|
Dear Rene Huamani:
Best wishes for a happy holiday season and a joyful 2013!
Welcome to the Digital Edition of the January 2013 Communications of the ACM. To access the Digital Edition, please click on the cover image at left or on the link at the top of this email. Also see the Table of Contents at the bottom of this email.
Most people have cellphones, which are increasingly providing researchers with valuable, low-cost footprint data on an unprecedented scale. This month's cover story, "Human Mobility Characterization from Cellular Network Data," by Richard Becker, Ramón Cáceres, Karrie Hanson, Sibren Isaacman, et al., describes work to develop techniques for exploring human mobility using Call Detail Records from cellular networks. The authors show that CDRs offer important insights into the movement patterns of individuals and communities.
Also in this issue:
- "What College Could Be Like," by Salman Khan, explores the possibility of crafting a university experience that bridges the gap between students' expectations, universities' strengths, and employers' needs.
- "Beyond Hadoop," by Gregory Mone, notes how the open source software system continues to evolve. It has made large-scale, cost-efficient machine learning possible, but new approaches with added features are on the rise.
- In "What's a Robot?," Google Vice President and ACM President Vinton G. Cerf posits that the notion of a robot could be expanded to include programs that perform functions, ingest input, and produce output that has a perceptible effect.
- Have browser vendors kept up in protecting users? Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil discuss "Browser Security: Appearances Can Be Deceiving."
Communications is also available through our mobile applications, including the ACM CACM app for Android devices, at bit.ly/QythPc, the ACM CACM app for the iPhone, at bit.ly/HWEAfw, and the ACM CACM HD app for the iPad, at bit.ly/MEa0JR.
We also invite you to visit the Communications website at http://cacm.acm.org, a digital hub of industry news, commentary, observations, and practical research. A version of the site for mobile devices is at http://m.cacm.acm.org.
As always, we welcome your thoughts and comments on Communications. Please forward your feedback to: cacmfe...@acm.org.
Sincerely,
Scott Delman
Director, Group Publishing
Association for Computing Machinery
- Table of Contents
-
- Who begat computing?
- Moshe Y. Vardi
Pages: 5-5 Full text: Html PDF Other formats: Digital Edition
- DEPARTMENT: From the president
- What's a robot?
- Vinton G. Cerf
Pages: 7-7 Full text: Html PDF Other formats: Digital Edition
- DEPARTMENT: Letters to the Editor
- Computer science is not a science
- CACM Staff
Pages: 8-9 Full text: Html PDF Other formats: Digital Edition
- ACM's annual report
- Alain Chesnais
Pages: 11-15 Full text: Html PDF Other formats: Digital Edition
- DEPARTMENT: BLOG@CACM
- Lost in translation
- Daniel Reed
Pages: 16-17 Full text: Html PDF Other formats: Digital Edition
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter ...
- COLUMN: News
- Stopping the leaks
- Neil Savage
Pages: 19-21 Full text: Html PDF Other formats: Digital Edition
Side channels give out information that can be used to crack secrets, but researchers are identifying the holes and trying to close them.
- Beyond Hadoop
- Gregory Mone
Pages: 22-24 Full text: Html PDF Other formats: Digital Edition
The leading open source system for processing big data continues to evolve, but new approaches with added features are on the rise.
- Just the facts
- Marina Krakovsky
Pages: 25-27 Full text: Html PDF Other formats: Digital Edition
In repackaging other companies' news, some news aggregators are diverting readers and ad dollars, and, critics argue, undercutting the incentive to spend money on original reporting. It is an economic and ethical problem without a clear legal fix.
- COLUMN: Technology strategy and management
- The Apple-Samsung lawsuits
- Michael A. Cusumano
Pages: 28-31 Full text: Html PDF Other formats: Digital Edition
In search of a middle ground in the intellectual property wars.
- COLUMN: The business of software
- How we build things: …and why things are 90% complete.
- Phillip G. Armour
Pages: 32-33 Full text: Html PDF Other formats: Digital Edition
- COLUMN: Law and technology
- Beyond location: data security in the 21st century
- Deven Desai
Pages: 34-36 Full text: Html PDF Other formats: Digital Edition
Viewing evolving data security issues as engineering problems to be solved.
- COLUMN: Historical reflections
- Five lessons from really good history
- Thomas Haigh
Pages: 37-40 Full text: Html PDF Other formats: Digital Edition
Lessons learned from four award-winning books on the history of information technology.
- COLUMN: Viewpoint
- What college could be like
- Salman Khan
Pages: 41-43 Full text: Html PDF Other formats: Digital Edition
Imagining an optimized education model.
- Conference-journal hybrids
- Jonathan Grudin, Gloria Mark, John Riedl
Pages: 44-49 Full text: Html PDF Other formats: Digital Edition
Considering how to combine the best elements of conferences and journals.
- SECTION: Practice
- Condos and clouds
- Pat Helland
Pages: 50-59 Full text: Html PDF Other formats: Digital Edition
Constraints in an environment empower the services.
- Browser security: appearances can be deceiving
- CACM Staff
Pages: 60-67 Full text: Html PDF Other formats: Digital Edition
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
- The web won't be safe or secure until we break it
- Jeremiah Grossman
Pages: 68-72 Full text: Html PDF Other formats: Digital Edition
Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.
- SECTION: Contributed articles
- Human mobility characterization from cellular network data
- Richard Becker, Ram243;n C225;ceres, Karrie Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky
Pages: 74-82 Full text: Html PDF Other formats: Digital Edition
Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.
- Abstractions for genomics
- Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese
Pages: 83-93 Full text: Html PDF Other formats: Digital Edition
Large genomic databases with interactive access require new, layered abstractions, including separating "evidence" from "inference."
- SECTION: Review articles
- Computer security and the modern home
- Tamara Denning, Tadayoshi Kohno, Henry M. Levy
Pages: 94-103 Full text: Html PDF Other formats: Digital Edition
A framework for evaluating security risks associated with technologies used at home.
- SECTION: Research highlights
- Visualization, understanding, and design: technical perspective
- Doug DeCarlo, Matthew Stone
Pages: 105-105 Full text: Html PDF Other formats: Digital Edition
- Illustrating how mechanical assemblies work
- Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala
Pages: 106-114 Full text: Html PDF Other formats: Digital Edition
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for generating such visualizations. Starting with a 3D CAD model of an assembly, we first ...
- Finding people in depth: technical perspective
- James M. Rehg
Pages: 115-115 Full text: Html PDF Other formats: Digital Edition
- Real-time human pose recognition in parts from single depth images
- Jamie Shotton, Toby Sharp, Alex Kipman, Andrew Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore
Pages: 116-124 Full text: Html PDF Other formats: Digital Edition
We propose a new method to quickly and accurately predict human pose---the 3D positions of body joints---from a single depth image, without depending on information from preceding frames. Our approach is strongly rooted in current object recognition ...
- COLUMN: Last byte
- Future tense
- Rudy Rucker
Pages: 136-ff Full text: Html PDF Other formats: Digital Edition
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.I self-publish, and you get to sail my aether wave for free.
-
|