Collaboration With a Robotic Scrub Nurse
Mithun George Jacob, Yu-Ting Li, George A. Akingba, Juan P. Wachs
Surgeons use hand gestures and/or voice commands without interrupting the natural flow of a procedure.
Strategies for Tomorrow's 'Winners-Take-Some' Digital Goods Markets
Chris F. Kemerer, Charles Zhechao Liu, Michael D. Smith
Markets characterized by multiple competing digital standards have room for more than one winner, unlike traditional analog markets...
Why Computer Talents Become Computer Hackers
Zhengchuan Xu, Qing Hu, Chenghong Zhang
Start with talent and skills driven by curiosity and hormones, constrained only by moral values and judgment.
Offline Management in Virtualized Environments
Nishant Thorat, Arvind Raghavendran, Nigel Groves
How to run virtual machines together with physical machines, especially when sharing computational resources.
Exploration and Mapping with Autonomous Robot Teams
Edwin Olson, Johannes Strom, Rob Goeddel, Ryan Morton, Pradeep Ranganathan, Andrew Richardson
The MAGIC 2010 robot competition showed how well multi-robot teams can work with human teams in urban search.
Mobile Social Networking Applications
Nafaâ Jabeur, Sherali Zeadally, Biju Sayed
They deliver the right social service to the right user anytime, anyplace, without divulging personal data.
New Approaches to Security and Availability for Cloud Data
Ari Juels, Alina Oprea
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
The Tail at Scale
Jeffrey Dean, Luiz André Barroso
Software techniques that tolerate latency variability are vital to building responsive large-scale Web services.
Human Mobility Characterization from Cellular Network Data
Richard Becker, Ramón Cáceres, Karrie Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky
Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.
Abstractions for Genomics
Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese
Large genomic databases with interactive access require new, layered abstractions, including separating "evidence" from "inference...
SPDYing Up the Web
Bryce Thomas, Raja Jurdak, Ian Atkinson
Improved performance and a proven deployment strategy make SPDY a potential successor to HTTP.
Moving Beyond the Turing Test
Robert M. French
Computers interacting with, not imitating, humans is the way forward.
Functional Encryption: A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, Brent Waters
Decryption keys allow users to learn a specific function of the encrypted data and nothing else.
Joerg Kurt Wegner, Aaron Sterling, Rajarshi Guha, Andreas Bender, Jean-Loup Faulon, Janna Hastings, Noel O'Boyle, John Overington, Herman Van Vlijmen, Egon Willighagen
Open-source chemistry software and molecular databases broaden the research horizons of drug discovery.
Experiments in Social Computation
Human subjects perform a computationally wide range of tasks from only local, networked interactions.
Internet Voting in the U.S.
Barbara Simons, Douglas W. Jones
Internet voting is unachievable for the foreseeable future and therefore not inevitable. View a video of Barbara Simons entitled...
Success Factors for Deploying Cloud Computing
Gary Garrison, Sanghyun Kim, Robin L. Wakefield
Trust between client organization and cloud provider is a strong predictor of successful cloud deployment.
Self-Adaptive Software Needs Quantitative Verification at Runtime
Radu Calinescu, Carlo Ghezzi, Marta Kwiatkowska, Raffaela Mirandola
Continually verify self-adaptation decisions taken by critical software in response to changes in the operating environment.
To Be or Not To Be Cited in Computer Science
Bjorn De Sutter, Aäron Van Den Oord
Traditional bias toward journals in citation databases diminishes the perceived value of conference papers and their authors.
The Loss of Location Privacy in the Cellular Age
Stephen B. Wicker
How to have the best of location-based services while avoiding the growing threat to personal privacy.
Wil Van Der Aalst
Using real event data to X-ray business processes helps ensure conformance between design and reality.
Large-Scale Complex IT Systems
Ian Sommerville, Dave Cliff, Radu Calinescu, Justin Keen, Tim Kelly, Marta Kwiatkowska, John Mcdermid, Richard Paige
The reductionism behind today's software-engineering methods breaks down in the face of systems complexity.
James Abello, Peter Broadwell, Timothy R. Tangherlini
A searchable meta-graph can connect even troublesome house elves and other supernatural beings to scholarly folk categories.
Why On-Chip Cache Coherence is Here to Stay
Milo M. K. Martin, Mark D. Hill, Daniel J. Sorin
On-chip hardware coherence can scale gracefully as the number of cores increases.
Do Small IT Firms Benefit From Higher Process Capability?
Matthew Swinarski, Diane H. Parente, Rajiv Kishore
Evidence suggests small firms can reap rewards from developing a high level of formal process capability.
Compose "dream tools" from continuously evolving bundles of software to make sense of complex scientific data sets.
An n-Gram Analysis of Communications 2000–2010
Daniel S. Soper, Ofir Turel
Applied to almost 3,500 articles it reveals computing's (and Communications') culture, identity, and evolution.
Sample Size in Usability Studies
Magic numbers are strictly hocus-pocus, so usability studies must test many more subjects than is usually assumed.
Text-Mining the Voice of the People
Nicholas Evangelopoulos, Lucian Visinescu
Statistical techniques help public leaders turn text in unstructured citizen feedback into responsive e-democracy.
Trust Extension for Commodity Computers
A user's trust in a single device can be extended to many other devices.
Social Media Evolution of the Egyptian Revolution
Alok Choudhary, William Hendrix, Kathy Lee, Diana Palsetia, Wei-Keng Liao
Twitter sentiment was revealed, along with popularity of Egypt-related subjects and tweeter influence on the 2011 revolution.
A Comparative Study of Cyberattacks
Seung Hyun Kim, Qiu-Hong Wang, Johannes B. Ullrich
Attackers base themselves in countries of convenience, virtually.
MobiCon: A Mobile Context-Monitoring Platform
Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Seungwoo Kang, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song
User context is defined by data generated through everyday physical activity in sensor-rich, resource-limited mobile environments...
Why Rumors Spread So Quickly in Social Networks
Benjamin Doer, Mahmoud Fouz, Tobias Friedrich
A few hubs with many connections share with many individuals with few connections.
What Agile Teams Think of Agile Principles
Even after almost a dozen years, they still deliver solid guidance for software development teams and their projects.
Programming by Optimization
Holger H. Hoos
Avoid premature commitment, seek design alternatives, and automatically generate performance-optimized software.
Long-Term Confidentiality of PKI
Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu
How to guarantee files encrypted and transmitted today stay confidential for years to come.
Software as a Service for Data Scientists
Bryce Allen, John Bresnahan, Lisa Childers, Ian Foster, Gopi Kandaswamy, Raj Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke
Globus Online manages fire-and-forget file transfers for big-data, high-performance scientific collaborations.
The State of Phishing Attacks
Looking past the systems people use, they target the people using the systems.
Flexible Experimentation in Wireless Sensor Networks
Geoff Coulson, Barry Porter, Ioannis Chatzigiannakis, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner
Virtual testbeds model them by seamlessly integrating physical, simulated, and emulated sensor nodes and radios in real time.
Visual Crowd Surveillance Through a Hydrodynamics Lens
Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah
People in high-density crowds appear to move with the flow of the crowd, like particles in a liquid.
The Rise and Fall of High Performance Fortran
Ken Kennedy, Charles Koelbel, Hans Zima
HPF pioneered a high-level approach to parallel programming but failed to win over a broad user community.
License Risks from Ad Hoc Reuse of Code from the Internet
Manuel Sojer, Joachim Henkel
Software developers' reuse of code from the Internet bears legal and economic risks for their employers.
Formal Analysis of MPI-based Parallel Programs
Ganesh Gopalakrishnan, Robert M. Kirby, Stephen Siegel, Rajeev Thakur, William Gropp, Ewing Lusk, Bronis R. De Supinski, Martin Schulz, Greg Bronevetsky
The goal is reliable parallel simulations, helping scientists understand nature, from how foams compress to how ribosomes construct...
'Natural' Search User Interfaces
Marti A. Hearst
Users will speak rather than type, watch video rather than read, and use technology socially rather than alone.
Sarah Cohen, James T. Hamilton, Fred Turner
How computer scientists can empower journalists, democracy's watchdogs, in the production of news in the public interest.
Don't Turn Social Media Into Another 'Literary Digest' Poll
The power to predict outcomes based on Twitter data is greatly exaggerated, especially for political elections.
Computing for the Masses
Zhiwei Xu, Guojie Li
A new paradigm is needed to cope with the application, technology, and discipline challenges to our computing profession in the...
Managing IS Adoption in Ambivalent Groups
DongBack Seo, Albert Boonstra, Marjolein Offenbeek
Insightful implementers refocus user ambivalence and resistance toward trust and acceptance of new systems.
From Blitzkrieg to Bitskrieg: The Military Encounter with Computers
Expect more cyberwarfare on the conventional battlefield and less against civilian infrastructure . . . assuming containment...
Protecting Users of the Cyber Commons
Stephen J. Lukasik
Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.
Realizing the Future of Wireless Data Communications
Technologies are available to unlock radio spectrum as consumers need it.
Satisfiability Modulo Theories: Introduction and Applications
Leonardo De Moura, Nikolaj Bjørner
Checking the satisfiability of logical formulas, SMT solvers scale orders of magnitude beyond custom ad hoc solvers.
Calculating and Improving ROI in Software and System Programs
The investment value of innovation follows from a technology's uncertain net present value and derived ROI calculations.
Crossing to the Dark Side: Examining Creators, Outcomes, and Inhibitors of Technostress
Monideepa Tarafdar, Qiang Tu, T. S. Ragu-Nathan, Bhanu S. Ragu-Nathan
Exploring the factors that may lead to the inability of professionals to adapt or cope with emerging IS in a healthy manner.
Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony J. Sherbondy, Raghavendra Singh
Unite neuroscience, supercomputing, and nanotechnology to discover, demonstrate, and deliver the brain's core algorithms.
Gender and Computing Conference Papers
J. McGrath Cohoon, Sergey Nigai, Joseph "Jofish" Kaye
Women increasingly publish in ACM conference proceedings and are notably productive authors.
Reputation Systems for Open Collaboration
Luca De Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler
Algorithmic-based user incentives ensure the trustworthiness of evaluations of Wikipedia entries and Google Maps business information...
Algorithmic Composition: Computational Thinking in Music
The composer still composes but also gets to take a programming-enabled journey of musical discovery.
A Decade of Software Model Checking with SLAM
Thomas Ball, Vladimir Levin, Sriram K. Rajamani
SLAM is a program-analysis engine used to check if clients of an API follow the API's stateful usage rules.
Searching for Jim Gray: A Technical Overview
Joseph M. Hellerstein, David L. Tennenhouse
The volunteer search for Jim Gray, lost at sea in 2007, highlights the challenges of computer-aided emergency response.
The Case for RAMCloud
John Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Diego Ongaro, Guru Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman
With scalable high-performance storage entirely in DRAM, RAMCloud will enable a new breed of data-intensive applications.
Should Privacy Impact Assessments Be Mandatory?
Privacy impact assessments should be integrated into the overall approach to risk management with other strategic planning instruments...
Cyberwarfare: Connecting the Dots in Cyber Intelligence
Cyberwarfare is a potent weapon in political conflicts, espionage, and propaganda. Difficult to detect a priori, it is often...
Reflecting on the DARPA Red Balloon Challenge
John C. Tang, Manuel Cebrian, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert
Finding 10 balloons across the U.S. illustrates how the Internet has changed the way we solve highly distributed problems.
Advancing the State of Home Networking
W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall
Before building the network or its components, first understand the home and the behavior of its human inhabitants.
10 Rules for Scalable Performance in Simple Operation' Datastores
Michael Stonebraker, Rick Cattell
Partition data and operations, keep administration simple, do not assume one size fits all.
Specification and Verification: The Spec# Experience
Mike Barnett, Manuel Fähndrich, K. Rustan M. Leino, Peter Müller, Wolfram Schulte, Herman Venter
Can a programming language really help programmers write better programs?
Viscous Democracy for Social Networks
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Sebastiano Vigna
Decision-making procedures in online social networks should reflect participants' political influence within the network.
Wireless on the Precipice: The 14th Century Revisited
Denise Mcmanus, Houston Carr, Benjamin Adams
Business continuity plans for the wireless world must address solar activity.
Is Open Source Security a Myth?
We became accustomed to acquiring software by procuring licenses for a proprietary, immaterial object. However, in recent years...
Brain-Computer Interfaces for Communication and Control
Dennis J. McFarland, Jonathan R. Wolpaw
The brain's electrical signals enable people without muscle control to physically interact with the world.
The Future of Microprocessors
Shekhar Borkar, Andrew A. Chien
Energy efficiency is the new fundamental limiter of processor performance, way beyond numbers of processors.
Privacy-Preserving Network Forensics
Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker
Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.
Challenges and Business Models for Mobile Location-based Services and Advertising
Subhankar Dhar, Upkar Varshney
Mobile advertising will become more pervasive and profitable, but not before addressing key technical and business challenges...
Invisible Work in Standard Bibliometric Evaluation of Computer Science
Jacques Wainer, Cleo Billa, Siome Goldenstein
Most of a computer scientist's production can go uncounted if a standard bibliographic service is used.
Design Principles for Visual Communication
Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz
How to identify, instantiate, and evaluate domain-specific design principles for creating more effective visualizations.
Why STM Can Be More Than A Research Toy
Aleksandar Dragojević, Pascal Felber, Vincent Gramoli, Rachid Guerraoui
Despite earlier claims, Software Transactional Memory outperforms sequential code.
Emergency! Web 2.0 to the Rescue!
Ann Majchrzak, Philip H. B. More
Emergent serendipity fosters volunteerism driven by creative problem solving, not simply following directions.
A Research Doctorate for Computing Professionals
Fred Grossman, Charles Tappert, Joe Bergin, Susan M. Merritt
Looking back on the first decade of the Doctor of Professional Studies in Computing---an ambitious doctoral track for people...
Understanding Scam Victims: Seven Principles for Systems Security
Frank Stajano, Paul Wilson
Effective countermeasures depend on first understanding how users naturally fall victim to fraudsters.
Vision-Based Hand-Gesture Applications
Juan Pablo Wachs, Mathias Kölsch, Helman Stern, Yael Edan
Body posture and finger pointing are a natural modality for human-machine interaction, but first the system must know what it's...
Structured Data on the Web
Michael J. Cafarella, Alon Halevy, Jayant Madhavan
Google's Web Tables and Deep Web Crawler identify and deliver this otherwise inaccessible resource directly to end users.
10 Scientific Problems in Virtual Reality
Virtual Reality was one of the 14 Grand Challenges identified as awaiting engineering solutions for the 21st century announced...
Only if the programmer can prove (through formal machine-checkable proofs) it is free of bugs with respect to a claim of dependability...
Business Impact of Web 2.0 Technologies
Stephen J. Andriole
What do wikis, blogs, podcasts, social networks, virtual worlds, and the rest do for corporate productivity and management?
A Global Collaboration to Deploy Help to China
Ralph Morelli, Chamindra de Silva, Trishan de Lanerolle, Rebecca Curzon, Xin Sheng Mao
A firsthand account of an international team effort to install the Sahana disaster-management system in Chengdu, Sichuan after...
Follow the Intellectual Property
How companies pay programmers when they move jobs and the related IP rights to offshore taxhavens.
Using Simple Abstraction to Reinvent Computing for Parallelism
The ICE abstraction may take CS from serial (single-core) computing to effective parallel (many-core) computing.
On the Move, Wirelessly Connected to the World
Peter Fröhlich, Antti Oulasvirta, Matthias Baldauf, Antti Nurminen
How to experience real-world landmarks through a wave, gaze, location coordinates, or touch, prompting delivery of useful digital...
Opensocial: An Enabler for Social Applications on the Web
Building on the OpenSocial API suite, developers can create applications that are interoperable within the context of different...
The Internet Electorate
R. Kelly Garrett, James N. Danziger
The 2008 U.S. presidential election demonstrated the Internet is a major source of political information and expression.
Governing Web 2.0
Steven De Hertogh, Stijn Viaene, Guido Dedene
Grounding principles to get the most out of enterprise 2.0 investments.
IT 2008: The History of a New Computing Discipline
Barry Lunt, J. Ekstrom, Han Reichgelt, Michael Bailey, Richard Leblanc
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline.
Understanding Throughput-Oriented Architectures
Michael Garland, David B. Kirk
For workloads with abundant parallelism, GPUs deliver higher peak computational throughput than latency-oriented CPUs.
Regulating the Information Gatekeepers
Patrick Vogl, Michael Barrett
Concerns about biased manipulation of search results may require intervention involving government regulation.
Relative Status of Journal and Conference Publications in Computer Science
Jill Freyne, Lorcan Coyle, Barry Smyth, Padraig Cunningham
Though computer scientists agree that conference publications enjoy greater status in computer science than in other disciplines...
Supporting Ubiquitous Location Information in Interworking 3G and Wireless Networks
Massimo Ficco, Roberto Pietrantuono, Stefano Russo
Positioning mobile devices in the third generation of wireless communication networks is crucial to many commercial services....
A Neuromorphic Approach to Computer Vision
Thomas Serre, Tomaso Poggio
Neuroscience is beginning to inspire a new generation of seeing machines.
How Offshoring Affects IT Workers
Prasanna B. Tambe, Lorin M. Hitt
IT jobs requiring interpersonal interaction or physical presence in fixed locations are less likely to be sent out of the country...
Confronting the Myth of Rapid Obsolescence in Computing Research
Dag I. K. Sjøberg
Computing research ages more slowly than research in other scientific disciplines, supporting the call for parity in funding.
The same component isolation that made it effective for large distributed telecom systems makes it effective for multicore CPUs...
The Singularity System
James Larus, Galen Hunt
Safe, modern programming languages let Microsoft rethink the architectural trade-offs in its experimental operating system.
Predicting the Popularity of Online Content
Gabor Szabo, Bernardo A. Huberman
Early patterns of Digg diggs and YouTube views reflect long-term user interest.
Commonsense Understanding of Concurrency: Computing Students and Concert Tickets
Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert McCartney, Kate Sanders, Beth Simon, Tammy VanDeGrift
Innate understanding of concurrency helps beginners solve CS problems with multiple processes executing at the same time.
Computer Graphics for All
Interactive computer graphics would rival word-processing and presentation programs for everyday communications.
Managing Scientific Data
Anastasia Ailamaki, Verena Kantere, Debabrata Dash
Needed are generic, rather than one-off, DBMS solutions automating storage and analysis of data from scientific collaborations...
Conference Paper Selectivity and Impact
Jilin Chen, Joseph A. Konstan
Conference acceptance rate signals future impact of published conference papers.
Beyond Total Capture: A Constructive Critique of Lifelogging
Abigail J. Sellen, Steve Whittaker
Rather than try to capture everything, system design should focus on the psychological basis of human memory.
Student and Faculty Attitudes and Beliefs About Computer Science
Clayton Lewis, Michele H. Jackson, William M. Waite
The curriculum should inspire students to view CS as both accomplishment and intellectual discipline.
Recipe for Efficiency: Principles of Power-Aware Computing
Prior work on power management reflects recurring themes that can be leveraged to make future systems more energy efficient.
Private Information Retrieval
Cryptographic protocols safeguard the privacy of user queries to public databases.
Chasing the AIDS Virus
Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
With no HIV vaccine in sight, virologists need to know how the virus will react to a given combination drug therapy.
Virtual Computing Initiative at a Small Public University
Cameron Seay, Gary Tucker
Student participation and resulting expertise is as valuable as having the high-performance resource itself.
A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World
Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson Engler
How Coverity built a bug-finding tool, and a business, around the unlimited supply of bugs in software systems.
Assessing the Changing U.S. IT R&D Ecosystem
Eric Benhamou, Jon Eisenberg, Randy H. Katz
The National Academy of Sciences recommends what the U.S. government should do to help maintain American IT leadership.
MapReduce and Parallel DBMSs: Friends or Foes?
Michael Stonebraker, Daniel Abadi, David J. DeWitt, Sam Madden, Erik Paulson, Andrew Pavlo, Alexander Rasin
Parallel DBMSs excel at efficient querying of large data sets; MapReduce-style systems excel at complex analytics and ETL tasks...
MapReduce: A Flexible Data Processing Tool
Jeffrey Dean, Sanjay Ghemawat
MapReduce advantages over parallel databases include storage-system independence and fine-grain fault tolerance for large jobs...
The Bulk Multicore Architecture for Improved Programmability
Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic
Easing the programmer's burden does not compromise system performance or increase the complexity of hardware implementation.
Computer Science in the Conceptual Age
University CS departments are incorporating game design and development to prepare their students for the game industry's expectations...
Scratch: Programming for All
Mitchel Resnick, John Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay Silver, Brian Silverman, Yasmin Kafai
"Digital fluency" should mean designing, creating, and remixing, not just browsing, chatting, and interacting.
Why IT Managers Don't Go for Cyber-Insurance Products
Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao
Proposed contracts tend to be overpriced because insurers are unable to anticipate customers' secondary losses.
A View of the Parallel Computing Landscape
Krste Asanovic, Rastislav Bodik, James Demmel, Tony Keaveny, Kurt Keutzer, John Kubiatowicz, Nelson Morgan, David Patterson, Koushik Sen, John Wawrzynek, David Wessel, Katherine Yelick
Writing programs that scale with increasing numbers of cores should be as easy as writing programs for sequential computers....
Automated Support for Managing Feature Requests in Open Forums
Jane Cleland-Huang, Horatiu Dumitru, Chuan Duan, Carlos Castro-Herrera
The result is stable, focused, dynamic discussion threads that avoid redundant ideas and engage thousands of stakeholders.
Sound Index: Charts for the People, By the People
Varun Bhagwan, Tyrone Grandison, Daniel Gruhl
Mining the wisdom of the online crowds generates music business intelligence, identifying what's hot and what's not.
What Intellectual Property Law Should Learn from Software
Software's close encounters with the law provide some lessons for our future.
A Blind Person's Interactions with Technology
Kristen Shinohara, Josh Tenenberg
Meaning can be as important as usability in the design of technology.
Revitalizing Computing Education Through Free and Open Source Software for Humanity
Ralph Morelli, Allen Tucker, Norman Danner, Trishan R. De Lanerolle, Heidi J. C. Ellis, Ozgur Izmirli, Danny Krizanc, Gary Parker
The humanitarian focus of socially useful projects promises to motivate community-minded undergrads in and out of CS.
Steps Toward Self-Aware Networks
Network software adapts to user needs and load variations and failures to provide reliable communications in largely unknown...
The Metropolis Model: A New Logic for Development of Crowdsourced Systems
Rick Kazman, Hong-Mei Chen
It takes a city of developers to build a big system that is never done.
The Claremont Report on Database Research
Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, Anhai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M.
Database research is expanding, with major efforts in system architecture, new languages, cloud services, mobile and virtual...
One Laptop Per Child: Vision vs. Reality
Kenneth L. Kraemer, Jason Dedrick, Prakul Sharma
The vision is being overwhelmed by the reality of business, politics, logistics, and competing interests worldwide.
Spending Moore's Dividend
Multicore computers shift the burden of software performance from chip designers and to software developers. Now the computing...
Computing Needs Time
Edward A. Lee
The passage of time is essential to ensuring the repeatability and predictability of software and networks in cyber-physical...
Database and Information-Retrieval Methods for Knowledge Discovery
Gerhard Weikum, Gjergji Kasneci, Maya Ramanath, Fabian Suchanek
Comprehensive knowledge bases would tap the Web's deepest information sources and relationships to address questions beyond today's...
Roofline: An Insightful Visual Performance Model for Multicore Architectures
Samuel Williams, Andrew Waterman, David Patterson
The Roofline model offers insight on how to improve the performance of multicore microprocessors whose design diversity exacerbates...
Reflecting Human Values in the Digital Age
Abigail Sellen, Yvonne Rogers, Richard Harper, Tom Rodden
HCI experts must broaden the field's scope and adopt new methods to be useful in 21st-century sociotechnical environments.
Statecharts in the Making: A Personal Account
How avionics work led to a graphical language for reactive systems where the diagrams themselves define the system's behavior...
Toward 2W, Beyond Web 2.0
T. V. Raman
2W is a result of the exponentially growing Web building on itself to move from a Web of content to a Web of applications.
Compiler Research: The Next 50 Years
Mary Hall, David Padua, Keshav Pingali
Four recommendations address the major challenges to keeping compilers and high-level languages vibrant.
Engineering Rural Development
Tapan S. Parikh
Information systems enable rural development by increasing the accountability of nongovernmental organizations.
wisePad Services for Vision-, Hearing-, and Speech-Impaired Users
Dawn N. Jutla, Dimitri Kanevsky
The wisePad system is envisioned as a full-service computing platform capable of delivering personalized image, audio, and text...
Got Data? A Guide to Data Preservation in the Information Age: a guide to data preservation in the information age
Tools for surviving a data deluge to ensure your data will be there when you need it.
Ontologies and the Semantic Web
How ontologies provide the semantics, as explained here with the help of Harry Potter and his owl Hedwig.
A Tribute to Jim Gray
Michael Stonebraker, David J. DeWitt
We knew him as both scholar and friend.
Jim Gray, Astronomer
Alexander S. Szalay
How he helped develop the SkyServer, delivering computation directly to terabytes of astronomical data.
The topology of Dark Networks
Jennifer Xu, Hsinchun Chen
Knowing the structure of criminal and terrorist networks could provide the technical insight needed to disrupt their activities...
Crossroads for Canadian CS Enrollment
Jacob Slonim, Sam Scully, Michael McAllister
What should be done to reverse falling CS enrollment in the Canadian education system?
Beyond Keywords: Automated Question Answering on the Web
Dmitri Roussinov, Weiguo Fan, José Robles-Flores
Beyond Google, emerging question-answering systems respond to natural-language queries.
Design and Code Reviews in the Age of the Internet
New collaboration tools allow geographically distributed software-development teams to boost the venerable concept of code review...
Designing Games With a Purpose
Luis von Ahn, Laura Dabbish
Data generated as a side effect of game play also solves computational problems and trains AI algorithms.
Web Science: An Interdisciplinary Approach to Understanding the Web
James Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel Weitzner
The Web must be studied as an entity in its own right to ensure it keeps flourishing and prevent unanticipated social effects...
The Revolution Inside the Box
How changes in computer architecture are about to impact everyone in the IT business.