@Preamble{
"\input bibnames.sty " #
"\input path.sty " #
"\def \TM {${}^{\sc TM}$} " #
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\hyphenation{ }"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-CACM = "Communications of the ACM"}
@Article{Vardi:2010:ELM,
author = "Moshe Y. Vardi",
title = "{Editor}'s letter: More debate, please!",
journal = j-CACM,
volume = "53",
number = "1",
pages = "5--5",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629176",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LES,
author = "{CACM Staff}",
title = "Letters to the {Editor}: Software still as much an art
as science",
journal = j-CACM,
volume = "53",
number = "1",
pages = "7--7",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629178",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEa,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "1",
pages = "8--8",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629179",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Communications' {\em Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library}.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hall:2010:AAR,
author = "Wendy Hall",
title = "{ACM}'s annual report",
journal = j-CACM,
volume = "53",
number = "1",
pages = "9--13",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629180",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Linden:2010:BSE,
author = "Greg Linden and Ruben Ortega and Jason Hong",
title = "{blog@CACM}: Software engineering, smartphones and
health systems, and security warnings",
journal = j-CACM,
volume = "53",
number = "1",
pages = "16--17",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629181",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish excerpts from
selected posts.
twitter Follow us on Twitter at
http://twitter.com/blogCACM
Greg Linden writes about frequent software deployments,
Ruben Ortega reports on smartphones and health systems
research, and Jason Hong discusses designing effective
security warnings.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COCa,
author = "David Roman",
title = "{CACM} online: The corollary of empowerment",
journal = j-CACM,
volume = "53",
number = "1",
pages = "18--18",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629182",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2010:NRE,
author = "Tom Geller",
title = "News: Rebuilding for eternity",
journal = j-CACM,
volume = "53",
number = "1",
pages = "19--21",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629185",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Researchers use computer vision techniques to preserve
culturally significant sites as high-resolution 3D
models.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:NAP,
author = "Leah Hoffmann",
title = "News: {Amir Pnueli}: ahead of his time",
journal = j-CACM,
volume = "53",
number = "1",
pages = "22--23",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629187",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Remembering a legacy of practical and theoretical
innovation.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NAT,
author = "Gary Anthes",
title = "News: Automated translation of {Indian} languages",
journal = j-CACM,
volume = "53",
number = "1",
pages = "24--26",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629184",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "India faces a daunting task trying to manually
translate among 22 official languages, but assistance,
in the form of advanced technology enabled by a lot of
hard work, is on the way.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2010:NNS,
author = "Neil Savage",
title = "News: New search challenges and opportunities",
journal = j-CACM,
volume = "53",
number = "1",
pages = "27--28",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629183",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "If search engines can extract more meaning from text
and better understand what people are looking for, the
Web's resources could be accessed more effectively.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NFI,
author = "Kirk L. Kroeker",
title = "News: Future {Internet} design summit",
journal = j-CACM,
volume = "53",
number = "1",
pages = "29--29",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629186",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The National Science Foundation's meeting on Internet
architectures focused on designs related to emerging
social and economic realities.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Frenkel:2010:NRL,
author = "Karen A. Frenkel",
title = "News: {Robert Lovett Ashenhurst: 1929--2009}",
journal = j-CACM,
volume = "53",
number = "1",
pages = "30--30",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629188",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NAI,
author = "Samuel Greengard",
title = "News: {ACM} and {India}",
journal = j-CACM,
volume = "53",
number = "1",
pages = "31--31",
month = jan,
year = "2010",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2010:VTS,
author = "Michael Cusumano",
title = "Viewpoints: Technology strategy and management: The
evolution of platform thinking",
journal = j-CACM,
volume = "53",
number = "1",
pages = "32--34",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629189",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "How platform adoption can be an important determinant
of product and technological success.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2010:VBS,
author = "Phillip G. Armour",
title = "Viewpoints: The business of software: In praise of bad
programmers",
journal = j-CACM,
volume = "53",
number = "1",
pages = "35--36",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629190",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A tale illustrating the difference between individual
and team skills.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rai:2010:VLT,
author = "Arti Rai",
title = "Viewpoints: Law and technology: Unstandard
standardization: the case of biology",
journal = j-CACM,
volume = "53",
number = "1",
pages = "37--39",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629191",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "How applicable are the approaches adopted by
information and communication technology
standards-setting organizations to biological
standards?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stroustrup:2010:VWS,
author = "Bjarne Stroustrup",
title = "Viewpoint: What should we teach new software
developers? Why?",
journal = j-CACM,
volume = "53",
number = "1",
pages = "40--42",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629192",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Fundamental changes to computer science education are
required to better address the needs of industry.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Aspray:2010:VCM,
author = "William Aspray and Len Shustek and Norbert Ryska",
title = "Viewpoints: Computer museum series: Great computing
museums of the world, part one",
journal = j-CACM,
volume = "53",
number = "1",
pages = "43--46",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629193",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The first of a two-part series highlighting several of
the world's museums dedicated to preserving,
exhibiting, and elucidating computing history.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hyde:2010:DF,
author = "Julian Hyde",
title = "Data in flight",
journal = j-CACM,
volume = "53",
number = "1",
pages = "48--52",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629195",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "How streaming SQL technology can help solve the Web
2.0 data crunch.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Petschulat:2010:OPD,
author = "Stephen Petschulat",
title = "Other people's data",
journal = j-CACM,
volume = "53",
number = "1",
pages = "53--57",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629196",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Companies have access to more types of external data
than ever before. How can they integrate it most
effectively?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Leventhal:2010:TPR,
author = "Adam Leventhal",
title = "Triple-parity {RAID} and beyond",
journal = j-CACM,
volume = "53",
number = "1",
pages = "58--63",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629194",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "As hard-drive capacities continue to outpace their
throughput, the time has come for a new level of
RAID.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2010:MPD,
author = "Michael Stonebraker and Daniel Abadi and David J.
DeWitt and Sam Madden and Erik Paulson and Andrew Pavlo
and Alexander Rasin",
title = "{MapReduce} and parallel {DBMSs}: friends or foes?",
journal = j-CACM,
volume = "53",
number = "1",
pages = "64--71",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629197",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "MapReduce complements DBMSs since databases are not
designed for extract-transform-load tasks, a MapReduce
specialty.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dean:2010:MFD,
author = "Jeffrey Dean and Sanjay Ghemawat",
title = "{MapReduce}: a flexible data processing tool",
journal = j-CACM,
volume = "53",
number = "1",
pages = "72--77",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629198",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "MapReduce advantages over parallel databases include
storage-system independence and fine-grain fault
tolerance for large jobs.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lin:2010:CAA,
author = "Raz Lin and Sarit Kraus",
title = "Can automated agents proficiently negotiate with
humans?",
journal = j-CACM,
volume = "53",
number = "1",
pages = "78--88",
month = jan,
year = "2010",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wallach:2010:TPN,
author = "Dan Wallach",
title = "Technical perspective: {Native Client}: a clever
alternative",
journal = j-CACM,
volume = "53",
number = "1",
pages = "90--90",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629202",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Yee:2010:NCS,
author = "Bennet Yee and David Sehr and Gregory Dardyk and J.
Bradley Chen and Robert Muth and Tavis Ormandy and
Shiki Okasaka and Neha Narula and Nicholas Fullagar",
title = "{Native Client}: a sandbox for portable, untrusted x86
native code",
journal = j-CACM,
volume = "53",
number = "1",
pages = "91--99",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629203",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Halevy:2010:TPS,
author = "Alon Halevy",
title = "Technical perspective: Schema mappings: rules for
mixing data",
journal = j-CACM,
volume = "53",
number = "1",
pages = "100--100",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629200",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{tenCate:2010:SCS,
author = "Balder ten Cate and Phokion G. Kolaitis",
title = "Structural characterizations of schema-mapping
languages",
journal = j-CACM,
volume = "53",
number = "1",
pages = "101--110",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629201",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:LBQa,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: {HP}'s running man",
journal = j-CACM,
volume = "53",
number = "1",
pages = "120--ff",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1645394",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Prith Banerjee discusses collaborating with
universities, his startup experiences, and
Hewlett--Packard Lab's approach to research and
development.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Seo:2010:UTF,
author = "Dongback Seo and King-Tim Mak",
title = "Using the thread-fabric perspective to analyze
industry dynamics",
journal = j-CACM,
volume = "53",
number = "1",
pages = "121--125",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629205",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Rapid advances in technology pose severe challenges to
organizations that are dependent on their technology
for day-to-day operations as well as strategic renewal.
For example, one major challenge is the decision of
which new technology to adopt and when to adopt it. If
an organization implements a technology too early and
its industry takes up another technology later as the
standard, the organization will have wasted resources
and must expend more in order to switch or make its
technology compatible. If the organization waits for a
standard to emerge, it will lose any benefits of being
the first mover. Organizations struggle to predict the
shape of tomorrow's industry, especially more dynamic
industries like wireless communications.\par
Current business theories are limited in their ability
to explain phenomena happening in these dynamic
industries. They are also weak in their ability to
predict the totality of these types of industries.
Theories like the resource-based view of the firm and
dynamic capabilities can assess an individual firm's
competitiveness and analyze competition between one
firm and another under preordained and well-ordered
industrial structures, but they cannot explain the
total shape of an industry and the positioning of firms
within the industry. For example, the analysis and
comparison of organizations in the wireless industry,
such as Nokia, Samsung, Qualcomm, Vodafone, Hutchison,
and Verizon, can assess a company's resources and
capabilities and its superiority over another in its
resources or capabilities. But these theories do not
explain the whole picture of the industry, why
companies are pursuing different technologies, why and
how they ally with one another, or how companies with
fewer resources or capabilities can compete with those
with more, for example.\par
They also fail to account for how organizations and
industries change constantly through internal and
external forces. In fairly static industries like the
traditional auto industry, companies operated on the
same stable supply chains and other systems for
decades, thus it was fair to detach two or more
organizations from the same shared industrial context
to compare them. However, we cannot separate
organizations from their industrial context in current
dynamic industries like information technology, because
organizations and the industry in which they belong
co-evolve rapidly by affecting each other. None of the
standard business theories can give us clear answers to
how, for example, Qualcomm and Korean electronics
companies, that started with few resources,
capabilities and market share, could create and then
expand their territory in the GSM-dominated wireless
industry led by Nokia.\par
More broadly, the nature of modern business competition
appears to be undergoing a fundamental change. To
explore the new industrial dynamics, we use the
intuitive ideas of {\em threads, fabric\/} and {\em
weaving\/} to develop a perspective which promises to
greatly facilitate the description and analysis of
highly competitive and dynamic industries such as the
wireless industry. The Thread-Fabric view perceives
organizations and industries as organic entities rather
than as rigid and mechanical units. The proposed
perspective also differs from existing theories in that
it allows a way to observe industries and predict the
future not only at the level of individual firms but
also from the scope of entire industries. For industry,
we hope this theory can support managers and
decision-makers to understand the fast-changing
business environment and build strategies and tactics
to achieve their business goals. For academia, we hope
our proposal shows a new way to analyze and understand
how industries transform in this day and age.\par
Here, we describe our framework and clarify its details
by applying it to the example of the global wireless
industry. We use this framework to analyze current
dynamics in the wireless industry: the fight for
third-generation technology standards, and within that,
the competition over wireless Internet platform
standards. We also discuss the possible use of this
framework to predict future directions in industries.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Burns:2010:SCR,
author = "Randal Burns and Zachary Peterson",
title = "Security constructs for regulatory-compliant storage",
journal = j-CACM,
volume = "53",
number = "1",
pages = "126--130",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629206",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "In response to a growing body of electronic records
legislation, the storage community has enhanced data
stores to include privacy, auditability, and a
`chain-of-custody' for data. There are currently over
4,000 federal, state, and local regulations that govern
the storage, management, and retrieval of electronic
records. Most notably, the Sarbanes--Oxley Act of 2002,
which regulates corporate financial records. Storage
vendors provide `compliance' platforms that store and
manage data in accordance with regulations, which aids
customers in meeting compliance guidelines. Examples
include: EMC Centera Compliance Edition,\TM{} NetApp
SnapLock,\TM{} and IBM Tivoli Security Compliance
Manage.\TM{}\par
Many of these platforms add storage management policy
to existing systems. Vendors start with systems that
manage versions of files or volumes. They add
immutability to past versions by preventing writes by
policy. They also enforce data retention guidelines by
not allowing the deletion of protected files. Enhanced
metadata allows users and auditors to examine the store
at any point-in-time and investigate the manner in
which data have changed throughout their
history.\par
While these features aid organizations in complying
with regulations, they do not provide strong evidence
of compliance. By following storage management
policies, data are versioned and retained for mandated
periods. However, there are many opportunities and
motivations to subvert such storage policies. In fact,
the file system owner represents the most likely
attacker. For example, a corporation might alter or
destroy data after the corporation comes under
suspicion of malfeasance. The shredding of Enron audit
documents at Arthur Anderson in 2001 provides a notable
paper analog. Similarly, a hospital or private medical
practice might attempt to amend or delete a patient's
medical records to hide evidence of malpractice. In
policy-based storage systems, past data may be altered
or destroyed by reverse engineering file system formats
and editing the file data on disk--a common and well
understood data forensics task.\par
We assert that these features need to be
cryptographically strong, providing irrefutable
evidence of compliance with regulations. This can be
achieved for data retention and chain of custody. A
storage system commits to a version history so that, at
a later time, an auditor may access past data and gain
conclusive evidence that the data have been retained
and are unmodified. Further, all data should be bound
to the users that modify, create, or delete that data.
Such constructs improve the evidentiary value of
electronic records within the courts, increase an
auditor's confidence in the veracity of the information
on which they report (and for which they are
responsible), and enhance an organization's quality of
data management.\par
To these ends, we review three security constructs for
versioning file systems. {\em Digital audit trails\/}
allow a file system to prove to an independent auditor
that it stored data in conformance with regulated
retention guidelines. {\em Fine-grained, secure
deletion\/} allows a system to efficiently delete
individual versions of files to meet confidentiality
requirements, limit liability, and allow data to be
redacted. {\em Per-block authenticated encryption\/}
adds authenticity guarantees to the confidentiality
provided by encryption. We also include a distillation
of requirements based on a review of relevant
legislation and a brief characterization of the
performance impact of these techniques based on their
implementation within the ext3cow file system.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hur:2010:FDI,
author = "Wonchang Hur and Dongsoo Kim",
title = "The future of digital imaging",
journal = j-CACM,
volume = "53",
number = "1",
pages = "131--135",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629207",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Traditionally, radiology is a support department that
provides imaging services to other hospital
departments. In this conventional framework, the
primary concerns of a radiology department were how to
enhance the productivity of imaging workflows. Most
efforts have been made principally to remove
unnecessary communications and thereby reduce report
turnaround time. The introduction of information
systems such as PACS (Picture Archiving and
Communication System) and RIS (Radiology Information
System) are typical examples of such efforts.\par
Over the past decades, imaging technologies have
advanced remarkably, and have led to the proliferation
of digital imaging services. Many imaging solution
providers are offering various off-the-shelf software
programs at more affordable prices. Those programs are
equipped with sophisticated imaging functions, and can
easily manipulate the large amounts of image data
generated from high-performance imaging modalities. As
a result, the number of imaging centers providing
diagnostic imaging services has grown considerably, and
competition between them has intensified.\par
In this evolving environment, enhanced productivity of
imaging workflow is not sufficient to guarantee a
competitive and successful imaging business. Rather,
more diversified perspectives of customer satisfaction
must be considered, and technological advancements must
be leveraged for the quality and the competitiveness as
well as the productivity of imaging services.\par
In this article, we envision digital imaging services
in radiology, with emphasis on the recent advancements
in digital imaging technology and its future direction.
Specifically, we focus on the four major issues
prevailing in current imaging business practices:
specialization, flexibility, reliability, and
usability. We investigate the kinds of technologies
pertaining to each issue, as well as the ways in which
such technologies have enabled the invention of
innovative services in diagnostic imaging practice.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kim:2010:MWM,
author = "Seongwoon Kim and Inseong Lee and Kiho Lee and Seungki
Jung and Joonah Park and Yeun Bae Kim and Sang Ryong
Kim and Jinwoo Kim",
title = "{Mobile Web 2.0} with multi-display buttons",
journal = j-CACM,
volume = "53",
number = "1",
pages = "136--141",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629208",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "User-Generated Content (UGC) is a burgeoning social
phenomenon being watched in today's world with keen
interest. UGC is an online new-media content created by
users rather than by conventional media such as
broadcasters. A typical example would be Flickr, an
online photo-sharing site with 37 million images, to
which its 1.2 million members add up to 200,000 images
daily. UGC is shifting the paradigm of Internet use
away from the one-way propagation of media content by
companies towards the creation and sharing of media
content by and among ordinary users.\par
The mobile phone is an especially important means of
promoting user generation and exchange of media
content. Many mobile phones now have built-in digital
cameras and inherent network connectivity. These
features have greatly facilitated the creation and
sharing of media content. For instance, users can
immediately upload photos on Flickr with their mobile
phones as well as access Flickr and browse other
people's media content.\par
However, the constraints of a typical mobile
phone---its small display and limited number of
buttons---make use of mobile UGC services challenging.
Only a few studies have investigated hardware or
software alternatives to address these problems. This
article presents a new user interface (UI) for mobile
phones, one that makes use of UGC services easier and
more efficient.\par
The new interface has two key characteristics: one
pertaining to content structure, and another to content
visualization. More specifically, the new UI employs
two major mobile Web 2.0 technologies, the tag and the
tag cloud, and multi-display buttons increase the
display size and flexibility of individual buttons. The
interface is dedicated specifically towards supporting
exploratory browsing within mobile UGC services,
because users of such services are likely to focus on
exploratory browsing and serendipitous discovery and be
more inclined toward entertainment rather than utility.
Here, we describe the new interface and investigate
whether it aids in enhancing exploratory browsing
within mobile UGC services.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Witman:2010:TBR,
author = "Paul D. Witman and Terry Ryan",
title = "Think big for reuse",
journal = j-CACM,
volume = "53",
number = "1",
pages = "142--147",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629209",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Many organizations are successful with software reuse
at fine to medium granularities --- ranging from
objects, subroutines, and components through software
product lines. However, relatively little has been
published on very large-grained reuse. One example of
this type of large-grained reuse might be that of an
entire Internet banking system (applications and
infrastructure) reused in business units all over the
world. In contrast, `large scale' software reuse in
current research generally refers to systems that reuse
a large number of smaller components, or that perhaps
reuse subsystems. In this article, we explore a case of
an organization with an internal development group that
has been very successful with large-grained software
reuse.\par
BigFinancial, and the BigFinancial Technology Center
(BTC) in particular, have created a number of software
systems that have been reused in multiple businesses
and in multiple countries. BigFinancial and BTC thus
provided a rich source of data for case studies to look
at the characteristics of those projects and why they
have been successful, as well as to look at projects
that have been less successful and to understand what
has caused those results and what might be done
differently to prevent issues in the future. The
research is focused on technology, process, and
organizational elements of the development process,
rather than on specific product features and
functions.\par
Supporting reuse at a large-grained level may help to
alleviate some of the issues that occur in more
traditional reuse programs, which tend to be
finer-grained. In particular, because BigFinancial was
trying to gain commonality in business processes and
operating models, reuse of large-grained components was
more closely aligned with its business goals. This same
effect may well not have happened with finer-grained
reuse, due to the continued ability of business units
to more readily pick and choose components for
reuse.\par
BTC is a technology development unit of BigFinancial,
with operations in both the eastern and western US.
Approximately 500 people are employed by BTC, reporting
ultimately through a single line manager responsible to
the Global Retail Business unit head of BigFinancial.
BTC is organized to deliver both products and
infrastructure components to BigFinancial, and its
product line has through the years included consumer
Internet banking services, teller systems, ATM
software, and network management tools. BigFinancial
has its U.S. operations headquartered in the eastern
U.S., and employs more than 8,000 technologists
worldwide.\par
In cooperation with BTC, we selected three cases for
further study from a pool of about 25. These cases were
the Java Banking Toolkit (JBT) and its related
application systems, the Worldwide Single Signon (WSSO)
subsystem, and the BigFinancial Message Switch (BMS).",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Khatri:2010:DDG,
author = "Vijay Khatri and Carol V. Brown",
title = "Designing data governance",
journal = j-CACM,
volume = "53",
number = "1",
pages = "148--152",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629210",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Organizations are becoming increasingly serious about
the notion of `data as an asset' as they face
increasing pressure for reporting a `single version of
the truth.' In a 2006 survey of 359 North American
organizations that had deployed business intelligence
and analytic systems, a program for the governance of
data was reported to be one of the five success
`practices' for deriving business value from data
assets. In light of the opportunities to leverage data
assets as well ensure legislative compliance to
mandates such as the Sarbanes--Oxley (SOX) Act and
Basel II, data governance has also recently been given
significant prominence in practitioners' conferences,
such as TDWI (The Data Warehousing Institute) World
Conference and DAMA (Data Management Association)
International Symposium.\par
The objective of this article is to provide an overall
framework for data governance that can be used by
researchers to focus on important data governance
issues, and by practitioners to develop an effective
data governance approach, strategy and design.
Designing data governance requires stepping back from
day-to-day decision making and focusing on identifying
the fundamental decisions that need to be made and who
should be making them. Based on Weill and Ross, we also
differentiate between governance and management as
follows:\par
{\bullet} {\em Governance\/} refers to what decisions
must be made to ensure effective management and use of
IT ({\em decision domains\/}) and who makes the
decisions ({\em locus of accountability for
decision-making\/}).\par
{\bullet} {\em Management\/} involves making and
implementing decisions.\par
For example, governance includes establishing who in
the organization holds decision rights for determining
standards for data quality. Management involves
determining the actual metrics employed for data
quality. Here, we focus on the former.\par
Corporate governance has been defined as a set of
relationships between a company's management, its
board, its shareholders and other stakeholders that
provide a structure for determining organizational
objectives and monitoring performance, thereby ensuring
that corporate objectives are attained. Considering the
synergy between macroeconomic and structural policies,
corporate governance is a key element in not only
improving economic efficiency and growth, but also
enhancing corporate confidence. A framework for linking
corporate and IT governance (see Figure 1) has been
proposed by Weill and Ross.\par
Unlike these authors, however, we differentiate between
IT assets and information assets: {\em IT assets\/}
refers to technologies (computers, communication and
databases) that help support the automation of
well-defined tasks, while {\em information assets\/}
(or data) are defined as facts having value or
potential value that are documented. Note that in the
context of this article, we do not differentiate
between data and information.\par
Next, we use the Weill and Ross framework for IT
governance as a starting point for our own framework
for data governance. We then propose a set of five data
decision domains, why they are important, and
guidelines for what governance is needed for each
decision domain. By operationalizing the {\em locus of
accountability of decision making\/} (the `who') for
each decision domain, we create a data governance
matrix, which can be used by practitioners to design
their data governance. The insights presented here have
been informed by field research, and address an area
that is of growing interest to the information systems
(IS) research and practice community.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Miori:2010:DTI,
author = "Vittorio Miori and Dario Russo and Massimo Aliberti",
title = "Domotic technologies incompatibility becomes user
transparent",
journal = j-CACM,
volume = "53",
number = "1",
pages = "153--157",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1629211",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The potential of current technologies in smart
automation has been largely unexploited. Pervasive
computing vision is still far from being achieved,
especially with regard to Domotics and home
applications. In fact, even though many implementations
have started to appear in several contexts, few
applications have been made available for the home
environment and the general public. This is mainly due
to the segmentation of standards and proprietary
solutions, which are currently confusing the market
with a sparse offer of uninteroperable devices and
systems.\par
Although modern houses are equipped with smart
technological appliances, still very few of these
appliances can be seamlessly connected to each
other.\par
Moreover, inter-working capabilities are required
beyond house boundaries, towards external services and
towards other houses as nodes of a global
network.\par
Therefore, the main goal of this research is to find
solutions to the problem of interoperability that will
be in line with open and widely recognized
standards.\par
The result is a computing framework based on open
communication standards, capable of abstracting the
peculiarities of underlying heterogeneous technologies,
and letting them co-exist and interwork, without
eliminating their differences. Interoperability can
thus be made potentially feasible between any domotic
technology, both currently existing, and still to be
defined.\par
Currently, domotic technology vendors concentrate on
building closed relationships with their customers, and
leveraging their economic investments by establishing
barriers against new manufacturers entering the
market.\par
Examples of current domotic protocols are X10, Konnex,
LonWorks, UPnP, HAVi, and Jini supporting various
communication standards (Ethernet, FireWire, Bluetooth,
ZigBee, IrDA and proprietary buses). We believe that no
domotic technology currently has the potential to
actually play a leading role. Within this wide and
heterogeneous framework, the market logic is to tie
consumers to a particular domotic protocol, which then
forces them to only purchase conforming devices in
order to keep a consistent level of
interoperability.\par
In recent years several interesting and innovative
solutions have emerged, with a reasonable level of
scalability and dependability, providing
interoperability among heterogeneous home
systems.\par
Twente University has proposed a solution that aims at
supporting heterogeneous technologies (including legacy
ones) with a `cluster cultures' approach. The
architecture outlines a `touch and play' system which,
at device registration time, enables a
zero-configuration environment for the exchange of
credentials among its gateways and to register device
services in a hierarchical structure. The architecture
provides a high level of security by using
cryptographic algorithms.\par
Waseda University have proposed a framework designed to
easily enable the integration of legacy middleware and
legacy services and clients, with a predefined path for
the inclusion of new, future, middleware. This is
accomplished mainly through the use of a Virtual
Service Gateway. This connects one piece of middleware
to another by exploiting a Protocol Conversion Manager,
whose task is to convert the different middleware
protocols into the specific internal protocol used by
the Virtual Service Gateway. Information about the
location and functions of services is provided by a
Virtual Service Repository.\par
Another interesting project is the `Domotic House
Gateway.' It implements an event-based mechanism which
is used to exchange messages between the single device
and the system. These events are internally converted
into logical events so as to clearly separate the
actual physical issues from the semantics that goes
beyond the devices and their role within the house. One
level of the architecture implements a rule-based core
that can be dynamically adapted either by the system
itself or manually through external interfaces. Each
device needs a device driver, which is responsible for
translating its low level or hardware states and
activities into events that can be managed by the
system.\par
Another promising approach, in line with our research,
is proposed by the Open Building Information Exchange
group who are working to create standard XML and Web
Services guidelines to facilitate information exchange
among mechanical and electrical systems in building
automation.\par
One such important European project in this context is
Amigo. This project was aimed at Ambient Intelligence
features for the networked home environment and the
usability of the system was among its main goals and
included three major guidelines: user-friendly
interfaces, interoperability, and automatic discovery
of devices and services.\par
All these projects resolved the interoperability
problem with several approaches, all of which are
different from what we consider, in our vision, as the
optimal solutions.\par
Lastly, we enlist a prototype previously created by our
research laboratory. This solution had the limitation
of abstracting each device typology with a Web service
implementing their specific functionalities. The
implementation of a new ad hoc Web service was needed
whenever a new category of device needed to be included
in the network. In addition, this prototype solved the
problem of cooperation by virtualizing devices
belonging to each domotic system onto the others. This
solution, however, had a drawback: the same device
appeared virtually replicated on every single domotic
system, thus creating data replications and possible
consistency problems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Drezner:2010:TOR,
author = "Zvi Drezner",
title = "Technical opinion: Random selection from a stream of
events",
journal = j-CACM,
volume = "53",
number = "1",
pages = "158--159",
month = jan,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1629175.1646395",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:12:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Crawford:2010:IT,
author = "Diane Crawford",
title = "An issue of teamwork",
journal = j-CACM,
volume = "53",
number = "2",
pages = "5--5",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646354",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "This column was supposed to write itself. When
Editor-in-Chief Moshe Vardi first asked me to tell
readers how a typical issue of {\em Communications\/}
comes together, I remember thinking `piece of cake.'",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEb,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "2",
pages = "9--9",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646357",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "{\em Communications'\/} Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Barr:2010:BCW,
author = "Valerie Barr",
title = "{blog@CACM}: Connecting women and technology",
journal = j-CACM,
volume = "53",
number = "2",
pages = "10--11",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646358",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish excerpts from
selected posts.
twitter: Follow us on Twitter at
\url{http://twitter.com/blogCACM}.
Guest blogger Valerie Barr writes about highlights of
the ninth Grace Hopper Celebration of Women in
Computing Conference, including keynote speeches by
Megan Smith and Francine Berman.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COW,
author = "David Roman",
title = "{CACM online}: Where the data is",
journal = j-CACM,
volume = "53",
number = "2",
pages = "12--12",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646359",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NAI,
author = "Kirk L. Kroeker",
title = "News: Alternate interface technologies emerge",
journal = j-CACM,
volume = "53",
number = "2",
pages = "13--15",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646360",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Researchers working in human-computer interaction are
developing new interfaces to produce greater
efficiencies in personal computing and enhance
miniaturization in mobile devices.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2010:NTT,
author = "Alex Wright",
title = "News: Type theory comes of age",
journal = j-CACM,
volume = "53",
number = "2",
pages = "16--17",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646361",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Type systems are moving beyond the realm of data
structure and into more complex domains like security
and networking.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Underwood:2010:NID,
author = "Sarah Underwood",
title = "News: Improving disaster management",
journal = j-CACM,
volume = "53",
number = "2",
pages = "18--20",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646362",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Social networking, sophisticated imaging, and dual-use
technologies promise improved disaster management, but
they must be adopted by governments and aid agencies if
more lives are to be saved in the wake of crises.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:NAF,
author = "{CACM Staff}",
title = "News: {ACM Fellows} honored",
journal = j-CACM,
volume = "53",
number = "2",
pages = "21--21",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646381",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Forty-seven men and women are inducted as 2009 ACM
Fellows.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sasse:2010:PSS,
author = "M. Angela Sasse",
title = "Privacy and security: Not seeing the crime for the
cameras?",
journal = j-CACM,
volume = "53",
number = "2",
pages = "22--25",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646363",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Why it is difficult---but essential---to monitor the
effectiveness of security technologies.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Groth:2010:EWI,
author = "Dennis P. Groth and Jeffrey K. MacKie-Mason",
title = "Education: Why an informatics degree?",
journal = j-CACM,
volume = "53",
number = "2",
pages = "26--28",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646364",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Isn't computer science enough?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Maughan:2010:IRN,
author = "Douglas Maughan",
title = "Inside risks: The need for a national cybersecurity
research and development agenda",
journal = j-CACM,
volume = "53",
number = "2",
pages = "29--31",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646365",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Government-funded initiatives, in cooperation with
private-sector partners in key technology areas, are
fundamental to cybersecurity technical
transformation.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Beaudouin-Lafon:2010:OAS,
author = "Michel Beaudouin-Lafon",
title = "Open access to scientific publications",
journal = j-CACM,
volume = "53",
number = "2",
pages = "32--34",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646367",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The good, the bad, and the ugly.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:KVT,
author = "George V. Neville-Neil",
title = "Kode Vicious: Taking your network's temperature",
journal = j-CACM,
volume = "53",
number = "2",
pages = "35--36",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646366",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A prescription for capturing data to diagnose and
debug a networking problem.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shasha:2010:IMR,
author = "Dennis Shasha",
title = "An interview with {Michael Rabin}",
journal = j-CACM,
volume = "53",
number = "2",
pages = "37--42",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646369",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Michael O. Rabin, co-recipient of the 1976 ACM A. M.
Turing Award, discusses his innovative algorithmic work
with Dennis Shasha.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Saxe:2010:PES,
author = "Eric Saxe",
title = "Power-efficient software",
journal = j-CACM,
volume = "53",
number = "2",
pages = "44--48",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646370",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Power-manageable hardware can help save energy, but
what can software developers do to address the
problem?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Fedorova:2010:MCS,
author = "Alexandra Fedorova and Sergey Blagodurov and Sergey
Zhuravlev",
title = "Managing contention for shared resources on multicore
processors",
journal = j-CACM,
volume = "53",
number = "2",
pages = "49--57",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646371",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Contention for caches, memory controllers, and
interconnects can be eased by contention-aware
scheduling algorithms.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Miller:2010:SMC,
author = "Steven P. Miller and Michael W. Whalen and Darren D.
Cofer",
title = "Software model checking takes off",
journal = j-CACM,
volume = "53",
number = "2",
pages = "58--64",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646372",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A translator framework enables the use of model
checking in complex avionics systems and other
industrial settings.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bessey:2010:FBL,
author = "Al Bessey and Ken Block and Ben Chelf and Andy Chou
and Bryan Fulton and Seth Hallem and Charles Henri-Gros
and Asya Kamsky and Scott McPeak and Dawson Engler",
title = "A few billion lines of code later: using static
analysis to find bugs in the real world",
journal = j-CACM,
volume = "53",
number = "2",
pages = "66--75",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646374",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "How Coverity built a bug-finding tool, and a business,
around the unlimited supply of bugs in software
systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Benhamou:2010:ACU,
author = "Eric Benhamou and Jon Eisenberg and Randy H. Katz",
title = "Assessing the changing {U.S. IT R\&D} ecosystem",
journal = j-CACM,
volume = "53",
number = "2",
pages = "76--83",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646373",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The National Academy of Sciences recommends what the
U.S. government should do to help maintain American IT
leadership.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bacon:2010:RPQ,
author = "Dave Bacon and Wim van Dam",
title = "Recent progress in quantum algorithms",
journal = j-CACM,
volume = "53",
number = "2",
pages = "84--93",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646375",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "What quantum algorithms outperform classical
computation and how do they do it?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dasgupta:2010:SEH,
author = "Sanjoy Dasgupta",
title = "Strange effects in high dimension",
journal = j-CACM,
volume = "53",
number = "2",
pages = "96--96",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646378",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ailon:2010:FDR,
author = "Nir Ailon and Bernard Chazelle",
title = "Faster dimension reduction",
journal = j-CACM,
volume = "53",
number = "2",
pages = "97--104",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646379",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Data represented geometrically in high-dimensional
vector spaces can be found in many applications. Images
and videos, are often represented by assigning a
dimension for every pixel (and time). Text documents
may be represented in a vector space where each word in
the dictionary incurs a dimension. The need to
manipulate such data in huge corpora such as the web
and to support various query types gives rise to the
question of how to represent the data in a
lower-dimensional space to allow more space and time
efficient computation. Linear mappings are an
attractive approach to this problem because the mapped
input can be readily fed into popular algorithms that
operate on linear spaces (such as principal-component
analysis, PCA) while avoiding the curse of
dimensionality.\par
The fact that such mappings even exist became known in
computer science following seminal work by Johnson and
Lindenstrauss in the early 1980s. The underlying
technique is often called `random projection.' The
complexity of the mapping itself, essentially the
product of a vector with a dense matrix, did not
attract much attention until recently. In 2006, we
discovered a way to `sparsify' the matrix via a
computational version of Heisenberg's Uncertainty
Principle. This led to a significant speedup, which
also retained the practical simplicity of the standard
Johnson--Lindenstrauss projection. We describe the
improvement in this article, together with some of its
applications.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Borkar:2010:WBB,
author = "Shekhar Y. Borkar",
title = "Want to be a bug buster?",
journal = j-CACM,
volume = "53",
number = "2",
pages = "105--105",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646376",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Park:2010:PSB,
author = "Sung-Boem Park and Subhasish Mitra",
title = "Post-silicon bug localization for processors using
{IFRA}",
journal = j-CACM,
volume = "53",
number = "2",
pages = "106--113",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646377",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "IFRA, an acronym for Instruction Footprint Recording
and Analysis, overcomes major challenges associated
with a very expensive step in post-silicon validation
of processors---pinpointing a bug location and the
instruction sequence that exposes the bug from a system
failure, such as a crash. Special on-chip recorders,
inserted in a processor during design, collect
instruction footprints---special information about
flows of instructions, and what the instructions did as
they passed through various microarchitectural blocks
of the processor. The recording is done concurrently
during the normal operation of the processor in a
post-silicon system validation setup. Upon detection of
a system failure, the recorded information is scanned
out and analyzed offline for bug localization. Special
self-consistency-based program analysis techniques,
together with the test-program binary of the
application executed during post-silicon validation,
are used for this purpose. Major benefits of using IFRA
over traditional techniques for post-silicon bug
localization are (1) it does not require full
system-level reproduction of bugs, and (2) it does not
require full system-level simulation. Hence, it can
overcome major hurdles that limit the scalability of
traditional post-silicon validation methodologies.
Simulation results on a complex superscalar processor
demonstrate that IFRA is effective in accurately
localizing electrical bugs with 1\% chip-level area
impact.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPa,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Breaking chocolate bars",
journal = j-CACM,
volume = "53",
number = "2",
pages = "120--120",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646380",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Welcome to three new puzzles. Solutions to the first
two will be published next month; the third is (as yet)
unsolved. In each, the issue is how your intuition
matches up with the mathematics.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kim:2010:DEI,
author = "Dongmin Kim and Izak Benbasat",
title = "Designs for effective implementation of trust
assurances in {Internet} stores",
journal = j-CACM,
volume = "53",
number = "2",
pages = "121--126",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646386",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Improving customer trust in an Internet store is an
important goal in B2C electronic commerce because it
leads to outcomes important for the success of an
Internet store, such as reduced customer risk
perceptions in transacting with the store and increased
willingness to buy from the store. Therefore, one of
the critical success factors for Internet stores is to
convince customers of the store's trustworthiness,
which refers to a set of customers' beliefs regarding
the ability, integrity, and benevolence of the online
merchant. One mechanism by which such perceptions of
trustworthiness on the part of stores can be
established is to provide trust assurances on a store's
Web site. Trust assurance refers to `a claim and its
supporting statements used in an Internet store to
address trust-related concerns.' An example of trust
assurance statements found in Internet stores
is:\par
{\em We are so confident in our security that we
guarantee you'll pay nothing if unauthorized charges
are made to your credit card as a result of shopping at
circuitcity.com.'\/} (Excerpted from a checkout page of
www.circuitcity.com)\par
Trust assurances can be provided by an Internet store
itself, by customers, or by a third party organization.
For example, Simplycheap.com, shown in Figure 1,
displays both a store's self-proclaimed assurance (such
as `safe shopping our security guarantee') and a
third-party assurance (such as Hacker Safe).\par
In this article, we first review finding in previous
studies regarding trust assurance. Then we provide a
snapshot regarding how often Internet stores use trust
assurances and what concerns are addressed in such
trust assurances by reporting current usage of trust
assurances based on observations of 85 Internet stores.
We expect that this snapshot will help business
managers to understand how other companies use trust
assurances. Second, we suggest two design guidelines
for effective implementation of trust assurances for
Web developers.\par
Before reporting our findings based on observations
from 85 Internet stores, we briefly review the findings
of several previous studies regarding trust
assurances.\par
First, many studies have reported that displaying trust
assurances increases the trustworthiness of an Internet
store. A store's own assurance enhances the
trustworthiness of an Internet store if they are
well-structured. Third-party assurances (or
trustmarks), such as TRUSTe and BBBOnLine seals
positively influence the favorableness of a store's
privacy policies, and are more influential in improving
a firm's trustworthiness than a rating by {\em Consumer
Reports\/} magazine is. Among third-party assurances,
the WebTrust seal appeared to be more influential than
BBBOnLine when people chose a vendor. Interestingly,
third-party assurances were not considered as important
as `security features,' such as SET (Secure Electronic
Transaction), SSL (Secure Sockets Layer), and a lock
symbol, in customer's decisions to buy on the World
Wide Web.\par
Second, detailed design/ usability guidelines for
building a Web site are already available. For example,
best practices in Interaction Design can be accessed at
van Welie's Web site (http://www.welie.com/patterns/).
In respect to specific implementations of trust
assurances, ease of access to assurances was suggested
as one of several design considerations. For example,
van Duyne et al. suggested that Internet stores needed
to make their privacy policy available on each of their
Web pages. The finding that only 54\% of licensees of
the top 500 Internet consumer Web sites display their
privacy seal of approval information on both their home
and privacy pages indicates that the other 46\% has
room to improve their customers' ease of access to
trust assurances.\par
In this study, based on van Duyne et al. we examine
{\em ease of access\/} to trust assurances. In
addition, we examine the application of {\em ease of
return\/} to the original checkout screen that customer
was working on before accessing trust assurances which
is important for customers to easily complete the
checkout process. These two implementation issues (for
example, ease of access and ease of return) are
examined in the assurance delivery modes section.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Becerra-Fernandez:2010:RLC,
author = "Irma Becerra-Fernandez and Joyce Elam and Susan
Clemmons",
title = "Reversing the landslide in computer-related degree
programs",
journal = j-CACM,
volume = "53",
number = "2",
pages = "127--133",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646387",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "There is growing concern that a technologically
educated workforce will not be available to meet the
needs of the job market in information technology in
the coming years, primarily because students are
turning away from academic programs in computer-related
disciplines, including computer science (CS),
information technology (IT), and management information
systems (MIS). We will collectively refer to these
academic units as Computer and Information
Science/Systems (CIS). Numerous surveys have documented
the steep decline: as much as 50\% over the last four
years of both the number of graduates in these programs
as well as the enrollment in courses associated with
these degree programs. The popularity of computer
science as an intended major among incoming freshmen
continues the decline that started in 2000. By 2004, it
had further declined by over 60\%. This lack of
interest in computer science by incoming students
translates to a downward trend in the number of
enrolled students and graduates for the foreseeable
future.\par
The most comprehensive source of information on the
production of bachelor, masters, and Ph. D. degrees in
computer science and computer engineering is the
Taulbee Survey, conducted annually by the Computing
Research Association.\par
The major findings from the 2006 Taulbee Survey
are:\par
1. Bachelor degree production was down more than 15\%
in 2006, following a 13\% decrease in 2005. Over the
last three years, there has been a drop of over
40\%.\par
2. Master's degree production was down 13\% in 2006,
this is reasonably consistent with the 17\% drop in new
Master's students reported two years ago.\par
3. The proportion of women receiving bachelor's degrees
decreased from 17\% in 2003--04 to 14.76\% in 2004--05.
The percentage was unchanged in 2006. This trend is not
likely to change in the near future, as only 0.3\% of
incoming freshmen women in 2004 expressed an interest
in majoring in computer science.\par
It has been suggested that the same trends reported in
this survey are occurring in CIS programs in business
schools. In order to validate this assumption, we
conducted a survey of large business schools, those
with at least 100 faculty members, that offer bachelor
and masters degree programs in computer/management
information systems. Out of 61 such AACSB-accredited
business schools, 23 responded to our survey for a
response rate of 38\%. As shown in Figure 1, our
findings show similar declines in degree production as
those in the Taulbee Survey. The number of
undergraduate CIS degrees awarded declined from 2,699
in 03--04 to 1,163 in 06--07 --- a drop of 57\%. The
percentage of women graduates is higher than that
reported in the Taulbee survey, although the percentage
declined from 31\% to 21\%. The decline was not as
steep for masters degrees awarded. The number of CIS
masters degrees awarded declined from 463 in 03--04 to
318 in 06--07, a drop of 32\%. The percentage of female
graduates held steady at 25\%.\par
One of the best ways to gain insight into the declining
interest in CIS is to look at this issue from the
students' perspective. First, there are the students
who, at one time, would have considered a major in CIS
but who no longer perceive there are opportunities to
build a career in this field. This lack of job market
attractiveness is probably tied to the Internet bubble
burst, which accompanied the technology stock market
crash. The bubble burst caused a temporary glut of
experienced IT professionals in the market, squeezing
out the jobs from new graduates. However, there are
more positions for new graduates today as compared to
2002.\par
Furthermore, students who may have an interest in CIS
are very aware of the growing trend to offshore many
low-end, production-oriented IT jobs, which may result
in reluctance to commit to a career in an industry that
they perceive in decline. In addition, like many
technology-oriented fields, enterprise IT is currently
undergoing dramatic changes, and IT organizations are
reducing their staff and becoming more specialized.
Rather than reflecting the new realities of what a CIS
career will be, students perceive that the CIS
curriculum may be preparing them for jobs which no
longer exist, rather than preparing them for emerging
IT jobs. As IT becomes more pervasive and central to
many disciplines --- from biology to art --- students
are drawn to academic programs in these fields that
increasingly provide their own CIS courses,
specifically tailored for that profession.\par
Gender differences in the choice of college majors have
been found to be a key contributor to the persistent
low number of women CIS enrollments. Some reports
attribute this difference to the fact that IT
workplaces (and university classrooms) lack
interpersonal orientation resulting in an inhospitable
male dominated atmosphere. Other reports point out that
the influence and attitude towards CIS may be best
instilled by a girl's parents and early positive
experiences with technology. Shaping their early
interests may inspire a more diverse work pool in the
future, but does not offer immediate relief in dealing
with the impending CIS student decline.\par
It is clear that strong interventions are needed if CIS
academic units are to maintain their current faculties,
academic and research programs, and dominant position
as the knowledge leader in computing-related
disciplines within the university. The types of
interventions needed are multi-dimensional. Clearly,
students' perception about the lack of attractive
high-paying careers in CIS needs to be addressed. Major
changes in curriculum design need to be undertaken.
And, we argue that another important necessary change
is for CIS academic units to become providers of
computer education for those academic disciplines where
IT has become an integral part of their
curriculum.\par
CIS academic units from around the country are looking
for ways to respond to the current problem of declining
enrollments in different ways. In order to understand
how to respond to the declining enrollment phenomena,
we turned to the work of Haeckel and its contrast
between the make-and-sell' versus the
sense-and-respond' organization, which we describe in
the next section. We describe the interventions taken
at Florida International University (FIU) to address
the declining student MIS enrollments and degree
production in the business school. We then explore the
extent to which Haeckel's model of the
sense-and-respond organization could be used to define
a new way of operating for academic units. We also
discuss the major differences between the two models
applied to CIS academic units and conclude with a
discussion of the implications of this new operating
model as universities seek to respond to the markets of
the future.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chenoweth:2010:WIE,
author = "Tim Chenoweth and Robert Minch and Sharon Tabor",
title = "Wireless insecurity: examining user security behavior
on public networks",
journal = j-CACM,
volume = "53",
number = "2",
pages = "134--138",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646388",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Altaf:2010:TFA,
author = "Farheen Altaf and David Schuff",
title = "Taking a flexible approach to {ASPs}",
journal = j-CACM,
volume = "53",
number = "2",
pages = "139--143",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646389",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "In 2001, subscription-based application service
providers (ASPs) represented the new paradigm for
application deployment. It was anticipated that ASP
spending would reach \$7.8 billion by 2004, and a 2001
survey conducted by PMP Research revealed that 23\% of
respondents said they would likely use an ASP in the
future. However, this turned out not to be the case. By
2004, spending on ASPs had increased only to \$4.2
billion.\par
Over the past few years, there has been a revival of
the ASP model through the notion of cloud computing and
`software as a service.' The market for cloud-based
services was \$16 billion in 2008, and projections
estimate the market for spending in this area will
reach \$42 billion by 2012. However, this still only
would represent 9\% of overall IT spending. These
services have traditionally targeted larger companies
instead of small or medium-sized businesses (or SMEs).
Companies like Oracle, Siebel, and Ariba claim that
nearly 60\% of their business comes from companies that
have annual revenues exceeding \$1 billion. However,
the ASP model provides the same or greater benefits to
SMEs, including lower costs, greater choice, simpler
installation (and no related fees), and the ability to
access applications from any Internet-connected
computer. ASP subscribers also often receive `24 by 7'
technical support. This access to IT expertise (without
maintaining an in-house IT staff) results in further
savings for businesses.\par
Despite the benefits, small businesses have not readily
adopted ASPs. The reasons for this lack of adoption
include the reluctance of SMEs to replace their
existing systems with untried ASPs and the
inappropriateness of the `one-size-fits-all' approach
that doesn't take in to consideration specific industry
or firm requirements. This makes the SME a significant
untapped market for companies operating in this
space.\par
The purpose of this article is to more fully understand
the SME market for ASPs through an analysis of the
factors that are most important to likely adopters.
While previous work has broadly investigated adoption
by SMEs and the general adoption of ASPs, this study
combines both perspectives and proposes the new
construct of `flexibility' as influential in the
adoption decision. We surveyed 101 SMEs that had not
yet adopted ASPs and asked them to rate the importance
of several factors that would affect their decision.
Correlating likelihood of adoption with the importance
of those factors yields several important insights into
how ASP vendors should position their product
offerings.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ross:2010:ICR,
author = "John Minor Ross",
title = "Informatics creativity: a role for abductive
reasoning?",
journal = j-CACM,
volume = "53",
number = "2",
pages = "144--148",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646390",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Despite the fact that creative problem solving is
desirable at all levels, it is constantly in short
supply. Technology developers always wish they, and
their peers, could devise novel solutions to the
problems at hand. Yet too often, common brainstorming
efforts generate only fog or drizzle. Part of the
problem may be that while some technology trainers
advocate the search for creative solutions, the
learning side of the equation is little changed by a
`be creative' lecture component. This inquiry attempts
to equip computer educators, and practitioners, with a
broadened approach to fostering creativity, targeted at
expanding discovery within Informatics areas.
Particularly, it is suggested that promoting abductive
reasoning might help computer professionals understand
the benefits of wider investigations within an expanded
range of topics. Although discussed additionally later,
a short overview of the abductive reasoning approach is
that `{\em abduction}, or {\em inference to the best
explanation}, is a form of inference that goes from
data describing something to a hypothesis that best
explains or accounts for the data.'\par
Few professionals would suggest there is no need for
new, creative solutions to the problems they encounter.
An example of the recognition of such needs is
highlighted in industry. Consider that each year
Procter and Gamble spends nearly \$2 billion looking
for innovative ideas. This R\&D budget spans 150
science areas including biotechnology, imaging, and
robotics. Aside from pure research, P\&G pursues
`aggressive mining of the scientific literature,' as
well as employs upwards of 70 `technology
entrepreneurs' around the world who analyze local
markets to see what has been created elsewhere that
might be acquired, modified, or simply spark new ideas
internally.\par
Sparking new computing ideas is the intent of this
discourse. Various overlapping and synergistic issues
come to mind when considering what has been called
`discovery informatics.' Concepts suggested therein are
extended here to consider the possible value of
abductive reasoning in Informatics. Specifically, how
might abduction help generate creative approaches to
problems as Informatics reaches into the fabric of so
many disciplines. Understanding this technique might
assist Informatics workers to progress from being data
rich and discovery poor, to a state of information
wealth, as professionals benefit from applying new
ideas.\par
In 1990, abductive-related efforts in computing had
already been occurring for nearly 20 years. And yet,
after another 15 years has passed, the awareness of the
potential of abductive reasoning in computing fields
remains relatively spotty. The current growth of
Informatics programs may offer a chance to change that
profile. Since Informatics programs tend to be more
cross-disciplinary, it might achieve the goal of that
1990 Automated Abduction symposium---to help a wider
range of researchers to recognize that `they might
benefit from work on abduction by people in other
areas.' Overall, it may turn out that this diffusion
cycle will be reminiscent of how slowly object-oriented
programming came to be understood, let alone
embraced.\par
We set out to consider the potential of abductive
reasoning to promote creativity within the
interdisciplinary field of Informatics. As will be
presented in the following sections, we believe in the
applicability of this reasoning style as a tool for
expanding the power of Informatics as it seeks to solve
complex problems in a wide range of disciplines.
Abductive reasoning is well suited for facing problems
that are vague, or even unrecognized. The goal? Turning
massive amounts of data lead into tiny, although much
more valuable, quantities of information gold.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Joseph:2010:PII,
author = "Damien Joseph and Soon Ang and Roger H. L. Chang and
Sandra A. Slaughter",
title = "Practical intelligence in {IT}: assessing soft skills
of {IT} professionals",
journal = j-CACM,
volume = "53",
number = "2",
pages = "149--154",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646391",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "What qualities make a successful it professional?
Certainty strong technical skills are sine qua non. As
a result, the technology geek remains the stereotype of
an information technology (IT) professional. Indeed,
when companies hire IT professionals, their focus is
often on the `hard' skills needed to perform the work,
such as years of Java programming
experience.\par
However, there is a growing (and gnawing) awareness
that technical skills alone are insufficient for
success in IT, particularly in today's dynamic,
distributed and complex workplace. Companies are
exploring outsourcing and offshoring to become more
flexible and contain costs while strategically
leveraging IT. Consequently, IT professionals (whether
onsite or offshore, in-house or outsourced) must
acquire a broader set of skills beyond their
traditional technical skills. These broader managerial
or interpersonal skills are generically labeled `soft
skills.'\par
Despite the increasing importance of soft skills, very
little systematic research has conceptualized such
skills and even less has measured these skills. Given
this gap in the literature, this article introduces
`practical intelligence' as the overarching concept
that could provide a better understanding of this
broader set of skills required of IT professionals. We
describe the development of the SoftSkills for IT
(SSIT) instrument for assessing an IT professional's
level of practical intelligence, and report the results
of a study that validates this instrument by comparing
the practical intelligence of experienced IT
professionals versus novices. We conclude by drawing
out implications of our study for IT recruitment,
training and development, and suggest future research
directions.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gurbani:2010:MCO,
author = "Vijay K. Gurbani and Anita Garvert and James D.
Herbsleb",
title = "Managing a corporate open source software asset",
journal = j-CACM,
volume = "53",
number = "2",
pages = "155--159",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646392",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "We define {\em corporate open source\/} (COS) as
applying the precepts and methodologies prevalent in
the open source development community for creating
industrial-strength software projects in a corporation
for internal use. It may seem that open source style
development - using informal processes, voluntary
assignment to tasks, and having few financial
incentives - may not be a good match for commercial
environments. Our ongoing work, however, demonstrates
that under the right circumstances, corporations can
benefit from open source development techniques. We
present two approaches to managing COS projects, and
expand in detail on one of them. Our results indicate
that open source approaches require significant
adaptation to succeed in commercial settings. In
particular, they require substantial support from
business divisions within a corporation to successfully
leverage the shared asset.\par
Our ongoing research has attempted to determine whether
corporations can effectively leverage the open source
development model to create and manage software
projects inside the corporate domain. We have observed
how the precepts and methodologies of the open source
development had to be adapted in order to create
commercial grade software. In particular changes are
required in order to accommodate a market-driven
schedule and feature decisions that are not wholly
amenable to an open source development approach. Our
contributions in this article include describing two
methods to effectively manage COS assets: an
Infrastructure-based COS model, and a Project-specific
COS model. We report experiences with the management
aspects of the latter COS model, which includes our
findings that this model requires a greater amount of
support to get a new business division onboard when
compared to the minimal support provided by traditional
open source projects. However, the benefits of
Project-specific COS outweigh the costs once the
business division is fully on-board: the development
costs are amortized over the number of divisions using
the common asset, and the asset itself benefits from
contributions from the expanded use.\par
Open source practices and tools have proven potential
to overcome many of the well-known difficulties of
geographically distributed software development, and to
allow widely distributed users of software to add
features and functionality they want with a minimum of
conflict and management overhead.\par
Dinkelacker et al. discuss Progressive Open Source as a
set of tools and techniques for a corporation to host
multiple open source projects within a company and
between third parties. In the context of their work,
our work on COS corresponds to and furthers their work
on what is referred to as `Inner Source' in their
paper.\par
Our previous work attempted to determine whether open
source tools and practices are a good fit for
developing commercial-grade software especially in the
light of the differences between the two camps: open
source development is more iterative in nature when
compared to the staged method of software development
practiced at many corporations; the incentive structure
between the two varies, as does the motivation factor;
commercial software is usually characterized by process
methodologies (CMMI, ISO, TL9000, among others), that
are typically absent in open source development. We
reached the conclusion that certain commercial projects
can indeed benefit from open source development
methodology, especially those projects
where:\par
{\bullet} a technology is needed by several product
groups (hence there is reason to pool
resources),\par
{\bullet} the technology is relatively immature so that
requirements and features are not fully known at the
outset (so there is a need to evolve
continuously),\par
{\bullet} product groups have different needs and
specific expertise in customizing the software for
their needs (so everyone benefits from the
contributions of each group), and\par
{\bullet} the initial product has a sound, modular
architecture (so that it is feasible to merge all the
diverse changes into a single development
branch).\par
Furthering our previous work, the discussion in this
article presents a management view of maintaining a COS
asset. We discuss project management and planning
aspects that are intrinsic to projects managed in this
style.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Mehta:2010:ITT,
author = "Nikhil Mehta and Anju Mehta",
title = "It takes two to tango: how relational investments
improve {IT} outsourcing partnerships",
journal = j-CACM,
volume = "53",
number = "2",
pages = "160--164",
month = feb,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1646353.1646393",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Feb 4 17:13:32 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The IT outsourcing, industry landscape is dotted with
broken contracts - results of unsuccessful
client-vendor (C-V) partnerships. Approximately 78\%
C-V partnerships fail in the long term, inflicting high
transition costs on clients. The recent economic
downturn has strained C-V partnerships further. Despite
the criticality of this issue, there is a relative lack
of efforts to understand the issues leading to failed
partnerships.\par
We discuss these issues in light of the clients' onus
towards improving the longevity of C-V
partnerships.\par
We adopt a two-pronged approach. First, we try to
identify the client characteristics that influence
their potential to forge a long-term C-V partnership.
To that extent, we discuss a partnership maturity curve
(PMC), which categorizes clients into three dynamic
stages, and predicts their potential for developing
mature partnerships based on their outsourcing
objectives and their fit with vendors' capabilities
(see Figure 1).\par
Second, we try to understand vendors' perspective on
the issue. We interviewed 21 executives in nine
established IT-outsourcing vendors in India. It has
been recommended that vendors' perspective is critical
to understanding C-V partnerships. Vendors highlighted
an interesting mix of their own as well as
client-generated issues, which we discuss in light of
the client dynamics identified by PMC, to propose
guidelines for clients interested in developing
successful C-V partnerships. The study confirms
existing belief that improving the longevity of C-V
partnerships requires relational investments from
clients. We identify various areas for clients to make
such investments.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2010:RPC,
author = "Moshe Y. Vardi",
title = "Revisiting the publication culture in computing
research",
journal = j-CACM,
volume = "53",
number = "3",
pages = "5--5",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666421",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LET,
author = "{CACM Staff}",
title = "Letters to the {Editor}: Too much debate?",
journal = j-CACM,
volume = "53",
number = "3",
pages = "6--7",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666422",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEc,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "3",
pages = "8--8",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666424",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "{\em Communications\/}' Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Guzdial:2010:BTM,
author = "Mark Guzdial and Judy Robertson",
title = "{BLOG@CACM}: Too much programming too soon?",
journal = j-CACM,
volume = "53",
number = "3",
pages = "10--11",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666425",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish excerpts from
selected posts.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COGa,
author = "David Roman",
title = "{CACM} online: Granting a second life",
journal = j-CACM,
volume = "53",
number = "3",
pages = "12--12",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666426",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2010:NCB,
author = "Gregory Goth",
title = "News: {CS} and biology's growing pains",
journal = j-CACM,
volume = "53",
number = "3",
pages = "13--15",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666427",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Biologists can benefit from learning and using the
tools of computer science, but several real-world
obstacles remain.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NEW,
author = "Kirk L. Kroeker",
title = "News: Engineering the {Web}'s third decade",
journal = j-CACM,
volume = "53",
number = "3",
pages = "16--18",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666428",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "As Web technologies move beyond two-way interactive
capabilities to facilitate more dynamic and pervasive
experiences, the Web is quickly advancing toward its
third major upgrade.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NTG,
author = "Samuel Greengard",
title = "News: Tracking garbage",
journal = j-CACM,
volume = "53",
number = "3",
pages = "19--20",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666429",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Researchers are focusing on the so-called `removal
chain' in an attempt to save landfill space, improve
recycling rates, and trim the flow of toxic materials
into the environment.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:NKP,
author = "{CACM Staff}",
title = "News: {Katayanagi} prizes and other {CS} awards",
journal = j-CACM,
volume = "53",
number = "3",
pages = "21--21",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666430",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chang:2010:EBD,
author = "Tim Chang",
title = "Economic and business dimensions: Gaming will save us
all",
journal = j-CACM,
volume = "53",
number = "3",
pages = "22--24",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666431",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "How gaming, as the first media market to successfully
transition toward media-as-a-service, is an exemplar
for a similar evolutionary transition of content and
entertainment.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2010:LSO,
author = "Pamela Samuelson",
title = "Legally speaking: Only technological processes are
patentable",
journal = j-CACM,
volume = "53",
number = "3",
pages = "25--27",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666432",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The U.S. Supreme Court will narrow the universe of
process innovations that can be patented to those that
are `technological,' but what will that mean for
software?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hollander:2010:CEE,
author = "Rachelle Hollander",
title = "Computing ethics: The ethics beat",
journal = j-CACM,
volume = "53",
number = "3",
pages = "28--29",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666433",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Surveying the increasing variety and nature of ethical
challenges encountered by computing researchers and
practitioners.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2010:PIO,
author = "Peter J. Denning and Fernando Flores and Peter
Luzmore",
title = "The Profession of {IT}: Orchestrating coordination in
pluralistic networks",
journal = j-CACM,
volume = "53",
number = "3",
pages = "30--32",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666434",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Learning to build virtual teams of people of diverse
backgrounds is an urgent challenge.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tapia:2010:BPH,
author = "Richard Tapia",
title = "Broadening participation: Hiring and developing
minority faculty at research universities",
journal = j-CACM,
volume = "53",
number = "3",
pages = "33--35",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666435",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Emphasizing the importance of creating more programs
and investing more funding toward the goal of
developing minority faculty at research universities.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wilson:2010:IPM,
author = "Cameron Wilson and Peter Harsha",
title = "{IT} Policy: Making the case for computing",
journal = j-CACM,
volume = "53",
number = "3",
pages = "36--38",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666436",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Seeking funding for current and future computing
initiatives requires both a strong argument and a broad
community of supporters.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{OHara:2010:PPD,
author = "Kieron O'Hara and Nigel Shadbolt",
title = "Privacy: Privacy on the data web",
journal = j-CACM,
volume = "53",
number = "3",
pages = "39--41",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666437",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Considering the nebulous question of ownership in the
virtual realm.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McKusick:2010:GEF,
author = "Kirk McKusick and Sean Quinlan",
title = "{GFS}: evolution on fast-forward",
journal = j-CACM,
volume = "53",
number = "3",
pages = "42--49",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666439",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Kirk McKusick and Sean Quinlan discuss the origin and
evolution of the Google File System.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brown:2010:TEE,
author = "David J. Brown and Charles Reams",
title = "Toward energy-efficient computing",
journal = j-CACM,
volume = "53",
number = "3",
pages = "50--58",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666438",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "What will it take to make server-side computing more
energy efficient?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sia:2010:GIM,
author = "Siew Kien Sia and Christina Soh and Peter Weill",
title = "Global {IT} management: structuring for scale,
responsiveness, and innovation",
journal = j-CACM,
volume = "53",
number = "3",
pages = "59--64",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666449",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "To succeed on a global scale, businesses should focus
on a trio of key elements.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lengauer:2010:CAV,
author = "Thomas Lengauer and Andr{\'e} Altmann and Alexander
Thielen and Rolf Kaiser",
title = "Chasing the {AIDS} virus",
journal = j-CACM,
volume = "53",
number = "3",
pages = "66--74",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666440",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "With no HIV vaccine in sight, virologists need to know
how the virus will react to a given combination drug
therapy.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Seay:2010:VCI,
author = "Cameron Seay and Gary Tucker",
title = "Virtual computing initiative at a small public
university",
journal = j-CACM,
volume = "53",
number = "3",
pages = "75--83",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666441",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Student participation and resulting expertise is as
valuable as having the high-performance resource
itself.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Conitzer:2010:MDB,
author = "Vincent Conitzer",
title = "Making decisions based on the preferences of multiple
agents",
journal = j-CACM,
volume = "53",
number = "3",
pages = "84--94",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666442",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Computer scientists have made great strides in how
decision-making mechanisms are used.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Micciancio:2010:FGC,
author = "Daniele Micciancio",
title = "A first glimpse of cryptography's {Holy Grail}",
journal = j-CACM,
volume = "53",
number = "3",
pages = "96--96",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666445",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "http://www.acm.org/pubs/contents/journals/cacm/;
https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gentry:2010:CAF,
author = "Craig Gentry",
title = "Computing arbitrary functions of encrypted data",
journal = j-CACM,
volume = "53",
number = "3",
pages = "97--105",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666444",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "http://www.acm.org/pubs/contents/journals/cacm/;
https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
abstract = "Suppose that you want to delegate the ability to {\em
process\/} your data, without giving away {\em
access\/} to it. We show that this separation is
possible: we describe a `fully homomorphic' encryption
scheme that keeps data private, but that allows a
worker that {\em does not have the secret decryption
key\/} to compute any (still encrypted) result of the
data, even when the function of the data is very
complex. In short, a third party can perform
complicated processing of data without being able to
see it. Among other things, this helps make cloud
computing compatible with privacy.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Perona:2010:STF,
author = "Pietro Perona",
title = "Seeing the trees, the forest, and much more",
journal = j-CACM,
volume = "53",
number = "3",
pages = "106--106",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666443",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Torralba:2010:UFS,
author = "A. Torralba and K. P. Murphy and W. T. Freeman",
title = "Using the forest to see the trees: exploiting context
for visual object detection and localization",
journal = j-CACM,
volume = "53",
number = "3",
pages = "107--114",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666446",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Recognizing objects in images is an active area of
research in computer vision. In the last two decades,
there has been much progress and there are already
object recognition systems operating in commercial
products. However, most of the algorithms for detecting
objects perform an exhaustive search across all
locations and scales in the image comparing local image
regions with an object model. That approach ignores the
semantic structure of scenes and tries to solve the
recognition problem by brute force. In the real world,
objects tend to covary with other objects, providing a
rich collection of contextual associations. These
contextual associations can be used to reduce the
search space by looking only in places in which the
object is expected to be; this also increases
performance, by rejecting patterns that look like the
target but appear in unlikely places.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPb,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "53",
number = "3",
pages = "118--118",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666447",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Last month (February 2010, p. 120) we posted a trio of
brainteasers, including one as yet unsolved, concerning
the breaking of a bar of chocolate.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Juels:2010:LBF,
author = "Ari Juels",
title = "Last Byte: Future tense: The Primal Cue",
journal = j-CACM,
volume = "53",
number = "3",
pages = "120--ff",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666448",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Future Tense, one of the revolving features on this
page, presents stories and essays from the intersection
of computational science and technological speculation,
their boundaries limited only by our ability to imagine
what will and could be.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Arduini:2010:BCB,
author = "Fabio Arduini and Vincenzo Morabito",
title = "Business continuity and the banking industry",
journal = j-CACM,
volume = "53",
number = "3",
pages = "121--125",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Since the September 11$^{th}$ attacks on the World
Trade Center, tsunami disaster, and hurricane Katrina,
there has been renewed interest in emergency planning
in both the private and public sectors. In particular,
as managers realize the size of potential exposure to
unmanaged risk, insuring `business continuity' (BC) is
becoming a key task within all industrial and financial
sectors (Figure 1).",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cannoy:2010:FHC,
author = "Sherrie Drye Cannoy and A. F. Salam",
title = "A framework for health care information assurance
policy and compliance",
journal = j-CACM,
volume = "53",
number = "3",
pages = "126--131",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666453",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "As many as 400 people may have access to one's
personal medical information throughout the typical
care process. Disclosures of sensitive information such
as emotional problems, sexually transmitted diseases,
substance abuse, and genetic predispositions to
diseases---could cause embarrassment and affect
insurability, child custody cases, and employment. A
recent survey by IDC found that {\em `Most consumers
\ldots{}were uncomfortable with their health plan
sharing health information with a hospital, a
specialist or their primary care doctor\ldots{} (and)
were concerned with who saw their information and were
worried that the information could be made available
online\ldots{} (and) other respondents said they didn't
trust their health plan or hospital to protect their
information.'\/} Clearly, patients (consumers) feel
that it is critical that their medical information is
held in confidence. If patients do not feel that their
personal medical information will be kept confidential,
they may withhold important medical information from
health care providers making it difficult to provide
quality and effective health care.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lin:2010:SPE,
author = "Lin Lin and Paul Jen-Hwa Hu and Olivia R. Liu Sheng
and Johnny Lee",
title = "Is stickiness profitable for electronic retailers?",
journal = j-CACM,
volume = "53",
number = "3",
pages = "132--136",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666454",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Is stickiness the Holy Grail for e-tailing? In
general, {\em stickiness\/} refers to the amount of
time a person spends on a Web site during a visiting
session (such as, {\em session stickiness\/}) or over a
specified time period (such as, {\em site
stickiness\/}). Zauberman equates stickiness and
`within-site lock-in' and uses it to approximate
visitors' loyalty to a Web site. The conventional
wisdom suggests that stickiness is crucial and can
contribute to e-tailers' bottom lines considerably.
However, the direct economic impacts of stickiness have
not been duly examined empirically, particularly from
the perspective of consumers' within-session visiting
behaviors.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Subramanyam:2010:UPS,
author = "Ramanath Subramanyam and Fei Lee Weisstein and M. S.
Krishnan",
title = "User participation in software development projects",
journal = j-CACM,
volume = "53",
number = "3",
pages = "137--141",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666455",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "It is commonly acknowledged that success in IT
projects is difficult to achieve. A recent industry
survey observed that only 34\% of IT projects were
considered successful. Of the several potential factors
contributing to this hard-to-achieve success, user
involvement was noted as the most important one.
Consistent with this notion, both researchers and
practitioners have viewed user participation as an
important way of improving software quality and
increasing user satisfaction and acceptance.
Users/customers are often encouraged to participate and
directly communicate with developers in the software
development process. On the other hand, empirical
evidence shows that user participation in the
development process can negatively influence project
performance since it could make the process more
difficult, lengthy, and less effective. Such
contradictory findings raise the question of when user
participation is actually helpful and when it might
negatively impact project performance.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Parkinson:2010:PBM,
author = "S. T. Parkinson and R. M. Hierons and M. Lycett and M.
Norman",
title = "Practitioner-based measurement: a collaborative
approach",
journal = j-CACM,
volume = "53",
number = "3",
pages = "142--147",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666456",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The established philosophy within the software
development industry is that an organization
implementing a program to improve software quality can
expect to recoup the cost of the implementation many
times over through the reduced cost associated with
improvements in quality. Measurement initiatives are
perceived to provide a key contribution to quality
improvement as evidenced by the focus of early
measurement based initiatives and the place of
measurement in the higher echelons of process
initiatives. In general, organizations pursue
measurement initiatives from a perspective that,
without measurement, control is not possible. While
organizations recognize that there are potential
benefits to measuring their processes and products,
however, they typically find it difficult to structure
ad-hoc measures into a formal program --- a situation
that is compounded by the significant cost of
implementing such programs. Although these problems
have led to some organizations moving away from
measurement programs, many companies still use
measurement programs as illustrated by the continued
interest in, for example, the Capability Maturity
Model. Given the appetite and potential returns on
investment of measurement frameworks and initiatives,
ways of successfully implementing them are important.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Nagy:2010:OAO,
author = "Del Nagy and Areej M. Yassin and Anol Bhattacherjee",
title = "Organizational adoption of open source software:
barriers and remedies",
journal = j-CACM,
volume = "53",
number = "3",
pages = "148--151",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666457",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Perhaps the business case for adopting open source
software is an easy sell. After all, the software is
free, and can be simply downloaded from the Internet
and installed or customized as needed. Organizations
interested in reducing the licensing fees of
proprietary software, while also avoiding the penalties
and legal liabilities associated with their illegal
use, can definitely consider open source software a
plausible alternative. However, less obvious than the
cost savings but equally important are the barriers
('hidden costs') of adopting open source software.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Benamati:2010:AUC,
author = "John H. Benamati and Zafer D. Ozdemir and H. Jeff
Smith",
title = "Aligning undergraduate {IS} curricula with industry
needs",
journal = j-CACM,
volume = "53",
number = "3",
pages = "152--156",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666458",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A paradox is becoming obvious to both information
systems (IS) academics and executives: U.S. demand for
IS graduates is increasing, but graduation numbers from
university IS programs are flat or in decline. As a
result, many CIOs are devoting increasing proportions
of their organizations' resources to recruiting IS
graduates, through outreach programs to both students
and faculty. In spite of these efforts, however, many
CIOs report continuing frustrations in attracting
enough newly-minted IS talent.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chan:2010:AOE,
author = "Hing Kai Chan",
title = "Agent-oriented embedded electronic measuring systems",
journal = j-CACM,
volume = "53",
number = "3",
pages = "157--162",
month = mar,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1666420.1666459",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:13:19 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Agent technology has attracted the attention of
academia in many domains in the past decade. It is
probably due to the fact that computer systems have
been becoming complicated with distribution and
openness characteristics. Agent-based systems, or
multi-agent systems in general, are contemporary
paradigm for software development. Ashri et al. claimed
that `the underlying concept of decentralized,
autonomous control expressed through agents that are
able to communicate and cooperate to achieve goals is
especially appealing for applications in heterogeneous
and dynamic computing environments.'",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gotlieb:2010:WAA,
author = "Calvin Gotlieb and James Horning",
title = "The work of {ACM}'s awards committee",
journal = j-CACM,
volume = "53",
number = "4",
pages = "5--5",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721655",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LECa,
author = "{CACM Staff}",
title = "Letters to the {Editor}: Computing paradigm not a
branch of science",
journal = j-CACM,
volume = "53",
number = "4",
pages = "6--7",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721657",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEd,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "4",
pages = "8--8",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721658",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "{\em Communications\/}' Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2010:BSDa,
author = "Michael Stonebraker",
title = "{BLOG@CACM}: {SQL} databases v. {NoSQL} databases",
journal = j-CACM,
volume = "53",
number = "4",
pages = "10--11",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721659",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish excerpts from
selected posts.\par
Follow us on Twitter at
http://twitter.com/blogCACM.\par
Michael Stonebraker considers several performance
arguments in favor of NoSQL databases---and finds them
insufficient.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COGb,
author = "David Roman",
title = "{CACM} Online: Going mobile",
journal = j-CACM,
volume = "53",
number = "4",
pages = "12--12",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721660",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2010:NDS,
author = "Alex Wright",
title = "News: Data streaming 2.0",
journal = j-CACM,
volume = "53",
number = "4",
pages = "13--14",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721661",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "In today's real-time Web, data streaming applications
no longer have the luxury of making multiple passes
over a recorded data set.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NRG,
author = "Gary Anthes",
title = "News: Robots gear up for disaster response",
journal = j-CACM,
volume = "53",
number = "4",
pages = "15--16",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721662",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "After 15 years of research, robots for search and
rescue may be nearing prime time.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NSA,
author = "Samuel Greengard",
title = "News: Spies among us?",
journal = j-CACM,
volume = "53",
number = "4",
pages = "17--19",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721663",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Governments' practice of electronic surveillance---and
the growing use of warrantless wiretapping---has
observers deeply concerned.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Heeks:2010:EMD,
author = "Richard Heeks",
title = "Emerging Markets: Development 2.0: the {IT}-enabled
transformation of international development",
journal = j-CACM,
volume = "53",
number = "4",
pages = "22--24",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721665",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The fundamental assumptions of international
development are changing, increasingly putting the
tools for a digital economy into the hands of the
world's poor.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Campbell-Kelly:2010:HRC,
author = "Martin Campbell-Kelly",
title = "Historical reflection: Be careful what you wish for",
journal = j-CACM,
volume = "53",
number = "4",
pages = "25--26",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721666",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Reflections on the decline of mathematical tables.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2010:TSM,
author = "Michael Cusumano",
title = "Technology strategy and management: Cloud computing
and {SaaS} as new computing platforms",
journal = j-CACM,
volume = "53",
number = "4",
pages = "27--29",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721667",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ohm:2010:VWN,
author = "Paul Ohm",
title = "Viewpoint: When network neutrality met privacy",
journal = j-CACM,
volume = "53",
number = "4",
pages = "30--32",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721669",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:KVD,
author = "George V. Neville-Neil",
title = "Kode Vicious: The data-structure canon",
journal = j-CACM,
volume = "53",
number = "4",
pages = "33--34",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721668",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Woods:2010:CDC,
author = "Andy Woods",
title = "Cooling the data center",
journal = j-CACM,
volume = "53",
number = "4",
pages = "36--42",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721671",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Creeger:2010:CRM,
author = "Mache Creeger",
title = "{CTO} roundtable: malware defense",
journal = j-CACM,
volume = "53",
number = "4",
pages = "43--49",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721670",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armbrust:2010:VCC,
author = "Michael Armbrust and Armando Fox and Rean Griffith and
Anthony D. Joseph and Randy Katz and Andy Konwinski and
Gunho Lee and David Patterson and Ariel Rabkin and Ion
Stoica and Matei Zaharia",
title = "A view of cloud computing",
journal = j-CACM,
volume = "53",
number = "4",
pages = "50--58",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721672",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ranganathan:2010:REP,
author = "Parthasarathy Ranganathan",
title = "Recipe for efficiency: principles of power-aware
computing",
journal = j-CACM,
volume = "53",
number = "4",
pages = "60--67",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721673",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Yekhanin:2010:PIR,
author = "Sergey Yekhanin",
title = "Private information retrieval",
journal = j-CACM,
volume = "53",
number = "4",
pages = "68--73",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721674",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Antoy:2010:FLP,
author = "Sergio Antoy and Michael Hanus",
title = "Functional logic programming",
journal = j-CACM,
volume = "53",
number = "4",
pages = "74--85",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721675",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Smyth:2010:TPC,
author = "Padhraic Smyth and Charles Elkan",
title = "Technical perspective: Creativity helps influence
prediction precision",
journal = j-CACM,
volume = "53",
number = "4",
pages = "88--88",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721678",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Koren:2010:CFT,
author = "Yehuda Koren",
title = "Collaborative filtering with temporal dynamics",
journal = j-CACM,
volume = "53",
number = "4",
pages = "89--97",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721677",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kaelbling:2010:TPN,
author = "Leslie Pack Kaelbling",
title = "Technical perspective New bar set for intelligent
vehicles",
journal = j-CACM,
volume = "53",
number = "4",
pages = "98--98",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721676",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Thrun:2010:TRC,
author = "Sebastian Thrun",
title = "Toward robotic cars",
journal = j-CACM,
volume = "53",
number = "4",
pages = "99--106",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721679",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:LBQb,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: Systematic Thinking: {Andrew S.
Tanenbaum} talks about {MINIX}, microkernels, and
electronic voting systems",
journal = j-CACM,
volume = "53",
number = "4",
pages = "112--ff",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721680",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "http://www.acm.org/pubs/contents/journals/cacm/;
https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
https://www.math.utah.edu/pub/tex/bib/minix.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Poon:2010:CFS,
author = "Pak-Lok Poon and Sau-Fun Tang and T. H. Tse and T. Y.
Chen",
title = "{CHOC'LATE}: a framework for specification-based
testing",
journal = j-CACM,
volume = "53",
number = "4",
pages = "113--118",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721687",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Aalberts:2010:TTI,
author = "Robert J. Aalberts and Percy S. Poon and Paul D.
Thistle",
title = "A tale of two {Internet} service providers",
journal = j-CACM,
volume = "53",
number = "4",
pages = "119--123",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721688",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2010:CPC,
author = "Keith Wright",
title = "Capstone programming courses considered harmful",
journal = j-CACM,
volume = "53",
number = "4",
pages = "124--127",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721689",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rebbapragada:2010:DMR,
author = "Surya Rebbapragada and Amit Basu and John Semple",
title = "Data mining and revenue management methodologies in
college admissions",
journal = j-CACM,
volume = "53",
number = "4",
pages = "128--133",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721690",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gregg:2010:DCI,
author = "Dawn G. Gregg",
title = "Designing for collective intelligence",
journal = j-CACM,
volume = "53",
number = "4",
pages = "134--138",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721691",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ferretti:2010:WRB,
author = "Stefano Ferretti and Marco Furini and Claudio E.
Palazzi and Marco Roccetti and Paola Salomoni",
title = "{WWW} recycling for a better world",
journal = j-CACM,
volume = "53",
number = "4",
pages = "139--143",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721692",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Joseph:2010:IRI,
author = "Rhoda C. Joseph",
title = "Individual resistance to {IT} innovations",
journal = j-CACM,
volume = "53",
number = "4",
pages = "144--146",
month = apr,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1721654.1721693",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:14:39 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2010:GOS,
author = "Moshe Y. Vardi",
title = "{\em Globalization and Offshoring of Software\/}
revisited",
journal = j-CACM,
volume = "53",
number = "5",
pages = "5--5",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735224",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LER,
author = "{CACM Staff}",
title = "Letters to the {Editor}: Roots of publication delay",
journal = j-CACM,
volume = "53",
number = "5",
pages = "6--7",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735226",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEe,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "5",
pages = "8--8",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735227",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wing:2010:BNF,
author = "Jeannette M. Wing and Daniel Reed",
title = "{BLOG@CACM}: {NSF} funding advice: 21st century
innovation",
journal = j-CACM,
volume = "53",
number = "5",
pages = "10--11",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735228",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COL,
author = "David Roman",
title = "{CACM} Online: Looking for control",
journal = j-CACM,
volume = "53",
number = "5",
pages = "12--12",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735229",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kanipe:2010:NMA,
author = "Jeff Kanipe",
title = "News: Modeling the astronomical",
journal = j-CACM,
volume = "53",
number = "5",
pages = "13--15",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735230",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NHB,
author = "Gary Anthes",
title = "News: Happy Birthday, {RDBMS!}",
journal = j-CACM,
volume = "53",
number = "5",
pages = "16--17",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735231",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NCC,
author = "Samuel Greengard",
title = "News: Cloud computing and developing nations",
journal = j-CACM,
volume = "53",
number = "5",
pages = "18--20",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735232",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2010:NTW,
author = "Jack Rosenberger",
title = "News: {Thacker} wins {Turing Award}",
journal = j-CACM,
volume = "53",
number = "5",
pages = "21--21",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735233",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:AGE,
author = "{CACM Staff}",
title = "{ACM}'s 2010 general election",
journal = j-CACM,
volume = "53",
number = "5",
pages = "23--31",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735251",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brynjolfsson:2010:EBD,
author = "Erik Brynjolfsson and Paul Hofmann and John Jordan",
title = "Economic and business dimensions: Cloud computing and
electricity: beyond the utility model",
journal = j-CACM,
volume = "53",
number = "5",
pages = "32--34",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735234",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wilson:2010:EHM,
author = "Cameron Wilson and Mark Guzdial",
title = "Education: How to make progress in computing
education",
journal = j-CACM,
volume = "53",
number = "5",
pages = "35--37",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735235",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Beck:2010:VCI,
author = "Roman Beck",
title = "Viewpoint: Can {IT} lean against the wind?",
journal = j-CACM,
volume = "53",
number = "5",
pages = "38--40",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735238",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Turel:2010:VME,
author = "Ofir Turel and Alexander Serenko",
title = "Viewpoint: Is mobile email addiction overlooked?",
journal = j-CACM,
volume = "53",
number = "5",
pages = "41--43",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735237",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Aspray:2010:CMS,
author = "William Aspray",
title = "Computer museum series: Great computing museums of the
world, part two",
journal = j-CACM,
volume = "53",
number = "5",
pages = "45--49",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735239",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Phillips:2010:EDT,
author = "Peter Phillips",
title = "Enhanced debugging with traces",
journal = j-CACM,
volume = "53",
number = "5",
pages = "50--53",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735240",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ridoux:2010:PRT,
author = "Julien Ridoux and Darryl Veitch",
title = "Principles of robust timing over the {Internet}",
journal = j-CACM,
volume = "53",
number = "5",
pages = "54--61",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735241",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Durkee:2010:WCC,
author = "Dave Durkee",
title = "Why cloud computing will never be free",
journal = j-CACM,
volume = "53",
number = "5",
pages = "62--69",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735242",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sellen:2010:BTC,
author = "Abigail J. Sellen and Steve Whittaker",
title = "Beyond total capture: a constructive critique of
lifelogging",
journal = j-CACM,
volume = "53",
number = "5",
pages = "70--77",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735243",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lewis:2010:SFA,
author = "Clayton Lewis and Michele H. Jackson and William M.
Waite",
title = "Student and faculty attitudes and beliefs about
computer science",
journal = j-CACM,
volume = "53",
number = "5",
pages = "78--85",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735244",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Albers:2010:EEA,
author = "Susanne Albers",
title = "Energy-efficient algorithms",
journal = j-CACM,
volume = "53",
number = "5",
pages = "86--96",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735245",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bartlett:2010:LAU,
author = "Peter L. Bartlett",
title = "Learning to act in uncertain environments: technical
perspective",
journal = j-CACM,
volume = "53",
number = "5",
pages = "98--98",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735246",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ganchev:2010:CED,
author = "Kuzman Ganchev and Yuriy Nevmyvaka and Michael Kearns
and Jennifer Wortman Vaughan",
title = "Censored exploration and the dark pool problem",
journal = j-CACM,
volume = "53",
number = "5",
pages = "99--107",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735247",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Harman:2010:APT,
author = "Mark Harman",
title = "Automated patching techniques: the fix is in:
technical perspective",
journal = j-CACM,
volume = "53",
number = "5",
pages = "108--108",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735248",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Weimer:2010:APR,
author = "Westley Weimer and Stephanie Forrest and Claire {Le
Goues} and ThanhVu Nguyen",
title = "Automatic program repair with evolutionary
computation",
journal = j-CACM,
volume = "53",
number = "5",
pages = "109--116",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735249",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPc,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Variations on the {Ham Sandwich
Theorem}",
journal = j-CACM,
volume = "53",
number = "5",
pages = "120--120",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735250",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tallon:2010:UDI,
author = "Paul P. Tallon",
title = "Understanding the dynamics of information management
costs",
journal = j-CACM,
volume = "53",
number = "5",
pages = "121--125",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735253",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Reich:2010:REI,
author = "Blaize Horner Reich and Chris Sauer",
title = "Roles of the external {IT} project manager",
journal = j-CACM,
volume = "53",
number = "5",
pages = "126--129",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735254",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hwang:2010:NPR,
author = "Wonil Hwang and Gavriel Salvendy",
title = "Number of people required for usability evaluation:
the $10 \pm 2$ rule",
journal = j-CACM,
volume = "53",
number = "5",
pages = "130--133",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735255",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Downing:2010:WBS,
author = "Charles E. Downing",
title = "Is {Web}-based supply chain integration right for your
company?",
journal = j-CACM,
volume = "53",
number = "5",
pages = "134--137",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735256",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wang:2010:MAA,
author = "Demin Wang and Dharma P. Agrawal and Wassana Toruksa
and Chaichana Chaiwatpongsakorn and Mingming Lu and Tim
C. Keener",
title = "Monitoring ambient air quality with carbon monoxide
sensor-based wireless network",
journal = j-CACM,
volume = "53",
number = "5",
pages = "138--141",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735257",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stratopoulos:2010:IIP,
author = "Theophanis C. Stratopoulos and Jee-Hae Lim",
title = "{IT} innovation persistence: an oxymoron?",
journal = j-CACM,
volume = "53",
number = "5",
pages = "142--146",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735258",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wilson:2010:RHI,
author = "E. Vance Wilson and Bengisu Tulu",
title = "The rise of a health-{IT} academic focus",
journal = j-CACM,
volume = "53",
number = "5",
pages = "147--150",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735259",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kim:2010:RIB,
author = "Hyeyoung Kim and Jae-Nam Lee and Jaemin Han",
title = "The role of {IT} in business ecosystems",
journal = j-CACM,
volume = "53",
number = "5",
pages = "151--156",
month = may,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1735223.1735260",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed May 12 15:15:05 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ryan:2010:TAH,
author = "Patricia Ryan",
title = "A tour of {ACM}'s {HQ}",
journal = j-CACM,
volume = "53",
number = "6",
pages = "5--5",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743547",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:WTD,
author = "{CACM Staff}",
title = "Workflow tools for distributed teams?",
journal = j-CACM,
volume = "53",
number = "6",
pages = "6--7",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743549",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEf,
author = "{CACM Staff}",
title = "In the Virtual Extension",
journal = j-CACM,
volume = "53",
number = "6",
pages = "8--8",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743550",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "{\em Communications'\/} Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Linden:2010:CIE,
author = "Greg Linden and Ed H. Chi and Mark Guzdial",
title = "The chaos of the {Internet} as an external brain; and
more",
journal = j-CACM,
volume = "53",
number = "6",
pages = "10--11",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743551",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COI,
author = "David Roman",
title = "{CACM} online: Interact naturally",
journal = j-CACM,
volume = "53",
number = "6",
pages = "12--12",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743552",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2010:NSH,
author = "Neil Savage",
title = "News: Straightening out heavy tails",
journal = j-CACM,
volume = "53",
number = "6",
pages = "13--15",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743553",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A better understanding of heavy-tailed probability
distributions can improve activities from Internet
commerce to the design of server farms.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2010:NBS,
author = "Tom Geller",
title = "News: Beyond the {Smart Grid}",
journal = j-CACM,
volume = "53",
number = "6",
pages = "16--17",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743554",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Sensor networks monitor residential and institutional
devices, motivating energy conservation.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:NMY,
author = "Leah Hoffmann",
title = "News: Mine your business",
journal = j-CACM,
volume = "53",
number = "6",
pages = "18--19",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743555",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Researchers are developing new techniques to gauge
employee productivity from information flow.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:NRM,
author = "Leah Hoffmann",
title = "News: {Robin Milner}: the elegant pragmatist",
journal = j-CACM,
volume = "53",
number = "6",
pages = "20--21",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743556",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Remembering a rich legacy in verification, languages,
and concurrency.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2010:NCT,
author = "Jack Rosenberger",
title = "News: {CS} and technology leaders honored",
journal = j-CACM,
volume = "53",
number = "6",
pages = "22--22",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743557",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Narayanan:2010:PSM,
author = "Arvind Narayanan and Vitaly Shmatikov",
title = "Privacy and security: Myths and fallacies of
`personally identifiable information'",
journal = j-CACM,
volume = "53",
number = "6",
pages = "24--26",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743558",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Developing effective privacy protection technologies
is a critical challenge for security and privacy
research as the amount and variety of data collected
about individuals increase exponentially.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shapiro:2010:IRP,
author = "Stuart S. Shapiro",
title = "Inside risks: Privacy by design: moving from art to
practice",
journal = j-CACM,
volume = "53",
number = "6",
pages = "27--29",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743559",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Designing privacy into systems at the beginning of the
development process necessitates the effective
translation of privacy principles, models, and
mechanisms into system requirements.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2010:PIR,
author = "Peter J. Denning and Jack B. Dennis",
title = "The profession of {IT}: The resurgence of
parallelism",
journal = j-CACM,
volume = "53",
number = "6",
pages = "30--32",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743560",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Parallel computation is making a comeback after a
quarter century of neglect. Past research can be put to
quick use today.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:KVPa,
author = "George V. Neville-Neil",
title = "Kode Vicious: Plotting away",
journal = j-CACM,
volume = "53",
number = "6",
pages = "33--34",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743561",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Tips and tricks for visualizing large data sets.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Leveque:2010:LTI,
author = "Fran{\c{c}}ois L{\'e}v{\^e}que",
title = "Law and technology: {Intel}'s rebates: above board or
below the belt?",
journal = j-CACM,
volume = "53",
number = "6",
pages = "35--37",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743562",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Over several years, Intel paid billions of dollars to
its customers. Was it to force them to boycott products
developed by its rival AMD or so they could sell its
microprocessors at lower prices?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Garfinkel:2010:VIR,
author = "Simson L. Garfinkel and Lorrie Faith Cranor",
title = "Viewpoint: Institutional review boards and your
research",
journal = j-CACM,
volume = "53",
number = "6",
pages = "38--40",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743563",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A proposal for improving the review procedures for
research projects that involve human subjects and their
associated identifiable private information.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shustek:2010:IIE,
author = "Len Shustek",
title = "Interview: An interview with {Ed Feigenbaum}",
journal = j-CACM,
volume = "53",
number = "6",
pages = "41--45",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743564",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "ACM Fellow and A. M. Turing Award recipient Edward A.
Feigenbaum, a pioneer in the field of expert systems,
reflects on his career.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Owens:2010:SEC,
author = "Dustin Owens",
title = "Securing elasticity in the cloud",
journal = j-CACM,
volume = "53",
number = "6",
pages = "46--51",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743565",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Elastic computing has great potential, but many
security challenges remain.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Phillips:2010:SB,
author = "George Phillips",
title = "Simplicity betrayed",
journal = j-CACM,
volume = "53",
number = "6",
pages = "52--58",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743566",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Emulating a video system shows how even a simple
interface can be more complex---and capable---than it
appears.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Heer:2010:TTV,
author = "Jeffrey Heer and Michael Bostock and Vadim
Ogievetsky",
title = "A tour through the visualization zoo",
journal = j-CACM,
volume = "53",
number = "6",
pages = "59--67",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743567",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A survey of powerful visualization techniques, from
the obvious to the obscure.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ailamaki:2010:MSD,
author = "Anastasia Ailamaki and Verena Kantere and Debabrata
Dash",
title = "Managing scientific data",
journal = j-CACM,
volume = "53",
number = "6",
pages = "68--78",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743568",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Needed are generic, rather than one-off, DBMS
solutions automating storage and analysis of data from
scientific collaborations.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chen:2010:CPS,
author = "Jilin Chen and Joseph A. Konstan",
title = "Conference paper selectivity and impact",
journal = j-CACM,
volume = "53",
number = "6",
pages = "79--83",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743569",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Conference acceptance rate signals future impact of
published conference papers.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Grauman:2010:ESS,
author = "Kristen Grauman",
title = "Efficiently searching for similar images",
journal = j-CACM,
volume = "53",
number = "6",
pages = "84--94",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743570",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "New algorithms provide the ability for robust but
scalable image search.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sarkar:2010:BCM,
author = "Vivek Sarkar",
title = "Building confidence in multicore software",
journal = j-CACM,
volume = "53",
number = "6",
pages = "96--96",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743571",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Burnim:2010:ACD,
author = "Jacob Burnim and Koushik Sen",
title = "Asserting and checking determinism for multithreaded
programs",
journal = j-CACM,
volume = "53",
number = "6",
pages = "97--105",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743572",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Leino:2010:LDP,
author = "K. Rustan M. Leino",
title = "Learning to do program verification",
journal = j-CACM,
volume = "53",
number = "6",
pages = "106--106",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743573",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Klein:2010:SFV,
author = "Gerwin Klein and June Andronick and Kevin Elphinstone
and Gernot Heiser and David Cock and Philip Derrin and
Dhammika Elkaduwe and Kai Engelhardt and Rafal Kolanski
and Michael Norrish and Thomas Sewell and Harvey Tuch
and Simon Winwood",
title = "{seL4}: formal verification of an operating-system
kernel",
journal = j-CACM,
volume = "53",
number = "6",
pages = "107--115",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743574",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPd,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "53",
number = "6",
pages = "118--118",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743575",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Last month (May 2010, p. 120) we posted a trio of
brainteasers, including one as yet unsolved, concerning
variations on the Ham Sandwich Theorem.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brin:2010:LBF,
author = "David Brin",
title = "Last Byte: Future tense: How the {Net} ensures our
cosmic survival",
journal = j-CACM,
volume = "53",
number = "6",
pages = "120, 119",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743576",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Future Tense, one of the revolving features on this
page, presents stories and essays from the intersection
of computational science and technological speculation,
their boundaries limited only by our ability to imagine
what will and could be. Give adolescent wonder an
evolutionary jolt.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sun:2010:BCS,
author = "Jun Sun and Marshall Scott Poole",
title = "Beyond connection: situated wireless communities",
journal = j-CACM,
volume = "53",
number = "6",
pages = "121--125",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743579",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{deCesare:2010:EPA,
author = "Sergio de Cesare and Mark Lycett and Robert D.
Macredie and Chaitali Patel and Ray Paul",
title = "Examining perceptions of agility in software
development practice",
journal = j-CACM,
volume = "53",
number = "6",
pages = "126--130",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743580",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Nill:2010:FIS,
author = "Alexander Nill and John Schibrowsky and James W.
Peltier",
title = "Factors that influence software piracy: a view from
{Germany}",
journal = j-CACM,
volume = "53",
number = "6",
pages = "131--134",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743581",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kietzmann:2010:PR,
author = "Jan Kietzmann and Ian Angell",
title = "{Panopticon} revisited",
journal = j-CACM,
volume = "53",
number = "6",
pages = "135--138",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743582",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Baudry:2010:BSM,
author = "Benoit Baudry and Sudipto Ghosh and Franck Fleurey and
Robert France and Yves Le Traon and Jean-Marie Mottu",
title = "Barriers to systematic model transformation testing",
journal = j-CACM,
volume = "53",
number = "6",
pages = "139--143",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743583",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gallagher:2010:RVS,
author = "Kevin P. Gallagher and Kate M. Kaiser and Judith C.
Simon and Cynthia M. Beath and Tim Goles",
title = "The requisite variety of skills for {IT}
professionals",
journal = j-CACM,
volume = "53",
number = "6",
pages = "144--148",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743584",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vannoy:2010:SIM,
author = "Sandra A. Vannoy and Prashant Palvia",
title = "The social influence model of technology adoption",
journal = j-CACM,
volume = "53",
number = "6",
pages = "149--153",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743585",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Human innovation, in combination with the Internet,
networking, and communications technologies have
produced a new platform for social and business
networking, formation of community, and communication.
This emerging phenomenon is generally known as social
computing. While there is no widely accepted definition
of social computing, we define it as: {\em intra-group
social and business actions practiced through group
consensus, group cooperation, and group authority,
where such actions are made possible through the
mediation of information technologies, and where group
interaction causes members to conform and influences
others to join the group}.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rhee:2010:MM,
author = "Cheul Rhee and G. Lawrence Sanders and Natalie C.
Simpson",
title = "{I}, myself and e-myself",
journal = j-CACM,
volume = "53",
number = "6",
pages = "154--157",
month = jun,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1743546.1743586",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 21 12:34:55 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The Internet has revolutionized the manner in which
people interact. Once regarded as merely a convenient
platform for the collection and dissemination of
information, the Internet is increasingly used for
intensely personal and creative purposes. Web 2.0
applications supporting Web-based social networking
through blogs, wikis and folksonomies have proven
potent in changing users' perception and use of the
Internet.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2010:H,
author = "Moshe Y. Vardi",
title = "Hypercriticality",
journal = j-CACM,
volume = "53",
number = "7",
pages = "5--5",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785415",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LED,
author = "{CACM Staff}",
title = "Letters to the {Editor}: Don't ignore security offshore,
or in the cloud",
journal = j-CACM,
volume = "53",
number = "7",
pages = "6--7",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785417",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEg,
author = "{CACM Staff}",
title = "In the Virtual Extension",
journal = j-CACM,
volume = "53",
number = "7",
pages = "9--9",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785418",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Communications' {\em Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.\/}",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ortega:2010:BSD,
author = "Ruben Ortega and Mark Guzdial and Daniel Reed",
title = "{BLOG@CACM}: Software development and crunch time; and
more",
journal = j-CACM,
volume = "53",
number = "7",
pages = "10--11",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785419",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish selected posts or
excerpts.
twitter Follow us on Twitter at
http://twitter.com/blogCACM
Ruben Ortega discusses developers and crunch time; Mark
Guzdial considers the impact of open source practices
on computing education; and Daniel Reed writes about
the technological shift from computational paucity to
computational plethora.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COCb,
author = "David Roman",
title = "{CACM} online: In case you missed it",
journal = j-CACM,
volume = "53",
number = "7",
pages = "12--12",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785420",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lindley:2010:NSC,
author = "David Lindley",
title = "News: Sharing computational perspectives",
journal = j-CACM,
volume = "53",
number = "7",
pages = "13--15",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785421",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Computer scientists are now making intellectual
contributions to a wide range of other disciplines,
including evolutionary theory, physics, and
economics.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NC,
author = "Samuel Greengard",
title = "News: Censored!",
journal = j-CACM,
volume = "53",
number = "7",
pages = "16--18",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785423",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Countries use Internet censorship to dominate the
political dialogue, but also to create favorable
conditions for government-controlled businesses.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NMA,
author = "Kirk L. Kroeker",
title = "News: Mainstreaming augmented reality",
journal = j-CACM,
volume = "53",
number = "7",
pages = "19--21",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785422",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Advancements in computer vision, object recognition,
and related technologies are leading to new levels of
sophistication in augmented-reality applications and
presenting new ways for humans to relate to the natural
world.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NCS,
author = "Gary Anthes",
title = "News: Committed to success",
journal = j-CACM,
volume = "53",
number = "7",
pages = "22--23",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785424",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Charles P. Thacker talks about the importance of
simplicity, reusable tools, thinking broadly, and his
practice of Tom Sawyering.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2010:NEB,
author = "Gregory Goth",
title = "News: {Eric Brewer}: change agent",
journal = j-CACM,
volume = "53",
number = "7",
pages = "24--24",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785425",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Eric Brewer's latest project involves designing and
deploying low-cost wireless infrastructure in
developing regions.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Underwood:2010:NVF,
author = "Sarah Underwood",
title = "News: Visions of the future",
journal = j-CACM,
volume = "53",
number = "7",
pages = "25--25",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785426",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "ACM joined forces with the British Computer Society to
deliver its first academic research conference in
Europe.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sako:2010:OVS,
author = "Mari Sako",
title = "Outsourcing versus shared services",
journal = j-CACM,
volume = "53",
number = "7",
pages = "27--29",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785427",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Choosing between outsourcing and shared services has
significant implications for long-term corporate
strategy.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Borenstein:2010:CEW,
author = "Jason Borenstein",
title = "Computing ethics: Work life in the robotic age",
journal = j-CACM,
volume = "53",
number = "7",
pages = "30--31",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785428",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Technological change results in changes in
expectations, in this case affecting the workplace.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2010:LSS,
author = "Pamela Samuelson",
title = "Legally speaking: Should the {Google} book settlement
be approved?",
journal = j-CACM,
volume = "53",
number = "7",
pages = "32--34",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785429",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Considering the precedent that could be established by
approval of the controversial Google book settlement.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Taylor:2010:BPC,
author = "Valerie E. Taylor",
title = "Broadening participation: Cultivating cultural
diversity in information technology",
journal = j-CACM,
volume = "53",
number = "7",
pages = "35--36",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785430",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introducing CMD-IT, a new center focused on
synergistic activities related to ethnic minorities and
people with disabilities.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Genova:2010:VCS,
author = "Gonzalo G{\'e}nova",
title = "Viewpoint: Is computer science truly scientific?",
journal = j-CACM,
volume = "53",
number = "7",
pages = "37--39",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785431",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Reflections on the (experimental) scientific method in
computer science.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Snir:2010:DMA,
author = "Marc Snir and Telle Whitney",
title = "Distinguished members: Advice to members seeking {ACM}
distinction",
journal = j-CACM,
volume = "53",
number = "7",
pages = "40--41",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785432",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Loh:2010:IHP,
author = "Eugene Loh",
title = "The ideal {HPC} programming language",
journal = j-CACM,
volume = "53",
number = "7",
pages = "42--47",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785433",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Maybe it's Fortran. Or maybe it just doesn't matter.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gregg:2010:VSL,
author = "Brendan Gregg",
title = "Visualizing system latency",
journal = j-CACM,
volume = "53",
number = "7",
pages = "48--54",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785435",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Heat maps are a unique and powerful way to visualize
latency data. Explaining the results, however, is an
ongoing challenge.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2010:YDI,
author = "Poul-Henning Kamp",
title = "You're doing it wrong",
journal = j-CACM,
volume = "53",
number = "7",
pages = "55--59",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785434",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Think you've mastered the art of server performance?
Think again.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lewandowski:2010:CUC,
author = "Gary Lewandowski and Dennis J. Bouvier and Tzu-Yi Chen
and Robert McCartney and Kate Sanders and Beth Simon
and Tammy VanDeGrift",
title = "Commonsense understanding of concurrency: computing
students and concert tickets",
journal = j-CACM,
volume = "53",
number = "7",
pages = "60--70",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785438",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Innate understanding of concurrency helps beginners
solve CS problems with multiple processes executing at
the same time.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Igarashi:2010:CGA,
author = "Takeo Igarashi",
title = "Computer graphics for all",
journal = j-CACM,
volume = "53",
number = "7",
pages = "71--77",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785436",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Interactive computer graphics would rival
word-processing and presentation programs for everyday
communications.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roughgarden:2010:AGT,
author = "Tim Roughgarden",
title = "Algorithmic game theory",
journal = j-CACM,
volume = "53",
number = "7",
pages = "78--86",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785439",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A new era of theoretical computer science addresses
fundamental problems about auctions, networks, and
human behavior.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Boehm:2010:SFX,
author = "Hans-J. Boehm",
title = "A solid foundation for x86 shared memory: technical
perspective",
journal = j-CACM,
volume = "53",
number = "7",
pages = "88--88",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785442",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sewell:2010:XTR,
author = "Peter Sewell and Susmit Sarkar and Scott Owens and
Francesco Zappa Nardelli and Magnus O. Myreen",
title = "{x86-TSO}: a rigorous and usable programmer's model
for x86 multiprocessors",
journal = j-CACM,
volume = "53",
number = "7",
pages = "89--97",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785443",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Exploiting the multiprocessors that have recently
become ubiquitous requires high-performance and
reliable concurrent systems code, for concurrent data
structures, operating system kernels, synchronization
libraries, compilers, and so on. However, concurrent
programming, which is always challenging, is made much
more so by two problems. First, real multiprocessors
typically do not provide the sequentially consistent
memory that is assumed by most work on semantics and
verification. Instead, they have relaxed memory models,
varying in subtle ways between processor families, in
which different hardware threads may have only loosely
consistent views of a shared memory. Second, the public
vendor architectures, supposedly specifying what
programmers can rely on, are often in ambiguous
informal prose (a particularly poor medium for loose
specifications), leading to widespread
confusion.\par
In this paper we focus on x86 processors. We review
several recent Intel and AMD specifications, showing
that all contain serious ambiguities, some are arguably
too weak to program above, and some are simply unsound
with respect to actual hardware. We present a new {\em
x86-TSO\/} programmer's model that, to the best of our
knowledge, suffers from none of these problems. It is
mathematically precise (rigorously defined in HOL4) but
can be presented as an intuitive abstract machine which
should be widely accessible to working programmers. We
illustrate how this can be used to reason about the
correctness of a Linux spinlock implementation and
describe a general theory of data-race freedom for
x86-TSO. This should put x86 multiprocessor system
building on a more solid foundation; it should also
provide a basis for future work on verification of such
systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Irwin:2010:TSR,
author = "Mary Jane Irwin",
title = "Technology scaling redirects main memories: technical
perspective",
journal = j-CACM,
volume = "53",
number = "7",
pages = "98--98",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785440",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lee:2010:PCM,
author = "Benjamin C. Lee and Engin Ipek and Onur Mutlu and Doug
Burger",
title = "Phase change memory architecture and the quest for
scalability",
journal = j-CACM,
volume = "53",
number = "7",
pages = "99--106",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785441",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Memory scaling is in jeopardy as charge storage and
sensing mechanisms become less reliable for prevalent
memory technologies, such as dynamic random access
memory (DRAM). In contrast, phase change memory (PCM)
relies on programmable resistances, as well as scalable
current and thermal mechanisms. To deploy PCM as a DRAM
alternative and to exploit its scalability, PCM must be
architected to address relatively long latencies, high
energy writes, and finite endurance.\par
We propose architectural enhancements that address
these limitations and make PCM competitive with DRAM. A
baseline PCM system is $ 1.6\times $ slower and
requires $ 2.2\times $ more energy than a DRAM system.
Buffer reorganizations reduce this delay and energy gap
to $ 1.2\times $ and $ 1.0\times $, using narrow rows
to mitigate write energy as well as multiple rows to
improve locality and write coalescing. Partial writes
mitigate limited memory endurance to provide more than
10 years of lifetime. Process scaling will further
reduce PCM energy costs and improve endurance.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:LBQc,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: From Single Core to Multicore",
journal = j-CACM,
volume = "53",
number = "7",
pages = "112, 111",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785444",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Charles P. Thacker discusses the legendary Alto
personal computer, the invention of the Ethernet, and
his current research on multicore architectures.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Yao:2010:ASP,
author = "Yurong Yao and Edward Watson and Beverly K. Kahn",
title = "Application service providers: market and adoption
decisions",
journal = j-CACM,
volume = "53",
number = "7",
pages = "113--117",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785447",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
IT outsourcing has been a viable business strategy
since the late 1950s when companies began to invest
significant resources in outside computing services. As
IT managers increasingly used time sharing, contract
programming, and facilities management, the next few
decades saw accompanying increases in efficiency in
software applications and services, not to mention
decreased operations costs. In 1989, when Kodak
outsourced its entire IT department to IBM and EDS, the
business world had to scramble to get over its initial
shock. Seemingly overnight, `software' and `service'
had become strange bedfellows. The rules of the game
had radically changed.\par
Since the mid-1990s, the explosion in Internet
connectivity, increased bandwidth, and the ubiquitous
nature of computing have made the delivery of software
applications from remote data centers both
technologically feasible and economically attractive. A
relatively new form of IS outsourcing, Application
Services Provision (ASP), provides applications to
multiple entities from its data center across a wide
area network. Similar to the telephone services model,
clients pay a monthly fee to access online applications
from an ASP. Advances in encryption and firewall
technology remove a client's security concerns for
using remotely hosted services. Active research on ASP
outsourcing (also called NetSourcing) has attracted
academic scholars and business practitioners alike, but
few have investigated the specifics of the market and
the decision process to adopt the ASP model.\par
ASPs today are quite different from what they were five
years ago, in large part because this dynamic industry
has experienced significant merger and acquisition
activity. Forty percent of ASPs active in 2001 were no
longer in business in 2004. Traditional software
companies also have jumped on the ASP bandwagon,
developing new technologies to deliver on-demand
services. The scope of hosted applications for ASPs has
also shifted significantly as certain applications were
scrapped for lack of profitability, for example,
overall enterprise system hosting with no specific
industrial solutions. However, a Forrester report
predicted that as eCommerce continued to grow 30\% -
40\% in 2005, the demand for licensed software products
would decrease while demand for hosted services
increases. This prediction seems to be reality, as ASP
hosting solutions are increasingly viable and
attractive business models.\par
Thus, to update our knowledge of the rapidly changing
ASP market and to help practitioners make
better-informed ASP adoption decisions, this article
addresses two central questions: What is the structure
of the current market? And what factors should clients
consider in their ASP adoption decisions?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Romero:2010:EDP,
author = "Jorge A. Romero and Nirup Menon and Rajiv D. Banker
and Mark Anderson",
title = "{ERP}: drilling for profit in the oil and gas
industry",
journal = j-CACM,
volume = "53",
number = "7",
pages = "118--121",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785448",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
Most large companies have adopted some form of
enterprise resource planning (ERP) system. A survey of
IT executives in the U.S. showed that ERP was the
second most important key category for investment. In
many cases, the implementation of an ERP system was a
long and expensive ordeal that involved extensive
restructuring of businesses and reengineering of
processes.\par
While the potential benefits of ERP have been extolled
frequently and much has been written about individual
company experiences, only limited evidence has been
produced that implementation of ERP does, on average,
lead to enhanced performance. To the best of our
knowledge, this is the first industry analysis on ERP
because previous work has been limited to case studies
and industry cross-sectional analyses.\par
Several research studies have validated that IT
provides productivity and profitability advantages.
However, questions remain because it is not clear
whether advantages from IT contribute, and to what
degree they might contribute, to operational efficiency
and profitability. For example, if the same IT is
implemented by all firms in an industry, will industry
profits from IT disappear? Due to the fact that for
many years large companies developed their information
systems independently, there have been limited
opportunities to evaluate the implementation of similar
IT infrastructure across companies. This study seeks to
extend prior work by performing a longitudinal study of
implementation of ERP systems in a specific
industry.\par
According to Porter, each industry is affected by new
information technology in different ways and drawing
general conclusions about how new IT affects firms
across industries would be a mistake. The oil and gas
industry was selected because ERP plays a major role in
standardizing business processes in this industry. In
this role, ERP helps firms link global operations and
supply chains. Also, a commodity-product industry, like
the oil and gas industry, helps us control for other
influences that may have affected the performance of
oil and gas companies during the study period. The ERP
adopting firms are those that adopted SAP.\par
This research applies a new methodological approach
toward understanding ERP implementation because rather
than looking at ordinary measures of firm performance,
we look at strategic performance measures (SPM) that
can only be utilized if one delves into data that is
not found on the financial statements. This is the
first study that shows the sources of profitability
after an ERP implementation, and will help managers
understand the strategic and managerial implications of
ERP implementations. Our analysis compares performance
changes of ERP adopting firms versus non-adopting firms
over a fifteen-year period (1990--2005), which is the
period when this industry was being transformed by
increased use of technology in the oil and gas
industry. Therefore, we see how the implementation of
ERP affected firm performance during this period in
relation to non-adopting firms.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chang:2010:CEE,
author = "Wei-Lun Chang and Soe-Tsyr Yuan and Carol W. Hsu",
title = "Creating the experience economy in e-commerce",
journal = j-CACM,
volume = "53",
number = "7",
pages = "122--127",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785449",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
Advances in information technology together with the
forces of globalization have accelerated the growth of
service industries. In 2003, the OECD reported that
service industries now account for over 60\% of both
employment and the gross domestic product (GDP) of OECD
member countries. The U.S Bureau of Labor Statistics
(BLS) has forecast strong employment growth in the
American service sector between 2004 and 2014. Although
service industries are expanding, Gilmore and Pine
argue that, the growing commoditisation of services
offered has gradually transformed the competition for
market share from focusing on the quality of services
to the creation of memorable experiences. As a
consequence, the competitive position of a firm now
depends to a large extent on its ability to generate
impressive experiences through innovative delivery
channels.\par
In this article, we adopt Gilmore and Pine's view that
the economic value of the experience economy lies in
co-producing the staging experiences via customer
participation and connection. Furthermore, we suggest
that current technologies and the growth of the
Internet have both enabled and strengthened the
opportunities for experience-oriented offerings beyond
limitations of time and place. In following sections,
we first describe the current practice of experience
economy in electronic commerce. Taking the iCare health
care service as an example, we demonstrate how
collaborative pricing over the Internet can further
provide added-value to the production of experiences
offered in the electronic marketplace.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Nov:2010:WDP,
author = "Oded Nov and Chen Ye",
title = "Why do people tag?: motivations for photo tagging",
journal = j-CACM,
volume = "53",
number = "7",
pages = "128--131",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785450",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
Tagging, or using keywords to add metadata to shared
content, is gaining much popularity in recent years.
Tags are used to annotate various types of content,
including images, videos, bookmarks, and blogs, through
web-based systems such as Flickr, YouTube, del.icio.us,
and Technorati, respectively. The popularity of tagging
is attributed, at least in part, to the benefits users
gain from effective sharing and from organization of
very large amounts of information.\par
As tagging receives increasing attention in both
research and business communities, studies have found
that users vary substantially in their tag usage, and
suggested several factors that motivate user tagging.
However, to date no quantitative study has assessed the
strength of the effects of each motivation on levels of
tag usage. This is surprising, since user participation
is critical to the sustainability of content sharing
communities, and a collaborative tagging system cannot
succeed without higher level of user contribution. In
what follows, we address this gap, by studying the
strength of relationships between several motivations
and users' tagging levels on Flickr, a prominent Web
2.0 photo sharing community.\par
Currently, there are more than 35 million Flickr users,
who have so far uploaded more 3 billion photos. Each
Flickr user can upload images and make them viewable by
self, by designated friends and family, or by all
Flickr users. Flickr users can annotate images with
tags - unstructured textual labels; and usually images
are tagged only by the user who uploaded them.8 These
tags make the images searchable by the uploading user,
as well as by others. In addition, each user can
designate other users as `contacts,' people whose
photos the user follows (contacts are often
reciprocal).\par
To understand what underlies tagging, we need to find
out what motivates sharing in online environments, and
in particular, what motivates tagging. Furthermore, we
need to measure the degree to which different
motivations affect tagging activity. While some studies
has identified individual-level motivations for
tagging, other studies have looked solely at the social
level, focusing on the social presence as a driver of
tagging.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Talia:2010:HDD,
author = "Domenico Talia and Paolo Trunfio",
title = "How distributed data mining tasks can thrive as
knowledge services",
journal = j-CACM,
volume = "53",
number = "7",
pages = "132--137",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785451",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
Computer science applications are becoming more and
more network centric, ubiquitous, knowledge intensive,
and computing demanding. This trend will result soon in
an ecosystem of pervasive applications and services
that professionals and end-users can exploit
everywhere. Recently, collections of IT services and
applications, such as Web services and Cloud computing
services, became available opening the way for
accessing computing services as public utilities, like
water, gas and electricity.\par
Key technologies for implementing that perspective are
Cloud computing and Web services, semantic Web and
ontologies, pervasive computing, P2P systems, Grid
computing, ambient intelligence architectures, data
mining and knowledge discovery tools, Web 2.0
facilities, mashup tools, and decentralized programming
models. In fact, it is mandatory to develop solutions
that integrate some or many of those technologies to
provide future knowledge-intensive software utilities.
The Grid paradigm can represent a key component of the
future Internet, a cyber infrastructure for efficiently
supporting that scenario.\par
Grid and Cloud computing are evolved models of
distributed computing and parallel processing
technologies. The Grid is a distributed computing
infrastructure that enables coordinated resource
sharing within dynamic organizations consisting of
individuals, institutions, and resources. In the area
of Grid computing a proposed approach in accordance
with the trend outlined above is the Service-Oriented
Knowledge Utilities (SOKU) model that envisions the
integrated use of a set of technologies that are
considered as a solution to information, knowledge and
communication needs of many knowledge-based industrial
and business applications. The SOKU approach stems from
the necessity of providing knowledge and processing
capabilities to everybody, thus supporting the advent
of a competitive knowledge-based economy. Although the
SOKU model is not yet implemented, Grids are
increasingly equipped with data management tools,
semantic technologies, complex work-flows, data mining
features and other Web intelligence approaches. Similar
efforts are currently devoted to develop knowledge and
intelligent Clouds. These technologies can facilitate
the process of having Grids and Clouds as strategic
components for supporting pervasive knowledge intensive
applications and utilities.\par
Grids were originally designed for dealing with
problems involving large amounts of data and/or
compute-intensive applications. Today, however, Grids
enlarged their horizon as they are going to run
business applications supporting consumers and
end-users. To face those new challenges, Grid
environments must support adaptive knowledge management
and data analysis applications by offering resources,
services, and decentralized data access mechanisms. In
particular, according to the service-oriented
architecture (SOA) model, data mining tasks and
knowledge discovery processes can be delivered as
services in Grid-based infrastructures.\par
Through a service-based approach we can define
integrated services for supporting distributed business
intelligence tasks in Grids. Those services can address
all the aspects that must be considered in data mining
and in knowledge discovery processes such as data
selection and transport, data analysis, knowledge
models representation and visualization. We worked in
this direction for providing Grid-based architectures
and services for distributed knowledge discovery such
as the Knowledge Grid the Weka4WS toolkit, and mobile
Grid services for data mining.\par
Here we describe a strategy and a model based on the
use of services for the design of distributed knowledge
discovery services and discuss how Grid frameworks,
such those mentioned above, can be developed as a
collection of services and how they can be used to
develop distributed data analysis tasks and knowledge
discovery processes using the SOA model.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dennis:2010:IPH,
author = "Alan R. Dennis and Thomas M. Duffy and Hasan Cakir",
title = "{IT} programs in high schools: lessons from the {Cisco
Networking Academy} program",
journal = j-CACM,
volume = "53",
number = "7",
pages = "138--141",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
Student enrollment in college computer science (CS) and
information technology (IT) programs are in a downward
trend in most developed countries. At the same time,
the U.S. Bureau of Labor and their counterparts in
other countries forecast an increased need for skilled
CS/IT graduates.\par
To reverse the downwards trend in college level CS/IT
enrollment, ACM launched the Computer Science Teachers
Association (csta.acm.org), whose mission is to
`directly and passionately' advocate for computer
science education in the high school.\par
One major initiative is to develop a comprehensive
computer science curriculum that educates high school
students and informs them about the profession because
a major factor in the enrollment decline is a lack of
knowledge about possible CS/IT careers. In this
article, we examine one CS/IT program (the Cisco
Networking Academy that has been offered in high
schools since 1978) to understand what lessons we can
draw for other CS/IT high school initiatives.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ruhnka:2010:UED,
author = "John C. Ruhnka and John W. Bagby",
title = "Using {ESI} discovery teams to manage electronic data
discovery",
journal = j-CACM,
volume = "53",
number = "7",
pages = "142--144",
month = jul,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1785414.1785453",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 15 17:10:30 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Introduction\par
The importance of electronically stored information
(ESI) in litigation has increased greatly over the past
decade. Responding to the `discovery' requests made by
all litigating parties has become a significant
management function and cost center for organizations
engaged in litigation. Today, over 92\% of all business
records and data are created and stored electronically;
most are never reduced to hard copy. After civil
litigation is filed, a pre-trial `discovery' phase
occurs during which courts require litigants to
identify and produce potentially relevant information
to their adversaries. Settlements often occur before a
trial is held, making ESI produced during the discovery
phase and evaluated by the parties often determinative
of litigation outcomes. Managing discovery of
electronic information requires close coordination
among managers with widely diverse technical IT
expertise, litigation experience and operational
authority. Multi-disciplinary `ESI Discovery Teams' are
a key mechanism that can be used to achieve the
necessary coordination and continuing oversight over
enterprise discovery activities, particularly in larger
organizations.\par
A 2007 litigation survey of 253 U.S. corporations
reveals that 83\% had new lawsuits filed against them
in 2006 implicating e-discovery management.1 The most
common subject of these law-suits was labor/employment,
contract enforcement and personal injuries. Litigation
was also significant at smaller companies surveyed,
17\% had at least one lawsuit claiming $20 million or
more, and at mid-sized companies, 98\% reported one or
more lawsuits of $20 million or larger. Costs of
litigation are high, 71\% of the companies reported
litigation costs exceeding $1 million per year and 40\%
had litigation costs over $5 million per year,
excluding settlements or judgment amounts. Over half
the U.S. firms surveyed use outside e-discovery IT
vendors to collect, identify, verify, recover and
produce ESI and 30\% reported using outside legal
counsel with special expertise in e-discovery. These
e-discovery vendors had revenues of $1.95 billion in
2006, a 50\% increase over 2005, and $130 million was
spent for forensic software, data recovery and
production.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vianu:2010:JSN,
author = "Victor Vianu",
title = "{\em {JACM\/}} at the start of a new decade",
journal = j-CACM,
volume = "53",
number = "8",
pages = "5--5",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787235",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEh,
author = "{CACM Staff}",
title = "In the Virtual Extension",
journal = j-CACM,
volume = "53",
number = "8",
pages = "6--6",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787237",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "{\em Communications\/}' Virtual Extension brings more
quality articles to ACM members. These articles are now
available in the ACM Digital Library.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LECb,
author = "{CACM Staff}",
title = "Letters to the {Editor}: {CS} expertise for
institutional review boards",
journal = j-CACM,
volume = "53",
number = "8",
pages = "7--7",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787236",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Linden:2010:BWA,
author = "Greg Linden and Michael Bernstein and Erika Shehan
Poole",
title = "{BLOG@CACM}: The war against spam: and more",
journal = j-CACM,
volume = "53",
number = "8",
pages = "8--9",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787238",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
URL = "http://cacm.acm.org/blogs/blog-cacm",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish selected posts or
excerpts.
twitter: Follow us on Twitter at
http://twitter.com/blogCACM
Greg Linden asks if spammers have been defeated;
Michael Bernstein discusses Clay Shirky's keynote
speech at CSCW 2010; and Erika S. Poole writes about
how the digital world can help parents cope with the
death of a child.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COPa,
author = "David Roman",
title = "{CACM} online: Print is not just ink anymore",
journal = j-CACM,
volume = "53",
number = "8",
pages = "10--10",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787239",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NMD,
author = "Gary Anthes",
title = "News: Mechanism design meets computer science",
journal = j-CACM,
volume = "53",
number = "8",
pages = "11--13",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787240",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A field emerging from economics is teaming up with
computer science to improve auctions, supply chains,
and communication protocols.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NLB,
author = "Kirk L. Kroeker",
title = "News: Looking beyond stereoscopic {$3$D}'s revival",
journal = j-CACM,
volume = "53",
number = "8",
pages = "14--16",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787241",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Researchers working in vision and graphics are
attempting to develop new techniques and technologies
to overcome the current limitations in stereoscopic
3D.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Underwood:2010:NMS,
author = "Sarah Underwood",
title = "News: Making sense of real-time behavior",
journal = j-CACM,
volume = "53",
number = "8",
pages = "17--18",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787242",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Data captured by sensors worn on the human body and
analyzed in near real-time could transform our
understanding of human behavior, health, and society.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2010:NCL,
author = "Kirk L. Kroeker",
title = "News: Celebrating the legacy of {PLATO}",
journal = j-CACM,
volume = "53",
number = "8",
pages = "19--20",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787261",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The PLATO@50 Conference marked the semicentennial of
the computer system that was the forerunner of today's
social media and interactive education.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2010:NGP,
author = "Jack Rosenberger",
title = "News: {G{\"o}del Prize} and other {CS} awards",
journal = j-CACM,
volume = "53",
number = "8",
pages = "21--21",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787267",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Sanjeev Arora, Joseph S. B. Mitchell, and other
researchers are recognized for their contributions to
computer science.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Yoo:2010:IMM,
author = "Christopher S. Yoo",
title = "Is the {Internet} a maturing market?",
journal = j-CACM,
volume = "53",
number = "8",
pages = "24--26",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787243",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Touretzky:2010:PCS,
author = "David S. Touretzky",
title = "Preparing computer science students for the robotics
revolution",
journal = j-CACM,
volume = "53",
number = "8",
pages = "27--29",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787244",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Robotics will inspire dramatic changes in the CS
curriculum.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gao:2010:CCI,
author = "Ping Gao and Jiang Yu",
title = "Has {China} caught up in {IT}?",
journal = j-CACM,
volume = "53",
number = "8",
pages = "30--32",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787245",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "An assessment of the relative achievements in IT
infrastructure, firms, and innovation in China.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:KVPb,
author = "George V. Neville-Neil",
title = "Kode Vicious: Presenting your project",
journal = j-CACM,
volume = "53",
number = "8",
pages = "33--34",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787247",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The what, the how, and the why of giving an effective
presentation.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Spafford:2010:PSR,
author = "Eugene H. Spafford",
title = "Privacy and security: Remembrances of things pest",
journal = j-CACM,
volume = "53",
number = "8",
pages = "35--37",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787246",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Recalling malware milestones.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chopra:2010:RAA,
author = "Samir Chopra",
title = "Rights for autonomous artificial agents?",
journal = j-CACM,
volume = "53",
number = "8",
pages = "38--40",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787248",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The growing role of artificial agents necessitates
modifying legal frameworks to better address human
interests.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Misa:2010:IEW,
author = "Thomas J. Misa",
title = "An interview with {Edsger W. Dijkstra}",
journal = j-CACM,
volume = "53",
number = "8",
pages = "41--47",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787249",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The computer science luminary, in one of his last
interviews before his death in 2002, reflects on a
programmer's life.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{DeLine:2010:SDC,
author = "Robert DeLine and Gina Venolia and Kael Rowan",
title = "Software development with code maps",
journal = j-CACM,
volume = "53",
number = "8",
pages = "48--54",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787250",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Could ubiquitous hand-drawn code map diagrams become a
thing of the past?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Creeger:2010:MEC,
author = "Mache Creeger",
title = "Moving to the edge: a {CTO} roundtable on network
virtualization",
journal = j-CACM,
volume = "53",
number = "8",
pages = "55--62",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787251",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Leading experts debate how virtualization and clouds
impact network service architectures.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Damsgaard:2010:SPS,
author = "Jan Damsgaard and Jan Karlsbjerg",
title = "Seven principles for selecting software packages",
journal = j-CACM,
volume = "53",
number = "8",
pages = "63--71",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787252",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Everything you always wanted to know but were afraid
to ask about the decision-making process.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Larus:2010:SS,
author = "James Larus and Galen Hunt",
title = "The {Singularity} system",
journal = j-CACM,
volume = "53",
number = "8",
pages = "72--79",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787253",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Safe, modern programming languages let Microsoft
rethink the architectural trade-offs in its
experimental operating system.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Szabo:2010:PPO,
author = "Gabor Szabo and Bernardo A. Huberman",
title = "Predicting the popularity of online content",
journal = j-CACM,
volume = "53",
number = "8",
pages = "80--88",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787254",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Early patterns of Digg diggs and YouTube views reflect
long-term user interest.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Adve:2010:MMC,
author = "Sarita V. Adve and Hans-J. Boehm",
title = "Memory models: a case for rethinking parallel
languages and hardware",
journal = j-CACM,
volume = "53",
number = "8",
pages = "90--101",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787255",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Solving the memory model problem will require an
ambitious and cross-disciplinary research direction.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wang:2010:ATW,
author = "Helen Wang",
title = "Attacks target {Web} server logic and prey on {XCS}
weaknesses: technical perspective",
journal = j-CACM,
volume = "53",
number = "8",
pages = "104--104",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787256",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bojinov:2010:ECC,
author = "Hristo Bojinov and Elie Bursztein and Dan Boneh",
title = "The emergence of cross channel scripting",
journal = j-CACM,
volume = "53",
number = "8",
pages = "105--113",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787257",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Henglein:2010:LSS,
author = "Fritz Henglein",
title = "Large-scale sound and precise program analysis:
technical perspective",
journal = j-CACM,
volume = "53",
number = "8",
pages = "114--114",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787258",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dillig:2010:RAU,
author = "Isil Dillig and Thomas Dillig and Alex Aiken",
title = "Reasoning about the unknown in static analysis",
journal = j-CACM,
volume = "53",
number = "8",
pages = "115--123",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787259",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPe,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Figures on a Plane",
journal = j-CACM,
volume = "53",
number = "8",
pages = "128--128",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787260",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Welcome to three new puzzles. Solutions to the first
two will be published next month; the third is (as yet)
unsolved. In each, the issue is how your intuition
matches up with the mathematics.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tung:2010:ISM,
author = "Wei-Fung Tung and Soe-Tsyr Yuan",
title = "Intelligent service machine",
journal = j-CACM,
volume = "53",
number = "8",
pages = "129--134",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787268",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The service sector is becoming increasingly important
to the economies of many countries, especially
developed countries. The Organization for Economic
Co-operation and Development (OECD) recently released
its report Promoting Innovation in Services, which
noted that government policy in developed countries has
not been attuned to the service sector. For better
satisfying the needs of customers, providers now
attempt to add or create value through services. To
unravel the changing worldview of marketing, a new
dominant logic is service-centered model of exchange
(such as intangibles, competences, dynamics, exchange
processes and relationships, and operant resources) in
21$^{st}$ century.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Haines:2010:HSO,
author = "Marc N. Haines and Marcus A. Rothenberger",
title = "How a service-oriented architecture may change the
software development process",
journal = j-CACM,
volume = "53",
number = "8",
pages = "135--140",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787269",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Software development practices have evolved
substantially during the past decade. As so called
`agile' approaches have gained more acceptance and
applications have become progressively more distributed
in terms of their physical execution and the
development of components, the service-oriented
approach to IT architecture has become an important
alternative to traditional software development.
Another impetus for the trend to a Service-Oriented
Architecture (SOA) is provided by enterprise system
vendors as they are incorporating the service-oriented
paradigm into their products. Substantial efforts
related to open standards (such as Web service
standards) and open source products (such as open
source enterprise service bus, development tools) are
further driving a service-oriented approach for
information systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tisselli:2010:TCS,
author = "Eugenio Tisselli",
title = "thinkflickrthink: a case study on strategic tagging",
journal = j-CACM,
volume = "53",
number = "8",
pages = "141--145",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787270",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The growth both in quantity and diversity of online
communities across the World Wide Web, along with a
number of new technologies that enhance both social
interaction and content management, have bred an array
of increasingly participatory practices. Users are
engaged in bustling environments in which they can
express themselves and interact with other users,
creating and fostering all sorts of relationships,
while uploading and sharing multimedia contents. Such
environments turn into vital territories for many of
their users, who can become extremely sensitive and
protective of what they believe to be their rights.
Thus even a small, unfavorable change in the structure
of the site or in its usage policies can trigger
discontent and active opposition. Actions performed by
the site administrators, such as the deletion of
content or the suspension of user accounts, can be
perceived as abusive by the community and trigger
outrage. In such situations, many uncoordinated forms
of spontaneous protest and defense can emerge from the
network of users. The creativity and effectiveness of
these initiatives can vary greatly, with protests
ranging from discussions on forums and blogs, to
site-blocking boycotts.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Prechelt:2010:PTO,
author = "Lutz Prechelt",
title = "{Plat\_Forms}: is there one best {Web} development
technology?",
journal = j-CACM,
volume = "53",
number = "8",
pages = "146--149",
month = aug,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1787234.1787271",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Aug 3 19:19:03 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Software developers during their work face several
fundamental choices with a multitude of options. There
are methodological choices, where one selects among
possible development processes, and technological
choices regarding for instance development tools or
base technologies for the software product.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2010:SOT,
author = "Moshe Y. Vardi",
title = "Science has only two legs",
journal = j-CACM,
volume = "53",
number = "9",
pages = "5--5",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810892",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LEM,
author = "{CACM Staff}",
title = "Letters to the {Editor}: More than one way to annotate
metadata",
journal = j-CACM,
volume = "53",
number = "9",
pages = "7--7",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810893",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chi:2010:BEC,
author = "Ed H. Chi and Ruben Ortega",
title = "{BLOG@CACM}: Expanding {CS} education; improving
software development",
journal = j-CACM,
volume = "53",
number = "9",
pages = "8--9",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810895",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
URL = "http://cacm.acm.org/blogs/blog-cacm/82365",
abstract = "The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish selected posts or
excerpts.
twitter Follow us on Twitter at
http://twitter.com/blogCACM
Ed H. Chi writes about the social Web's impact on CS
education. Ruben Ortega discusses software and
test-driven development.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COMa,
author = "David Roman",
title = "{CACM} online: More {{\em Communications\/}}",
journal = j-CACM,
volume = "53",
number = "9",
pages = "12--12",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810896",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lindley:2010:NBB,
author = "David Lindley",
title = "News: Brains and bytes",
journal = j-CACM,
volume = "53",
number = "9",
pages = "13--15",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810897",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Computational neuroscientists are learning that the
brain is like a computer, except when it isn't.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:OCA,
author = "Samuel Greengard",
title = "Obituary: {Carl Adam Petri}, 1926--2010",
journal = j-CACM,
volume = "53",
number = "9",
pages = "14--14",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810897",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Scott:2010:SNP,
author = "Phil Scott",
title = "Security: New Passwords Approach",
journal = j-CACM,
volume = "53",
number = "9",
pages = "15--15",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810897",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2010:NCT,
author = "Neil Savage",
title = "News: Cycling through data",
journal = j-CACM,
volume = "53",
number = "9",
pages = "16--17",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810898",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Sensor-equipped bicycles are providing valuable data
to cyclists, city planners, and computer scientists.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2010:NDD,
author = "Marina Krakovsky",
title = "News: Degrees, distance, and dollars",
journal = j-CACM,
volume = "53",
number = "9",
pages = "18--19",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810899",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The Internet is making higher education accessible to
a whole new class of students---but not necessarily at
a lower cost.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2010:NAC,
author = "Tom Geller",
title = "News: {ACM China} nearing launch",
journal = j-CACM,
volume = "53",
number = "9",
pages = "20--20",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810900",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "ACM's expansion into China will support local
professionals and increase Chinese involvement in ACM's
international activities.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2010:NKP,
author = "Jack Rosenberger",
title = "News: {Kyoto} prize and other {CS} awards",
journal = j-CACM,
volume = "53",
number = "9",
pages = "21--21",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810901",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "L{\'a}szl{\'o} Lov{\'a}sz, Vinton G. Cerf, and other
researchers are honored for their contributions to
computer science.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2010:BSR,
author = "Phillip G. Armour",
title = "The business of software: Return at risk",
journal = j-CACM,
volume = "53",
number = "9",
pages = "23--25",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810902",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Calculating the likely true cost of projects.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hillman:2010:LTP,
author = "Robert A. Hillman and Maureen A. O'Rourke",
title = "Law and Technology: Principles of the law of software
contracts",
journal = j-CACM,
volume = "53",
number = "9",
pages = "26--28",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810903",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "An overview of a new set of legal principles for
software contracts developed by the American Law
Institute.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2010:PID,
author = "Peter J. Denning and Dorothy E. Denning",
title = "The profession of {IT}: Discussing cyber attack",
journal = j-CACM,
volume = "53",
number = "9",
pages = "29--31",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810904",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Cyber attack---the other side of cyber
defense---deserves a more open discussion than it has
been getting.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ben-Ari:2010:VON,
author = "Mordechai Ben-Ari",
title = "Viewpoint: Objects never?: well, hardly ever!",
journal = j-CACM,
volume = "53",
number = "9",
pages = "32--35",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810905",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Revisiting the Great Objects Debate.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rexford:2010:PCF,
author = "Jennifer Rexford and Constantine Dovrolis",
title = "Point\slash Counterpoint: Future {Internet}
architecture: clean-slate versus evolutionary
research",
journal = j-CACM,
volume = "53",
number = "9",
pages = "36--40",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810906",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Should researchers focus on designing new network
architectures or improving the current Internet?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cantrill:2010:CPC,
author = "Stephen V. Cantrill",
title = "Computers in patient care: the promise and the
challenge",
journal = j-CACM,
volume = "53",
number = "9",
pages = "42--47",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810907",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Information technology has the potential to radically
transform health care. Why has progress been so slow?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chessin:2010:IEF,
author = "Steve Chessin",
title = "Injecting errors for fun and profit",
journal = j-CACM,
volume = "53",
number = "9",
pages = "48--54",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810908",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Error-detection and correction features are only as
good as our ability to test them.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Millsap:2010:TCAa,
author = "Cary Millsap",
title = "Thinking clearly about performance, part 1",
journal = j-CACM,
volume = "53",
number = "9",
pages = "55--60",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810909",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Improving the performance of complex software is
difficult, but understanding some fundamental
principles can make it easier.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sjoberg:2010:CMR,
author = "Dag I. K. Sj{\o}berg",
title = "Confronting the myth of rapid obsolescence in
computing research",
journal = j-CACM,
volume = "53",
number = "9",
pages = "62--67",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810911",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Computing research ages more slowly than research in
other scientific disciplines, supporting the call for
parity in funding.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armstrong:2010:E,
author = "Joe Armstrong",
title = "{Erlang}",
journal = j-CACM,
volume = "53",
number = "9",
pages = "68--75",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810910",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The same component isolation that made it effective
for large distributed telecom systems makes it
effective for multicore CPUs and networked
applications.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Baier:2010:PEM,
author = "Christel Baier and Boudewijn R. Haverkort and Holger
Hermanns and Joost-Pieter Katoen",
title = "Performance evaluation and model checking join
forces",
journal = j-CACM,
volume = "53",
number = "9",
pages = "76--85",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810912",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A call for the perfect marriage between classical
performance evaluation and state-of-the-art
verification techniques.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gehrke:2010:PDP,
author = "Johannes Gehrke",
title = "Programming with differential privacy: technical
perspective",
journal = j-CACM,
volume = "53",
number = "9",
pages = "88--88",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810915",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McSherry:2010:PIQ,
author = "Frank McSherry",
title = "Privacy integrated queries: an extensible platform for
privacy-preserving data analysis",
journal = j-CACM,
volume = "53",
number = "9",
pages = "89--97",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810916",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Privacy Integrated Queries (PINQ) is an extensible
data analysis platform designed to provide
unconditional privacy guarantees for the records of the
underlying data sets. PINQ provides analysts with
access to records through an SQL-like declarative
language (LINQ) amidst otherwise arbitrary C\# code. At
the same time, the design of PINQ's analysis language
and its careful implementation provide formal
guarantees of {\em differential privacy\/} for any and
all uses of the platform. PINQ's guarantees require no
trust placed in the expertise or diligence of the
analysts, broadening the scope for design and
deployment of privacy-preserving data analyses,
especially by privacy nonexperts.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Jerrum:2010:CSP,
author = "Mark Jerrum",
title = "Constraint satisfaction problems and computational
complexity: technical perspective",
journal = j-CACM,
volume = "53",
number = "9",
pages = "98--98",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810913",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bulatov:2010:CSP,
author = "Andrei A. Bulatov and D{\'a}niel Marx",
title = "Constraint satisfaction problems and global
cardinality constraints",
journal = j-CACM,
volume = "53",
number = "9",
pages = "99--106",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810914",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "In a constraint satisfaction problem (CSP) the goal is
to find an assignment of a given set of variables
subject to specified constraints. A global cardinality
constraint is an additional requirement that prescribes
how many variables must be assigned a certain value. We
study the complexity of the problem CCSP({\Gamma}), the
CSP with global cardinality constraints that allows
only relations from the set {\Gamma}. The main result
of this paper characterizes sets {\Gamma} that give
rise to problems solvable in polynomial time, and
states that the remaining such problems are
NP-complete.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPf,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "53",
number = "9",
pages = "110--110",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810917",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "It's amazing how little we know about good old plane
geometry. Last month (August 2010, p. 128) we posted a
trio of brainteasers, including one as yet unsolved,
concerning figures on a plane. Here, we offer solutions
to two of them.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bear:2010:LBF,
author = "Greg Bear",
title = "Last Byte: Future tense: Little Brother is Watching",
journal = j-CACM,
volume = "53",
number = "9",
pages = "112--ff",
month = sep,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1810891.1810918",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 26 16:49:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Future Tense, one of the revolving features on this
page, presents stories and essays from the intersection
of computational science and technological speculation,
their boundaries limited only by our ability to imagine
what will and could be. In a world of technology and
fear, the public gets to know what it wants to
know\ldots{} and more than it can possibly digest.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chesnais:2010:ABV,
author = "Alain Chesnais",
title = "{ACM} is built on volunteers' shoulders",
journal = j-CACM,
volume = "53",
number = "10",
pages = "5--5",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831408",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LEHa,
author = "{CACM Staff}",
title = "Letters to the {Editor}: How to celebrate {Codd}'s
{RDBMS} vision",
journal = j-CACM,
volume = "53",
number = "10",
pages = "7--7",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831409",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2010:BSDb,
author = "Michael Stonebraker",
title = "{BLOG@CACM}: In search of database consistency",
journal = j-CACM,
volume = "53",
number = "10",
pages = "8--9",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831411",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "http://cacm.acm.org/blogs/blog-cacm
The {\em Communications\/} Web site,
http://cacm.acm.org, features more than a dozen
bloggers in the BLOG@CACM community. In each issue of
{\em Communications}, we'll publish selected posts or
excerpts.
twitter Follow us on Twitter at
http://twitter.com/blogCACM
Michael Stonebraker discusses the implications of the
CAP theorem on database management system applications
that span multiple processing sites.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COMb,
author = "David Roman",
title = "{CACM} online: The mobile road ahead",
journal = j-CACM,
volume = "53",
number = "10",
pages = "10--10",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831412",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2010:NLL,
author = "Alex Wright",
title = "News: Linear logic",
journal = j-CACM,
volume = "53",
number = "10",
pages = "11--13",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831413",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "A novel approach to computational logic is reaching
maturity, opening up opening up new vistas in
programming languages, proof nets, and security
applications.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stemp-Morlock:2010:NPF,
author = "Graeme Stemp-Morlock",
title = "News: Personal fabrication",
journal = j-CACM,
volume = "53",
number = "10",
pages = "14--15",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831414",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Open source 3D printers could herald the start of a
new industrial revolution.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McCafferty:2010:NSC,
author = "Dennis McCafferty",
title = "News: Should code be released?",
journal = j-CACM,
volume = "53",
number = "10",
pages = "16--17",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831415",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Software code can provide important insights into the
results of research, but it's up to individual
scientists whether their code is released---and many
opt not to.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Campbell-Kelly:2010:VDP,
author = "Martin Campbell-Kelly",
title = "{Victorian} data processing",
journal = j-CACM,
volume = "53",
number = "10",
pages = "19--21",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831417",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Reflections on the first payment systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2010:PSU,
author = "Michael A. Cusumano",
title = "Platforms and services: understanding the resurgence
of {Apple}",
journal = j-CACM,
volume = "53",
number = "10",
pages = "22--24",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831418",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Combining new consumer devices and Internet platforms
with online services and content is proving to be a
successful strategy.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Parnas:2010:IRR,
author = "David L. Parnas",
title = "Inside Risks: Risks of undisciplined development",
journal = j-CACM,
volume = "53",
number = "10",
pages = "25--27",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831419",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "An illustration of the problems caused by a lack of
discipline in software development and our failure to
apply what is known in the field.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:KVV,
author = "George V. Neville-Neil",
title = "Kode Vicious: Version aversion",
journal = j-CACM,
volume = "53",
number = "10",
pages = "28--29",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831420",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The way you number your releases communicates more
than you might think.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hicks:2010:VSA,
author = "Michael Hicks and Jeffrey S. Foster",
title = "Viewpoint: {SCORE}: agile research group management",
journal = j-CACM,
volume = "53",
number = "10",
pages = "30--31",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831421",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Adapting agile software development methodology toward
more efficient management of academic research
groups.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Study:2010:PSK,
author = "ACM Case Study",
title = "{Photoshop} scalability: keeping it simple",
journal = j-CACM,
volume = "53",
number = "10",
pages = "32--38",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831423",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Clem Cole and Russell Williams discuss Photoshop's
long history with parallelism, and what is now seen as
the chief challenge.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Millsap:2010:TCAb,
author = "Cary Millsap",
title = "Thinking clearly about performance, part 2",
journal = j-CACM,
volume = "53",
number = "10",
pages = "39--45",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831422",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "More important principles to keep in mind when
designing high-performance software.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Montagne:2010:TAC,
author = "Kevin Montagne",
title = "Tackling architectural complexity with modeling",
journal = j-CACM,
volume = "53",
number = "10",
pages = "46--52",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831424",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Component models can help diagnose architectural
problems in both new and existing systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Serre:2010:NAC,
author = "Thomas Serre and Tomaso Poggio",
title = "A neuromorphic approach to computer vision",
journal = j-CACM,
volume = "53",
number = "10",
pages = "54--61",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831425",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Neuroscience is beginning to inspire a new generation
of seeing machines.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tambe:2010:HOA,
author = "Prasanna B. Tambe and Lorin M. Hitt",
title = "How offshoring affects {IT} workers",
journal = j-CACM,
volume = "53",
number = "10",
pages = "62--70",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831426",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "IT jobs requiring interpersonal interaction or
physical presence in fixed locations are less likely to
be sent out of the country.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rodrigues:2010:PPS,
author = "Rodrigo Rodrigues and Peter Druschel",
title = "Peer-to-peer systems",
journal = j-CACM,
volume = "53",
number = "10",
pages = "72--82",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831427",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Within a decade, P2P has proven to be a technology
that enables innovative new services and is used by
millions of people every day.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Waldspurger:2010:VEM,
author = "Carl Waldspurger",
title = "A {VM} `Engine' that makes a difference: technical
perspective",
journal = j-CACM,
volume = "53",
number = "10",
pages = "84--84",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831428",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gupta:2010:DEH,
author = "Diwaker Gupta and Sangmin Lee and Michael Vrable and
Stefan Savage and Alex C. Snoeren and George Varghese
and Geoffrey M. Voelker and Amin Vahdat",
title = "Difference engine: harnessing memory redundancy in
virtual machines",
journal = j-CACM,
volume = "53",
number = "10",
pages = "85--93",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831429",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Virtual machine monitors (VMMs) are a popular platform
for Internet hosting centers and cloud-based compute
services. By multiplexing hardware resources among
virtual machines (VMs) running commodity operating
systems, VMMs decrease both the capital outlay and
management overhead of hosting centers. Appropriate
placement and migration policies can take advantage of
statistical multiplexing to effectively utilize
available processors. However, main memory is not
amenable to such multiplexing and is often the primary
bottleneck in achieving higher degrees of
consolidation.\par
Previous efforts have shown that content-based page
sharing provides modest decreases in the memory
footprint of VMs running similar operating systems and
applications. Our studies show that significant
additional gains can be had by leveraging both subpage
level sharing (through page patching) and incore memory
compression. We build {\em Difference Engine}, an
extension to the Xen VMM, to support each of these---in
addition to standard copy-on-write full-page
sharing---and demonstrate substantial savings across
VMs running disparate workloads (up to 65\%). In
head-to-head memory-savings comparisons, Difference
Engine outperforms VMware ESX server by a factor
1.6--2.5 for heterogeneous workloads. In all cases, the
performance overhead of Difference Engine is less than
7\%.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Weiss:2010:BPT,
author = "Yair Weiss and Judea Pearl",
title = "Belief propagation: technical perspective",
journal = j-CACM,
volume = "53",
number = "10",
pages = "94--94",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831430",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sudderth:2010:NBP,
author = "Erik B. Sudderth and Alexander T. Ihler and Michael
Isard and William T. Freeman and Alan S. Willsky",
title = "Nonparametric belief propagation",
journal = j-CACM,
volume = "53",
number = "10",
pages = "95--103",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831431",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Continuous quantities are ubiquitous in models of
real-world phenomena, but are surprisingly difficult to
reason about automatically. Probabilistic graphical
models such as Bayesian networks and Markov random
fields, and algorithms for approximate inference such
as belief propagation (BP), have proven to be powerful
tools in a wide range of applications in statistics and
artificial intelligence. However, applying these
methods to models with continuous variables remains a
challenging task. In this work we describe an extension
of BP to continuous variable models, generalizing
particle filtering, and Gaussian mixture filtering
techniques for time series to more complex models. We
illustrate the power of the resulting nonparametric BP
algorithm via two applications: kinematic tracking of
visual motion and distributed localization in sensor
networks.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:LBQd,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: {Gray's Paradigm}",
journal = j-CACM,
volume = "53",
number = "10",
pages = "112--ff",
month = oct,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1831407.1831432",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 1 21:13:00 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Tony Hey talks about Jim Gray and his vision of a new
era of collaborative, data-intensive science.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2010:PNC,
author = "Moshe Y. Vardi",
title = "On {P}, {NP}, and computational complexity",
journal = j-CACM,
volume = "53",
number = "11",
pages = "5--5",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839677",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:LEHb,
author = "{CACM Staff}",
title = "Letters to the {Editor}: How to think about objects",
journal = j-CACM,
volume = "53",
number = "11",
pages = "6--7",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839678",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEi,
author = "{CACM Staff}",
title = "In the Virtual Extension",
journal = j-CACM,
volume = "53",
number = "11",
pages = "9--9",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839679",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lau:2010:BRS,
author = "Tessa Lau",
title = "{BLOG@CACM}: Rethinking the systems review process",
journal = j-CACM,
volume = "53",
number = "11",
pages = "10--11",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839680",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:COPb,
author = "David Roman",
title = "{CACM} online: a preference for {PDF}",
journal = j-CACM,
volume = "53",
number = "11",
pages = "12--12",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839681",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2010:NTD,
author = "Gregory Goth",
title = "News: Turning data into knowledge",
journal = j-CACM,
volume = "53",
number = "11",
pages = "13--15",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839682",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:NSC,
author = "Gary Anthes",
title = "News: Security in the cloud",
journal = j-CACM,
volume = "53",
number = "11",
pages = "16--18",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839683",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2010:NCO,
author = "Leah Hoffmann",
title = "News: Career opportunities",
journal = j-CACM,
volume = "53",
number = "11",
pages = "19--21",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839684",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2010:NWO,
author = "Neil Savage",
title = "News: Wide open spaces",
journal = j-CACM,
volume = "53",
number = "11",
pages = "23--23",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839704",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Boczkowski:2010:EBD,
author = "Pablo J. Boczkowski",
title = "Economic and business dimensions: The divergent online
news preferences of journalists and readers",
journal = j-CACM,
volume = "53",
number = "11",
pages = "24--25",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839685",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cooper:2010:EKC,
author = "Stephen Cooper and Lance C. P{\'e}rez and Daphne
Rainey",
title = "Education: {K--12} computational learning",
journal = j-CACM,
volume = "53",
number = "11",
pages = "27--29",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839686",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2010:LSW,
author = "Pamela Samuelson",
title = "Legally speaking: Why do software startups patent (or
not)?",
journal = j-CACM,
volume = "53",
number = "11",
pages = "30--32",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839687",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brenner:2010:PSW,
author = "Joel F. Brenner",
title = "Privacy and security: Why isn't cyberspace more
secure?",
journal = j-CACM,
volume = "53",
number = "11",
pages = "33--35",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839688",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Welsh:2010:VSN,
author = "Matt Welsh",
title = "Viewpoint: Sensor networks for the sciences",
journal = j-CACM,
volume = "53",
number = "11",
pages = "36--39",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839690",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Fitzpatrick:2010:CAD,
author = "Brian W. Fitzpatrick and JJ Lueck",
title = "The case against data lock-in",
journal = j-CACM,
volume = "53",
number = "11",
pages = "42--46",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839691",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "Yes, it is JJ Lueck, not J. J. Lueck.",
}
@Article{Rosenthal:2010:KBS,
author = "David S. H. Rosenthal",
title = "Keeping bits safe: how hard can it be?",
journal = j-CACM,
volume = "53",
number = "11",
pages = "47--55",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839692",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2010:SPS,
author = "Poul-Henning Kamp",
title = "Sir, please step away from the {ASR-33!}",
journal = j-CACM,
volume = "53",
number = "11",
pages = "56--57",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839693",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Garland:2010:UTO,
author = "Michael Garland and David B. Kirk",
title = "Understanding throughput-oriented architectures",
journal = j-CACM,
volume = "53",
number = "11",
pages = "58--66",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839694",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vogl:2010:RIG,
author = "Patrick Vogl and Michael Barrett",
title = "Regulating the information gatekeepers",
journal = j-CACM,
volume = "53",
number = "11",
pages = "67--72",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839695",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Faliszewski:2010:UCP,
author = "Piotr Faliszewski and Edith Hemaspaandra and Lane A.
Hemaspaandra",
title = "Using complexity to protect elections",
journal = j-CACM,
volume = "53",
number = "11",
pages = "74--82",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839696",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Adve:2010:DRE,
author = "Sarita Adve",
title = "Data races are evil with no exceptions: technical
perspective",
journal = j-CACM,
volume = "53",
number = "11",
pages = "84--84",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839697",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Elmas:2010:GRA,
author = "Tayfun Elmas and Shaz Qadeer and Serdar Tasiran",
title = "{Goldilocks}: a race-aware {Java} runtime",
journal = j-CACM,
volume = "53",
number = "11",
pages = "85--92",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839698",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Flanagan:2010:FEP,
author = "Cormac Flanagan and Stephen N. Freund",
title = "{FastTrack}: efficient and precise dynamic race
detection",
journal = j-CACM,
volume = "53",
number = "11",
pages = "93--101",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839699",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2010:LBPg,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Rectangles Galore",
journal = j-CACM,
volume = "53",
number = "11",
pages = "112--112",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839700",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Buell:2010:VVE,
author = "Duncan Buell",
title = "Viewpoints: Virtual extension: In support of computer
science teachers and the {CSTA}",
journal = j-CACM,
volume = "53",
number = "11",
pages = "113--115",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839703",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ficco:2010:VES,
author = "Massimo Ficco and Roberto Pietrantuono and Stefano
Russo",
title = "Virtual extension: Supporting ubiquitous location
information in interworking {3G} and wireless
networks",
journal = j-CACM,
volume = "53",
number = "11",
pages = "116--123",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839702",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Freyne:2010:VER,
author = "Jill Freyne and Lorcan Coyle and Barry Smyth and
Padraig Cunningham",
title = "Virtual extension: Relative status of journal and
conference publications in computer science",
journal = j-CACM,
volume = "53",
number = "11",
pages = "124--132",
month = nov,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1839676.1839701",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Oct 29 17:02:13 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Patterson:2010:DC,
author = "David A. Patterson",
title = "Diverse connections",
journal = j-CACM,
volume = "53",
number = "12",
pages = "5--5",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859205",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:SFL,
author = "{CACM Staff}",
title = "Science has four legs",
journal = j-CACM,
volume = "53",
number = "12",
pages = "6--7",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859206",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:VEj,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "9--9",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859207",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Linden:2010:SAM,
author = "Greg Linden and Jason Hong and Mark Guzdial",
title = "Security advice; malvertisements; and {CS} education
in {Qatar}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "10--11",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859208",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2010:SGN,
author = "David Roman",
title = "School grades need improvement",
journal = j-CACM,
volume = "53",
number = "12",
pages = "12--12",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859209",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2010:EI,
author = "Gregory Goth",
title = "The eyes have it",
journal = j-CACM,
volume = "53",
number = "12",
pages = "13--15",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859211",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2010:TMV,
author = "Gary Anthes",
title = "Topic models vs. unstructured data",
journal = j-CACM,
volume = "53",
number = "12",
pages = "16--18",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859210",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2010:CER,
author = "Marina Krakovsky",
title = "{CSEdWeek} expands its reach",
journal = j-CACM,
volume = "53",
number = "12",
pages = "19--19",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859213",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2010:NFW,
author = "Samuel Greengard",
title = "The new face of war",
journal = j-CACM,
volume = "53",
number = "12",
pages = "20--22",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859212",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lindley:2010:MP,
author = "David Lindley",
title = "A matter of privacy",
journal = j-CACM,
volume = "53",
number = "12",
pages = "23--23",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859214",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goodman:2010:CAT,
author = "Seymour Goodman and Andrew Harris",
title = "The coming {African} tsunami of information
insecurity",
journal = j-CACM,
volume = "53",
number = "12",
pages = "24--27",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859215",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Smotherman:2010:ISP,
author = "Mark Smotherman and Dag Spicer",
title = "{IBM}'s single-processor supercomputer efforts",
journal = j-CACM,
volume = "53",
number = "12",
pages = "28--30",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859216",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "IBM 7030 Stretch; Project Stretch",
}
@Article{Gates:2010:RHS,
author = "Ann Quiroz Gates",
title = "The role of {Hispanic}-serving institutions in
contributing to an educated work force",
journal = j-CACM,
volume = "53",
number = "12",
pages = "31--33",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859217",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2010:LQU,
author = "Peter J. Denning and Robert E. Kahn",
title = "The long quest for universal information access",
journal = j-CACM,
volume = "53",
number = "12",
pages = "34--36",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859218",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2010:LC,
author = "George V. Neville-Neil",
title = "Literate coding",
journal = j-CACM,
volume = "53",
number = "12",
pages = "37--38",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859219",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Berman:2010:WNR,
author = "Francine Berman",
title = "We need a research data census",
journal = j-CACM,
volume = "53",
number = "12",
pages = "39--41",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859220",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2010:CEC,
author = "{CACM Staff}",
title = "A conversation with {Ed Catmull}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "42--47",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859224",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Creeger:2010:TBI,
author = "Mache Creeger",
title = "The theft of business innovation: an {ACM--BCS}
roundtable on threats to global competitiveness",
journal = j-CACM,
volume = "53",
number = "12",
pages = "48--55",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859222",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shao:2010:CS,
author = "Zhong Shao",
title = "Certified software",
journal = j-CACM,
volume = "53",
number = "12",
pages = "56--66",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859226",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Andriole:2010:BIW,
author = "Stephen J. Andriole",
title = "Business impact of {Web 2.0} technologies",
journal = j-CACM,
volume = "53",
number = "12",
pages = "67--79",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859225",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Darwiche:2010:BN,
author = "Adnan Darwiche",
title = "{Bayesian} networks",
journal = j-CACM,
volume = "53",
number = "12",
pages = "80--90",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859227",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Elad:2010:ISR,
author = "Michael Elad and Raja Giryes",
title = "Iterative signal recovery from incomplete samples:
technical perspective",
journal = j-CACM,
volume = "53",
number = "12",
pages = "92--92",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859228",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Needell:2010:CIS,
author = "Deanna Needell and Joel A. Tropp",
title = "{CoSaMP}: iterative signal recovery from incomplete
and inaccurate samples",
journal = j-CACM,
volume = "53",
number = "12",
pages = "93--100",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859229",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Aaronson:2010:QPB,
author = "Scott Aaronson",
title = "{QIP = PSPACE} breakthrough: technical perspective",
journal = j-CACM,
volume = "53",
number = "12",
pages = "101--101",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859230",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Jain:2010:QP,
author = "Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and
John Watrous",
title = "{QIP $=$ PSPACE}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "102--109",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859231",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "The interactive proof system model of computation has
been studied extensively in computational complexity
theory and theoretical cryptography for more than 25
years, and has driven the development of interesting
new techniques and insights in those fields. This work
considers the quantum interactive proof system model,
which is the classical model's natural quantum
computational analog. An exact characterization of the
expressive power of quantum interactive proof systems
is obtained: the collection of computational problems
having quantum interactive proof systems consists
precisely of those problems solvable with an ordinary
classical computer using at most a polynomial amount of
memory (or QIP $=$ PSPACE in complexity-theoretic
terminology). One striking implication of this
characterization is that it implies quantum computing
provides no increase in computational power whatsoever
over classical computing in the context of interactive
proof systems.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "An earlier version of this work won Best Paper Award
at STOC'2010 (Symposium on the Theory of Computing):
see \url{https://doi.org/10.1145/1806689.1806768}",
}
@Article{Winkler:2010:LBPh,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and sources",
journal = j-CACM,
volume = "53",
number = "12",
pages = "126--126",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859232",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rumilisoun:2010:FTR,
author = "Rumilisoun",
title = "Future tense: {Rebirth} of worlds",
journal = j-CACM,
volume = "53",
number = "12",
pages = "128--ff",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859233",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Franceschet:2010:RCP,
author = "Massimo Franceschet",
title = "The role of conference publications in {CS}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "129--132",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859234",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lunt:2010:IHN,
author = "Barry Lunt and J. Ekstrom and Han Reichgelt and
Michael Bailey and Richard Leblanc",
title = "{IT 2008}: the history of a new computing discipline",
journal = j-CACM,
volume = "53",
number = "12",
pages = "133--141",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859236",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Morelli:2010:GCD,
author = "Ralph Morelli and Chamindra de Silva and Trishan de
Lanerolle and Rebecca Curzon and Xin Sheng Mao",
title = "A global collaboration to deploy help to {China}",
journal = j-CACM,
volume = "53",
number = "12",
pages = "142--149",
month = dec,
year = "2010",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1859204.1859235",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Nov 24 17:07:53 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:WAW,
author = "Moshe Y. Vardi",
title = "Where have all the workshops gone?",
journal = j-CACM,
volume = "54",
number = "1",
pages = "5--5",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866740",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:CWT,
author = "{CACM Staff}",
title = "To change the world, take a chance",
journal = j-CACM,
volume = "54",
number = "1",
pages = "6--7",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866741",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anonymous:2011:VE,
author = "Anonymous",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "1",
pages = "8--8",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866742",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hall:2011:AAR,
author = "Wendy Hall",
title = "{ACM}'s annual report",
journal = j-CACM,
volume = "54",
number = "1",
pages = "9--13",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866768",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2011:SCA,
author = "Jack Rosenberger and Judy Robertson",
title = "Smart career advice: laptops as a classroom
distraction",
journal = j-CACM,
volume = "54",
number = "1",
pages = "14--15",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866743",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2011:SPM,
author = "David Roman",
title = "Scholarly publishing model needs an update",
journal = j-CACM,
volume = "54",
number = "1",
pages = "16--ff",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866744",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2011:NSM,
author = "Gary Anthes",
title = "Nonlinear systems made easy",
journal = j-CACM,
volume = "54",
number = "1",
pages = "17--19",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866745",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2011:TSH,
author = "Alex Wright",
title = "The touchy subject of haptics",
journal = j-CACM,
volume = "54",
number = "1",
pages = "20--22",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866746",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2011:IEE,
author = "Marina Krakovsky",
title = "{India}'s elephantine effort",
journal = j-CACM,
volume = "54",
number = "1",
pages = "23--24",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866747",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosenberger:2011:EPO,
author = "Jack Rosenberger",
title = "{EMET} prize and other awards",
journal = j-CACM,
volume = "54",
number = "1",
pages = "25--25",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866767",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2011:DBM,
author = "Phillip G. Armour",
title = "Don't bring me a good idea",
journal = j-CACM,
volume = "54",
number = "1",
pages = "27--29",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866748",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bechtold:2011:GAE,
author = "Stefan Bechtold",
title = "{Google AdWords} and {European} trademark law",
journal = j-CACM,
volume = "54",
number = "1",
pages = "30--32",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866749",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2011:RTD,
author = "Michael A. Cusumano",
title = "Reflections on the {Toyota} debacle",
journal = j-CACM,
volume = "54",
number = "1",
pages = "33--35",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866750",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ryan:2011:CCP,
author = "Mark D. Ryan",
title = "Cloud computing privacy concerns on our doorstep",
journal = j-CACM,
volume = "54",
number = "1",
pages = "36--38",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866751",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Steele:2011:IFA,
author = "Guy L. {Steele Jr.}",
title = "An interview with {Frances E. Allen}",
journal = j-CACM,
volume = "54",
number = "1",
pages = "39--45",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866752",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
note = "This article contains an important half-century
retrospective on the IBM 7030 Stretch project, and its
impact on subsequent computer designs.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Haber:2011:CSA,
author = "Eben M. Haber and Eser Kandogan and Paul P. Maglio",
title = "Collaboration in system administration",
journal = j-CACM,
volume = "54",
number = "1",
pages = "46--53",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866755",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anonymous:2011:UDA,
author = "Anonymous",
title = "{UX} design and agile: a natural fit?",
journal = j-CACM,
volume = "54",
number = "1",
pages = "54--60",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866753",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
note = "Talking with Julian Gosper, Jean-Luc Agathos, Richard
Rutter, and Terry Coatta",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kotsovinos:2011:VBC,
author = "Evangelos Kotsovinos",
title = "Virtualization: blessing or curse?",
journal = j-CACM,
volume = "54",
number = "1",
pages = "61--65",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866754",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wiederhold:2011:FIP,
author = "Gio Wiederhold",
title = "Follow the intellectual property",
journal = j-CACM,
volume = "54",
number = "1",
pages = "66--74",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866756",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vishkin:2011:USA,
author = "Uzi Vishkin",
title = "Using simple abstraction to reinvent computing for
parallelism",
journal = j-CACM,
volume = "54",
number = "1",
pages = "75--85",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866757",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dwork:2011:FFP,
author = "Cynthia Dwork",
title = "A firm foundation for private data analysis",
journal = j-CACM,
volume = "54",
number = "1",
pages = "86--95",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866758",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Katabi:2011:SPL,
author = "Dina Katabi",
title = "{Sora} promises lasting impact: technical
perspective",
journal = j-CACM,
volume = "54",
number = "1",
pages = "98--98",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866759",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tan:2011:SHP,
author = "Kun Tan and He Liu and Jiansong Zhang and Yongguang
Zhang and Ji Fang and Geoffrey M. Voelker",
title = "{Sora}: high-performance software radio using
general-purpose multi-core processors",
journal = j-CACM,
volume = "54",
number = "1",
pages = "99--107",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866760",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wischik:2011:MNC,
author = "Damon Wischik",
title = "Multipath: a new control architecture for the
{Internet}: technical perspective",
journal = j-CACM,
volume = "54",
number = "1",
pages = "108--108",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866761",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Key:2011:PSM,
author = "Peter Key and Laurent Massouli{\'e} and Don Towsley",
title = "Path selection and multipath congestion control",
journal = j-CACM,
volume = "54",
number = "1",
pages = "109--116",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866762",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McCafferty:2011:LBQ,
author = "Dennis McCafferty",
title = "Last Byte: {Q\&A}: a Journey of Discovery",
journal = j-CACM,
volume = "54",
number = "1",
pages = "128--ff",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866763",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Ed Lazowska discusses his heady undergraduate days at
Brown University, teaching, eScience, and being chair
of the Computing Community Consortium.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Locasto:2011:ELP,
author = "Michael E. Locasto and Anup K. Ghosh and Sushil
Jajodia and Angelos Stavrou",
title = "The ephemeral legion: producing an expert
cyber-security work force from thin air",
journal = j-CACM,
volume = "54",
number = "1",
pages = "129--131",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866764",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Frohlich:2011:MWC,
author = "Peter Fr{\"o}hlich and Antti Oulasvirta and Matthias
Baldauf and Antti Nurminen",
title = "On the move, wirelessly connected to the world",
journal = j-CACM,
volume = "54",
number = "1",
pages = "132--138",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866766",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hasel:2011:OES,
author = "Matthias H{\"a}sel",
title = "{Opensocial}: an enabler for social applications on
the {Web}",
journal = j-CACM,
volume = "54",
number = "1",
pages = "139--144",
month = jan,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1866739.1866765",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Dec 23 17:45:01 MST 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rodden:2011:IOM,
author = "Tom Rodden",
title = "{ICPS} offers major research venue",
journal = j-CACM,
volume = "54",
number = "2",
pages = "5--5",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897817",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:SLC,
author = "{CACM Staff}",
title = "Shine the light of computational complexity",
journal = j-CACM,
volume = "54",
number = "2",
pages = "6--7",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897818",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEa,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "2",
pages = "9--9",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897821",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hong:2011:MD,
author = "Jason Hong",
title = "Matters of design",
journal = j-CACM,
volume = "54",
number = "2",
pages = "10--11",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897820",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2011:EDC,
author = "David Roman",
title = "End of days for {Communications} in print?",
journal = j-CACM,
volume = "54",
number = "2",
pages = "12--12",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1936942",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2011:CGG,
author = "Gregory Goth",
title = "Chipping away at greenhouse gases",
journal = j-CACM,
volume = "54",
number = "2",
pages = "13--15",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897823",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2011:ITA,
author = "Neil Savage",
title = "Information theory after {Shannon}",
journal = j-CACM,
volume = "54",
number = "2",
pages = "16--18",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897822",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:MWL,
author = "Leah Hoffmann",
title = "{Maurice Wilkes}: the last pioneer",
journal = j-CACM,
volume = "54",
number = "2",
pages = "19--19",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897827",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:FC,
author = "Samuel Greengard",
title = "Following the crowd",
journal = j-CACM,
volume = "54",
number = "2",
pages = "20--22",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897824",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2011:ALN,
author = "Gary Anthes",
title = "{ACM} launches new {Digital Library}",
journal = j-CACM,
volume = "54",
number = "2",
pages = "23--24",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897828",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:AFH,
author = "{CACM Staff}",
title = "{ACM Fellows} honored",
journal = j-CACM,
volume = "54",
number = "2",
pages = "25--25",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897826",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Conway:2011:AC,
author = "Maura Conway",
title = "Against cyberterrorism",
journal = j-CACM,
volume = "54",
number = "2",
pages = "26--28",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897829",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosston:2011:HDB,
author = "Gregory Rosston and Scott Savage and Donald Waldman",
title = "Household demand for broadband {Internet} service",
journal = j-CACM,
volume = "54",
number = "2",
pages = "29--31",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897830",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ledin:2011:GHT,
author = "George {Ledin, Jr.}",
title = "The growing harm of not teaching malware",
journal = j-CACM,
volume = "54",
number = "2",
pages = "32--34",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897832",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2011:FT,
author = "George V. Neville-Neil",
title = "Forest for the trees",
journal = j-CACM,
volume = "54",
number = "2",
pages = "35--36",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897833",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Guzdial:2011:SE,
author = "Mark Guzdial",
title = "From science to engineering",
journal = j-CACM,
volume = "54",
number = "2",
pages = "37--39",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897831",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Grudin:2011:TCC,
author = "Jonathan Grudin",
title = "Technology, conferences, and community",
journal = j-CACM,
volume = "54",
number = "2",
pages = "41--43",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897834",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Harty:2011:FUB,
author = "Julian Harty",
title = "Finding usability bugs with automated tests",
journal = j-CACM,
volume = "54",
number = "2",
pages = "44--49",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897836",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Limoncelli:2011:PSS,
author = "Thomas A. Limoncelli",
title = "A plea from sysadmins to software vendors: 10 do's and
don'ts",
journal = j-CACM,
volume = "54",
number = "2",
pages = "50--51",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897835",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lear:2011:SAS,
author = "Christina Lear",
title = "System administration soft skills",
journal = j-CACM,
volume = "54",
number = "2",
pages = "52--58",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897837",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wachs:2011:VBH,
author = "Juan Pablo Wachs and Mathias K{\"o}lsch and Helman
Stern and Yael Edan",
title = "Vision-based hand-gesture applications",
journal = j-CACM,
volume = "54",
number = "2",
pages = "60--71",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897838",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cafarella:2011:SDW,
author = "Michael J. Cafarella and Alon Halevy and Jayant
Madhavan",
title = "Structured data on the {Web}",
journal = j-CACM,
volume = "54",
number = "2",
pages = "72--79",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897839",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Davies:2011:SBM,
author = "Stephen Davies",
title = "Still building the {Memex}",
journal = j-CACM,
volume = "54",
number = "2",
pages = "80--88",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897840",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Pereira:2011:MMB,
author = "Fernando Pereira",
title = "{Markov} meets {Bayes}: technical perspective",
journal = j-CACM,
volume = "54",
number = "2",
pages = "90--90",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897841",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wood:2011:SM,
author = "Frank Wood and Jan Gasthaus and C{\'e}dric Archambeau
and Lancelot James and Yee Whye Teh",
title = "The sequence memoizer",
journal = j-CACM,
volume = "54",
number = "2",
pages = "91--98",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897842",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Jouppi:2011:DEW,
author = "Norman P. Jouppi",
title = "{DRAM} errors in the wild: technical perspective",
journal = j-CACM,
volume = "54",
number = "2",
pages = "99--99",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897843",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schroeder:2011:DEW,
author = "Bianca Schroeder and Eduardo Pinheiro and
Wolf-Dietrich Weber",
title = "{DRAM} errors in the wild: a large-scale field study",
journal = j-CACM,
volume = "54",
number = "2",
pages = "100--107",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897844",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPa,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Parsing Partitions",
journal = j-CACM,
volume = "54",
number = "2",
pages = "112--112",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897845",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Estell:2011:NNG,
author = "John K. Estell and Ken Christensen",
title = "The need for a new graduation rite of passage",
journal = j-CACM,
volume = "54",
number = "2",
pages = "113--115",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897846",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Zhao:2011:SPV,
author = "Qinping Zhao",
title = "10 scientific problems in virtual reality",
journal = j-CACM,
volume = "54",
number = "2",
pages = "116--118",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897847",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2011:OGS,
author = "David Wright and Paul {De Hert} and Serge Gutwirth",
title = "Are the {OECD} guidelines at 30 showing their age?",
journal = j-CACM,
volume = "54",
number = "2",
pages = "119--127",
month = feb,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897816.1897848",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Feb 15 11:09:00 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "Organization for Economic Co-operation and Development
(OECD)",
}
@Article{Vardi:2011:FF,
author = "Moshe Y. Vardi",
title = "Fumbling the future",
journal = j-CACM,
volume = "54",
number = "3",
pages = "5--5",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897853",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:FSA,
author = "{CACM Staff}",
title = "Free speech for algorithms?",
journal = j-CACM,
volume = "54",
number = "3",
pages = "6--7",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897854",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEb,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "3",
pages = "11--11",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897855",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Guzdial:2011:SEC,
author = "Mark Guzdial and Greg Linden",
title = "Scientists, engineers, and computer science; industry
and research groups",
journal = j-CACM,
volume = "54",
number = "3",
pages = "12--13",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897856",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Roman:2011:TC,
author = "David Roman",
title = "Time to change",
journal = j-CACM,
volume = "54",
number = "3",
pages = "14--14",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897857",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:GCF,
author = "Kirk L. Kroeker",
title = "{Grid} computing's future",
journal = j-CACM,
volume = "54",
number = "3",
pages = "15--17",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897858",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2011:TMM,
author = "Neil Savage",
title = "{Twitter} as medium and message",
journal = j-CACM,
volume = "54",
number = "3",
pages = "18--20",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897860",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2011:EGF,
author = "Tom Geller",
title = "Evaluating government funding",
journal = j-CACM,
volume = "54",
number = "3",
pages = "21--21",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897861",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2011:MPF,
author = "Gary Anthes",
title = "Memristors: pass or fail?",
journal = j-CACM,
volume = "54",
number = "3",
pages = "22--24",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897859",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:GCT,
author = "Samuel Greengard",
title = "{Gary Chapman}, technologist: 1952--2010",
journal = j-CACM,
volume = "54",
number = "3",
pages = "25--25",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897862",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2011:DYO,
author = "Pamela Samuelson",
title = "Do you own the software you buy?",
journal = j-CACM,
volume = "54",
number = "3",
pages = "26--28",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897863",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Pimple:2011:SM,
author = "Kenneth D. Pimple",
title = "Surrounded by machines",
journal = j-CACM,
volume = "54",
number = "3",
pages = "29--31",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897864",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2011:MT,
author = "Peter J. Denning",
title = "Managing time",
journal = j-CACM,
volume = "54",
number = "3",
pages = "32--34",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897865",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chubin:2011:PGT,
author = "Daryl E. Chubin and Roosevelt Y. Johnson",
title = "A program greater than the sum of its parts: the {BPC}
alliances",
journal = j-CACM,
volume = "54",
number = "3",
pages = "35--37",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897866",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Snir:2011:CIS,
author = "Marc Snir",
title = "Computer and information science and engineering: one
discipline, many specialties",
journal = j-CACM,
volume = "54",
number = "3",
pages = "38--43",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897867",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Burgess:2011:TSA,
author = "Mark Burgess",
title = "Testable system administration",
journal = j-CACM,
volume = "54",
number = "3",
pages = "44--49",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897868",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stapleton-Gray:2011:NID,
author = "Ross Stapleton-Gray and William Woodcock",
title = "National {Internet} defense---small states on the
skirmish line",
journal = j-CACM,
volume = "54",
number = "3",
pages = "50--55",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897869",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2011:BCT,
author = "Poul-Henning Kamp",
title = "{B.Y.O.C} (1,342 times and counting)",
journal = j-CACM,
volume = "54",
number = "3",
pages = "56--58",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897870",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Borner:2011:PPM,
author = "Katy B{\"o}rner",
title = "Plug-and-play macroscopes",
journal = j-CACM,
volume = "54",
number = "3",
pages = "60--69",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897871",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stajano:2011:USV,
author = "Frank Stajano and Paul Wilson",
title = "Understanding scam victims: seven principles for
systems security",
journal = j-CACM,
volume = "54",
number = "3",
pages = "70--75",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897872",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shavit:2011:DSM,
author = "Nir Shavit",
title = "Data structures in the multicore age",
journal = j-CACM,
volume = "54",
number = "3",
pages = "76--84",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897873",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bello:2011:CVM,
author = "Juan Bello and Yann LeCun and Robert Rowe",
title = "Concerto for violin and {Markov} model: technical
perspective",
journal = j-CACM,
volume = "54",
number = "3",
pages = "86--86",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897874",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Raphael:2011:IP,
author = "Christopher Raphael",
title = "The informatics philharmonic",
journal = j-CACM,
volume = "54",
number = "3",
pages = "87--93",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897875",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rexford:2011:VTP,
author = "Jennifer Rexford",
title = "{VL2}: technical perspective",
journal = j-CACM,
volume = "54",
number = "3",
pages = "94--94",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897876",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greenberg:2011:VSF,
author = "Albert Greenberg and James R. Hamilton and Navendu
Jain and Srikanth Kandula and Changhoon Kim and
Parantap Lahiri and David A. Maltz and Parveen Patel
and Sudipta Sengupta",
title = "{VL2}: a scalable and flexible data center network",
journal = j-CACM,
volume = "54",
number = "3",
pages = "95--104",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897877",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPb,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "54",
number = "3",
pages = "109--109",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897878",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Benford:2011:FT,
author = "Gregory Benford",
title = "Future tense",
journal = j-CACM,
volume = "54",
number = "3",
pages = "112--ff",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897879",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosamond:2011:RMB,
author = "Frances Rosamond and Roswitha Bardohl and Stephan
Diehl and Uwe Geisler and Gordon Bolduan and Annette
Lessm{\"o}llmann and Andreas Schwill and Ulrike Stege",
title = "Reaching out to the media: become a computer science
ambassador",
journal = j-CACM,
volume = "54",
number = "3",
pages = "113--116",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897880",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Garrett:2011:IE,
author = "R. Kelly Garrett and James N. Danziger",
title = "The {Internet} electorate",
journal = j-CACM,
volume = "54",
number = "3",
pages = "117--123",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897881",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{DeHertogh:2011:GW,
author = "Steven {De Hertogh} and Stijn Viaene and Guido
Dedene",
title = "Governing {Web 2.0}",
journal = j-CACM,
volume = "54",
number = "3",
pages = "124--130",
month = mar,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1897852.1897882",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Feb 25 15:54:43 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schnabel:2011:ECN,
author = "Robert B. Schnabel",
title = "Educating computing's next generation",
journal = j-CACM,
volume = "54",
number = "4",
pages = "5--5",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924422",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEc,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "4",
pages = "8--8",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924424",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:WPI,
author = "{CACM Staff}",
title = "{I} want a personal information pod",
journal = j-CACM,
volume = "54",
number = "4",
pages = "9--9",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924423",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hong:2011:MDP,
author = "Jason Hong",
title = "Matters of design, part {II}",
journal = j-CACM,
volume = "54",
number = "4",
pages = "10--11",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924425",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:AM,
author = "Scott E. Delman",
title = "{ACM} on the move",
journal = j-CACM,
volume = "54",
number = "4",
pages = "12--12",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924426",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2011:QR,
author = "Gary Anthes",
title = "The quest for randomness",
journal = j-CACM,
volume = "54",
number = "4",
pages = "13--15",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924427",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:ESA,
author = "Kirk L. Kroeker",
title = "Engineering sensation in artificial limbs",
journal = j-CACM,
volume = "54",
number = "4",
pages = "16--18",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924428",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:SGV,
author = "Samuel Greengard",
title = "Social games, virtual goods",
journal = j-CACM,
volume = "54",
number = "4",
pages = "19--22",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924429",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Underwood:2011:BCS,
author = "Sarah Underwood",
title = "{British} computer scientists reboot",
journal = j-CACM,
volume = "54",
number = "4",
pages = "23--23",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924430",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Niederman:2011:MGI,
author = "Fred Niederman and Felix B. Tan",
title = "Managing global {IT} teams: considering cultural
dynamics",
journal = j-CACM,
volume = "54",
number = "4",
pages = "24--27",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924431",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ensmenger:2011:BCA,
author = "Nathan Ensmenger",
title = "Building castles in the air",
journal = j-CACM,
volume = "54",
number = "4",
pages = "28--30",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924432",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2011:PWC,
author = "Michael A. Cusumano",
title = "Platform wars come to social media",
journal = j-CACM,
volume = "54",
number = "4",
pages = "31--33",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924433",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2011:CB,
author = "George V. Neville-Neil",
title = "Coder's block",
journal = j-CACM,
volume = "54",
number = "4",
pages = "34--35",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924434",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gomez-Barroso:2011:ASN,
author = "Jos{\'e} Luis G{\'o}mez-Barroso and Claudio
Feij{\'o}o",
title = "Asymmetries and shortages of the network neutrality
principle",
journal = j-CACM,
volume = "54",
number = "4",
pages = "36--37",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924435",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Parri:2011:RCP,
author = "Jonathan Parri and Daniel Shapiro and Miodrag Bolic
and Voicu Groza",
title = "Returning control to the programmer: {SIMD} intrinsics
for virtual machines",
journal = j-CACM,
volume = "54",
number = "4",
pages = "38--43",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924437",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Limoncelli:2011:SSI,
author = "Thomas A. Limoncelli and Vinton G. Cerf",
title = "Successful strategies for {IPv6} rollouts: {Really}",
journal = j-CACM,
volume = "54",
number = "4",
pages = "44--48",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924438",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Meijer:2011:CRM,
author = "Erik Meijer and Gavin Bierman",
title = "A co-relational model of data for large shared data
banks",
journal = j-CACM,
volume = "54",
number = "4",
pages = "49--58",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924436",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Agrawala:2011:DPV,
author = "Maneesh Agrawala and Wilmot Li and Floraine
Berthouzoz",
title = "Design principles for visual communication",
journal = j-CACM,
volume = "54",
number = "4",
pages = "60--69",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924439",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dragojevik:2011:WSC,
author = "Aleksandar Dragojevik and Pascal Felber and Vincent
Gramoli and Rachid Guerraoui",
title = "Why {STM} can be more than a research toy",
journal = j-CACM,
volume = "54",
number = "4",
pages = "70--77",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924440",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tang:2011:RDR,
author = "John C. Tang and Manuel Cebrian and Nicklaus A.
Giacobe and Hyun-Woo Kim and Taemie Kim and Douglas
``Beaker'' Wickert",
title = "Reflecting on the {DARPA Red Balloon Challenge}",
journal = j-CACM,
volume = "54",
number = "4",
pages = "78--85",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924441",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Doan:2011:CSW,
author = "Anhai Doan and Raghu Ramakrishnan and Alon Y.
Halevy",
title = "Crowdsourcing systems on the {World-Wide Web}",
journal = j-CACM,
volume = "54",
number = "4",
pages = "86--96",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924442",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Berry:2011:LIS,
author = "Daniel M. Berry",
title = "Liability issues in software engineering: technical
perspective",
journal = j-CACM,
volume = "54",
number = "4",
pages = "98--98",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924443",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{LeMetayer:2011:LIS,
author = "Daniel {Le M{\'e}tayer} and Manuel Maarek and Eduardo
Mazza and Marie-Laure Potet and St{\'e}phane Fr{\'e}not
and Val{\'e}rie Viet Triem Tong and Nicolas Craipeau
and Ronan Hardouin",
title = "Liability issues in software engineering: the use of
formal methods to reduce legal uncertainties",
journal = j-CACM,
volume = "54",
number = "4",
pages = "99--106",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924444",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sudan:2011:PHS,
author = "Madhu Sudan",
title = "Patterns hidden from simple algorithms: technical
perspective",
journal = j-CACM,
volume = "54",
number = "4",
pages = "107--107",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924445",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Braverman:2011:PLI,
author = "Mark Braverman",
title = "Poly-logarithmic independence fools bounded-depth
{Boolean} circuits",
journal = j-CACM,
volume = "54",
number = "4",
pages = "108--115",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924446",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:LBQa,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: The Chief Computer",
journal = j-CACM,
volume = "54",
number = "4",
pages = "120--ff",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924447",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Kelly Gotlieb recalls the early days of computer
science in Canada.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Morreale:2011:RFC,
author = "Patricia Morreale and David Joiner",
title = "Reaching future computer scientists",
journal = j-CACM,
volume = "54",
number = "4",
pages = "121--124",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924448",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Majchrzak:2011:EWR,
author = "Ann Majchrzak and Philip H. B. More",
title = "Emergency! {Web 2.0} to the rescue!",
journal = j-CACM,
volume = "54",
number = "4",
pages = "125--132",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924449",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Grossman:2011:RDC,
author = "Fred Grossman and Charles Tappert and Joe Bergin and
Susan M. Merritt",
title = "A research doctorate for computing professionals",
journal = j-CACM,
volume = "54",
number = "4",
pages = "133--141",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924450",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Canfora:2011:ACS,
author = "Gerardo Canfora and Massimiliano {Di Penta} and Luigi
Cerulo",
title = "Achievements and challenges in software reverse
engineering",
journal = j-CACM,
volume = "54",
number = "4",
pages = "142--151",
month = apr,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1924421.1924451",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Mar 24 13:48:13 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:TSC,
author = "Moshe Y. Vardi",
title = "Technology has social consequences",
journal = j-CACM,
volume = "54",
number = "5",
pages = "5--5",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941488",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:PPS,
author = "{CACM Staff}",
title = "Preserve privacy in statistical correlations",
journal = j-CACM,
volume = "54",
number = "5",
pages = "6--7",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941489",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEd,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "5",
pages = "9--9",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941490",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2011:SDW,
author = "Michael Stonebraker",
title = "{Stonebraker} on data warehouses",
journal = j-CACM,
volume = "54",
number = "5",
pages = "10--11",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941491",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:LAH,
author = "Scott E. Delman",
title = "Let {ACM} help you find your next job `online'",
journal = j-CACM,
volume = "54",
number = "5",
pages = "12--12",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941492",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2011:STP,
author = "Neil Savage",
title = "Sorting through photos",
journal = j-CACM,
volume = "54",
number = "5",
pages = "13--15",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941493",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2011:DR,
author = "Gregory Goth",
title = "{I}, domestic robot",
journal = j-CACM,
volume = "54",
number = "5",
pages = "16--17",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941494",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:DOD,
author = "Leah Hoffmann",
title = "Data optimization in developing nations",
journal = j-CACM,
volume = "54",
number = "5",
pages = "18--20",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941495",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2011:DEM,
author = "Marina Krakovsky",
title = "Deus ex machina",
journal = j-CACM,
volume = "54",
number = "5",
pages = "22--22",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941496",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2011:WSM,
author = "Alex Wright",
title = "{Web} science meets network science",
journal = j-CACM,
volume = "54",
number = "5",
pages = "23--23",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941497",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goldfarb:2011:OAB,
author = "Avi Goldfarb and Catherine E. Tucker",
title = "Online advertising, behavioral targeting, and
privacy",
journal = j-CACM,
volume = "54",
number = "5",
pages = "25--27",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941498",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dorn:2011:RLB,
author = "Brian Dorn",
title = "Reaching learners beyond our hallowed halls",
journal = j-CACM,
volume = "54",
number = "5",
pages = "28--30",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941499",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wu:2011:BLC,
author = "Tim Wu",
title = "{Bell Labs} and centralized innovation",
journal = j-CACM,
volume = "54",
number = "5",
pages = "31--33",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941500",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Fitzpatrick:2011:ISF,
author = "Jason Fitzpatrick",
title = "An interview with {Steve Furber}",
journal = j-CACM,
volume = "54",
number = "5",
pages = "34--39",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941501",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anel:2011:IRC,
author = "Juan A. A{\~n}el",
title = "The importance of reviewing the code",
journal = j-CACM,
volume = "54",
number = "5",
pages = "40--41",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941502",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2011:OSW,
author = "Poul-Henning Kamp",
title = "The one-second war",
journal = j-CACM,
volume = "54",
number = "5",
pages = "44--48",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941505",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Finding a lasting solution to the leap seconds problem
has become increasingly urgent.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "From the second paragraph: ``We're talking about the
abolishment of leap seconds, a crude hack added 40
years ago to paper over the fact that planets make
lousy clocks compared with quantum mechanical
phenomena.''",
}
@Article{Charland:2011:MAD,
author = "Andre Charland and Brian Leroux",
title = "Mobile application development: {Web} vs. native",
journal = j-CACM,
volume = "54",
number = "5",
pages = "49--53",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941504",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McKenzie:2011:WMA,
author = "Patrick McKenzie",
title = "Weapons of mass assignment",
journal = j-CACM,
volume = "54",
number = "5",
pages = "54--59",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941503",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McFarland:2011:BCI,
author = "Dennis J. McFarland and Jonathan R. Wolpaw",
title = "Brain-computer interfaces for communication and
control",
journal = j-CACM,
volume = "54",
number = "5",
pages = "60--66",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941506",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Borkar:2011:FM,
author = "Shekhar Borkar and Andrew A. Chien",
title = "The future of microprocessors",
journal = j-CACM,
volume = "54",
number = "5",
pages = "67--77",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941507",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Energy efficiency is the new fundamental limiter of
processor performance, way beyond numbers of
processors.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "This is an excellent survey of the computer-industry
past, present, and future evolution of transistor
densities, energy consumption, clock speeds, memory
speeds and capacity, and processor performance.",
}
@Article{Afanasyev:2011:PPN,
author = "Mikhail Afanasyev and Tadayoshi Kohno and Justin Ma
and Nick Murphy and Stefan Savage and Alex C. Snoeren
and Geoffrey M. Voelker",
title = "Privacy-preserving network forensics",
journal = j-CACM,
volume = "54",
number = "5",
pages = "78--87",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941508",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Privacy-preserving attribution of IP packets can help
balance forensics with an individual's right to
privacy.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "cryptography; digital signatures; fingerprints; Intel
Processor Serial Number (PSN) (1999); privacy",
}
@Article{Cook:2011:PPT,
author = "Byron Cook and Andreas Podelski and Andrey
Rybalchenko",
title = "Proving program termination",
journal = j-CACM,
volume = "54",
number = "5",
pages = "88--98",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941509",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "In contrast to popular belief, proving termination is
not always impossible.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "A large number of articles that have been published
about Turing's 1938 program-termination problem (or
uniform halting problem, or Entscheidungsproblem
(decision problem)) and are absent from this
bibliography. This paper is a recent one with many
references to important earlier work, and points out
that the problem is often misunderstood. The authors
comment ``Unfortunately, many have drawn too strong of
a conclusion about the prospects of automatic program
termination proving and falsely believe we are always
unable to prove termination, rather than more benign
consequence that we are unable to always prove
termination.''",
}
@Article{Parkes:2011:CFP,
author = "David C. Parkes",
title = "Complex financial products: caveat emptor: technical
perspective",
journal = j-CACM,
volume = "54",
number = "5",
pages = "100--100",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941510",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Arora:2011:CCI,
author = "Sanjeev Arora and Boaz Barak and Markus Brunnermeier
and Rong Ge",
title = "Computational complexity and information asymmetry in
financial products",
journal = j-CACM,
volume = "54",
number = "5",
pages = "101--107",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941511",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sapiro:2011:IEL,
author = "Guillermo Sapiro",
title = "Images everywhere: looking for models: technical
perspective",
journal = j-CACM,
volume = "54",
number = "5",
pages = "108--108",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941512",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Buades:2011:SSB,
author = "Antoni Buades and Bartomeu Coll and Jean-Michel
Morel",
title = "Self-similarity-based image denoising",
journal = j-CACM,
volume = "54",
number = "5",
pages = "109--117",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941513",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPc,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Games, Roles, Turns",
journal = j-CACM,
volume = "54",
number = "5",
pages = "120--120",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941514",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dhar:2011:CBM,
author = "Subhankar Dhar and Upkar Varshney",
title = "Challenges and business models for mobile
location-based services and advertising",
journal = j-CACM,
volume = "54",
number = "5",
pages = "121--128",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941515",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schryen:2011:OSS,
author = "Guido Schryen",
title = "Is open source security a myth?",
journal = j-CACM,
volume = "54",
number = "5",
pages = "130--140",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941516",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "What does vulnerability and patch data say?",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wainer:2011:IWS,
author = "Jacques Wainer and Cleo Billa and Siome Goldenstein",
title = "Invisible work in standard bibliometric evaluation of
computer science",
journal = j-CACM,
volume = "54",
number = "5",
pages = "141--146",
month = may,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1941487.1941517",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Apr 25 18:29:06 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Narayanan:2011:CI,
author = "P. J. Narayanan and Anand Deshpanda",
title = "Computing and {India}",
journal = j-CACM,
volume = "54",
number = "6",
pages = "5--5",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953123",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:WCO,
author = "{CACM Staff}",
title = "Why concurrent objects are recurrently complicated",
journal = j-CACM,
volume = "54",
number = "6",
pages = "6--6",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953124",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEe,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "6",
pages = "7--7",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953125",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Reed:2011:SDR,
author = "Daniel Reed and Mark Guzdial and Judy Robertson",
title = "Simple design; research vs. teaching; and quest to
learn",
journal = j-CACM,
volume = "54",
number = "6",
pages = "8--9",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953126",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:SIV,
author = "Scott E. Delman",
title = "Say it with video",
journal = j-CACM,
volume = "54",
number = "6",
pages = "10--10",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953127",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:BIN,
author = "Kirk L. Kroeker",
title = "Biology-inspired networking",
journal = j-CACM,
volume = "54",
number = "6",
pages = "11--13",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953128",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2011:BEL,
author = "Gary Anthes",
title = "Beauty and elegance: {Leslie Valiant} talks about
machine learning, parallel computing, and his quest for
simplicity",
journal = j-CACM,
volume = "54",
number = "6",
pages = "14--15",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953131",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2011:PFD,
author = "Tom Geller",
title = "The promise of flexible displays",
journal = j-CACM,
volume = "54",
number = "6",
pages = "16--18",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953130",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2011:UP,
author = "Gregory Goth",
title = "Unlimited possibilities",
journal = j-CACM,
volume = "54",
number = "6",
pages = "19--19",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953132",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2011:ANT,
author = "Marina Krakovsky",
title = "All the news that's fit for you",
journal = j-CACM,
volume = "54",
number = "6",
pages = "20--21",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953129",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schwartz:2011:IMP,
author = "Ari Schwartz",
title = "Identity management and privacy: a rare opportunity to
get it right",
journal = j-CACM,
volume = "54",
number = "6",
pages = "22--24",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953134",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2011:WWN,
author = "Peter J. Denning and Dennis J. Frailey",
title = "Who are we---now?",
journal = j-CACM,
volume = "54",
number = "6",
pages = "25--27",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953133",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2011:PAT,
author = "Phillip G. Armour",
title = "Practical application of theoretical estimation",
journal = j-CACM,
volume = "54",
number = "6",
pages = "28--30",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953135",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Parnas:2011:RST,
author = "David Lorge Parnas",
title = "The risks of stopping too soon",
journal = j-CACM,
volume = "54",
number = "6",
pages = "31--33",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953136",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2011:TBY,
author = "George V. Neville-Neil",
title = "Think before you fork",
journal = j-CACM,
volume = "54",
number = "6",
pages = "34--35",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953137",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Morrison:2011:CSC,
author = "Clayton T. Morrison and Richard T. Snodgrass",
title = "Computer science can use more science",
journal = j-CACM,
volume = "54",
number = "6",
pages = "36--38",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953139",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Helland:2011:IYT,
author = "Pat Helland",
title = "If you have too much data, then `good enough' is good
enough",
journal = j-CACM,
volume = "54",
number = "6",
pages = "40--47",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953140",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rys:2011:SS,
author = "Michael Rys",
title = "Scalable {SQL}",
journal = j-CACM,
volume = "54",
number = "6",
pages = "48--53",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953141",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hu:2011:DDW,
author = "Qing Hu and Zhengchuan Xu and Tamara Dinev and Hong
Ling",
title = "Does deterrence work in reducing information security
policy abuse by employees?",
journal = j-CACM,
volume = "54",
number = "6",
pages = "54--60",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953142",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Edwards:2011:ASH,
author = "W. Keith Edwards and Rebecca E. Grinter and Ratul
Mahajan and David Wetherall",
title = "Advancing the state of home networking",
journal = j-CACM,
volume = "54",
number = "6",
pages = "62--71",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953143",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2011:RSP,
author = "Michael Stonebraker and Rick Cattell",
title = "10 rules for scalable performance in `simple
operation' datastores",
journal = j-CACM,
volume = "54",
number = "6",
pages = "72--80",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953144",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Barnett:2011:SVS,
author = "Mike Barnett and Manuel F{\"a}hndrich and K. Rustan M.
Leino and Peter M{\"u}ller and Wolfram Schulte and
Herman Venter",
title = "Specification and verification: the {Spec\#}
experience",
journal = j-CACM,
volume = "54",
number = "6",
pages = "81--91",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953145",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Franceschet:2011:PSS,
author = "Massimo Franceschet",
title = "{PageRank}: standing on the shoulders of giants",
journal = j-CACM,
volume = "54",
number = "6",
pages = "92--101",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953146",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kolaitis:2011:QLP,
author = "Phokion G. Kolaitis",
title = "The quest for a logic for polynomial-time computation:
technical perspective",
journal = j-CACM,
volume = "54",
number = "6",
pages = "103--103",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953149",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Grohe:2011:PTQ,
author = "Martin Grohe",
title = "From polynomial time queries to graph structure
theory",
journal = j-CACM,
volume = "54",
number = "6",
pages = "104--112",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953150",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Franklin:2011:DAA,
author = "Michael J. Franklin",
title = "Data analysis at astonishing speed: technical
perspective",
journal = j-CACM,
volume = "54",
number = "6",
pages = "113--13",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953147",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Melnik:2011:DIA,
author = "Sergey Melnik and Andrey Gubarev and Jing Jing Long
and Geoffrey Romer and Shiva Shivakumar and Matt Tolton
and Theo Vassilakis",
title = "{Dremel}: interactive analysis of {Web}-scale
datasets",
journal = j-CACM,
volume = "54",
number = "6",
pages = "114--123",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953148",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPd,
author = "Peter Winkler",
title = "Last Byte: Puzzled: a Lifelong Learner",
journal = j-CACM,
volume = "54",
number = "6",
pages = "126--126",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953151",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:LBQb,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: a Lifelong Learner: {Leslie
Valiant} discusses machine learning, parallel
computing, and computational neuroscience",
journal = j-CACM,
volume = "54",
number = "6",
pages = "128, 127",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953152",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Boldi:2011:VDS,
author = "Paolo Boldi and Francesco Bonchi and Carlos Castillo
and Sebastiano Vigna",
title = "Viscous democracy for social networks",
journal = j-CACM,
volume = "54",
number = "6",
pages = "129--137",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953154",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Mcmanus:2011:WPC,
author = "Denise Mcmanus and Houston Carr and Benjamin Adams",
title = "Wireless on the precipice: {The} 14th century
revisited",
journal = j-CACM,
volume = "54",
number = "6",
pages = "138--143",
month = jun,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1953122.1953155",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Jun 1 18:12:20 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:SU,
author = "Moshe Y. Vardi",
title = "Solving the unsolvable",
journal = j-CACM,
volume = "54",
number = "7",
pages = "5--5",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965725",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:PRY,
author = "{CACM Staff}",
title = "Practical research yields fundamental insight, too",
journal = j-CACM,
volume = "54",
number = "7",
pages = "6--7",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965726",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEf,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "7",
pages = "9--9",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965727",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wing:2011:RPR,
author = "Jeannette M. Wing and Ed H. Chi",
title = "Reviewing peer review",
journal = j-CACM,
volume = "54",
number = "7",
pages = "10--11",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965728",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:AAP,
author = "Scott E. Delman",
title = "{ACM} aggregates publication statistics in the {ACM
Digital Library}",
journal = j-CACM,
volume = "54",
number = "7",
pages = "12--12",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965729",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:WWI,
author = "Kirk L. Kroeker",
title = "Weighing {Watson}'s impact",
journal = j-CACM,
volume = "54",
number = "7",
pages = "13--15",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965730",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2011:AA,
author = "Alex Wright",
title = "Automotive autonomy",
journal = j-CACM,
volume = "54",
number = "7",
pages = "16--18",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965731",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McCafferty:2011:BNS,
author = "Dennis McCafferty",
title = "Brave, new social world",
journal = j-CACM,
volume = "54",
number = "7",
pages = "19--21",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965732",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:AAR,
author = "{CACM Staff}",
title = "{ACM} award recipients",
journal = j-CACM,
volume = "54",
number = "7",
pages = "22--22",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965733",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sako:2011:DPG,
author = "Mari Sako",
title = "Driving power in global supply chains",
journal = j-CACM,
volume = "54",
number = "7",
pages = "23--25",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965734",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Knobel:2011:VD,
author = "Cory Knobel and Geoffrey C. Bowker",
title = "Values in design",
journal = j-CACM,
volume = "54",
number = "7",
pages = "26--28",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965735",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2011:TMC,
author = "Pamela Samuelson",
title = "Too many copyrights?",
journal = j-CACM,
volume = "54",
number = "7",
pages = "29--31",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965736",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ong:2011:SWC,
author = "Maria (Mia) Ong",
title = "The status of women of color in computer science",
journal = j-CACM,
volume = "54",
number = "7",
pages = "32--34",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965737",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ben-Ari:2011:NMA,
author = "Mordechai (Moti) Ben-Ari",
title = "Non-myths about programming",
journal = j-CACM,
volume = "54",
number = "7",
pages = "35--37",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965738",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ierusalimschy:2011:PLT,
author = "Roberto Ierusalimschy and Luiz Henrique {De
Figueiredo} and Waldemar Celes",
title = "Passing a language through the eye of a needle",
journal = j-CACM,
volume = "54",
number = "7",
pages = "38--43",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965739",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ghosh:2011:DU,
author = "Debasish Ghosh",
title = "{DSL} for the uninitiated",
journal = j-CACM,
volume = "54",
number = "7",
pages = "44--50",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965740",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "Domain Specific Languages (DSL)",
}
@Article{Staff:2011:MPD,
author = "{CACM Staff}",
title = "{Microsoft}'s protocol documentation program:
interoperability testing at scale",
journal = j-CACM,
volume = "54",
number = "7",
pages = "51--57",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965741",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Edwards:2011:ACC,
author = "Michael Edwards",
title = "Algorithmic composition: computational thinking in
music",
journal = j-CACM,
volume = "54",
number = "7",
pages = "58--67",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965742",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ball:2011:DSM,
author = "Thomas Ball and Vladimir Levin and Sriram K.
Rajamani",
title = "A decade of software model checking with {SLAM}",
journal = j-CACM,
volume = "54",
number = "7",
pages = "68--76",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965743",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hellerstein:2011:SJG,
author = "Joseph M. Hellerstein and David L. Tennenhouse",
title = "Searching for {Jim Gray}: a technical overview",
journal = j-CACM,
volume = "54",
number = "7",
pages = "77--87",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965744",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wicker:2011:CTQ,
author = "Stephen B. Wicker",
title = "Cellular telephony and the question of privacy",
journal = j-CACM,
volume = "54",
number = "7",
pages = "88--98",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965745",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Barroso:2011:FFA,
author = "Luiz Andr{\'e} Barroso",
title = "{FAWN}: a {Fast Array of Wimpy Nodes}: technical
perspective",
journal = j-CACM,
volume = "54",
number = "7",
pages = "100--100",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965746",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Andersen:2011:FFA,
author = "David G. Andersen and Jason Franklin and Michael
Kaminsky and Amar Phanishayee and Lawrence Tan and
Vijay Vasudevan",
title = "{FAWN}: a {Fast Array of Wimpy Nodes}",
journal = j-CACM,
volume = "54",
number = "7",
pages = "101--109",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965747",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ousterhout:2011:SYE,
author = "John Ousterhout",
title = "Is scale your enemy, or is scale your friend?:
technical perspective",
journal = j-CACM,
volume = "54",
number = "7",
pages = "110--110",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965748",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kinshumann:2011:DVL,
author = "Kinshuman Kinshumann and Kirk Glerum and Steve
Greenberg and Gabriel Aul and Vince Orgovan and Greg
Nichols and David Grant and Gretchen Loihle and Galen
Hunt",
title = "Debugging in the (very) large: ten years of
implementation and experience",
journal = j-CACM,
volume = "54",
number = "7",
pages = "111--116",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965749",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rucker:2011:FT,
author = "Rudy Rucker",
title = "Future tense",
journal = j-CACM,
volume = "54",
number = "7",
pages = "120--ff",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965750",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Ousterhout:2011:CR,
author = "John Ousterhout and Parag Agrawal and David Erickson
and Christos Kozyrakis and Jacob Leverich and David
Mazi{\`e}res and Subhasish Mitra and Aravind Narayanan
and Diego Ongaro and Guru Parulkar and Mendel Rosenblum
and Stephen M. Rumble and Eric Stratmann and Ryan
Stutsman",
title = "The case for {RAMCloud}",
journal = j-CACM,
volume = "54",
number = "7",
pages = "121--130",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965751",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Dasgupta:2011:WMP,
author = "Gargi Dasgupta and Amit Sharma and Akshat Verma and
Anindya Neogi and Ravi Kothari",
title = "Workload management for power efficiency in
virtualized data centers",
journal = j-CACM,
volume = "54",
number = "7",
pages = "131--141",
month = jul,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1965724.1965752",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jun 27 11:10:58 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Reisman:2011:PIC,
author = "Sorel Reisman and Alain Chesnais",
title = "From the {Presidents} of the {IEEE Computer Society}
and {ACM}",
journal = j-CACM,
volume = "54",
number = "8",
pages = "5--5",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978543",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:PDV,
author = "{CACM Staff}",
title = "A policy that deters violation of security policy",
journal = j-CACM,
volume = "54",
number = "8",
pages = "7--7",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978544",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEg,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "8",
pages = "8--8",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978545",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2011:SNE,
author = "Michael Stonebraker",
title = "{Stonebraker} on {NoSQL} and enterprises",
journal = j-CACM,
volume = "54",
number = "8",
pages = "10--11",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978546",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:WYS,
author = "Scott E. Delman",
title = "Why you should be happy to sign in!",
journal = j-CACM,
volume = "54",
number = "8",
pages = "12--12",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978547",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:NBA,
author = "Kirk L. Kroeker",
title = "A new benchmark for artificial intelligence",
journal = j-CACM,
volume = "54",
number = "8",
pages = "13--15",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978548",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2011:SET,
author = "Tom Geller",
title = "Supercomputing's exaflop target",
journal = j-CACM,
volume = "54",
number = "8",
pages = "16--18",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978549",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:LT,
author = "Samuel Greengard",
title = "Life, translated",
journal = j-CACM,
volume = "54",
number = "8",
pages = "19--21",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978550",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cummings:2011:GAW,
author = "Jonathon N. Cummings",
title = "Geography is alive and well in virtual teams",
journal = j-CACM,
volume = "54",
number = "8",
pages = "24--26",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978551",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{DiSalvo:2011:IV,
author = "Betsy DiSalvo and Amy Bruckman",
title = "From interests to values",
journal = j-CACM,
volume = "54",
number = "8",
pages = "27--29",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978552",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bellovin:2011:PSS,
author = "S. M. Bellovin and S. O. Bradner and W. Diffie and S.
Landau and J. Rexford",
title = "Privacy and Security: As simple as possible---but not
more so: An assessment of the {U.S.} government's
{EINSTEIN} project",
journal = j-CACM,
volume = "54",
number = "8",
pages = "30--33",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978553",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
https://www.math.utah.edu/pub/tex/bib/einstein.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
remark = "From the conclusion in the article: ``Electronic
fences protecting critical infrastructure sound good,
but once one examines network architecture more
carefully, EINSTEIN's fit is highly questionable. In
determining how to protect critical infrastructure, one
should keep in mind what Einstein himself was purported
to have said: `Everything should be made as simple as
possible, but no simpler' --- and then develop
solutions accordingly.''",
}
@Article{Neville-Neil:2011:SS,
author = "George V. Neville-Neil",
title = "Storage strife",
journal = j-CACM,
volume = "54",
number = "8",
pages = "34--35",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978554",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Halpern:2011:JCC,
author = "Joseph Y. Halpern and David C. Parkes",
title = "Journals for certification, conferences for rapid
dissemination",
journal = j-CACM,
volume = "54",
number = "8",
pages = "36--38",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978555",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Allman:2011:RPR,
author = "Eric Allman",
title = "The robustness principle reconsidered",
journal = j-CACM,
volume = "54",
number = "8",
pages = "40--45",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978557",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Singh:2011:CP,
author = "Satnam Singh",
title = "Computing without processors",
journal = j-CACM,
volume = "54",
number = "8",
pages = "46--54",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978558",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Eini:2011:PIL,
author = "Oren Eini",
title = "The pain of implementing {LINQ} providers",
journal = j-CACM,
volume = "54",
number = "8",
pages = "55--61",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978556",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Modha:2011:CC,
author = "Dharmendra S. Modha and Rajagopal Ananthanarayanan and
Steven K. Esser and Anthony Ndirango and Anthony
J. Sherbondy and Raghavendra Singh",
title = "Cognitive computing",
journal = j-CACM,
volume = "54",
number = "8",
pages = "62--71",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978559",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cohoon:2011:GCC,
author = "J. McGrath Cohoon and Sergey Nigai and Joseph
``Jofish'' Kaye",
title = "Gender and computing conference papers",
journal = j-CACM,
volume = "54",
number = "8",
pages = "72--80",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978561",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{DeAlfaro:2011:RSO,
author = "Luca {De Alfaro} and Ashutosh Kulshreshtha and Ian Pye
and B. Thomas Adler",
title = "Reputation systems for open collaboration",
journal = j-CACM,
volume = "54",
number = "8",
pages = "81--87",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978560",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chaudhuri:2011:OBI,
author = "Surajit Chaudhuri and Umeshwar Dayal and Vivek
Narasayya",
title = "An overview of business intelligence technology",
journal = j-CACM,
volume = "54",
number = "8",
pages = "88--98",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978562",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Haas:2011:SGS,
author = "Peter J. Haas",
title = "Sketches get sketchier",
journal = j-CACM,
volume = "54",
number = "8",
pages = "100--100",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978565",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Li:2011:TAB,
author = "Ping Li and Arnd Christian K{\"o}nig",
title = "Theory and applications of $b$-bit minwise hashing",
journal = j-CACM,
volume = "54",
number = "8",
pages = "101--109",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978566",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Klemmer:2011:SF,
author = "Scott Klemmer",
title = "Skintroducing the future",
journal = j-CACM,
volume = "54",
number = "8",
pages = "110--110",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978563",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Harrison:2011:SAS,
author = "Chris Harrison and Desney Tan and Dan Morris",
title = "Skinput: appropriating the skin as an interactive
canvas",
journal = j-CACM,
volume = "54",
number = "8",
pages = "111--118",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978564",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPe,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Uncommon Divisors",
journal = j-CACM,
volume = "54",
number = "8",
pages = "120--120",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978567",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "divisibility ($n|m$ means that $n$ divides $m$ without
remainder); Fibonacci numbers",
}
@Article{Wright:2011:SPI,
author = "David Wright",
title = "Should privacy impact assessments be mandatory?",
journal = j-CACM,
volume = "54",
number = "8",
pages = "121--131",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978568",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goel:2011:CCD,
author = "Sanjay Goel",
title = "Cyberwarfare: connecting the dots in cyber
intelligence",
journal = j-CACM,
volume = "54",
number = "8",
pages = "132--140",
month = aug,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1978542.1978569",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Wed Aug 17 15:27:45 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:YTM,
author = "Moshe Y. Vardi",
title = "Are you talking to me?",
journal = j-CACM,
volume = "54",
number = "9",
pages = "5--5",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995377",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:SAP,
author = "{CACM Staff}",
title = "Solved, for all practical purposes",
journal = j-CACM,
volume = "54",
number = "9",
pages = "7--7",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995378",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEh,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "9",
pages = "9--9",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995379",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wing:2011:JMW,
author = "Jeannette M. Wing and Valerie Barr",
title = "{Jeannette M. Wing @ PCAST}; {Barbara Liskov}
keynote",
journal = j-CACM,
volume = "54",
number = "9",
pages = "10--11",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995380",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:BAD,
author = "Kirk L. Kroeker",
title = "A breakthrough in algorithm design",
journal = j-CACM,
volume = "54",
number = "9",
pages = "13--15",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995382",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
keywords = "symmetric diagonally-dominant (SDD) linear system",
}
@Article{Anthes:2011:IMA,
author = "Gary Anthes",
title = "Invasion of the mobile apps",
journal = j-CACM,
volume = "54",
number = "9",
pages = "16--18",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995383",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:MRM,
author = "Samuel Greengard",
title = "In Memoriam: {Robert Morris, 1932--2011}",
journal = j-CACM,
volume = "54",
number = "9",
pages = "17--17",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995383",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Cryptographer and Unix operating system co-creator
Robert Morris died June 26 in Lebanon, NH, at the age
of 78 from complications of dementia. Morris was a
pioneer in developing operating systems and computer
security. He also purportedly played a role in one of
the world's first cyberattacks during the 1991 Persian
Gulf War.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2011:RAM,
author = "Neil Savage",
title = "Remaking {American} medicine",
journal = j-CACM,
volume = "54",
number = "9",
pages = "19--21",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995384",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tushnet:2011:RN,
author = "Rebecca Tushnet",
title = "Remix nation",
journal = j-CACM,
volume = "54",
number = "9",
pages = "22--24",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995385",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Campbell-Kelly:2011:PWW,
author = "Martin Campbell-Kelly",
title = "In praise of {'Wilkes, Wheeler, and Gill'}",
journal = j-CACM,
volume = "54",
number = "9",
pages = "25--27",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995386",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
abstract = "Sixty years ago, in spring 1951, Maurice Wilkes, David
Wheeler, and Stanley Gill produced the first textbook
on programming: The Preparation of Programs for an
Electronic Digital Computer. It was a publication that
spearheaded the software revolution.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Babin:2011:CSR,
author = "Ron Babin and Steve Briggs and Brian Nicholson",
title = "Corporate social responsibility and global {IT}
outsourcing",
journal = j-CACM,
volume = "54",
number = "9",
pages = "28--30",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995387",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2011:MTP,
author = "Peter J. Denning and Ritu Raj",
title = "Managing time, part 2",
journal = j-CACM,
volume = "54",
number = "9",
pages = "31--33",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995388",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shneiderman:2011:RVS,
author = "Ben Shneiderman and Jennifer Preece and Peter
Pirolli",
title = "Realizing the value of social media requires
innovative computing research",
journal = j-CACM,
volume = "54",
number = "9",
pages = "34--37",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995389",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vixie:2011:ABP,
author = "Paul Vixie",
title = "Arrogance in business planning",
journal = j-CACM,
volume = "54",
number = "9",
pages = "38--41",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995392",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2011:MEO,
author = "Poul-Henning Kamp",
title = "The most expensive one-byte mistake",
journal = j-CACM,
volume = "54",
number = "9",
pages = "42--44",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995391",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Creeger:2011:ACR,
author = "Mache Creeger",
title = "{ACM CTO} roundtable on mobile devices in the
enterprise",
journal = j-CACM,
volume = "54",
number = "9",
pages = "45--53",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995390",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lukasik:2011:PUC,
author = "Stephen J. Lukasik",
title = "Protecting users of the cyber commons",
journal = j-CACM,
volume = "54",
number = "9",
pages = "54--61",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995393",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Partridge:2011:RFW,
author = "Craig Partridge",
title = "Realizing the future of wireless data communications",
journal = j-CACM,
volume = "54",
number = "9",
pages = "62--68",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995395",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{DeMoura:2011:SMT,
author = "Leonardo {De Moura} and Nikolaj Bj{\o}rner",
title = "Satisfiability modulo theories: introduction and
applications",
journal = j-CACM,
volume = "54",
number = "9",
pages = "69--77",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995394",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bouyer:2011:QAR,
author = "Patricia Bouyer and Uli Fahrenberg and Kim G. Larsen
and Nicolas Markey",
title = "Quantitative analysis of real-time systems using
priced timed automata",
journal = j-CACM,
volume = "54",
number = "9",
pages = "78--87",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995396",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kruegel:2011:MBE,
author = "Christopher Kruegel",
title = "Making browser extensions secure: technical
perspective",
journal = j-CACM,
volume = "54",
number = "9",
pages = "90--90",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995397",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bandhakavi:2011:VBE,
author = "Sruthi Bandhakavi and Nandit Tiku and Wyatt Pittman
and Samuel T. King and P. Madhusudan and Marianne
Winslett",
title = "Vetting browser extensions for security
vulnerabilities with {VEX}",
journal = j-CACM,
volume = "54",
number = "9",
pages = "91--99",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995398",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Danvy:2011:AAM,
author = "Olivier Danvy and Jan Midtgaard",
title = "Abstracting abstract machines: technical perspective",
journal = j-CACM,
volume = "54",
number = "9",
pages = "100--100",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995399",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{VanHorn:2011:AAM,
author = "David {Van Horn} and Matthew Might",
title = "Abstracting abstract machines: a systematic approach
to higher-order program analysis",
journal = j-CACM,
volume = "54",
number = "9",
pages = "101--109",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995400",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPf,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "54",
number = "9",
pages = "110--110",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995401",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:LBQc,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: Scaling Up",
journal = j-CACM,
volume = "54",
number = "9",
pages = "112--ff",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995402",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tarafdar:2011:CDS,
author = "Monideepa Tarafdar and Qiang Tu and T. S. Ragu-Nathan
and Bhanu S. Ragu-Nathan",
title = "Crossing to the dark side: examining creators,
outcomes, and inhibitors of technostress",
journal = j-CACM,
volume = "54",
number = "9",
pages = "113--120",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995403",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cantor:2011:CIR,
author = "Murray Cantor",
title = "Calculating and improving {ROI} in software and system
programs",
journal = j-CACM,
volume = "54",
number = "9",
pages = "121--130",
month = sep,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/1995376.1995404",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Aug 25 17:24:35 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Boisvert:2011:ACP,
author = "Ronald F. Boisvert and Jack W. Davidson",
title = "{ACM}'s copyright policy",
journal = j-CACM,
volume = "54",
number = "10",
pages = "5--6",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001270",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEi,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "10",
pages = "7--7",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001272",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Reed:2011:IPH,
author = "Daniel Reed and Mark Guzdial",
title = "From idea to product: how schools of education can
help {CS}",
journal = j-CACM,
volume = "54",
number = "10",
pages = "8--9",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001273",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:ATN,
author = "Scott E. Delman",
title = "{ACM TechNews} now available in the {Android Market}",
journal = j-CACM,
volume = "54",
number = "10",
pages = "10--10",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001274",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:IBC,
author = "Kirk L. Kroeker",
title = "Improving brain-computer interfaces",
journal = j-CACM,
volume = "54",
number = "10",
pages = "11--14",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001275",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Geller:2011:SE,
author = "Tom Geller",
title = "Seeing is not enough",
journal = j-CACM,
volume = "54",
number = "10",
pages = "15--16",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001276",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:LDW,
author = "Samuel Greengard",
title = "Living in a digital world",
journal = j-CACM,
volume = "54",
number = "10",
pages = "17--19",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001277",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Krakovsky:2011:S,
author = "Marina Krakovsky",
title = "Success at 16",
journal = j-CACM,
volume = "54",
number = "10",
pages = "20--20",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001278",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2011:PLD,
author = "Michael A. Cusumano",
title = "The platform leader's dilemma",
journal = j-CACM,
volume = "54",
number = "10",
pages = "21--24",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001279",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2011:FSL,
author = "George V. Neville-Neil",
title = "File-system litter",
journal = j-CACM,
volume = "54",
number = "10",
pages = "25--26",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001282",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schurmann:2011:MDD,
author = "Carsten Sch{\"u}rmann",
title = "Modernizing the {Danish} democratic process",
journal = j-CACM,
volume = "54",
number = "10",
pages = "27--29",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001281",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2011:TFS,
author = "Phillip G. Armour",
title = "Testing: failing to succeed",
journal = j-CACM,
volume = "54",
number = "10",
pages = "30--31",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001280",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wallach:2011:RCP,
author = "Dan S. Wallach",
title = "Rebooting the {CS} publication process",
journal = j-CACM,
volume = "54",
number = "10",
pages = "32--35",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001283",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Nikhil:2011:AHS,
author = "Rishiyur S. Nikhil",
title = "Abstraction in hardware system design",
journal = j-CACM,
volume = "54",
number = "10",
pages = "36--44",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001284",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Meijer:2011:WAL,
author = "Erik Meijer",
title = "The world according to {LINQ}",
journal = j-CACM,
volume = "54",
number = "10",
pages = "45--51",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001285",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Andersen:2011:VSC,
author = "B. Scott Andersen and George Romanski",
title = "Verification of safety-critical software",
journal = j-CACM,
volume = "54",
number = "10",
pages = "52--57",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001286",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Arquilla:2011:BBM,
author = "John Arquilla",
title = "From blitzkrieg to bitskrieg: the military encounter
with computers",
journal = j-CACM,
volume = "54",
number = "10",
pages = "58--65",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001287",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cohen:2011:CJ,
author = "Sarah Cohen and James T. Hamilton and Fred Turner",
title = "Computational journalism",
journal = j-CACM,
volume = "54",
number = "10",
pages = "66--71",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001288",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Fisher:2011:BR,
author = "Jasmin Fisher and David Harel and Thomas A.
Henzinger",
title = "Biology as reactivity",
journal = j-CACM,
volume = "54",
number = "10",
pages = "72--82",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001289",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Moore:2011:PED,
author = "Charles Moore",
title = "Power efficiency as the \#1 design constraint:
technical perspective",
journal = j-CACM,
volume = "54",
number = "10",
pages = "84--84",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001290",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hameed:2011:USI,
author = "Rehan Hameed and Wajahat Qadeer and Megan Wachs and
Omid Azizi and Alex Solomatnikov and Benjamin C. Lee
and Stephen Richardson and Christos Kozyrakis and Mark
Horowitz",
title = "Understanding sources of inefficiency in
general-purpose chips",
journal = j-CACM,
volume = "54",
number = "10",
pages = "85--93",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001291",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hinton:2011:BWL,
author = "Geoffrey E. Hinton",
title = "A better way to learn features: technical
perspective",
journal = j-CACM,
volume = "54",
number = "10",
pages = "94--94",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001294",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lee:2011:ULH,
author = "Honglak Lee and Roger Grosse and Rajesh Ranganath and
Andrew Y. Ng",
title = "Unsupervised learning of hierarchical representations
with convolutional deep belief networks",
journal = j-CACM,
volume = "54",
number = "10",
pages = "95--103",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001295",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tomasi:2011:VRT,
author = "Carlo Tomasi",
title = "Visual reconstruction: technical perspective",
journal = j-CACM,
volume = "54",
number = "10",
pages = "104--104",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001292",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Agarwal:2011:BRD,
author = "Sameer Agarwal and Yasutaka Furukawa and Noah Snavely
and Ian Simon and Brian Curless and Steven M. Seitz and
Richard Szeliski",
title = "Building {Rome} in a day",
journal = j-CACM,
volume = "54",
number = "10",
pages = "105--112",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001293",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Baluja:2011:FT,
author = "Shumeet Baluja",
title = "Future tense",
journal = j-CACM,
volume = "54",
number = "10",
pages = "120--ff",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001296",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gayo-Avello:2011:DTS,
author = "Daniel Gayo-Avello",
title = "Don't turn social media into another {`Literary
Digest'} poll",
journal = j-CACM,
volume = "54",
number = "10",
pages = "121--128",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001297",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Xu:2011:CM,
author = "Zhiwei Xu and Guojie Li",
title = "Computing for the masses",
journal = j-CACM,
volume = "54",
number = "10",
pages = "129--137",
month = oct,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2001269.2001298",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Sep 26 16:49:19 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:MP,
author = "Moshe Y. Vardi",
title = "Is {Moore's Party} over?",
journal = j-CACM,
volume = "54",
number = "11",
pages = "5--5",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018397",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:JJ,
author = "{CACM Staff}",
title = "Justice for {Jahromi}",
journal = j-CACM,
volume = "54",
number = "11",
pages = "6--7",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018398",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:VEj,
author = "{CACM Staff}",
title = "In the {Virtual Extension}",
journal = j-CACM,
volume = "54",
number = "11",
pages = "9--9",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018399",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Meyer:2011:SOR,
author = "Bertrand Meyer and Greg Linden",
title = "In support of open reviews: better teaching through
large-scale data mining",
journal = j-CACM,
volume = "54",
number = "11",
pages = "12--13",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018400",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2011:AON,
author = "Scott E. Delman",
title = "{ACM} offers a new approach to self-archiving",
journal = j-CACM,
volume = "54",
number = "11",
pages = "14--14",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018401",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:MCS,
author = "Kirk L. Kroeker",
title = "Modeling chaotic storms",
journal = j-CACM,
volume = "54",
number = "11",
pages = "15--17",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018402",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2011:HC,
author = "Alex Wright",
title = "Hacking cars",
journal = j-CACM,
volume = "54",
number = "11",
pages = "18--19",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018403",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:RB,
author = "Leah Hoffmann",
title = "Risky business",
journal = j-CACM,
volume = "54",
number = "11",
pages = "20--22",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018404",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Tschofenig:2011:SRN,
author = "Hannes Tschofenig",
title = "Security risks in next-generation emergency services",
journal = j-CACM,
volume = "54",
number = "11",
pages = "23--25",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018405",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wallsten:2011:WGM,
author = "Scott Wallsten",
title = "What gets measured gets done",
journal = j-CACM,
volume = "54",
number = "11",
pages = "26--28",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018406",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Samuelson:2011:WGB,
author = "Pamela Samuelson",
title = "Why the {Google} book settlement failed: and what
comes next?",
journal = j-CACM,
volume = "54",
number = "11",
pages = "29--31",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018408",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Davis:2011:WSE,
author = "Michael Davis",
title = "Will software engineering ever be engineering?",
journal = j-CACM,
volume = "54",
number = "11",
pages = "32--34",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018407",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Group:2011:TOF,
author = "SIGCSE Teaching-Oriented Faculty Working Group",
title = "Teaching-oriented faculty at research universities",
journal = j-CACM,
volume = "54",
number = "11",
pages = "35--37",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018409",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Baumann:2011:GDT,
author = "Douglas Baumann and Susanne Hambrusch and Jennifer
Neville",
title = "Gender demographics trends and changes in {U.S.} {CS}
departments",
journal = j-CACM,
volume = "54",
number = "11",
pages = "38--42",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018410",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kamp:2011:SIP,
author = "Poul-Henning Kamp",
title = "The software industry is the problem",
journal = j-CACM,
volume = "54",
number = "11",
pages = "44--47",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018412",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gong:2011:JSA,
author = "Li Gong",
title = "{Java} security architecture revisited",
journal = j-CACM,
volume = "54",
number = "11",
pages = "48--52",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018411",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Minsky:2011:OM,
author = "Yaron Minsky",
title = "{OCaml} for the masses",
journal = j-CACM,
volume = "54",
number = "11",
pages = "53--58",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018413",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hearst:2011:NSU,
author = "Marti A. Hearst",
title = "'Natural' search user interfaces",
journal = j-CACM,
volume = "54",
number = "11",
pages = "60--67",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018414",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Seo:2011:MAA,
author = "DongBack Seo and Albert Boonstra and Marjolein
Offenbeek",
title = "Managing {IS} adoption in ambivalent groups",
journal = j-CACM,
volume = "54",
number = "11",
pages = "68--73",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018416",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kennedy:2011:RFH,
author = "Ken Kennedy and Charles Koelbel and Hans Zima",
title = "The rise and fall of {High Performance Fortran}",
journal = j-CACM,
volume = "54",
number = "11",
pages = "74--82",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018415",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Akyildiz:2011:NNF,
author = "Ian F. Akyildiz and Josep Miquel Jornet and
Massimiliano Pierobon",
title = "Nanonetworks: a new frontier in communications",
journal = j-CACM,
volume = "54",
number = "11",
pages = "84--89",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018417",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lampson:2011:MUC,
author = "Butler Lampson",
title = "Making untrusted code useful: technical perspective",
journal = j-CACM,
volume = "54",
number = "11",
pages = "92--92",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018418",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Zeldovich:2011:MIF,
author = "Nickolai Zeldovich and Silas Boyd-Wickizer and Eddie
Kohler and David Mazi{\`e}res",
title = "Making information flow explicit in {HiStar}",
journal = j-CACM,
volume = "54",
number = "11",
pages = "93--101",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018419",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Freeman:2011:PMT,
author = "William T. Freeman",
title = "A perfect `match': technical perspective",
journal = j-CACM,
volume = "54",
number = "11",
pages = "102--102",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018420",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Barnes:2011:PRM,
author = "Connelly Barnes and Dan B. Goldman and Eli Shechtman
and Adam Finkelstein",
title = "The {PatchMatch} randomized matching algorithm for
image manipulation",
journal = j-CACM,
volume = "54",
number = "11",
pages = "103--110",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018421",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPg,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Distances Between Points on the
Plane",
journal = j-CACM,
volume = "54",
number = "11",
pages = "120--120",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018422",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Garcia-Molina:2011:ISC,
author = "Hector Garcia-Molina and Georgia Koutrika and Aditya
Parameswaran",
title = "Information seeking: convergence of search,
recommendations, and advertising",
journal = j-CACM,
volume = "54",
number = "11",
pages = "121--130",
month = nov,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2018396.2018423",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sun Nov 6 06:54:03 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2011:CH,
author = "Moshe Y. Vardi",
title = "Computing for humans",
journal = j-CACM,
volume = "54",
number = "12",
pages = "5--5",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043175",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:BPQ,
author = "{CACM Staff}",
title = "To boost presentation quality, ask questions",
journal = j-CACM,
volume = "54",
number = "12",
pages = "7--7",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043176",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Langford:2011:CVL,
author = "John Langford and Judy Robertson",
title = "Conferences and video lectures; scientific educational
games",
journal = j-CACM,
volume = "54",
number = "12",
pages = "8--9",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043178",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2011:NER,
author = "{CACM Staff}",
title = "Nominees for elections and report of the {ACM
Nominating Committee}",
journal = j-CACM,
volume = "54",
number = "12",
pages = "10--10",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043179",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kroeker:2011:RMM,
author = "Kirk L. Kroeker",
title = "The rise of molecular machines",
journal = j-CACM,
volume = "54",
number = "12",
pages = "11--13",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043180",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2011:BNW,
author = "Gregory Goth",
title = "Brave {NUI} world",
journal = j-CACM,
volume = "54",
number = "12",
pages = "14--16",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043181",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McCafferty:2011:AVS,
author = "Dennis McCafferty",
title = "Activism vs. slacktivism",
journal = j-CACM,
volume = "54",
number = "12",
pages = "17--19",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043182",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2011:CTH,
author = "Samuel Greengard",
title = "{CSEdWeek} takes hold",
journal = j-CACM,
volume = "54",
number = "12",
pages = "20--20",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043183",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hyman:2011:DR,
author = "Paul Hyman",
title = "{Dennis Ritchie, 1941--2011}",
journal = j-CACM,
volume = "54",
number = "12",
pages = "21--21",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043202",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Lanier:2011:MAM,
author = "Jaron Lanier",
title = "The most ancient marketing",
journal = j-CACM,
volume = "54",
number = "12",
pages = "22--23",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043204",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bell:2011:LDI,
author = "Genevieve Bell",
title = "Life, death, and the {iPad}: cultural symbols and
{Steve Jobs}",
journal = j-CACM,
volume = "54",
number = "12",
pages = "24--25",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043205",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cusumano:2011:LSJ,
author = "Michael A. Cusumano",
title = "The legacy of {Steve Jobs}",
journal = j-CACM,
volume = "54",
number = "12",
pages = "26--28",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043184",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Toyama:2011:THS,
author = "Kentaro Toyama",
title = "On turbocharged, heat-seeking, robotic fishing poles",
journal = j-CACM,
volume = "54",
number = "12",
pages = "29--31",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043185",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2011:DLS,
author = "George V. Neville-Neil",
title = "Debugging on live systems",
journal = j-CACM,
volume = "54",
number = "12",
pages = "32--33",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043186",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Taylor:2011:DTM,
author = "Valerie Taylor and Richard Ladner",
title = "Data trends on minorities and people with disabilities
in computing",
journal = j-CACM,
volume = "54",
number = "12",
pages = "34--37",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043187",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Denning:2011:GP,
author = "Peter J. Denning",
title = "The grounding practice",
journal = j-CACM,
volume = "54",
number = "12",
pages = "38--40",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043188",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bernat:2011:DPR,
author = "Andrew Bernat and Eric Grimson",
title = "Doctoral program rankings for {U.S}. computing
programs: the {National Research Council} strikes out",
journal = j-CACM,
volume = "54",
number = "12",
pages = "41--43",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043203",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Pacheco:2011:PDD,
author = "David Pacheco",
title = "Postmortem debugging in dynamic environments",
journal = j-CACM,
volume = "54",
number = "12",
pages = "44--51",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043189",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Berriman:2011:HWA,
author = "G. Bruce Berriman and Steven L. Groom",
title = "How will astronomy archives survive the data
tsunami?",
journal = j-CACM,
volume = "54",
number = "12",
pages = "52--56",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043190",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Green:2011:CGF,
author = "Robert Green and Henry Ledgard",
title = "Coding guidelines: finding the art in the science",
journal = j-CACM,
volume = "54",
number = "12",
pages = "57--63",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043191",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Moore:2011:VCS,
author = "Brian E. Moore and Saad Ali and Ramin Mehran and
Mubarak Shah",
title = "Visual crowd surveillance through a hydrodynamics
lens",
journal = j-CACM,
volume = "54",
number = "12",
pages = "64--73",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043192",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Sojer:2011:LRA,
author = "Manuel Sojer and Joachim Henkel",
title = "License risks from ad hoc reuse of code from the
{Internet}",
journal = j-CACM,
volume = "54",
number = "12",
pages = "74--81",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043193",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gopalakrishnan:2011:FAM,
author = "Ganesh Gopalakrishnan and Robert M. Kirby and Stephen
Siegel and Rajeev Thakur and William Gropp and Ewing
Lusk and Bronis R. De Supinski and Martin Schulz and
Greg Bronevetsky",
title = "Formal analysis of {MPI}-based parallel programs",
journal = j-CACM,
volume = "54",
number = "12",
pages = "82--91",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043194",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brewka:2011:ASP,
author = "Gerhard Brewka and Thomas Eiter and Miros{\l}aw
Truszczy{\'n}ski",
title = "Answer set programming at a glance",
journal = j-CACM,
volume = "54",
number = "12",
pages = "92--103",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043195",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Leroy:2011:SFT,
author = "Xavier Leroy",
title = "Safety first!: technical perspective",
journal = j-CACM,
volume = "54",
number = "12",
pages = "122--122",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043196",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Yang:2011:SLI,
author = "Jean Yang and Chris Hawblitzel",
title = "Safe to the last instruction: automated verification
of a type-safe operating system",
journal = j-CACM,
volume = "54",
number = "12",
pages = "123--131",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043197",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Shmatikov:2011:APT,
author = "Vitaly Shmatikov",
title = "Anonymity is not privacy: technical perspective",
journal = j-CACM,
volume = "54",
number = "12",
pages = "132--132",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043198",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Backstrom:2011:WAT,
author = "Lars Backstrom and Cynthia Dwork and Jon Kleinberg",
title = "Wherefore art thou {R3579X}?: anonymized social
networks, hidden patterns, and structural
steganography",
journal = j-CACM,
volume = "54",
number = "12",
pages = "133--141",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043199",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Winkler:2011:LBPh,
author = "Peter Winkler",
title = "Last Byte: Puzzled: Solutions and Sources",
journal = j-CACM,
volume = "54",
number = "12",
pages = "142--142",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043200",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoffmann:2011:LBQd,
author = "Leah Hoffmann",
title = "Last Byte: {Q\&A}: Scaling Up: {M. Frans Kaashoek}
talks about multicore computing, security, and
operating system design",
journal = j-CACM,
volume = "54",
number = "12",
pages = "144, 143",
month = dec,
year = "2011",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2043174.2043201",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Nov 29 11:53:53 MST 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vardi:2012:AIP,
author = "Moshe Y. Vardi",
title = "Artificial intelligence: past and future",
journal = j-CACM,
volume = "55",
number = "1",
pages = "5--5",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063177",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2012:SEE,
author = "{CACM Staff}",
title = "Software engineering is engineering",
journal = j-CACM,
volume = "55",
number = "1",
pages = "6--7",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063178",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chesnais:2012:APL,
author = "Alain Chesnais",
title = "{ACM President}'s letter",
journal = j-CACM,
volume = "55",
number = "1",
pages = "8--8",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063206",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Chesnais:2012:AAR,
author = "Alain Chesnais",
title = "{ACM}'s annual report",
journal = j-CACM,
volume = "55",
number = "1",
pages = "9--13",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063179",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Guzdial:2012:UCS,
author = "Mark Guzdial and Bertrand Meyer",
title = "Understanding {CS1} students; defective software",
journal = j-CACM,
volume = "55",
number = "1",
pages = "14--15",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063180",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Delman:2012:EWA,
author = "Scott Delman",
title = "{eBooks} will abound in the {ACM Digital Library}",
journal = j-CACM,
volume = "55",
number = "1",
pages = "16--16",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063181",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Savage:2012:BMT,
author = "Neil Savage",
title = "Better medicine through machine learning",
journal = j-CACM,
volume = "55",
number = "1",
pages = "17--19",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063182",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Anthes:2012:RSP,
author = "Gary Anthes",
title = "Revamping storage performance",
journal = j-CACM,
volume = "55",
number = "1",
pages = "20--22",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063183",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2012:LD,
author = "Samuel Greengard",
title = "Law and disorder",
journal = j-CACM,
volume = "55",
number = "1",
pages = "23--25",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063184",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Underwood:2012:CT,
author = "Sarah Underwood",
title = "Celebration time",
journal = j-CACM,
volume = "55",
number = "1",
pages = "26--26",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063185",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2012:AAP,
author = "Alex Wright",
title = "Analyzing {Apple} products",
journal = j-CACM,
volume = "55",
number = "1",
pages = "27--27",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063186",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hyman:2012:JM,
author = "Paul Hyman",
title = "{John McCarthy}, 1927--2011",
journal = j-CACM,
volume = "55",
number = "1",
pages = "28--29",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063187",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Picker:2012:YYC,
author = "Randal C. Picker",
title = "The yin and yang of copyright and technology",
journal = j-CACM,
volume = "55",
number = "1",
pages = "30--32",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063190",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Armour:2012:DE,
author = "Phillip G. Armour",
title = "The difference engine",
journal = j-CACM,
volume = "55",
number = "1",
pages = "33--34",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063191",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Haigh:2012:IPB,
author = "Thomas Haigh",
title = "The {IBM PC}: from beige box to industry standard",
journal = j-CACM,
volume = "55",
number = "1",
pages = "35--37",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063188",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Olsen:2012:IOU,
author = "Kai A. Olsen and Alessio Malizia",
title = "Interfaces for the ordinary user: can we hide too
much?",
journal = j-CACM,
volume = "55",
number = "1",
pages = "38--40",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063192",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Frana:2012:ISC,
author = "Philip L. Frana",
title = "An interview with {Stephen A. Cook}",
journal = j-CACM,
volume = "55",
number = "1",
pages = "41--46",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063193",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Flatt:2012:CLR,
author = "Matthew Flatt",
title = "Creating languages in {Racket}",
journal = j-CACM,
volume = "55",
number = "1",
pages = "48--56",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063195",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gettys:2012:BDB,
author = "Jim Gettys and Kathleen Nichols",
title = "Bufferbloat: dark buffers in the {Internet}",
journal = j-CACM,
volume = "55",
number = "1",
pages = "57--65",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063196",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Waldspurger:2012:V,
author = "Carl Waldspurger and Mendel Rosenblum",
title = "{I/O} virtualization",
journal = j-CACM,
volume = "55",
number = "1",
pages = "66--73",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063194",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hong:2012:SPA,
author = "Jason Hong",
title = "The state of phishing attacks",
journal = j-CACM,
volume = "55",
number = "1",
pages = "74--81",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063197",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Coulson:2012:FEW,
author = "Geoff Coulson and Barry Porter and Ioannis
Chatzigiannakis and Christos Koninis and Stefan Fischer
and Dennis Pfisterer and Daniel Bimschas and Torsten
Braun and Philipp Hurni and Markus Anwander and Gerald
Wagenknecht and S{\'a}ndor P. Fekete and Alexander
Kr{\"o}ller and Tobias Baumgartner",
title = "Flexible experimentation in wireless sensor networks",
journal = j-CACM,
volume = "55",
number = "1",
pages = "82--90",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063198",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Laih:2012:LTC,
author = "Chi-Sung Laih and Shang-Ming Jen and Chia-Yu Lu",
title = "Long-term confidentiality of {PKI}",
journal = j-CACM,
volume = "55",
number = "1",
pages = "91--95",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063199",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Manduchi:2012:CVS,
author = "Roberto Manduchi and James Coughlan",
title = "(Computer) vision without sight",
journal = j-CACM,
volume = "55",
number = "1",
pages = "96--104",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063200",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Durand:2012:WDP,
author = "Fr{\'e}do Durand",
title = "Where do people draw lines?: technical perspective",
journal = j-CACM,
volume = "55",
number = "1",
pages = "106--106",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063201",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cole:2012:WDP,
author = "Forrester Cole and Aleksey Golovinskiy and Alex
Limpaecher and Heather Stoddart Barros and Adam
Finkelstein and Thomas Funkhouser and Szymon
Rusinkiewicz",
title = "Where do people draw lines?",
journal = j-CACM,
volume = "55",
number = "1",
pages = "107--115",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063202",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kurose:2012:CCN,
author = "Jim Kurose",
title = "Content-centric networking: technical perspective",
journal = j-CACM,
volume = "55",
number = "1",
pages = "116--116",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063203",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Jacobson:2012:NNC,
author = "Van Jacobson and Diana K. Smetters and James D.
Thornton and Michael Plass and Nick Briggs and Rebecca
Braynard",
title = "Networking named content",
journal = j-CACM,
volume = "55",
number = "1",
pages = "117--124",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063204",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wilson:2012:FT,
author = "Daniel H. Wilson",
title = "Future tense",
journal = j-CACM,
volume = "55",
number = "1",
pages = "136--ff",
month = jan,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2063176.2063205",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jan 5 12:17:32 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Gagliardi:2012:RAE,
author = "Fabrizio Gagliardi",
title = "Revisiting {ACM Europe}",
journal = j-CACM,
volume = "55",
number = "2",
pages = "5--5",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076451",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Brooke:2012:LCN,
author = "Phil Brooke and Vladik Kreinovich",
title = "Letters: Credit non-anonymous reviewers with a name",
journal = j-CACM,
volume = "55",
number = "2",
pages = "6--7",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Paulson:2012:LWL,
author = "Lawrence C. Paulson and Poul-Henning Kamp",
title = "Letters: What Liability for Faulty Software?",
journal = j-CACM,
volume = "55",
number = "2",
pages = "6--7",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Joyner:2012:LSJ,
author = "Ian Joyner",
title = "Letters: The {[Steve] Jobs} Factor",
journal = j-CACM,
volume = "55",
number = "2",
pages = "6--7",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Schau:2012:LGM,
author = "August Schau and Charles H. Lindsey",
title = "Letters: Give Me Competent Communication",
journal = j-CACM,
volume = "55",
number = "2",
pages = "6--7",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076452",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Stonebraker:2012:RBD,
author = "Michael Stonebraker and Jason Hong",
title = "Researchers' big data crisis; understanding design and
functionality",
journal = j-CACM,
volume = "55",
number = "2",
pages = "10--11",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076453",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Goth:2012:SBS,
author = "Gregory Goth",
title = "The science of better science",
journal = j-CACM,
volume = "55",
number = "2",
pages = "13--15",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076455",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Greengard:2012:WAB,
author = "Samuel Greengard",
title = "The war against botnets",
journal = j-CACM,
volume = "55",
number = "2",
pages = "16--18",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076456",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Wright:2012:SLR,
author = "Alex Wright",
title = "The social life of robots",
journal = j-CACM,
volume = "55",
number = "2",
pages = "19--21",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076457",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Staff:2012:AFI,
author = "{CACM Staff}",
title = "{ACM Fellows} inducted",
journal = j-CACM,
volume = "55",
number = "2",
pages = "23--23",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076476",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Rosston:2012:IA,
author = "Gregory Rosston",
title = "Incentive auctions",
journal = j-CACM,
volume = "55",
number = "2",
pages = "24--26",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076458",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Simon:2012:PIT,
author = "Beth Simon and Quintin Cutts",
title = "Peer instruction: a teaching method to foster deep
understanding",
journal = j-CACM,
volume = "55",
number = "2",
pages = "27--29",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076459",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Norman:2012:YAT,
author = "Donald A. Norman",
title = "Yet another technology cusp: confusion, vendor wars,
and opportunities",
journal = j-CACM,
volume = "55",
number = "2",
pages = "30--32",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076460",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Neville-Neil:2012:WAD,
author = "George V. Neville-Neil",
title = "Wanton acts of debuggery",
journal = j-CACM,
volume = "55",
number = "2",
pages = "33--34",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076461",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{McDermott:2012:ES,
author = "Rose McDermott",
title = "Emotion and security",
journal = j-CACM,
volume = "55",
number = "2",
pages = "35--37",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076462",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Zelkowitz:2012:WWL,
author = "Marvin V. Zelkowitz",
title = "What have we learned about software engineering?",
journal = j-CACM,
volume = "55",
number = "2",
pages = "38--39",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076463",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Cerf:2012:BWW,
author = "Vint Cerf and Van Jacobson and Nick Weaver and Jim
Gettys",
title = "{BufferBloat}: what's wrong with the {Internet}?",
journal = j-CACM,
volume = "55",
number = "2",
pages = "40--47",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076464",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Boehm:2012:YDK,
author = "Hans-J. Boehm and Sarita V. Adve",
title = "You don't know jack about shared variables or memory
models",
journal = j-CACM,
volume = "55",
number = "2",
pages = "48--54",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076465",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Oliner:2012:ACL,
author = "Adam Oliner and Archana Ganapathi and Wei Xu",
title = "Advances and challenges in log analysis",
journal = j-CACM,
volume = "55",
number = "2",
pages = "55--61",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076466",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Evangelopoulos:2012:TMV,
author = "Nicholas Evangelopoulos and Lucian Visinescu",
title = "Text-mining the voice of the people",
journal = j-CACM,
volume = "55",
number = "2",
pages = "62--69",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076467",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Hoos:2012:PO,
author = "Holger H. Hoos",
title = "Programming by optimization",
journal = j-CACM,
volume = "55",
number = "2",
pages = "70--80",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076469",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Allen:2012:SSD,
author = "Bryce Allen and John Bresnahan and Lisa Childers and
Ian Foster and Gopi Kandaswamy and Raj Kettimuthu and
Jack Kordas and Mike Link and Stuart Martin and Karl
Pickett and Steven Tuecke",
title = "Software as a service for data scientists",
journal = j-CACM,
volume = "55",
number = "2",
pages = "81--88",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076468",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Faezipour:2012:PCI,
author = "Miad Faezipour and Mehrdad Nourani and Adnan Saeed and
Sateesh Addepalli",
title = "Progress and challenges in intelligent vehicle area
networks",
journal = j-CACM,
volume = "55",
number = "2",
pages = "90--100",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076470",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Bodik:2012:CWH,
author = "Rastislav Bodik",
title = "Compiling what to how: technical perspective",
journal = j-CACM,
volume = "55",
number = "2",
pages = "102--102",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076471",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kuncak:2012:SSP,
author = "Viktor Kuncak and Mika{\"e}l Mayer and Ruzica Piskac
and Philippe Suter",
title = "Software synthesis procedures",
journal = j-CACM,
volume = "55",
number = "2",
pages = "103--111",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076472",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Vempala:2012:MHD,
author = "Santosh S. Vempala",
title = "Modeling high-dimensional data: technical
perspective",
journal = j-CACM,
volume = "55",
number = "2",
pages = "112--112",
month = feb,
year = "2012",
CODEN = "CACMA2",
DOI = "https://doi.org/10.1145/2076450.2076473",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 4 16:05:55 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "https://dl.acm.org/loi/cacm",
}
@Article{Kalai:2012:DG,
author = "Adam Tauman Kalai and Ankur Moitra and Gregory
Valiant",
title = "Disentangling {Gaussians}",
journal = j-CACM,
volume = "55",
number = "2",
pages = "113--120",
month = feb,
year =