communications of the acm
Departments
5 Tapia Conference Letter
Diverse Connections
By David A. Patterson
6 Letters To The Editor
Science Has Four Legs
9 In the Virtual Extension
News
13 The Eyes Have It
Eye-tracking control for mobile
phones might lead to a new era
of context-aware user interfaces.
By Gregory Goth
Viewpoints
24 Emerging Markets
The Coming African Tsunami
of Information Insecurity
As the affordability and use of
mobile phones in Africa increase, so
too will security vulnerabilities.
By Seymour Goodman
and Andrew Harris
10 BLOG@CACM
Security Advice; Malvertisements;
and CS Education in Qatar
Greg Linden discusses security
advice and the cost of user effort;
Jason Hong considers the increase
in malvertisements; and Mark
Guzdial writes about gender
and CS education in Qatar.
28 Historical Reflections
IBM’s Single-Processor
Supercomputer Efforts
Insights on the pioneering IBM
Stretch and ACS projects.
By Mark Smotherman and Dag Spicer
12 CACM Online
School Grades Need Improvement
By David Roman
31 Broadening Participation
The Role of Hispanic-Serving
Institutions in Contributing
to an Educated Work Force
Improving inclusiveness in
computing education.
By Ann Quiroz Gates
29 Calendar
111 Careers
16 Topic Models Vs. Unstructured Data
With topic modeling, scientists
can explore and understand huge
collections of unlabeled information.
By Gary Anthes
Last Byte
126 Puzzled
Solutions and Sources
By Peter Winkler
19 CSEd Week Expands Its Reach
The second Computer Science
Education Week is showing
students, parents, and educators
why computer science is important.
By Marina Krakovsky
34 The Profession of IT
The Long Quest for Universal
Information Access
Digital object repositories are on the
cusp of resolving the long-standing
problem of universal information
access in the Internet.
By Peter J. Denning and Robert E. Kahn
128 Future Tense
Rebirth of Worlds
Build a digital library of pioneering
virtual worlds as a living laboratory
of history and social science.
By Rumilisoun
20 The New Face of War
With the introduction of the
sophisticated Stuxnet worm,
the stakes of cyberwarfare
have increased immeasurably.
By Samuel Greengard
37 Kode Vicious
Literate Coding
Spelling and grammar do matter.
By George V. Neville-Neil
23 A Matter of Privacy
Do consumers have enough control
over their personal information
or is more government regulation
needed?
By David Lindley
Association for Computing Machinery
Advancing Computing as a Science & Profession
39 Viewpoint
We Need a Research Data Census
The increasing volume of research
data highlights the need for reliable,
cost-effective data storage and
preservation at the national scale.
By Francine Berman
photograph by jalani morgan
The Role of Conference
Publications in CS
A bibliometric view of conference
proceedings and journals.
By Massimo Franceschet