Communications of the ACM: June 2012 Issue

3 views
Skip to first unread message

Berthin

unread,
Jun 2, 2012, 7:13:25 AM6/2/12
to acm-chap...@googlegroups.com
Communications of the ACM Newsletter – New Digital Edition
June 2012





Communications of the ACM, June 2012 Digital EditionWelcome to the Digital Edition of the June 2012 Communications of the ACM. To access the Digital Edition, please click on the cover image at left or on the link at the top of this email. Also see the Table of Contents at the bottom of this email.
Judea Pearl, winner of the 2011 ACM A.M. Turing Award, is pictured outside his office at UCLA on this month’s cover. Pearl's fundamental contributions to the field of artificial intelligence, and his ruminations on what to do with the award’s $250,000 prize money, are addressed in "Game Changer," by Neil Savage. And Pearl discusses probability and causation in "A Sure Thing," an interview with Leah Hoffman.
 
Also in this issue:
  • "Trust Extension for Commodity Computers," by Bryan Parno, describes techniques to enable users to their trust in one computing device to other devices and services.
  • "The GCT Program Towards the vs. NP Problem," by Ketan D. Mulmuley, presents an overview of geometric complexity theory, an approach to the foundational questions of complexity theory via algebraic geometry and representational theory.
  • Why hasn't increased attention to cybersecurity made today's computer systems more secure?, asks Simson L. Garfinkel in "The Cybersecurity Risk."
  • With the ongoing policy debate about matters of war and peace in cyberspace as a backdrop, Herbert Lin explains "Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy."
I am also very pleased to announce that we will be launching the new Communications of the ACMwebsite early next week using the same URL as the existing site, so please visit the new site atcacm.acm.org after May 29, 2012. This new site was developed with significant input from theCACM Editorial Board and Readership Community, and I would like to thank all who volunteered their time and experience to improve cacm.acm.org for everyone's benefit. Notable changes include a new sophisticated design, improved navigation for latest issues, new and improved discoverability and search tools, including faceted search, improved readability of article-level pages, enhanced sharing functionality for full-text articles, and improved display of video and multi-media content. I hope you will enjoy the new site and please send your feedback to cacmfe...@acm.org !
As always, we welcome and appreciate your thoughts and comments on Communications of the ACM
 
Sincerely,
Scott Delman
Director, Group Publishing
Association for Computing Machinery

Table of Contents
 

USACM and U.S. legislation
Eugene H. Spafford

Pages: 5-5
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Computing professionals sometimes find policy issues ill-defined, confusing, or irrelevant. Perhaps that is why---to date---policy participation has been limited within our community.


DEPARTMENT: Letters to the editor
The halting problem in the clear light of probability
CACM Staff

Pages: 6-7
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

DEPARTMENT: BLOG@CACM
Protecting against data breaches; living with mistakes
Jason Hong, Greg Linden

Pages: 10-11
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter ...


DEPARTMENT: CACM online
Don't throw the baby out with the bathwater
Scott E. Delman

Pages: 12-12
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

COLUMN: News
Analyzing medical data
Gregory Goth

Pages: 13-15
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Electronic patient records contain a treasure trove of data, and researchers are using natural language processing technology to mine the structured data and free text.


Smarter photography
Gary Anthes

Pages: 16-18
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Improvements in camera hardware, image processing, camera-photographer interfaces, and image viewing are advancing the state of the art in digital photography.


Data mining meets city hall
Leah Hoffmann

Pages: 19-21
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Local and national governments are turning to open data to cut their costs, increase transparency and efficiency, and respond to the needs of citizens.


Game changer
Neil Savage

Pages: 22-23
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Judea Pearl's passionate advocacy of the importance of probability and causality helped revolutionize artificial intelligence.


An influential theoretician
Paul Hyman

Pages: 24-24
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Sanjeev Arora, winner of the 2011 ACM-Infosys Award, discusses his pivotal role in theoretical computer science.


COLUMN: The business of software
A measure of control
Phillip G. Armour

Pages: 26-28
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Some limitations on measurements in software.


COLUMN: Inside risks
The cybersecurity risk
Simson L. Garfinkel

Pages: 29-32
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Increased attention to cybersecurity has not resulted in improved cybersecurity.


COLUMN: Kode Vicious
Scale failure
George V. Neville-Neil

Pages: 33-34
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Using a tool for the wrong job is OK until the day when it isn't.


COLUMN: Privacy and security
Security of the internet and the known unknowns
Chris Hall

Pages: 35-37
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Seeking answers to questions about Internet vulnerabilities.


COLUMN: The profession of IT
The myth of the elevator pitch
Peter J. Denning, Nicholas Dew

Pages: 38-40
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Instead of pitching, listen and offer.


COLUMN: Viewpoint
Why computer scientists should care about cyber conflict and U.S. national security policy
Herbert Lin

Pages: 41-43
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Cybersecurity and policy issues for computer scientists.


SECTION: Practice
A guided tour of data-center networking
Dennis Abts, Bob Felderman

Pages: 44-51
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

A good user experience depends on predictable performance within the data-center network.


Modeling people and places with internet photo collections
David Crandall, Noah Snavely

Pages: 52-60
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Understanding the world from the sea of online photos.


Real-time computer vision with OpenCV
Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov

Pages: 61-69
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Mobile computer-vision technology will soon become as ubiquitous as touch interfaces.


SECTION: Contributed articles
Why rumors spread so quickly in social networks
Benjamin Doer, Mahmoud Fouz, Tobias Friedrich

Pages: 70-75
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

A few hubs with many connections share with many individuals with few connections.


Trust extension for commodity computers
Bryan Parno

Pages: 76-85
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

A user's trust in a single device can be extended to many other devices.


SECTION: Review articles
Data services
Michael J. Carey, Nicola Onose, Michalis Petropoulos

Pages: 86-97
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Exploring the technology trends in basic, integrated, and cloud data services.


The GCT program toward the P vs. NP problem
Ketan D. Mulmuley

Pages: 98-107
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Exploring the power and potential of geometric complexity theory.


SECTION: Research highlights
Reconstructing the unknown, balancing structure and uncertainty: technical perspective
Pablo A. Parrilo

Pages: 110-110
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Exact matrix completion via convex optimization
Emmanuel Candès, Benjamin Recht

Pages: 111-119
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Suppose that one observes an incomplete subset of entries selected from a low-rank matrix. When is it possible to complete the matrix and recover the entries that have not been seen? We demonstrate that in very general settings, one can perfectly recover ...


The fox and the hedgehog: technical perspective
Peter Lee

Pages: 120-120
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs
Tiark Rompf, Martin Odersky

Pages: 121-130
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Good software engineering practice demands generalization and abstraction, whereas high performance demands specialization and concretization. These goals are at odds, and compilers can only rarely translate expressive high-level programs to modern hardware ...


COLUMN: Last byte
Puzzled
Peter Winkler

Pages: 133-133
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Last month (May 2012) we posted a trio of brainteasers concerning designs on square grids. Here, we offer solutions to all three. How did you do?


Q&A
Leah Hoffmann

Pages: 136-ff
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Artificial intelligence pioneer Judea Pearl discusses probability, causation, the calculus of intervention, and counterfactuals.


--
Berthin




--
Berthin

Reply all
Reply to author
Forward
0 new messages