
                 most are never reduced to hard copy. After civil
                 litigation is filed, a pre-trial `discovery' phase
                 occurs during which courts require litigants to
                 identify and produce potentially relevant information
                 to their adversaries. Settlements often occur before a
                 trial is held, making ESI produced during the discovery
                 phase and evaluated by the parties often determinative
                 of litigation outcomes. Managing discovery of
                 electronic information requires close coordination
                 among managers with widely diverse technical IT
                 expertise, litigation experience and operational
                 authority. Multi-disciplinary `ESI Discovery Teams' are
                 a key mechanism that can be used to achieve the
                 necessary coordination and continuing oversight over
                 enterprise discovery activities, particularly in larger
                 organizations.\par

                 A 2007 litigation survey of 253 U.S. corporations
                 reveals that 83\% had new lawsuits filed against them
                 in 2006 implicating e-discovery management.1 The most
                 common subject of these law-suits was labor/employment,
                 contract enforcement and personal injuries. Litigation
                 was also significant at smaller companies surveyed,
                 17\% had at least one lawsuit claiming $20 million or
                 more, and at mid-sized companies, 98\% reported one or
                 more lawsuits of $20 million or larger. Costs of
                 litigation are high, 71\% of the companies reported
                 litigation costs exceeding $1 million per year and 40\%
                 had litigation costs over $5 million per year,
                 excluding settlements or judgment amounts. Over half
                 the U.S. firms surveyed use outside e-discovery IT
                 vendors to collect, identify, verify, recover and
                 produce ESI and 30\% reported using outside legal
                 counsel with special expertise in e-discovery. These
                 e-discovery vendors had revenues of $1.95 billion in
                 2006, a 50\% increase over 2005, and $130 million was
                 spent for forensic software, data recovery and
                 production.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vianu:2010:JSN,
  author =       "Victor Vianu",
  title =        "{\em {JACM\/}} at the start of a new decade",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787235",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEh,
  author =       "{CACM Staff}",
  title =        "In the Virtual Extension",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "6--6",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787237",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "{\em Communications\/}' Virtual Extension brings more
                 quality articles to ACM members. These articles are now
                 available in the ACM Digital Library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LECb,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: {CS} expertise for
                 institutional review boards",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "7--7",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787236",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Linden:2010:BWA,
  author =       "Greg Linden and Michael Bernstein and Erika Shehan
                 Poole",
  title =        "{BLOG@CACM}: The war against spam: and more",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "8--9",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787238",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  URL =          "http://cacm.acm.org/blogs/blog-cacm",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish selected posts or
                 excerpts.

                 twitter: Follow us on Twitter at
                 http://twitter.com/blogCACM

                 Greg Linden asks if spammers have been defeated;
                 Michael Bernstein discusses Clay Shirky's keynote
                 speech at CSCW 2010; and Erika S. Poole writes about
                 how the digital world can help parents cope with the
                 death of a child.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COPa,
  author =       "David Roman",
  title =        "{CACM} online: Print is not just ink anymore",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "10--10",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787239",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NMD,
  author =       "Gary Anthes",
  title =        "News: Mechanism design meets computer science",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "11--13",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787240",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A field emerging from economics is teaming up with
                 computer science to improve auctions, supply chains,
                 and communication protocols.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NLB,
  author =       "Kirk L. Kroeker",
  title =        "News: Looking beyond stereoscopic {$3$D}'s revival",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "14--16",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787241",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Researchers working in vision and graphics are
                 attempting to develop new techniques and technologies
                 to overcome the current limitations in stereoscopic
                 3D.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Underwood:2010:NMS,
  author =       "Sarah Underwood",
  title =        "News: Making sense of real-time behavior",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "17--18",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787242",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Data captured by sensors worn on the human body and
                 analyzed in near real-time could transform our
                 understanding of human behavior, health, and society.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2010:NCL,
  author =       "Kirk L. Kroeker",
  title =        "News: Celebrating the legacy of {PLATO}",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "19--20",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787261",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The PLATO@50 Conference marked the semicentennial of
                 the computer system that was the forerunner of today's
                 social media and interactive education.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2010:NGP,
  author =       "Jack Rosenberger",
  title =        "News: {G{\"o}del Prize} and other {CS} awards",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "21--21",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787267",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Sanjeev Arora, Joseph S. B. Mitchell, and other
                 researchers are recognized for their contributions to
                 computer science.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Yoo:2010:IMM,
  author =       "Christopher S. Yoo",
  title =        "Is the {Internet} a maturing market?",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "24--26",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787243",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Touretzky:2010:PCS,
  author =       "David S. Touretzky",
  title =        "Preparing computer science students for the robotics
                 revolution",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "27--29",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787244",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Robotics will inspire dramatic changes in the CS
                 curriculum.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gao:2010:CCI,
  author =       "Ping Gao and Jiang Yu",
  title =        "Has {China} caught up in {IT}?",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "30--32",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787245",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "An assessment of the relative achievements in IT
                 infrastructure, firms, and innovation in China.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:KVPb,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: Presenting your project",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "33--34",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787247",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The what, the how, and the why of giving an effective
                 presentation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Spafford:2010:PSR,
  author =       "Eugene H. Spafford",
  title =        "Privacy and security: Remembrances of things pest",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "35--37",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787246",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Recalling malware milestones.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chopra:2010:RAA,
  author =       "Samir Chopra",
  title =        "Rights for autonomous artificial agents?",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "38--40",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787248",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The growing role of artificial agents necessitates
                 modifying legal frameworks to better address human
                 interests.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Misa:2010:IEW,
  author =       "Thomas J. Misa",
  title =        "An interview with {Edsger W. Dijkstra}",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "41--47",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787249",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The computer science luminary, in one of his last
                 interviews before his death in 2002, reflects on a
                 programmer's life.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{DeLine:2010:SDC,
  author =       "Robert DeLine and Gina Venolia and Kael Rowan",
  title =        "Software development with code maps",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "48--54",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787250",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Could ubiquitous hand-drawn code map diagrams become a
                 thing of the past?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Creeger:2010:MEC,
  author =       "Mache Creeger",
  title =        "Moving to the edge: a {CTO} roundtable on network
                 virtualization",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "55--62",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787251",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Leading experts debate how virtualization and clouds
                 impact network service architectures.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Damsgaard:2010:SPS,
  author =       "Jan Damsgaard and Jan Karlsbjerg",
  title =        "Seven principles for selecting software packages",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "63--71",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787252",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Everything you always wanted to know but were afraid
                 to ask about the decision-making process.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Larus:2010:SS,
  author =       "James Larus and Galen Hunt",
  title =        "The {Singularity} system",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "72--79",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787253",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Safe, modern programming languages let Microsoft
                 rethink the architectural trade-offs in its
                 experimental operating system.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Szabo:2010:PPO,
  author =       "Gabor Szabo and Bernardo A. Huberman",
  title =        "Predicting the popularity of online content",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "80--88",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787254",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Early patterns of Digg diggs and YouTube views reflect
                 long-term user interest.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Adve:2010:MMC,
  author =       "Sarita V. Adve and Hans-J. Boehm",
  title =        "Memory models: a case for rethinking parallel
                 languages and hardware",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "90--101",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787255",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Solving the memory model problem will require an
                 ambitious and cross-disciplinary research direction.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wang:2010:ATW,
  author =       "Helen Wang",
  title =        "Attacks target {Web} server logic and prey on {XCS}
                 weaknesses: technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "104--104",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787256",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bojinov:2010:ECC,
  author =       "Hristo Bojinov and Elie Bursztein and Dan Boneh",
  title =        "The emergence of cross channel scripting",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "105--113",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787257",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Henglein:2010:LSS,
  author =       "Fritz Henglein",
  title =        "Large-scale sound and precise program analysis:
                 technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "114--114",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787258",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dillig:2010:RAU,
  author =       "Isil Dillig and Thomas Dillig and Alex Aiken",
  title =        "Reasoning about the unknown in static analysis",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "115--123",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787259",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPe,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Figures on a Plane",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "128--128",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787260",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Welcome to three new puzzles. Solutions to the first
                 two will be published next month; the third is (as yet)
                 unsolved. In each, the issue is how your intuition
                 matches up with the mathematics.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tung:2010:ISM,
  author =       "Wei-Fung Tung and Soe-Tsyr Yuan",
  title =        "Intelligent service machine",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "129--134",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787268",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The service sector is becoming increasingly important
                 to the economies of many countries, especially
                 developed countries. The Organization for Economic
                 Co-operation and Development (OECD) recently released
                 its report Promoting Innovation in Services, which
                 noted that government policy in developed countries has
                 not been attuned to the service sector. For better
                 satisfying the needs of customers, providers now
                 attempt to add or create value through services. To
                 unravel the changing worldview of marketing, a new
                 dominant logic is service-centered model of exchange
                 (such as intangibles, competences, dynamics, exchange
                 processes and relationships, and operant resources) in
                 21$^{st}$ century.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Haines:2010:HSO,
  author =       "Marc N. Haines and Marcus A. Rothenberger",
  title =        "How a service-oriented architecture may change the
                 software development process",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "135--140",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787269",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Software development practices have evolved
                 substantially during the past decade. As so called
                 `agile' approaches have gained more acceptance and
                 applications have become progressively more distributed
                 in terms of their physical execution and the
                 development of components, the service-oriented
                 approach to IT architecture has become an important
                 alternative to traditional software development.
                 Another impetus for the trend to a Service-Oriented
                 Architecture (SOA) is provided by enterprise system
                 vendors as they are incorporating the service-oriented
                 paradigm into their products. Substantial efforts
                 related to open standards (such as Web service
                 standards) and open source products (such as open
                 source enterprise service bus, development tools) are
                 further driving a service-oriented approach for
                 information systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tisselli:2010:TCS,
  author =       "Eugenio Tisselli",
  title =        "thinkflickrthink: a case study on strategic tagging",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "141--145",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787270",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The growth both in quantity and diversity of online
                 communities across the World Wide Web, along with a
                 number of new technologies that enhance both social
                 interaction and content management, have bred an array
                 of increasingly participatory practices. Users are
                 engaged in bustling environments in which they can
                 express themselves and interact with other users,
                 creating and fostering all sorts of relationships,
                 while uploading and sharing multimedia contents. Such
                 environments turn into vital territories for many of
                 their users, who can become extremely sensitive and
                 protective of what they believe to be their rights.
                 Thus even a small, unfavorable change in the structure
                 of the site or in its usage policies can trigger
                 discontent and active opposition. Actions performed by
                 the site administrators, such as the deletion of
                 content or the suspension of user accounts, can be
                 perceived as abusive by the community and trigger
                 outrage. In such situations, many uncoordinated forms
                 of spontaneous protest and defense can emerge from the
                 network of users. The creativity and effectiveness of
                 these initiatives can vary greatly, with protests
                 ranging from discussions on forums and blogs, to
                 site-blocking boycotts.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Prechelt:2010:PTO,
  author =       "Lutz Prechelt",
  title =        "{Plat\_Forms}: is there one best {Web} development
                 technology?",
  journal =      j-CACM,
  volume =       "53",
  number =       "8",
  pages =        "146--149",
  month =        aug,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1787234.1787271",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 3 19:19:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Software developers during their work face several
                 fundamental choices with a multitude of options. There
                 are methodological choices, where one selects among
                 possible development processes, and technological
                 choices regarding for instance development tools or
                 base technologies for the software product.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2010:SOT,
  author =       "Moshe Y. Vardi",
  title =        "Science has only two legs",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810892",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LEM,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: More than one way to annotate
                 metadata",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "7--7",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810893",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chi:2010:BEC,
  author =       "Ed H. Chi and Ruben Ortega",
  title =        "{BLOG@CACM}: Expanding {CS} education; improving
                 software development",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "8--9",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810895",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  URL =          "http://cacm.acm.org/blogs/blog-cacm/82365",
  abstract =     "The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish selected posts or
                 excerpts.

                 twitter Follow us on Twitter at
                 http://twitter.com/blogCACM

                 Ed H. Chi writes about the social Web's impact on CS
                 education. Ruben Ortega discusses software and
                 test-driven development.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COMa,
  author =       "David Roman",
  title =        "{CACM} online: More {{\em Communications\/}}",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "12--12",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810896",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lindley:2010:NBB,
  author =       "David Lindley",
  title =        "News: Brains and bytes",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "13--15",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810897",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Computational neuroscientists are learning that the
                 brain is like a computer, except when it isn't.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:OCA,
  author =       "Samuel Greengard",
  title =        "Obituary: {Carl Adam Petri}, 1926--2010",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "14--14",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810897",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Scott:2010:SNP,
  author =       "Phil Scott",
  title =        "Security: New Passwords Approach",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "15--15",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810897",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2010:NCT,
  author =       "Neil Savage",
  title =        "News: Cycling through data",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "16--17",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810898",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Sensor-equipped bicycles are providing valuable data
                 to cyclists, city planners, and computer scientists.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2010:NDD,
  author =       "Marina Krakovsky",
  title =        "News: Degrees, distance, and dollars",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "18--19",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810899",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The Internet is making higher education accessible to
                 a whole new class of students---but not necessarily at
                 a lower cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2010:NAC,
  author =       "Tom Geller",
  title =        "News: {ACM China} nearing launch",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "20--20",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810900",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "ACM's expansion into China will support local
                 professionals and increase Chinese involvement in ACM's
                 international activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2010:NKP,
  author =       "Jack Rosenberger",
  title =        "News: {Kyoto} prize and other {CS} awards",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "21--21",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810901",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "L{\'a}szl{\'o} Lov{\'a}sz, Vinton G. Cerf, and other
                 researchers are honored for their contributions to
                 computer science.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2010:BSR,
  author =       "Phillip G. Armour",
  title =        "The business of software: Return at risk",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "23--25",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810902",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Calculating the likely true cost of projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hillman:2010:LTP,
  author =       "Robert A. Hillman and Maureen A. O'Rourke",
  title =        "Law and Technology: Principles of the law of software
                 contracts",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "26--28",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810903",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "An overview of a new set of legal principles for
                 software contracts developed by the American Law
                 Institute.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2010:PID,
  author =       "Peter J. Denning and Dorothy E. Denning",
  title =        "The profession of {IT}: Discussing cyber attack",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "29--31",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810904",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Cyber attack---the other side of cyber
                 defense---deserves a more open discussion than it has
                 been getting.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ben-Ari:2010:VON,
  author =       "Mordechai Ben-Ari",
  title =        "Viewpoint: Objects never?: well, hardly ever!",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "32--35",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810905",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Revisiting the Great Objects Debate.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rexford:2010:PCF,
  author =       "Jennifer Rexford and Constantine Dovrolis",
  title =        "Point\slash Counterpoint: Future {Internet}
                 architecture: clean-slate versus evolutionary
                 research",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "36--40",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810906",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Should researchers focus on designing new network
                 architectures or improving the current Internet?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cantrill:2010:CPC,
  author =       "Stephen V. Cantrill",
  title =        "Computers in patient care: the promise and the
                 challenge",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "42--47",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810907",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Information technology has the potential to radically
                 transform health care. Why has progress been so slow?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chessin:2010:IEF,
  author =       "Steve Chessin",
  title =        "Injecting errors for fun and profit",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "48--54",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810908",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Error-detection and correction features are only as
                 good as our ability to test them.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Millsap:2010:TCAa,
  author =       "Cary Millsap",
  title =        "Thinking clearly about performance, part 1",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "55--60",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810909",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Improving the performance of complex software is
                 difficult, but understanding some fundamental
                 principles can make it easier.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sjoberg:2010:CMR,
  author =       "Dag I. K. Sj{\o}berg",
  title =        "Confronting the myth of rapid obsolescence in
                 computing research",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "62--67",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810911",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Computing research ages more slowly than research in
                 other scientific disciplines, supporting the call for
                 parity in funding.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armstrong:2010:E,
  author =       "Joe Armstrong",
  title =        "{Erlang}",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "68--75",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810910",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The same component isolation that made it effective
                 for large distributed telecom systems makes it
                 effective for multicore CPUs and networked
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Baier:2010:PEM,
  author =       "Christel Baier and Boudewijn R. Haverkort and Holger
                 Hermanns and Joost-Pieter Katoen",
  title =        "Performance evaluation and model checking join
                 forces",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "76--85",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810912",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A call for the perfect marriage between classical
                 performance evaluation and state-of-the-art
                 verification techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gehrke:2010:PDP,
  author =       "Johannes Gehrke",
  title =        "Programming with differential privacy: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "88--88",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810915",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McSherry:2010:PIQ,
  author =       "Frank McSherry",
  title =        "Privacy integrated queries: an extensible platform for
                 privacy-preserving data analysis",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "89--97",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810916",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Privacy Integrated Queries (PINQ) is an extensible
                 data analysis platform designed to provide
                 unconditional privacy guarantees for the records of the
                 underlying data sets. PINQ provides analysts with
                 access to records through an SQL-like declarative
                 language (LINQ) amidst otherwise arbitrary C\# code. At
                 the same time, the design of PINQ's analysis language
                 and its careful implementation provide formal
                 guarantees of {\em differential privacy\/} for any and
                 all uses of the platform. PINQ's guarantees require no
                 trust placed in the expertise or diligence of the
                 analysts, broadening the scope for design and
                 deployment of privacy-preserving data analyses,
                 especially by privacy nonexperts.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Jerrum:2010:CSP,
  author =       "Mark Jerrum",
  title =        "Constraint satisfaction problems and computational
                 complexity: technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "98--98",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810913",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bulatov:2010:CSP,
  author =       "Andrei A. Bulatov and D{\'a}niel Marx",
  title =        "Constraint satisfaction problems and global
                 cardinality constraints",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "99--106",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810914",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "In a constraint satisfaction problem (CSP) the goal is
                 to find an assignment of a given set of variables
                 subject to specified constraints. A global cardinality
                 constraint is an additional requirement that prescribes
                 how many variables must be assigned a certain value. We
                 study the complexity of the problem CCSP({\Gamma}), the
                 CSP with global cardinality constraints that allows
                 only relations from the set {\Gamma}. The main result
                 of this paper characterizes sets {\Gamma} that give
                 rise to problems solvable in polynomial time, and
                 states that the remaining such problems are
                 NP-complete.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPf,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "110--110",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810917",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "It's amazing how little we know about good old plane
                 geometry. Last month (August 2010, p. 128) we posted a
                 trio of brainteasers, including one as yet unsolved,
                 concerning figures on a plane. Here, we offer solutions
                 to two of them.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bear:2010:LBF,
  author =       "Greg Bear",
  title =        "Last Byte: Future tense: Little Brother is Watching",
  journal =      j-CACM,
  volume =       "53",
  number =       "9",
  pages =        "112--ff",
  month =        sep,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1810891.1810918",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 26 16:49:59 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Future Tense, one of the revolving features on this
                 page, presents stories and essays from the intersection
                 of computational science and technological speculation,
                 their boundaries limited only by our ability to imagine
                 what will and could be. In a world of technology and
                 fear, the public gets to know what it wants to
                 know\ldots{} and more than it can possibly digest.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chesnais:2010:ABV,
  author =       "Alain Chesnais",
  title =        "{ACM} is built on volunteers' shoulders",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831408",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LEHa,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: How to celebrate {Codd}'s
                 {RDBMS} vision",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831409",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2010:BSDb,
  author =       "Michael Stonebraker",
  title =        "{BLOG@CACM}: In search of database consistency",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "8--9",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831411",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "http://cacm.acm.org/blogs/blog-cacm

                 The {\em Communications\/} Web site,
                 http://cacm.acm.org, features more than a dozen
                 bloggers in the BLOG@CACM community. In each issue of
                 {\em Communications}, we'll publish selected posts or
                 excerpts.

                 twitter Follow us on Twitter at
                 http://twitter.com/blogCACM

                 Michael Stonebraker discusses the implications of the
                 CAP theorem on database management system applications
                 that span multiple processing sites.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COMb,
  author =       "David Roman",
  title =        "{CACM} online: The mobile road ahead",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "10--10",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831412",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2010:NLL,
  author =       "Alex Wright",
  title =        "News: Linear logic",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "11--13",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831413",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "A novel approach to computational logic is reaching
                 maturity, opening up opening up new vistas in
                 programming languages, proof nets, and security
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stemp-Morlock:2010:NPF,
  author =       "Graeme Stemp-Morlock",
  title =        "News: Personal fabrication",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "14--15",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831414",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Open source 3D printers could herald the start of a
                 new industrial revolution.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McCafferty:2010:NSC,
  author =       "Dennis McCafferty",
  title =        "News: Should code be released?",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "16--17",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831415",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Software code can provide important insights into the
                 results of research, but it's up to individual
                 scientists whether their code is released---and many
                 opt not to.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Campbell-Kelly:2010:VDP,
  author =       "Martin Campbell-Kelly",
  title =        "{Victorian} data processing",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "19--21",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831417",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Reflections on the first payment systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2010:PSU,
  author =       "Michael A. Cusumano",
  title =        "Platforms and services: understanding the resurgence
                 of {Apple}",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "22--24",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831418",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Combining new consumer devices and Internet platforms
                 with online services and content is proving to be a
                 successful strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Parnas:2010:IRR,
  author =       "David L. Parnas",
  title =        "Inside Risks: Risks of undisciplined development",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "25--27",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831419",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "An illustration of the problems caused by a lack of
                 discipline in software development and our failure to
                 apply what is known in the field.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:KVV,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: Version aversion",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "28--29",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831420",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The way you number your releases communicates more
                 than you might think.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hicks:2010:VSA,
  author =       "Michael Hicks and Jeffrey S. Foster",
  title =        "Viewpoint: {SCORE}: agile research group management",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "30--31",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831421",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Adapting agile software development methodology toward
                 more efficient management of academic research
                 groups.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Study:2010:PSK,
  author =       "ACM Case Study",
  title =        "{Photoshop} scalability: keeping it simple",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "32--38",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831423",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Clem Cole and Russell Williams discuss Photoshop's
                 long history with parallelism, and what is now seen as
                 the chief challenge.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Millsap:2010:TCAb,
  author =       "Cary Millsap",
  title =        "Thinking clearly about performance, part 2",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "39--45",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831422",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "More important principles to keep in mind when
                 designing high-performance software.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Montagne:2010:TAC,
  author =       "Kevin Montagne",
  title =        "Tackling architectural complexity with modeling",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "46--52",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831424",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Component models can help diagnose architectural
                 problems in both new and existing systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Serre:2010:NAC,
  author =       "Thomas Serre and Tomaso Poggio",
  title =        "A neuromorphic approach to computer vision",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "54--61",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831425",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Neuroscience is beginning to inspire a new generation
                 of seeing machines.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tambe:2010:HOA,
  author =       "Prasanna B. Tambe and Lorin M. Hitt",
  title =        "How offshoring affects {IT} workers",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "62--70",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831426",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "IT jobs requiring interpersonal interaction or
                 physical presence in fixed locations are less likely to
                 be sent out of the country.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rodrigues:2010:PPS,
  author =       "Rodrigo Rodrigues and Peter Druschel",
  title =        "Peer-to-peer systems",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "72--82",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831427",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Within a decade, P2P has proven to be a technology
                 that enables innovative new services and is used by
                 millions of people every day.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Waldspurger:2010:VEM,
  author =       "Carl Waldspurger",
  title =        "A {VM} `Engine' that makes a difference: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "84--84",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831428",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gupta:2010:DEH,
  author =       "Diwaker Gupta and Sangmin Lee and Michael Vrable and
                 Stefan Savage and Alex C. Snoeren and George Varghese
                 and Geoffrey M. Voelker and Amin Vahdat",
  title =        "Difference engine: harnessing memory redundancy in
                 virtual machines",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "85--93",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Virtual machine monitors (VMMs) are a popular platform
                 for Internet hosting centers and cloud-based compute
                 services. By multiplexing hardware resources among
                 virtual machines (VMs) running commodity operating
                 systems, VMMs decrease both the capital outlay and
                 management overhead of hosting centers. Appropriate
                 placement and migration policies can take advantage of
                 statistical multiplexing to effectively utilize
                 available processors. However, main memory is not
                 amenable to such multiplexing and is often the primary
                 bottleneck in achieving higher degrees of
                 consolidation.\par

                 Previous efforts have shown that content-based page
                 sharing provides modest decreases in the memory
                 footprint of VMs running similar operating systems and
                 applications. Our studies show that significant
                 additional gains can be had by leveraging both subpage
                 level sharing (through page patching) and incore memory
                 compression. We build {\em Difference Engine}, an
                 extension to the Xen VMM, to support each of these---in
                 addition to standard copy-on-write full-page
                 sharing---and demonstrate substantial savings across
                 VMs running disparate workloads (up to 65\%). In
                 head-to-head memory-savings comparisons, Difference
                 Engine outperforms VMware ESX server by a factor
                 1.6--2.5 for heterogeneous workloads. In all cases, the
                 performance overhead of Difference Engine is less than
                 7\%.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Weiss:2010:BPT,
  author =       "Yair Weiss and Judea Pearl",
  title =        "Belief propagation: technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "94--94",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831430",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sudderth:2010:NBP,
  author =       "Erik B. Sudderth and Alexander T. Ihler and Michael
                 Isard and William T. Freeman and Alan S. Willsky",
  title =        "Nonparametric belief propagation",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "95--103",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831431",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Continuous quantities are ubiquitous in models of
                 real-world phenomena, but are surprisingly difficult to
                 reason about automatically. Probabilistic graphical
                 models such as Bayesian networks and Markov random
                 fields, and algorithms for approximate inference such
                 as belief propagation (BP), have proven to be powerful
                 tools in a wide range of applications in statistics and
                 artificial intelligence. However, applying these
                 methods to models with continuous variables remains a
                 challenging task. In this work we describe an extension
                 of BP to continuous variable models, generalizing
                 particle filtering, and Gaussian mixture filtering
                 techniques for time series to more complex models. We
                 illustrate the power of the resulting nonparametric BP
                 algorithm via two applications: kinematic tracking of
                 visual motion and distributed localization in sensor
                 networks.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:LBQd,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: {Gray's Paradigm}",
  journal =      j-CACM,
  volume =       "53",
  number =       "10",
  pages =        "112--ff",
  month =        oct,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1831407.1831432",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 1 21:13:00 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Tony Hey talks about Jim Gray and his vision of a new
                 era of collaborative, data-intensive science.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2010:PNC,
  author =       "Moshe Y. Vardi",
  title =        "On {P}, {NP}, and computational complexity",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839677",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:LEHb,
  author =       "{CACM Staff}",
  title =        "Letters to the {Editor}: How to think about objects",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "6--7",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839678",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEi,
  author =       "{CACM Staff}",
  title =        "In the Virtual Extension",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "9--9",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839679",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lau:2010:BRS,
  author =       "Tessa Lau",
  title =        "{BLOG@CACM}: Rethinking the systems review process",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "10--11",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839680",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:COPb,
  author =       "David Roman",
  title =        "{CACM} online: a preference for {PDF}",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "12--12",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839681",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2010:NTD,
  author =       "Gregory Goth",
  title =        "News: Turning data into knowledge",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "13--15",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839682",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:NSC,
  author =       "Gary Anthes",
  title =        "News: Security in the cloud",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "16--18",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839683",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2010:NCO,
  author =       "Leah Hoffmann",
  title =        "News: Career opportunities",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "19--21",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839684",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2010:NWO,
  author =       "Neil Savage",
  title =        "News: Wide open spaces",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "23--23",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839704",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Boczkowski:2010:EBD,
  author =       "Pablo J. Boczkowski",
  title =        "Economic and business dimensions: The divergent online
                 news preferences of journalists and readers",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "24--25",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839685",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cooper:2010:EKC,
  author =       "Stephen Cooper and Lance C. P{\'e}rez and Daphne
                 Rainey",
  title =        "Education: {K--12} computational learning",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "27--29",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839686",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2010:LSW,
  author =       "Pamela Samuelson",
  title =        "Legally speaking: Why do software startups patent (or
                 not)?",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "30--32",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839687",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brenner:2010:PSW,
  author =       "Joel F. Brenner",
  title =        "Privacy and security: Why isn't cyberspace more
                 secure?",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "33--35",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839688",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Welsh:2010:VSN,
  author =       "Matt Welsh",
  title =        "Viewpoint: Sensor networks for the sciences",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "36--39",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839690",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Fitzpatrick:2010:CAD,
  author =       "Brian W. Fitzpatrick and JJ Lueck",
  title =        "The case against data lock-in",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "42--46",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839691",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "Yes, it is JJ Lueck, not J. J. Lueck.",
}

@Article{Rosenthal:2010:KBS,
  author =       "David S. H. Rosenthal",
  title =        "Keeping bits safe: how hard can it be?",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "47--55",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839692",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2010:SPS,
  author =       "Poul-Henning Kamp",
  title =        "Sir, please step away from the {ASR-33!}",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "56--57",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839693",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Garland:2010:UTO,
  author =       "Michael Garland and David B. Kirk",
  title =        "Understanding throughput-oriented architectures",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "58--66",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839694",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vogl:2010:RIG,
  author =       "Patrick Vogl and Michael Barrett",
  title =        "Regulating the information gatekeepers",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "67--72",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839695",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Faliszewski:2010:UCP,
  author =       "Piotr Faliszewski and Edith Hemaspaandra and Lane A.
                 Hemaspaandra",
  title =        "Using complexity to protect elections",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "74--82",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839696",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Adve:2010:DRE,
  author =       "Sarita Adve",
  title =        "Data races are evil with no exceptions: technical
                 perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "84--84",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839697",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Elmas:2010:GRA,
  author =       "Tayfun Elmas and Shaz Qadeer and Serdar Tasiran",
  title =        "{Goldilocks}: a race-aware {Java} runtime",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "85--92",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839698",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Flanagan:2010:FEP,
  author =       "Cormac Flanagan and Stephen N. Freund",
  title =        "{FastTrack}: efficient and precise dynamic race
                 detection",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "93--101",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839699",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2010:LBPg,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Rectangles Galore",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "112--112",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839700",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Buell:2010:VVE,
  author =       "Duncan Buell",
  title =        "Viewpoints: Virtual extension: In support of computer
                 science teachers and the {CSTA}",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "113--115",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839703",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ficco:2010:VES,
  author =       "Massimo Ficco and Roberto Pietrantuono and Stefano
                 Russo",
  title =        "Virtual extension: Supporting ubiquitous location
                 information in interworking {3G} and wireless
                 networks",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "116--123",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839702",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Freyne:2010:VER,
  author =       "Jill Freyne and Lorcan Coyle and Barry Smyth and
                 Padraig Cunningham",
  title =        "Virtual extension: Relative status of journal and
                 conference publications in computer science",
  journal =      j-CACM,
  volume =       "53",
  number =       "11",
  pages =        "124--132",
  month =        nov,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1839676.1839701",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Oct 29 17:02:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Patterson:2010:DC,
  author =       "David A. Patterson",
  title =        "Diverse connections",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859205",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:SFL,
  author =       "{CACM Staff}",
  title =        "Science has four legs",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "6--7",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859206",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:VEj,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "9--9",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859207",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Linden:2010:SAM,
  author =       "Greg Linden and Jason Hong and Mark Guzdial",
  title =        "Security advice; malvertisements; and {CS} education
                 in {Qatar}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "10--11",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859208",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2010:SGN,
  author =       "David Roman",
  title =        "School grades need improvement",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "12--12",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859209",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2010:EI,
  author =       "Gregory Goth",
  title =        "The eyes have it",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "13--15",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859211",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2010:TMV,
  author =       "Gary Anthes",
  title =        "Topic models vs. unstructured data",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "16--18",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859210",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2010:CER,
  author =       "Marina Krakovsky",
  title =        "{CSEdWeek} expands its reach",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "19--19",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859213",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2010:NFW,
  author =       "Samuel Greengard",
  title =        "The new face of war",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "20--22",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859212",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lindley:2010:MP,
  author =       "David Lindley",
  title =        "A matter of privacy",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "23--23",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859214",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goodman:2010:CAT,
  author =       "Seymour Goodman and Andrew Harris",
  title =        "The coming {African} tsunami of information
                 insecurity",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "24--27",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859215",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Smotherman:2010:ISP,
  author =       "Mark Smotherman and Dag Spicer",
  title =        "{IBM}'s single-processor supercomputer efforts",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "28--30",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859216",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "IBM 7030 Stretch; Project Stretch",
}

@Article{Gates:2010:RHS,
  author =       "Ann Quiroz Gates",
  title =        "The role of {Hispanic}-serving institutions in
                 contributing to an educated work force",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "31--33",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859217",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2010:LQU,
  author =       "Peter J. Denning and Robert E. Kahn",
  title =        "The long quest for universal information access",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "34--36",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859218",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2010:LC,
  author =       "George V. Neville-Neil",
  title =        "Literate coding",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "37--38",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859219",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Berman:2010:WNR,
  author =       "Francine Berman",
  title =        "We need a research data census",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "39--41",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859220",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2010:CEC,
  author =       "{CACM Staff}",
  title =        "A conversation with {Ed Catmull}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "42--47",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859224",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Creeger:2010:TBI,
  author =       "Mache Creeger",
  title =        "The theft of business innovation: an {ACM--BCS}
                 roundtable on threats to global competitiveness",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "48--55",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859222",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shao:2010:CS,
  author =       "Zhong Shao",
  title =        "Certified software",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "56--66",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859226",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Andriole:2010:BIW,
  author =       "Stephen J. Andriole",
  title =        "Business impact of {Web 2.0} technologies",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "67--79",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859225",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Darwiche:2010:BN,
  author =       "Adnan Darwiche",
  title =        "{Bayesian} networks",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "80--90",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859227",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Elad:2010:ISR,
  author =       "Michael Elad and Raja Giryes",
  title =        "Iterative signal recovery from incomplete samples:
                 technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "92--92",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859228",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Needell:2010:CIS,
  author =       "Deanna Needell and Joel A. Tropp",
  title =        "{CoSaMP}: iterative signal recovery from incomplete
                 and inaccurate samples",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "93--100",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859229",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Aaronson:2010:QPB,
  author =       "Scott Aaronson",
  title =        "{QIP = PSPACE} breakthrough: technical perspective",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "101--101",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859230",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Jain:2010:QP,
  author =       "Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and
                 John Watrous",
  title =        "{QIP $=$ PSPACE}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "102--109",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859231",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "The interactive proof system model of computation has
                 been studied extensively in computational complexity
                 theory and theoretical cryptography for more than 25
                 years, and has driven the development of interesting
                 new techniques and insights in those fields. This work
                 considers the quantum interactive proof system model,
                 which is the classical model's natural quantum
                 computational analog. An exact characterization of the
                 expressive power of quantum interactive proof systems
                 is obtained: the collection of computational problems
                 having quantum interactive proof systems consists
                 precisely of those problems solvable with an ordinary
                 classical computer using at most a polynomial amount of
                 memory (or QIP $=$ PSPACE in complexity-theoretic
                 terminology). One striking implication of this
                 characterization is that it implies quantum computing
                 provides no increase in computational power whatsoever
                 over classical computing in the context of interactive
                 proof systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "An earlier version of this work won Best Paper Award
                 at STOC'2010 (Symposium on the Theory of Computing):
                 see \url{https://doi.org/10.1145/1806689.1806768}",
}

@Article{Winkler:2010:LBPh,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and sources",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "126--126",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859232",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rumilisoun:2010:FTR,
  author =       "Rumilisoun",
  title =        "Future tense: {Rebirth} of worlds",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "128--ff",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859233",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Franceschet:2010:RCP,
  author =       "Massimo Franceschet",
  title =        "The role of conference publications in {CS}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "129--132",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859234",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lunt:2010:IHN,
  author =       "Barry Lunt and J. Ekstrom and Han Reichgelt and
                 Michael Bailey and Richard Leblanc",
  title =        "{IT 2008}: the history of a new computing discipline",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "133--141",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859236",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Morelli:2010:GCD,
  author =       "Ralph Morelli and Chamindra de Silva and Trishan de
                 Lanerolle and Rebecca Curzon and Xin Sheng Mao",
  title =        "A global collaboration to deploy help to {China}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "142--149",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859235",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:WAW,
  author =       "Moshe Y. Vardi",
  title =        "Where have all the workshops gone?",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866740",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:CWT,
  author =       "{CACM Staff}",
  title =        "To change the world, take a chance",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "6--7",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866741",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anonymous:2011:VE,
  author =       "Anonymous",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "8--8",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866742",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hall:2011:AAR,
  author =       "Wendy Hall",
  title =        "{ACM}'s annual report",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "9--13",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866768",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2011:SCA,
  author =       "Jack Rosenberger and Judy Robertson",
  title =        "Smart career advice: laptops as a classroom
                 distraction",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "14--15",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866743",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2011:SPM,
  author =       "David Roman",
  title =        "Scholarly publishing model needs an update",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "16--ff",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866744",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2011:NSM,
  author =       "Gary Anthes",
  title =        "Nonlinear systems made easy",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "17--19",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866745",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2011:TSH,
  author =       "Alex Wright",
  title =        "The touchy subject of haptics",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "20--22",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866746",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2011:IEE,
  author =       "Marina Krakovsky",
  title =        "{India}'s elephantine effort",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "23--24",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866747",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosenberger:2011:EPO,
  author =       "Jack Rosenberger",
  title =        "{EMET} prize and other awards",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "25--25",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866767",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2011:DBM,
  author =       "Phillip G. Armour",
  title =        "Don't bring me a good idea",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "27--29",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866748",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bechtold:2011:GAE,
  author =       "Stefan Bechtold",
  title =        "{Google AdWords} and {European} trademark law",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "30--32",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866749",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2011:RTD,
  author =       "Michael A. Cusumano",
  title =        "Reflections on the {Toyota} debacle",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "33--35",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866750",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ryan:2011:CCP,
  author =       "Mark D. Ryan",
  title =        "Cloud computing privacy concerns on our doorstep",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "36--38",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866751",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Steele:2011:IFA,
  author =       "Guy L. {Steele Jr.}",
  title =        "An interview with {Frances E. Allen}",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "39--45",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866752",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  note =         "This article contains an important half-century
                 retrospective on the IBM 7030 Stretch project, and its
                 impact on subsequent computer designs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Haber:2011:CSA,
  author =       "Eben M. Haber and Eser Kandogan and Paul P. Maglio",
  title =        "Collaboration in system administration",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "46--53",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866755",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anonymous:2011:UDA,
  author =       "Anonymous",
  title =        "{UX} design and agile: a natural fit?",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "54--60",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866753",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  note =         "Talking with Julian Gosper, Jean-Luc Agathos, Richard
                 Rutter, and Terry Coatta",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kotsovinos:2011:VBC,
  author =       "Evangelos Kotsovinos",
  title =        "Virtualization: blessing or curse?",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "61--65",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866754",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wiederhold:2011:FIP,
  author =       "Gio Wiederhold",
  title =        "Follow the intellectual property",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "66--74",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866756",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vishkin:2011:USA,
  author =       "Uzi Vishkin",
  title =        "Using simple abstraction to reinvent computing for
                 parallelism",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "75--85",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866757",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dwork:2011:FFP,
  author =       "Cynthia Dwork",
  title =        "A firm foundation for private data analysis",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "86--95",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866758",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Katabi:2011:SPL,
  author =       "Dina Katabi",
  title =        "{Sora} promises lasting impact: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "98--98",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866759",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tan:2011:SHP,
  author =       "Kun Tan and He Liu and Jiansong Zhang and Yongguang
                 Zhang and Ji Fang and Geoffrey M. Voelker",
  title =        "{Sora}: high-performance software radio using
                 general-purpose multi-core processors",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "99--107",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866760",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wischik:2011:MNC,
  author =       "Damon Wischik",
  title =        "Multipath: a new control architecture for the
                 {Internet}: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "108--108",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866761",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Key:2011:PSM,
  author =       "Peter Key and Laurent Massouli{\'e} and Don Towsley",
  title =        "Path selection and multipath congestion control",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "109--116",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866762",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McCafferty:2011:LBQ,
  author =       "Dennis McCafferty",
  title =        "Last Byte: {Q\&A}: a Journey of Discovery",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "128--ff",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866763",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Ed Lazowska discusses his heady undergraduate days at
                 Brown University, teaching, eScience, and being chair
                 of the Computing Community Consortium.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Locasto:2011:ELP,
  author =       "Michael E. Locasto and Anup K. Ghosh and Sushil
                 Jajodia and Angelos Stavrou",
  title =        "The ephemeral legion: producing an expert
                 cyber-security work force from thin air",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "129--131",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866764",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Frohlich:2011:MWC,
  author =       "Peter Fr{\"o}hlich and Antti Oulasvirta and Matthias
                 Baldauf and Antti Nurminen",
  title =        "On the move, wirelessly connected to the world",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "132--138",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866766",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hasel:2011:OES,
  author =       "Matthias H{\"a}sel",
  title =        "{Opensocial}: an enabler for social applications on
                 the {Web}",
  journal =      j-CACM,
  volume =       "54",
  number =       "1",
  pages =        "139--144",
  month =        jan,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1866739.1866765",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 23 17:45:01 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rodden:2011:IOM,
  author =       "Tom Rodden",
  title =        "{ICPS} offers major research venue",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897817",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:SLC,
  author =       "{CACM Staff}",
  title =        "Shine the light of computational complexity",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897818",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEa,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "9--9",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897821",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hong:2011:MD,
  author =       "Jason Hong",
  title =        "Matters of design",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "10--11",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897820",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2011:EDC,
  author =       "David Roman",
  title =        "End of days for {Communications} in print?",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "12--12",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1936942",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2011:CGG,
  author =       "Gregory Goth",
  title =        "Chipping away at greenhouse gases",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "13--15",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897823",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2011:ITA,
  author =       "Neil Savage",
  title =        "Information theory after {Shannon}",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "16--18",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897822",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:MWL,
  author =       "Leah Hoffmann",
  title =        "{Maurice Wilkes}: the last pioneer",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "19--19",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897827",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:FC,
  author =       "Samuel Greengard",
  title =        "Following the crowd",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "20--22",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897824",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2011:ALN,
  author =       "Gary Anthes",
  title =        "{ACM} launches new {Digital Library}",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "23--24",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897828",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:AFH,
  author =       "{CACM Staff}",
  title =        "{ACM Fellows} honored",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "25--25",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897826",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Conway:2011:AC,
  author =       "Maura Conway",
  title =        "Against cyberterrorism",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "26--28",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897829",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosston:2011:HDB,
  author =       "Gregory Rosston and Scott Savage and Donald Waldman",
  title =        "Household demand for broadband {Internet} service",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "29--31",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897830",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ledin:2011:GHT,
  author =       "George {Ledin, Jr.}",
  title =        "The growing harm of not teaching malware",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "32--34",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897832",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2011:FT,
  author =       "George V. Neville-Neil",
  title =        "Forest for the trees",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "35--36",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897833",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Guzdial:2011:SE,
  author =       "Mark Guzdial",
  title =        "From science to engineering",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "37--39",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897831",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Grudin:2011:TCC,
  author =       "Jonathan Grudin",
  title =        "Technology, conferences, and community",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "41--43",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897834",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Harty:2011:FUB,
  author =       "Julian Harty",
  title =        "Finding usability bugs with automated tests",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "44--49",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897836",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Limoncelli:2011:PSS,
  author =       "Thomas A. Limoncelli",
  title =        "A plea from sysadmins to software vendors: 10 do's and
                 don'ts",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "50--51",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897835",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lear:2011:SAS,
  author =       "Christina Lear",
  title =        "System administration soft skills",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "52--58",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897837",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wachs:2011:VBH,
  author =       "Juan Pablo Wachs and Mathias K{\"o}lsch and Helman
                 Stern and Yael Edan",
  title =        "Vision-based hand-gesture applications",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "60--71",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897838",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cafarella:2011:SDW,
  author =       "Michael J. Cafarella and Alon Halevy and Jayant
                 Madhavan",
  title =        "Structured data on the {Web}",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "72--79",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897839",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Davies:2011:SBM,
  author =       "Stephen Davies",
  title =        "Still building the {Memex}",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "80--88",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897840",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Pereira:2011:MMB,
  author =       "Fernando Pereira",
  title =        "{Markov} meets {Bayes}: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "90--90",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897841",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wood:2011:SM,
  author =       "Frank Wood and Jan Gasthaus and C{\'e}dric Archambeau
                 and Lancelot James and Yee Whye Teh",
  title =        "The sequence memoizer",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "91--98",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897842",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Jouppi:2011:DEW,
  author =       "Norman P. Jouppi",
  title =        "{DRAM} errors in the wild: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "99--99",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897843",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schroeder:2011:DEW,
  author =       "Bianca Schroeder and Eduardo Pinheiro and
                 Wolf-Dietrich Weber",
  title =        "{DRAM} errors in the wild: a large-scale field study",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "100--107",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897844",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPa,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Parsing Partitions",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "112--112",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897845",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Estell:2011:NNG,
  author =       "John K. Estell and Ken Christensen",
  title =        "The need for a new graduation rite of passage",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "113--115",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897846",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Zhao:2011:SPV,
  author =       "Qinping Zhao",
  title =        "10 scientific problems in virtual reality",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "116--118",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897847",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2011:OGS,
  author =       "David Wright and Paul {De Hert} and Serge Gutwirth",
  title =        "Are the {OECD} guidelines at 30 showing their age?",
  journal =      j-CACM,
  volume =       "54",
  number =       "2",
  pages =        "119--127",
  month =        feb,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897816.1897848",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 15 11:09:00 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "Organization for Economic Co-operation and Development
                 (OECD)",
}

@Article{Vardi:2011:FF,
  author =       "Moshe Y. Vardi",
  title =        "Fumbling the future",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897853",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:FSA,
  author =       "{CACM Staff}",
  title =        "Free speech for algorithms?",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "6--7",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897854",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEb,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "11--11",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897855",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Guzdial:2011:SEC,
  author =       "Mark Guzdial and Greg Linden",
  title =        "Scientists, engineers, and computer science; industry
                 and research groups",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "12--13",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897856",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Roman:2011:TC,
  author =       "David Roman",
  title =        "Time to change",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "14--14",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897857",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:GCF,
  author =       "Kirk L. Kroeker",
  title =        "{Grid} computing's future",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "15--17",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897858",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2011:TMM,
  author =       "Neil Savage",
  title =        "{Twitter} as medium and message",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "18--20",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897860",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2011:EGF,
  author =       "Tom Geller",
  title =        "Evaluating government funding",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "21--21",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897861",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2011:MPF,
  author =       "Gary Anthes",
  title =        "Memristors: pass or fail?",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "22--24",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897859",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:GCT,
  author =       "Samuel Greengard",
  title =        "{Gary Chapman}, technologist: 1952--2010",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "25--25",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897862",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2011:DYO,
  author =       "Pamela Samuelson",
  title =        "Do you own the software you buy?",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "26--28",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897863",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Pimple:2011:SM,
  author =       "Kenneth D. Pimple",
  title =        "Surrounded by machines",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "29--31",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897864",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2011:MT,
  author =       "Peter J. Denning",
  title =        "Managing time",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "32--34",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897865",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chubin:2011:PGT,
  author =       "Daryl E. Chubin and Roosevelt Y. Johnson",
  title =        "A program greater than the sum of its parts: the {BPC}
                 alliances",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "35--37",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897866",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Snir:2011:CIS,
  author =       "Marc Snir",
  title =        "Computer and information science and engineering: one
                 discipline, many specialties",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "38--43",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897867",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Burgess:2011:TSA,
  author =       "Mark Burgess",
  title =        "Testable system administration",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "44--49",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897868",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stapleton-Gray:2011:NID,
  author =       "Ross Stapleton-Gray and William Woodcock",
  title =        "National {Internet} defense---small states on the
                 skirmish line",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "50--55",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897869",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2011:BCT,
  author =       "Poul-Henning Kamp",
  title =        "{B.Y.O.C} (1,342 times and counting)",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "56--58",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897870",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Borner:2011:PPM,
  author =       "Katy B{\"o}rner",
  title =        "Plug-and-play macroscopes",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "60--69",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897871",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stajano:2011:USV,
  author =       "Frank Stajano and Paul Wilson",
  title =        "Understanding scam victims: seven principles for
                 systems security",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "70--75",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897872",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shavit:2011:DSM,
  author =       "Nir Shavit",
  title =        "Data structures in the multicore age",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "76--84",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897873",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bello:2011:CVM,
  author =       "Juan Bello and Yann LeCun and Robert Rowe",
  title =        "Concerto for violin and {Markov} model: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "86--86",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897874",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Raphael:2011:IP,
  author =       "Christopher Raphael",
  title =        "The informatics philharmonic",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "87--93",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897875",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rexford:2011:VTP,
  author =       "Jennifer Rexford",
  title =        "{VL2}: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "94--94",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897876",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greenberg:2011:VSF,
  author =       "Albert Greenberg and James R. Hamilton and Navendu
                 Jain and Srikanth Kandula and Changhoon Kim and
                 Parantap Lahiri and David A. Maltz and Parveen Patel
                 and Sudipta Sengupta",
  title =        "{VL2}: a scalable and flexible data center network",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "95--104",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897877",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPb,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "109--109",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897878",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Benford:2011:FT,
  author =       "Gregory Benford",
  title =        "Future tense",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "112--ff",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897879",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosamond:2011:RMB,
  author =       "Frances Rosamond and Roswitha Bardohl and Stephan
                 Diehl and Uwe Geisler and Gordon Bolduan and Annette
                 Lessm{\"o}llmann and Andreas Schwill and Ulrike Stege",
  title =        "Reaching out to the media: become a computer science
                 ambassador",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "113--116",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897880",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Garrett:2011:IE,
  author =       "R. Kelly Garrett and James N. Danziger",
  title =        "The {Internet} electorate",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "117--123",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897881",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{DeHertogh:2011:GW,
  author =       "Steven {De Hertogh} and Stijn Viaene and Guido
                 Dedene",
  title =        "Governing {Web 2.0}",
  journal =      j-CACM,
  volume =       "54",
  number =       "3",
  pages =        "124--130",
  month =        mar,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1897852.1897882",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 25 15:54:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schnabel:2011:ECN,
  author =       "Robert B. Schnabel",
  title =        "Educating computing's next generation",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924422",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEc,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "8--8",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924424",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:WPI,
  author =       "{CACM Staff}",
  title =        "{I} want a personal information pod",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "9--9",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924423",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hong:2011:MDP,
  author =       "Jason Hong",
  title =        "Matters of design, part {II}",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "10--11",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924425",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:AM,
  author =       "Scott E. Delman",
  title =        "{ACM} on the move",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "12--12",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924426",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2011:QR,
  author =       "Gary Anthes",
  title =        "The quest for randomness",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "13--15",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924427",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:ESA,
  author =       "Kirk L. Kroeker",
  title =        "Engineering sensation in artificial limbs",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "16--18",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924428",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:SGV,
  author =       "Samuel Greengard",
  title =        "Social games, virtual goods",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "19--22",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Underwood:2011:BCS,
  author =       "Sarah Underwood",
  title =        "{British} computer scientists reboot",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "23--23",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924430",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Niederman:2011:MGI,
  author =       "Fred Niederman and Felix B. Tan",
  title =        "Managing global {IT} teams: considering cultural
                 dynamics",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "24--27",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924431",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ensmenger:2011:BCA,
  author =       "Nathan Ensmenger",
  title =        "Building castles in the air",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "28--30",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924432",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2011:PWC,
  author =       "Michael A. Cusumano",
  title =        "Platform wars come to social media",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "31--33",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924433",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2011:CB,
  author =       "George V. Neville-Neil",
  title =        "Coder's block",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "34--35",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924434",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gomez-Barroso:2011:ASN,
  author =       "Jos{\'e} Luis G{\'o}mez-Barroso and Claudio
                 Feij{\'o}o",
  title =        "Asymmetries and shortages of the network neutrality
                 principle",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "36--37",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924435",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Parri:2011:RCP,
  author =       "Jonathan Parri and Daniel Shapiro and Miodrag Bolic
                 and Voicu Groza",
  title =        "Returning control to the programmer: {SIMD} intrinsics
                 for virtual machines",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "38--43",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924437",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Limoncelli:2011:SSI,
  author =       "Thomas A. Limoncelli and Vinton G. Cerf",
  title =        "Successful strategies for {IPv6} rollouts: {Really}",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "44--48",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924438",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Meijer:2011:CRM,
  author =       "Erik Meijer and Gavin Bierman",
  title =        "A co-relational model of data for large shared data
                 banks",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "49--58",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924436",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Agrawala:2011:DPV,
  author =       "Maneesh Agrawala and Wilmot Li and Floraine
                 Berthouzoz",
  title =        "Design principles for visual communication",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "60--69",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924439",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dragojevik:2011:WSC,
  author =       "Aleksandar Dragojevik and Pascal Felber and Vincent
                 Gramoli and Rachid Guerraoui",
  title =        "Why {STM} can be more than a research toy",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "70--77",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924440",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tang:2011:RDR,
  author =       "John C. Tang and Manuel Cebrian and Nicklaus A.
                 Giacobe and Hyun-Woo Kim and Taemie Kim and Douglas
                 ``Beaker'' Wickert",
  title =        "Reflecting on the {DARPA Red Balloon Challenge}",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "78--85",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924441",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Doan:2011:CSW,
  author =       "Anhai Doan and Raghu Ramakrishnan and Alon Y.
                 Halevy",
  title =        "Crowdsourcing systems on the {World-Wide Web}",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "86--96",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924442",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Berry:2011:LIS,
  author =       "Daniel M. Berry",
  title =        "Liability issues in software engineering: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "98--98",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924443",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{LeMetayer:2011:LIS,
  author =       "Daniel {Le M{\'e}tayer} and Manuel Maarek and Eduardo
                 Mazza and Marie-Laure Potet and St{\'e}phane Fr{\'e}not
                 and Val{\'e}rie Viet Triem Tong and Nicolas Craipeau
                 and Ronan Hardouin",
  title =        "Liability issues in software engineering: the use of
                 formal methods to reduce legal uncertainties",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "99--106",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924444",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sudan:2011:PHS,
  author =       "Madhu Sudan",
  title =        "Patterns hidden from simple algorithms: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "107--107",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924445",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Braverman:2011:PLI,
  author =       "Mark Braverman",
  title =        "Poly-logarithmic independence fools bounded-depth
                 {Boolean} circuits",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "108--115",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924446",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:LBQa,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: The Chief Computer",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "120--ff",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924447",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Kelly Gotlieb recalls the early days of computer
                 science in Canada.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Morreale:2011:RFC,
  author =       "Patricia Morreale and David Joiner",
  title =        "Reaching future computer scientists",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "121--124",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924448",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Majchrzak:2011:EWR,
  author =       "Ann Majchrzak and Philip H. B. More",
  title =        "Emergency! {Web 2.0} to the rescue!",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "125--132",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924449",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Grossman:2011:RDC,
  author =       "Fred Grossman and Charles Tappert and Joe Bergin and
                 Susan M. Merritt",
  title =        "A research doctorate for computing professionals",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "133--141",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924450",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Canfora:2011:ACS,
  author =       "Gerardo Canfora and Massimiliano {Di Penta} and Luigi
                 Cerulo",
  title =        "Achievements and challenges in software reverse
                 engineering",
  journal =      j-CACM,
  volume =       "54",
  number =       "4",
  pages =        "142--151",
  month =        apr,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1924421.1924451",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 13:48:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:TSC,
  author =       "Moshe Y. Vardi",
  title =        "Technology has social consequences",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941488",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:PPS,
  author =       "{CACM Staff}",
  title =        "Preserve privacy in statistical correlations",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "6--7",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941489",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEd,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "9--9",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941490",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2011:SDW,
  author =       "Michael Stonebraker",
  title =        "{Stonebraker} on data warehouses",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "10--11",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941491",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:LAH,
  author =       "Scott E. Delman",
  title =        "Let {ACM} help you find your next job `online'",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "12--12",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941492",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2011:STP,
  author =       "Neil Savage",
  title =        "Sorting through photos",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "13--15",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941493",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2011:DR,
  author =       "Gregory Goth",
  title =        "{I}, domestic robot",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "16--17",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941494",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:DOD,
  author =       "Leah Hoffmann",
  title =        "Data optimization in developing nations",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "18--20",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941495",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2011:DEM,
  author =       "Marina Krakovsky",
  title =        "Deus ex machina",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "22--22",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941496",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2011:WSM,
  author =       "Alex Wright",
  title =        "{Web} science meets network science",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "23--23",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941497",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goldfarb:2011:OAB,
  author =       "Avi Goldfarb and Catherine E. Tucker",
  title =        "Online advertising, behavioral targeting, and
                 privacy",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "25--27",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941498",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dorn:2011:RLB,
  author =       "Brian Dorn",
  title =        "Reaching learners beyond our hallowed halls",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "28--30",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941499",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wu:2011:BLC,
  author =       "Tim Wu",
  title =        "{Bell Labs} and centralized innovation",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "31--33",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941500",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Fitzpatrick:2011:ISF,
  author =       "Jason Fitzpatrick",
  title =        "An interview with {Steve Furber}",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "34--39",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941501",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anel:2011:IRC,
  author =       "Juan A. A{\~n}el",
  title =        "The importance of reviewing the code",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "40--41",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941502",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2011:OSW,
  author =       "Poul-Henning Kamp",
  title =        "The one-second war",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "44--48",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941505",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Finding a lasting solution to the leap seconds problem
                 has become increasingly urgent.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "From the second paragraph: ``We're talking about the
                 abolishment of leap seconds, a crude hack added 40
                 years ago to paper over the fact that planets make
                 lousy clocks compared with quantum mechanical
                 phenomena.''",
}

@Article{Charland:2011:MAD,
  author =       "Andre Charland and Brian Leroux",
  title =        "Mobile application development: {Web} vs. native",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "49--53",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941504",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McKenzie:2011:WMA,
  author =       "Patrick McKenzie",
  title =        "Weapons of mass assignment",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "54--59",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941503",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McFarland:2011:BCI,
  author =       "Dennis J. McFarland and Jonathan R. Wolpaw",
  title =        "Brain-computer interfaces for communication and
                 control",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "60--66",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941506",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Borkar:2011:FM,
  author =       "Shekhar Borkar and Andrew A. Chien",
  title =        "The future of microprocessors",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "67--77",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941507",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Energy efficiency is the new fundamental limiter of
                 processor performance, way beyond numbers of
                 processors.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "This is an excellent survey of the computer-industry
                 past, present, and future evolution of transistor
                 densities, energy consumption, clock speeds, memory
                 speeds and capacity, and processor performance.",
}

@Article{Afanasyev:2011:PPN,
  author =       "Mikhail Afanasyev and Tadayoshi Kohno and Justin Ma
                 and Nick Murphy and Stefan Savage and Alex C. Snoeren
                 and Geoffrey M. Voelker",
  title =        "Privacy-preserving network forensics",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "78--87",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941508",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Privacy-preserving attribution of IP packets can help
                 balance forensics with an individual's right to
                 privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "cryptography; digital signatures; fingerprints; Intel
                 Processor Serial Number (PSN) (1999); privacy",
}

@Article{Cook:2011:PPT,
  author =       "Byron Cook and Andreas Podelski and Andrey
                 Rybalchenko",
  title =        "Proving program termination",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "88--98",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941509",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "In contrast to popular belief, proving termination is
                 not always impossible.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "A large number of articles that have been published
                 about Turing's 1938 program-termination problem (or
                 uniform halting problem, or Entscheidungsproblem
                 (decision problem)) and are absent from this
                 bibliography. This paper is a recent one with many
                 references to important earlier work, and points out
                 that the problem is often misunderstood. The authors
                 comment ``Unfortunately, many have drawn too strong of
                 a conclusion about the prospects of automatic program
                 termination proving and falsely believe we are always
                 unable to prove termination, rather than more benign
                 consequence that we are unable to always prove
                 termination.''",
}

@Article{Parkes:2011:CFP,
  author =       "David C. Parkes",
  title =        "Complex financial products: caveat emptor: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "100--100",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941510",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Arora:2011:CCI,
  author =       "Sanjeev Arora and Boaz Barak and Markus Brunnermeier
                 and Rong Ge",
  title =        "Computational complexity and information asymmetry in
                 financial products",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "101--107",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941511",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sapiro:2011:IEL,
  author =       "Guillermo Sapiro",
  title =        "Images everywhere: looking for models: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "108--108",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941512",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Buades:2011:SSB,
  author =       "Antoni Buades and Bartomeu Coll and Jean-Michel
                 Morel",
  title =        "Self-similarity-based image denoising",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "109--117",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941513",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPc,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Games, Roles, Turns",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "120--120",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941514",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dhar:2011:CBM,
  author =       "Subhankar Dhar and Upkar Varshney",
  title =        "Challenges and business models for mobile
                 location-based services and advertising",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "121--128",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941515",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schryen:2011:OSS,
  author =       "Guido Schryen",
  title =        "Is open source security a myth?",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "130--140",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941516",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "What does vulnerability and patch data say?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wainer:2011:IWS,
  author =       "Jacques Wainer and Cleo Billa and Siome Goldenstein",
  title =        "Invisible work in standard bibliometric evaluation of
                 computer science",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "141--146",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941517",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Narayanan:2011:CI,
  author =       "P. J. Narayanan and Anand Deshpanda",
  title =        "Computing and {India}",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953123",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:WCO,
  author =       "{CACM Staff}",
  title =        "Why concurrent objects are recurrently complicated",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953124",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEe,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953125",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Reed:2011:SDR,
  author =       "Daniel Reed and Mark Guzdial and Judy Robertson",
  title =        "Simple design; research vs. teaching; and quest to
                 learn",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "8--9",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953126",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:SIV,
  author =       "Scott E. Delman",
  title =        "Say it with video",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "10--10",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953127",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:BIN,
  author =       "Kirk L. Kroeker",
  title =        "Biology-inspired networking",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "11--13",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953128",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2011:BEL,
  author =       "Gary Anthes",
  title =        "Beauty and elegance: {Leslie Valiant} talks about
                 machine learning, parallel computing, and his quest for
                 simplicity",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "14--15",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953131",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2011:PFD,
  author =       "Tom Geller",
  title =        "The promise of flexible displays",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "16--18",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953130",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2011:UP,
  author =       "Gregory Goth",
  title =        "Unlimited possibilities",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "19--19",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953132",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2011:ANT,
  author =       "Marina Krakovsky",
  title =        "All the news that's fit for you",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "20--21",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953129",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schwartz:2011:IMP,
  author =       "Ari Schwartz",
  title =        "Identity management and privacy: a rare opportunity to
                 get it right",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "22--24",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953134",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2011:WWN,
  author =       "Peter J. Denning and Dennis J. Frailey",
  title =        "Who are we---now?",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "25--27",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953133",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2011:PAT,
  author =       "Phillip G. Armour",
  title =        "Practical application of theoretical estimation",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "28--30",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953135",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Parnas:2011:RST,
  author =       "David Lorge Parnas",
  title =        "The risks of stopping too soon",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "31--33",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953136",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2011:TBY,
  author =       "George V. Neville-Neil",
  title =        "Think before you fork",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "34--35",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953137",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Morrison:2011:CSC,
  author =       "Clayton T. Morrison and Richard T. Snodgrass",
  title =        "Computer science can use more science",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "36--38",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953139",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Helland:2011:IYT,
  author =       "Pat Helland",
  title =        "If you have too much data, then `good enough' is good
                 enough",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "40--47",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953140",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rys:2011:SS,
  author =       "Michael Rys",
  title =        "Scalable {SQL}",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "48--53",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953141",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hu:2011:DDW,
  author =       "Qing Hu and Zhengchuan Xu and Tamara Dinev and Hong
                 Ling",
  title =        "Does deterrence work in reducing information security
                 policy abuse by employees?",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "54--60",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953142",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Edwards:2011:ASH,
  author =       "W. Keith Edwards and Rebecca E. Grinter and Ratul
                 Mahajan and David Wetherall",
  title =        "Advancing the state of home networking",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "62--71",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953143",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2011:RSP,
  author =       "Michael Stonebraker and Rick Cattell",
  title =        "10 rules for scalable performance in `simple
                 operation' datastores",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "72--80",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953144",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Barnett:2011:SVS,
  author =       "Mike Barnett and Manuel F{\"a}hndrich and K. Rustan M.
                 Leino and Peter M{\"u}ller and Wolfram Schulte and
                 Herman Venter",
  title =        "Specification and verification: the {Spec\#}
                 experience",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "81--91",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953145",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Franceschet:2011:PSS,
  author =       "Massimo Franceschet",
  title =        "{PageRank}: standing on the shoulders of giants",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "92--101",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953146",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kolaitis:2011:QLP,
  author =       "Phokion G. Kolaitis",
  title =        "The quest for a logic for polynomial-time computation:
                 technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "103--103",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953149",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Grohe:2011:PTQ,
  author =       "Martin Grohe",
  title =        "From polynomial time queries to graph structure
                 theory",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "104--112",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953150",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Franklin:2011:DAA,
  author =       "Michael J. Franklin",
  title =        "Data analysis at astonishing speed: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "113--13",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953147",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Melnik:2011:DIA,
  author =       "Sergey Melnik and Andrey Gubarev and Jing Jing Long
                 and Geoffrey Romer and Shiva Shivakumar and Matt Tolton
                 and Theo Vassilakis",
  title =        "{Dremel}: interactive analysis of {Web}-scale
                 datasets",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "114--123",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953148",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPd,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: a Lifelong Learner",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "126--126",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953151",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:LBQb,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: a Lifelong Learner: {Leslie
                 Valiant} discusses machine learning, parallel
                 computing, and computational neuroscience",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "128, 127",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953152",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Boldi:2011:VDS,
  author =       "Paolo Boldi and Francesco Bonchi and Carlos Castillo
                 and Sebastiano Vigna",
  title =        "Viscous democracy for social networks",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "129--137",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953154",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Mcmanus:2011:WPC,
  author =       "Denise Mcmanus and Houston Carr and Benjamin Adams",
  title =        "Wireless on the precipice: {The} 14th century
                 revisited",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "138--143",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953155",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:SU,
  author =       "Moshe Y. Vardi",
  title =        "Solving the unsolvable",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965725",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:PRY,
  author =       "{CACM Staff}",
  title =        "Practical research yields fundamental insight, too",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "6--7",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965726",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEf,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "9--9",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965727",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wing:2011:RPR,
  author =       "Jeannette M. Wing and Ed H. Chi",
  title =        "Reviewing peer review",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "10--11",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965728",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:AAP,
  author =       "Scott E. Delman",
  title =        "{ACM} aggregates publication statistics in the {ACM
                 Digital Library}",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "12--12",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965729",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:WWI,
  author =       "Kirk L. Kroeker",
  title =        "Weighing {Watson}'s impact",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "13--15",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965730",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2011:AA,
  author =       "Alex Wright",
  title =        "Automotive autonomy",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "16--18",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965731",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McCafferty:2011:BNS,
  author =       "Dennis McCafferty",
  title =        "Brave, new social world",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "19--21",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965732",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:AAR,
  author =       "{CACM Staff}",
  title =        "{ACM} award recipients",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "22--22",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965733",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sako:2011:DPG,
  author =       "Mari Sako",
  title =        "Driving power in global supply chains",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "23--25",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965734",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Knobel:2011:VD,
  author =       "Cory Knobel and Geoffrey C. Bowker",
  title =        "Values in design",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "26--28",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965735",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2011:TMC,
  author =       "Pamela Samuelson",
  title =        "Too many copyrights?",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "29--31",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965736",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ong:2011:SWC,
  author =       "Maria (Mia) Ong",
  title =        "The status of women of color in computer science",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "32--34",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965737",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ben-Ari:2011:NMA,
  author =       "Mordechai (Moti) Ben-Ari",
  title =        "Non-myths about programming",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "35--37",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965738",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ierusalimschy:2011:PLT,
  author =       "Roberto Ierusalimschy and Luiz Henrique {De
                 Figueiredo} and Waldemar Celes",
  title =        "Passing a language through the eye of a needle",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "38--43",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965739",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ghosh:2011:DU,
  author =       "Debasish Ghosh",
  title =        "{DSL} for the uninitiated",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "44--50",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965740",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "Domain Specific Languages (DSL)",
}

@Article{Staff:2011:MPD,
  author =       "{CACM Staff}",
  title =        "{Microsoft}'s protocol documentation program:
                 interoperability testing at scale",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "51--57",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965741",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Edwards:2011:ACC,
  author =       "Michael Edwards",
  title =        "Algorithmic composition: computational thinking in
                 music",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "58--67",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965742",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ball:2011:DSM,
  author =       "Thomas Ball and Vladimir Levin and Sriram K.
                 Rajamani",
  title =        "A decade of software model checking with {SLAM}",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "68--76",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965743",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hellerstein:2011:SJG,
  author =       "Joseph M. Hellerstein and David L. Tennenhouse",
  title =        "Searching for {Jim Gray}: a technical overview",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "77--87",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965744",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wicker:2011:CTQ,
  author =       "Stephen B. Wicker",
  title =        "Cellular telephony and the question of privacy",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "88--98",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965745",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Barroso:2011:FFA,
  author =       "Luiz Andr{\'e} Barroso",
  title =        "{FAWN}: a {Fast Array of Wimpy Nodes}: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "100--100",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965746",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Andersen:2011:FFA,
  author =       "David G. Andersen and Jason Franklin and Michael
                 Kaminsky and Amar Phanishayee and Lawrence Tan and
                 Vijay Vasudevan",
  title =        "{FAWN}: a {Fast Array of Wimpy Nodes}",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "101--109",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965747",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ousterhout:2011:SYE,
  author =       "John Ousterhout",
  title =        "Is scale your enemy, or is scale your friend?:
                 technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "110--110",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965748",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kinshumann:2011:DVL,
  author =       "Kinshuman Kinshumann and Kirk Glerum and Steve
                 Greenberg and Gabriel Aul and Vince Orgovan and Greg
                 Nichols and David Grant and Gretchen Loihle and Galen
                 Hunt",
  title =        "Debugging in the (very) large: ten years of
                 implementation and experience",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "111--116",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965749",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rucker:2011:FT,
  author =       "Rudy Rucker",
  title =        "Future tense",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "120--ff",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965750",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Ousterhout:2011:CR,
  author =       "John Ousterhout and Parag Agrawal and David Erickson
                 and Christos Kozyrakis and Jacob Leverich and David
                 Mazi{\`e}res and Subhasish Mitra and Aravind Narayanan
                 and Diego Ongaro and Guru Parulkar and Mendel Rosenblum
                 and Stephen M. Rumble and Eric Stratmann and Ryan
                 Stutsman",
  title =        "The case for {RAMCloud}",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "121--130",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965751",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Dasgupta:2011:WMP,
  author =       "Gargi Dasgupta and Amit Sharma and Akshat Verma and
                 Anindya Neogi and Ravi Kothari",
  title =        "Workload management for power efficiency in
                 virtualized data centers",
  journal =      j-CACM,
  volume =       "54",
  number =       "7",
  pages =        "131--141",
  month =        jul,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1965724.1965752",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 27 11:10:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Reisman:2011:PIC,
  author =       "Sorel Reisman and Alain Chesnais",
  title =        "From the {Presidents} of the {IEEE Computer Society}
                 and {ACM}",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978543",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:PDV,
  author =       "{CACM Staff}",
  title =        "A policy that deters violation of security policy",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "7--7",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978544",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEg,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "8--8",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978545",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2011:SNE,
  author =       "Michael Stonebraker",
  title =        "{Stonebraker} on {NoSQL} and enterprises",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "10--11",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978546",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:WYS,
  author =       "Scott E. Delman",
  title =        "Why you should be happy to sign in!",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "12--12",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978547",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:NBA,
  author =       "Kirk L. Kroeker",
  title =        "A new benchmark for artificial intelligence",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "13--15",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978548",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2011:SET,
  author =       "Tom Geller",
  title =        "Supercomputing's exaflop target",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "16--18",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978549",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:LT,
  author =       "Samuel Greengard",
  title =        "Life, translated",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "19--21",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978550",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cummings:2011:GAW,
  author =       "Jonathon N. Cummings",
  title =        "Geography is alive and well in virtual teams",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "24--26",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978551",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{DiSalvo:2011:IV,
  author =       "Betsy DiSalvo and Amy Bruckman",
  title =        "From interests to values",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "27--29",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978552",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bellovin:2011:PSS,
  author =       "S. M. Bellovin and S. O. Bradner and W. Diffie and S.
                 Landau and J. Rexford",
  title =        "Privacy and Security: As simple as possible---but not
                 more so: An assessment of the {U.S.} government's
                 {EINSTEIN} project",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "30--33",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978553",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/einstein.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  remark =       "From the conclusion in the article: ``Electronic
                 fences protecting critical infrastructure sound good,
                 but once one examines network architecture more
                 carefully, EINSTEIN's fit is highly questionable. In
                 determining how to protect critical infrastructure, one
                 should keep in mind what Einstein himself was purported
                 to have said: `Everything should be made as simple as
                 possible, but no simpler' --- and then develop
                 solutions accordingly.''",
}

@Article{Neville-Neil:2011:SS,
  author =       "George V. Neville-Neil",
  title =        "Storage strife",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "34--35",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978554",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Halpern:2011:JCC,
  author =       "Joseph Y. Halpern and David C. Parkes",
  title =        "Journals for certification, conferences for rapid
                 dissemination",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "36--38",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978555",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Allman:2011:RPR,
  author =       "Eric Allman",
  title =        "The robustness principle reconsidered",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "40--45",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978557",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Singh:2011:CP,
  author =       "Satnam Singh",
  title =        "Computing without processors",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "46--54",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978558",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Eini:2011:PIL,
  author =       "Oren Eini",
  title =        "The pain of implementing {LINQ} providers",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "55--61",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978556",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Modha:2011:CC,
  author =       "Dharmendra S. Modha and Rajagopal Ananthanarayanan and
                 Steven K. Esser and Anthony Ndirango and Anthony
                 J. Sherbondy and Raghavendra Singh",
  title =        "Cognitive computing",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "62--71",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978559",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cohoon:2011:GCC,
  author =       "J. McGrath Cohoon and Sergey Nigai and Joseph
                 ``Jofish'' Kaye",
  title =        "Gender and computing conference papers",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "72--80",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978561",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{DeAlfaro:2011:RSO,
  author =       "Luca {De Alfaro} and Ashutosh Kulshreshtha and Ian Pye
                 and B. Thomas Adler",
  title =        "Reputation systems for open collaboration",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "81--87",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978560",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chaudhuri:2011:OBI,
  author =       "Surajit Chaudhuri and Umeshwar Dayal and Vivek
                 Narasayya",
  title =        "An overview of business intelligence technology",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "88--98",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978562",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Haas:2011:SGS,
  author =       "Peter J. Haas",
  title =        "Sketches get sketchier",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "100--100",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978565",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Li:2011:TAB,
  author =       "Ping Li and Arnd Christian K{\"o}nig",
  title =        "Theory and applications of $b$-bit minwise hashing",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "101--109",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978566",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Klemmer:2011:SF,
  author =       "Scott Klemmer",
  title =        "Skintroducing the future",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "110--110",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978563",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Harrison:2011:SAS,
  author =       "Chris Harrison and Desney Tan and Dan Morris",
  title =        "Skinput: appropriating the skin as an interactive
                 canvas",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "111--118",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978564",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPe,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Uncommon Divisors",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "120--120",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978567",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "divisibility ($n|m$ means that $n$ divides $m$ without
                 remainder); Fibonacci numbers",
}

@Article{Wright:2011:SPI,
  author =       "David Wright",
  title =        "Should privacy impact assessments be mandatory?",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "121--131",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978568",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goel:2011:CCD,
  author =       "Sanjay Goel",
  title =        "Cyberwarfare: connecting the dots in cyber
                 intelligence",
  journal =      j-CACM,
  volume =       "54",
  number =       "8",
  pages =        "132--140",
  month =        aug,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1978542.1978569",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Aug 17 15:27:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:YTM,
  author =       "Moshe Y. Vardi",
  title =        "Are you talking to me?",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995377",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:SAP,
  author =       "{CACM Staff}",
  title =        "Solved, for all practical purposes",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "7--7",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995378",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEh,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "9--9",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995379",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wing:2011:JMW,
  author =       "Jeannette M. Wing and Valerie Barr",
  title =        "{Jeannette M. Wing @ PCAST}; {Barbara Liskov}
                 keynote",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "10--11",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995380",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:BAD,
  author =       "Kirk L. Kroeker",
  title =        "A breakthrough in algorithm design",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "13--15",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995382",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
  keywords =     "symmetric diagonally-dominant (SDD) linear system",
}

@Article{Anthes:2011:IMA,
  author =       "Gary Anthes",
  title =        "Invasion of the mobile apps",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "16--18",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995383",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:MRM,
  author =       "Samuel Greengard",
  title =        "In Memoriam: {Robert Morris, 1932--2011}",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "17--17",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995383",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Cryptographer and Unix operating system co-creator
                 Robert Morris died June 26 in Lebanon, NH, at the age
                 of 78 from complications of dementia. Morris was a
                 pioneer in developing operating systems and computer
                 security. He also purportedly played a role in one of
                 the world's first cyberattacks during the 1991 Persian
                 Gulf War.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2011:RAM,
  author =       "Neil Savage",
  title =        "Remaking {American} medicine",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "19--21",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995384",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tushnet:2011:RN,
  author =       "Rebecca Tushnet",
  title =        "Remix nation",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "22--24",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995385",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Campbell-Kelly:2011:PWW,
  author =       "Martin Campbell-Kelly",
  title =        "In praise of {'Wilkes, Wheeler, and Gill'}",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "25--27",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995386",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  abstract =     "Sixty years ago, in spring 1951, Maurice Wilkes, David
                 Wheeler, and Stanley Gill produced the first textbook
                 on programming: The Preparation of Programs for an
                 Electronic Digital Computer. It was a publication that
                 spearheaded the software revolution.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Babin:2011:CSR,
  author =       "Ron Babin and Steve Briggs and Brian Nicholson",
  title =        "Corporate social responsibility and global {IT}
                 outsourcing",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "28--30",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995387",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2011:MTP,
  author =       "Peter J. Denning and Ritu Raj",
  title =        "Managing time, part 2",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "31--33",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995388",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shneiderman:2011:RVS,
  author =       "Ben Shneiderman and Jennifer Preece and Peter
                 Pirolli",
  title =        "Realizing the value of social media requires
                 innovative computing research",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "34--37",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995389",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vixie:2011:ABP,
  author =       "Paul Vixie",
  title =        "Arrogance in business planning",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "38--41",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995392",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2011:MEO,
  author =       "Poul-Henning Kamp",
  title =        "The most expensive one-byte mistake",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "42--44",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995391",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Creeger:2011:ACR,
  author =       "Mache Creeger",
  title =        "{ACM CTO} roundtable on mobile devices in the
                 enterprise",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "45--53",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995390",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lukasik:2011:PUC,
  author =       "Stephen J. Lukasik",
  title =        "Protecting users of the cyber commons",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "54--61",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995393",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Partridge:2011:RFW,
  author =       "Craig Partridge",
  title =        "Realizing the future of wireless data communications",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "62--68",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995395",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{DeMoura:2011:SMT,
  author =       "Leonardo {De Moura} and Nikolaj Bj{\o}rner",
  title =        "Satisfiability modulo theories: introduction and
                 applications",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "69--77",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995394",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bouyer:2011:QAR,
  author =       "Patricia Bouyer and Uli Fahrenberg and Kim G. Larsen
                 and Nicolas Markey",
  title =        "Quantitative analysis of real-time systems using
                 priced timed automata",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "78--87",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995396",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kruegel:2011:MBE,
  author =       "Christopher Kruegel",
  title =        "Making browser extensions secure: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "90--90",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995397",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bandhakavi:2011:VBE,
  author =       "Sruthi Bandhakavi and Nandit Tiku and Wyatt Pittman
                 and Samuel T. King and P. Madhusudan and Marianne
                 Winslett",
  title =        "Vetting browser extensions for security
                 vulnerabilities with {VEX}",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "91--99",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995398",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Danvy:2011:AAM,
  author =       "Olivier Danvy and Jan Midtgaard",
  title =        "Abstracting abstract machines: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "100--100",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995399",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{VanHorn:2011:AAM,
  author =       "David {Van Horn} and Matthew Might",
  title =        "Abstracting abstract machines: a systematic approach
                 to higher-order program analysis",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "101--109",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995400",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPf,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "110--110",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995401",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:LBQc,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: Scaling Up",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "112--ff",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995402",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tarafdar:2011:CDS,
  author =       "Monideepa Tarafdar and Qiang Tu and T. S. Ragu-Nathan
                 and Bhanu S. Ragu-Nathan",
  title =        "Crossing to the dark side: examining creators,
                 outcomes, and inhibitors of technostress",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "113--120",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995403",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cantor:2011:CIR,
  author =       "Murray Cantor",
  title =        "Calculating and improving {ROI} in software and system
                 programs",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "121--130",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995404",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Boisvert:2011:ACP,
  author =       "Ronald F. Boisvert and Jack W. Davidson",
  title =        "{ACM}'s copyright policy",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "5--6",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001270",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEi,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001272",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Reed:2011:IPH,
  author =       "Daniel Reed and Mark Guzdial",
  title =        "From idea to product: how schools of education can
                 help {CS}",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "8--9",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001273",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:ATN,
  author =       "Scott E. Delman",
  title =        "{ACM TechNews} now available in the {Android Market}",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "10--10",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001274",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:IBC,
  author =       "Kirk L. Kroeker",
  title =        "Improving brain-computer interfaces",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "11--14",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001275",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Geller:2011:SE,
  author =       "Tom Geller",
  title =        "Seeing is not enough",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "15--16",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001276",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:LDW,
  author =       "Samuel Greengard",
  title =        "Living in a digital world",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "17--19",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001277",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Krakovsky:2011:S,
  author =       "Marina Krakovsky",
  title =        "Success at 16",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "20--20",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001278",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2011:PLD,
  author =       "Michael A. Cusumano",
  title =        "The platform leader's dilemma",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "21--24",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001279",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2011:FSL,
  author =       "George V. Neville-Neil",
  title =        "File-system litter",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "25--26",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001282",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schurmann:2011:MDD,
  author =       "Carsten Sch{\"u}rmann",
  title =        "Modernizing the {Danish} democratic process",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "27--29",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001281",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2011:TFS,
  author =       "Phillip G. Armour",
  title =        "Testing: failing to succeed",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "30--31",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001280",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wallach:2011:RCP,
  author =       "Dan S. Wallach",
  title =        "Rebooting the {CS} publication process",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "32--35",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001283",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Nikhil:2011:AHS,
  author =       "Rishiyur S. Nikhil",
  title =        "Abstraction in hardware system design",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "36--44",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001284",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Meijer:2011:WAL,
  author =       "Erik Meijer",
  title =        "The world according to {LINQ}",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "45--51",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001285",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Andersen:2011:VSC,
  author =       "B. Scott Andersen and George Romanski",
  title =        "Verification of safety-critical software",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "52--57",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001286",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Arquilla:2011:BBM,
  author =       "John Arquilla",
  title =        "From blitzkrieg to bitskrieg: the military encounter
                 with computers",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "58--65",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001287",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cohen:2011:CJ,
  author =       "Sarah Cohen and James T. Hamilton and Fred Turner",
  title =        "Computational journalism",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "66--71",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001288",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Fisher:2011:BR,
  author =       "Jasmin Fisher and David Harel and Thomas A.
                 Henzinger",
  title =        "Biology as reactivity",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "72--82",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001289",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Moore:2011:PED,
  author =       "Charles Moore",
  title =        "Power efficiency as the \#1 design constraint:
                 technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "84--84",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001290",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hameed:2011:USI,
  author =       "Rehan Hameed and Wajahat Qadeer and Megan Wachs and
                 Omid Azizi and Alex Solomatnikov and Benjamin C. Lee
                 and Stephen Richardson and Christos Kozyrakis and Mark
                 Horowitz",
  title =        "Understanding sources of inefficiency in
                 general-purpose chips",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "85--93",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001291",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hinton:2011:BWL,
  author =       "Geoffrey E. Hinton",
  title =        "A better way to learn features: technical
                 perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "94--94",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001294",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lee:2011:ULH,
  author =       "Honglak Lee and Roger Grosse and Rajesh Ranganath and
                 Andrew Y. Ng",
  title =        "Unsupervised learning of hierarchical representations
                 with convolutional deep belief networks",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "95--103",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001295",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tomasi:2011:VRT,
  author =       "Carlo Tomasi",
  title =        "Visual reconstruction: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "104--104",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001292",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Agarwal:2011:BRD,
  author =       "Sameer Agarwal and Yasutaka Furukawa and Noah Snavely
                 and Ian Simon and Brian Curless and Steven M. Seitz and
                 Richard Szeliski",
  title =        "Building {Rome} in a day",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "105--112",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001293",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Baluja:2011:FT,
  author =       "Shumeet Baluja",
  title =        "Future tense",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "120--ff",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001296",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gayo-Avello:2011:DTS,
  author =       "Daniel Gayo-Avello",
  title =        "Don't turn social media into another {`Literary
                 Digest'} poll",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "121--128",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001297",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Xu:2011:CM,
  author =       "Zhiwei Xu and Guojie Li",
  title =        "Computing for the masses",
  journal =      j-CACM,
  volume =       "54",
  number =       "10",
  pages =        "129--137",
  month =        oct,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2001269.2001298",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 26 16:49:19 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:MP,
  author =       "Moshe Y. Vardi",
  title =        "Is {Moore's Party} over?",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018397",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:JJ,
  author =       "{CACM Staff}",
  title =        "Justice for {Jahromi}",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "6--7",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018398",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:VEj,
  author =       "{CACM Staff}",
  title =        "In the {Virtual Extension}",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "9--9",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018399",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Meyer:2011:SOR,
  author =       "Bertrand Meyer and Greg Linden",
  title =        "In support of open reviews: better teaching through
                 large-scale data mining",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "12--13",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018400",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2011:AON,
  author =       "Scott E. Delman",
  title =        "{ACM} offers a new approach to self-archiving",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "14--14",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018401",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:MCS,
  author =       "Kirk L. Kroeker",
  title =        "Modeling chaotic storms",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "15--17",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018402",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2011:HC,
  author =       "Alex Wright",
  title =        "Hacking cars",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "18--19",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018403",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:RB,
  author =       "Leah Hoffmann",
  title =        "Risky business",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "20--22",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018404",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tschofenig:2011:SRN,
  author =       "Hannes Tschofenig",
  title =        "Security risks in next-generation emergency services",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "23--25",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018405",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wallsten:2011:WGM,
  author =       "Scott Wallsten",
  title =        "What gets measured gets done",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "26--28",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018406",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Samuelson:2011:WGB,
  author =       "Pamela Samuelson",
  title =        "Why the {Google} book settlement failed: and what
                 comes next?",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "29--31",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018408",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Davis:2011:WSE,
  author =       "Michael Davis",
  title =        "Will software engineering ever be engineering?",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "32--34",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018407",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Group:2011:TOF,
  author =       "SIGCSE Teaching-Oriented Faculty Working Group",
  title =        "Teaching-oriented faculty at research universities",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "35--37",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018409",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Baumann:2011:GDT,
  author =       "Douglas Baumann and Susanne Hambrusch and Jennifer
                 Neville",
  title =        "Gender demographics trends and changes in {U.S.} {CS}
                 departments",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "38--42",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018410",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kamp:2011:SIP,
  author =       "Poul-Henning Kamp",
  title =        "The software industry is the problem",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "44--47",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018412",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gong:2011:JSA,
  author =       "Li Gong",
  title =        "{Java} security architecture revisited",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "48--52",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018411",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Minsky:2011:OM,
  author =       "Yaron Minsky",
  title =        "{OCaml} for the masses",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "53--58",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018413",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hearst:2011:NSU,
  author =       "Marti A. Hearst",
  title =        "'Natural' search user interfaces",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "60--67",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018414",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Seo:2011:MAA,
  author =       "DongBack Seo and Albert Boonstra and Marjolein
                 Offenbeek",
  title =        "Managing {IS} adoption in ambivalent groups",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "68--73",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018416",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kennedy:2011:RFH,
  author =       "Ken Kennedy and Charles Koelbel and Hans Zima",
  title =        "The rise and fall of {High Performance Fortran}",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "74--82",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018415",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Akyildiz:2011:NNF,
  author =       "Ian F. Akyildiz and Josep Miquel Jornet and
                 Massimiliano Pierobon",
  title =        "Nanonetworks: a new frontier in communications",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "84--89",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018417",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lampson:2011:MUC,
  author =       "Butler Lampson",
  title =        "Making untrusted code useful: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "92--92",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018418",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Zeldovich:2011:MIF,
  author =       "Nickolai Zeldovich and Silas Boyd-Wickizer and Eddie
                 Kohler and David Mazi{\`e}res",
  title =        "Making information flow explicit in {HiStar}",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "93--101",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018419",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Freeman:2011:PMT,
  author =       "William T. Freeman",
  title =        "A perfect `match': technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "102--102",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018420",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Barnes:2011:PRM,
  author =       "Connelly Barnes and Dan B. Goldman and Eli Shechtman
                 and Adam Finkelstein",
  title =        "The {PatchMatch} randomized matching algorithm for
                 image manipulation",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "103--110",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018421",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPg,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Distances Between Points on the
                 Plane",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "120--120",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018422",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Garcia-Molina:2011:ISC,
  author =       "Hector Garcia-Molina and Georgia Koutrika and Aditya
                 Parameswaran",
  title =        "Information seeking: convergence of search,
                 recommendations, and advertising",
  journal =      j-CACM,
  volume =       "54",
  number =       "11",
  pages =        "121--130",
  month =        nov,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2018396.2018423",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun Nov 6 06:54:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2011:CH,
  author =       "Moshe Y. Vardi",
  title =        "Computing for humans",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043175",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:BPQ,
  author =       "{CACM Staff}",
  title =        "To boost presentation quality, ask questions",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "7--7",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043176",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Langford:2011:CVL,
  author =       "John Langford and Judy Robertson",
  title =        "Conferences and video lectures; scientific educational
                 games",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "8--9",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043178",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2011:NER,
  author =       "{CACM Staff}",
  title =        "Nominees for elections and report of the {ACM
                 Nominating Committee}",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "10--10",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043179",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kroeker:2011:RMM,
  author =       "Kirk L. Kroeker",
  title =        "The rise of molecular machines",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "11--13",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043180",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2011:BNW,
  author =       "Gregory Goth",
  title =        "Brave {NUI} world",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "14--16",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043181",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McCafferty:2011:AVS,
  author =       "Dennis McCafferty",
  title =        "Activism vs. slacktivism",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "17--19",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043182",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2011:CTH,
  author =       "Samuel Greengard",
  title =        "{CSEdWeek} takes hold",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "20--20",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043183",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hyman:2011:DR,
  author =       "Paul Hyman",
  title =        "{Dennis Ritchie, 1941--2011}",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "21--21",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043202",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Lanier:2011:MAM,
  author =       "Jaron Lanier",
  title =        "The most ancient marketing",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "22--23",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043204",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bell:2011:LDI,
  author =       "Genevieve Bell",
  title =        "Life, death, and the {iPad}: cultural symbols and
                 {Steve Jobs}",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "24--25",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043205",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cusumano:2011:LSJ,
  author =       "Michael A. Cusumano",
  title =        "The legacy of {Steve Jobs}",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "26--28",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043184",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Toyama:2011:THS,
  author =       "Kentaro Toyama",
  title =        "On turbocharged, heat-seeking, robotic fishing poles",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "29--31",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043185",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2011:DLS,
  author =       "George V. Neville-Neil",
  title =        "Debugging on live systems",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "32--33",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043186",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Taylor:2011:DTM,
  author =       "Valerie Taylor and Richard Ladner",
  title =        "Data trends on minorities and people with disabilities
                 in computing",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "34--37",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043187",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Denning:2011:GP,
  author =       "Peter J. Denning",
  title =        "The grounding practice",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "38--40",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043188",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bernat:2011:DPR,
  author =       "Andrew Bernat and Eric Grimson",
  title =        "Doctoral program rankings for {U.S}. computing
                 programs: the {National Research Council} strikes out",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "41--43",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043203",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Pacheco:2011:PDD,
  author =       "David Pacheco",
  title =        "Postmortem debugging in dynamic environments",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "44--51",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043189",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Berriman:2011:HWA,
  author =       "G. Bruce Berriman and Steven L. Groom",
  title =        "How will astronomy archives survive the data
                 tsunami?",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "52--56",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043190",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Green:2011:CGF,
  author =       "Robert Green and Henry Ledgard",
  title =        "Coding guidelines: finding the art in the science",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "57--63",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043191",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Moore:2011:VCS,
  author =       "Brian E. Moore and Saad Ali and Ramin Mehran and
                 Mubarak Shah",
  title =        "Visual crowd surveillance through a hydrodynamics
                 lens",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "64--73",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043192",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Sojer:2011:LRA,
  author =       "Manuel Sojer and Joachim Henkel",
  title =        "License risks from ad hoc reuse of code from the
                 {Internet}",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "74--81",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043193",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gopalakrishnan:2011:FAM,
  author =       "Ganesh Gopalakrishnan and Robert M. Kirby and Stephen
                 Siegel and Rajeev Thakur and William Gropp and Ewing
                 Lusk and Bronis R. De Supinski and Martin Schulz and
                 Greg Bronevetsky",
  title =        "Formal analysis of {MPI}-based parallel programs",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "82--91",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043194",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brewka:2011:ASP,
  author =       "Gerhard Brewka and Thomas Eiter and Miros{\l}aw
                 Truszczy{\'n}ski",
  title =        "Answer set programming at a glance",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "92--103",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043195",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Leroy:2011:SFT,
  author =       "Xavier Leroy",
  title =        "Safety first!: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "122--122",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043196",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Yang:2011:SLI,
  author =       "Jean Yang and Chris Hawblitzel",
  title =        "Safe to the last instruction: automated verification
                 of a type-safe operating system",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "123--131",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043197",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Shmatikov:2011:APT,
  author =       "Vitaly Shmatikov",
  title =        "Anonymity is not privacy: technical perspective",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "132--132",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043198",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Backstrom:2011:WAT,
  author =       "Lars Backstrom and Cynthia Dwork and Jon Kleinberg",
  title =        "Wherefore art thou {R3579X}?: anonymized social
                 networks, hidden patterns, and structural
                 steganography",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "133--141",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043199",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Winkler:2011:LBPh,
  author =       "Peter Winkler",
  title =        "Last Byte: Puzzled: Solutions and Sources",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "142--142",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043200",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoffmann:2011:LBQd,
  author =       "Leah Hoffmann",
  title =        "Last Byte: {Q\&A}: Scaling Up: {M. Frans Kaashoek}
                 talks about multicore computing, security, and
                 operating system design",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "144, 143",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043201",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vardi:2012:AIP,
  author =       "Moshe Y. Vardi",
  title =        "Artificial intelligence: past and future",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063177",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2012:SEE,
  author =       "{CACM Staff}",
  title =        "Software engineering is engineering",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "6--7",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063178",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chesnais:2012:APL,
  author =       "Alain Chesnais",
  title =        "{ACM President}'s letter",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "8--8",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063206",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Chesnais:2012:AAR,
  author =       "Alain Chesnais",
  title =        "{ACM}'s annual report",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "9--13",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063179",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Guzdial:2012:UCS,
  author =       "Mark Guzdial and Bertrand Meyer",
  title =        "Understanding {CS1} students; defective software",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "14--15",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063180",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Delman:2012:EWA,
  author =       "Scott Delman",
  title =        "{eBooks} will abound in the {ACM Digital Library}",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "16--16",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063181",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Savage:2012:BMT,
  author =       "Neil Savage",
  title =        "Better medicine through machine learning",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "17--19",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063182",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Anthes:2012:RSP,
  author =       "Gary Anthes",
  title =        "Revamping storage performance",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "20--22",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063183",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2012:LD,
  author =       "Samuel Greengard",
  title =        "Law and disorder",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "23--25",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063184",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Underwood:2012:CT,
  author =       "Sarah Underwood",
  title =        "Celebration time",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "26--26",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063185",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2012:AAP,
  author =       "Alex Wright",
  title =        "Analyzing {Apple} products",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "27--27",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063186",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hyman:2012:JM,
  author =       "Paul Hyman",
  title =        "{John McCarthy}, 1927--2011",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "28--29",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063187",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Picker:2012:YYC,
  author =       "Randal C. Picker",
  title =        "The yin and yang of copyright and technology",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "30--32",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063190",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Armour:2012:DE,
  author =       "Phillip G. Armour",
  title =        "The difference engine",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "33--34",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063191",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Haigh:2012:IPB,
  author =       "Thomas Haigh",
  title =        "The {IBM PC}: from beige box to industry standard",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "35--37",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063188",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Olsen:2012:IOU,
  author =       "Kai A. Olsen and Alessio Malizia",
  title =        "Interfaces for the ordinary user: can we hide too
                 much?",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "38--40",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063192",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Frana:2012:ISC,
  author =       "Philip L. Frana",
  title =        "An interview with {Stephen A. Cook}",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "41--46",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063193",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Flatt:2012:CLR,
  author =       "Matthew Flatt",
  title =        "Creating languages in {Racket}",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "48--56",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063195",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gettys:2012:BDB,
  author =       "Jim Gettys and Kathleen Nichols",
  title =        "Bufferbloat: dark buffers in the {Internet}",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "57--65",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063196",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Waldspurger:2012:V,
  author =       "Carl Waldspurger and Mendel Rosenblum",
  title =        "{I/O} virtualization",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "66--73",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063194",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hong:2012:SPA,
  author =       "Jason Hong",
  title =        "The state of phishing attacks",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "74--81",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063197",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Coulson:2012:FEW,
  author =       "Geoff Coulson and Barry Porter and Ioannis
                 Chatzigiannakis and Christos Koninis and Stefan Fischer
                 and Dennis Pfisterer and Daniel Bimschas and Torsten
                 Braun and Philipp Hurni and Markus Anwander and Gerald
                 Wagenknecht and S{\'a}ndor P. Fekete and Alexander
                 Kr{\"o}ller and Tobias Baumgartner",
  title =        "Flexible experimentation in wireless sensor networks",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "82--90",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063198",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Laih:2012:LTC,
  author =       "Chi-Sung Laih and Shang-Ming Jen and Chia-Yu Lu",
  title =        "Long-term confidentiality of {PKI}",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "91--95",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063199",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Manduchi:2012:CVS,
  author =       "Roberto Manduchi and James Coughlan",
  title =        "(Computer) vision without sight",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "96--104",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063200",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Durand:2012:WDP,
  author =       "Fr{\'e}do Durand",
  title =        "Where do people draw lines?: technical perspective",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "106--106",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063201",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cole:2012:WDP,
  author =       "Forrester Cole and Aleksey Golovinskiy and Alex
                 Limpaecher and Heather Stoddart Barros and Adam
                 Finkelstein and Thomas Funkhouser and Szymon
                 Rusinkiewicz",
  title =        "Where do people draw lines?",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "107--115",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063202",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kurose:2012:CCN,
  author =       "Jim Kurose",
  title =        "Content-centric networking: technical perspective",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "116--116",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063203",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Jacobson:2012:NNC,
  author =       "Van Jacobson and Diana K. Smetters and James D.
                 Thornton and Michael Plass and Nick Briggs and Rebecca
                 Braynard",
  title =        "Networking named content",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "117--124",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063204",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wilson:2012:FT,
  author =       "Daniel H. Wilson",
  title =        "Future tense",
  journal =      j-CACM,
  volume =       "55",
  number =       "1",
  pages =        "136--ff",
  month =        jan,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2063176.2063205",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jan 5 12:17:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Gagliardi:2012:RAE,
  author =       "Fabrizio Gagliardi",
  title =        "Revisiting {ACM Europe}",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076451",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Brooke:2012:LCN,
  author =       "Phil Brooke and Vladik Kreinovich",
  title =        "Letters: Credit non-anonymous reviewers with a name",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Paulson:2012:LWL,
  author =       "Lawrence C. Paulson and Poul-Henning Kamp",
  title =        "Letters: What Liability for Faulty Software?",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Joyner:2012:LSJ,
  author =       "Ian Joyner",
  title =        "Letters: The {[Steve] Jobs} Factor",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Schau:2012:LGM,
  author =       "August Schau and Charles H. Lindsey",
  title =        "Letters: Give Me Competent Communication",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076452",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Stonebraker:2012:RBD,
  author =       "Michael Stonebraker and Jason Hong",
  title =        "Researchers' big data crisis; understanding design and
                 functionality",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "10--11",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076453",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Goth:2012:SBS,
  author =       "Gregory Goth",
  title =        "The science of better science",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "13--15",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076455",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Greengard:2012:WAB,
  author =       "Samuel Greengard",
  title =        "The war against botnets",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "16--18",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076456",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Wright:2012:SLR,
  author =       "Alex Wright",
  title =        "The social life of robots",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "19--21",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076457",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Staff:2012:AFI,
  author =       "{CACM Staff}",
  title =        "{ACM Fellows} inducted",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "23--23",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076476",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Rosston:2012:IA,
  author =       "Gregory Rosston",
  title =        "Incentive auctions",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "24--26",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076458",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Simon:2012:PIT,
  author =       "Beth Simon and Quintin Cutts",
  title =        "Peer instruction: a teaching method to foster deep
                 understanding",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "27--29",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076459",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Norman:2012:YAT,
  author =       "Donald A. Norman",
  title =        "Yet another technology cusp: confusion, vendor wars,
                 and opportunities",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "30--32",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076460",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Neville-Neil:2012:WAD,
  author =       "George V. Neville-Neil",
  title =        "Wanton acts of debuggery",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "33--34",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076461",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{McDermott:2012:ES,
  author =       "Rose McDermott",
  title =        "Emotion and security",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "35--37",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076462",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Zelkowitz:2012:WWL,
  author =       "Marvin V. Zelkowitz",
  title =        "What have we learned about software engineering?",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "38--39",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076463",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Cerf:2012:BWW,
  author =       "Vint Cerf and Van Jacobson and Nick Weaver and Jim
                 Gettys",
  title =        "{BufferBloat}: what's wrong with the {Internet}?",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "40--47",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076464",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Boehm:2012:YDK,
  author =       "Hans-J. Boehm and Sarita V. Adve",
  title =        "You don't know jack about shared variables or memory
                 models",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "48--54",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076465",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Oliner:2012:ACL,
  author =       "Adam Oliner and Archana Ganapathi and Wei Xu",
  title =        "Advances and challenges in log analysis",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "55--61",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076466",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Evangelopoulos:2012:TMV,
  author =       "Nicholas Evangelopoulos and Lucian Visinescu",
  title =        "Text-mining the voice of the people",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "62--69",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076467",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Hoos:2012:PO,
  author =       "Holger H. Hoos",
  title =        "Programming by optimization",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "70--80",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076469",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Allen:2012:SSD,
  author =       "Bryce Allen and John Bresnahan and Lisa Childers and
                 Ian Foster and Gopi Kandaswamy and Raj Kettimuthu and
                 Jack Kordas and Mike Link and Stuart Martin and Karl
                 Pickett and Steven Tuecke",
  title =        "Software as a service for data scientists",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "81--88",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076468",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Faezipour:2012:PCI,
  author =       "Miad Faezipour and Mehrdad Nourani and Adnan Saeed and
                 Sateesh Addepalli",
  title =        "Progress and challenges in intelligent vehicle area
                 networks",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "90--100",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076470",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Bodik:2012:CWH,
  author =       "Rastislav Bodik",
  title =        "Compiling what to how: technical perspective",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "102--102",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076471",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kuncak:2012:SSP,
  author =       "Viktor Kuncak and Mika{\"e}l Mayer and Ruzica Piskac
                 and Philippe Suter",
  title =        "Software synthesis procedures",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "103--111",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076472",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Vempala:2012:MHD,
  author =       "Santosh S. Vempala",
  title =        "Modeling high-dimensional data: technical
                 perspective",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "112--112",
  month =        feb,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2076450.2076473",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 4 16:05:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Kalai:2012:DG,
  author =       "Adam Tauman Kalai and Ankur Moitra and Gregory
                 Valiant",
  title =        "Disentangling {Gaussians}",
  journal =      j-CACM,
  volume =       "55",
  number =       "2",
  pages =        "113--120",
  month =        feb,
  year =