Communications of the ACM: January 2013 Issue

24 views
Skip to first unread message

René Huamaní Aguilar

unread,
Jan 2, 2013, 11:41:39 AM1/2/13
to Sociedad Peruana de Computación
Communications of the ACM Newsletter – New Digital Edition
January 2013



Dear Rene Huamani:
Best wishes for a happy holiday season and a joyful 2013!
Communications of the ACM, January 2013 Digital EditionWelcome to the Digital Edition of the January 2013 Communications of the ACM. To access the Digital Edition, please click on the cover image at left or on the link at the top of this email. Also see the Table of Contents at the bottom of this email.
Most people have cellphones, which are increasingly providing researchers with valuable, low-cost footprint data on an unprecedented scale. This month's cover story, "Human Mobility Characterization from Cellular Network Data," by Richard Becker, Ramón Cáceres, Karrie Hanson, Sibren Isaacman, et al., describes work to develop techniques for exploring human mobility using Call Detail Records from cellular networks. The authors show that CDRs offer important insights into the movement patterns of individuals and communities. 
Also in this issue:

  • "What College Could Be Like," by Salman Khan, explores the possibility of crafting a university experience that bridges the gap between students' expectations, universities' strengths, and employers' needs.
  • "Beyond Hadoop," by Gregory Mone, notes how the open source software system continues to evolve. It has made large-scale, cost-efficient machine learning possible, but new approaches with added features are on the rise.
  • In "What's a Robot?," Google Vice President and ACM President Vinton G. Cerf posits that the notion of a robot could be expanded to include programs that perform functions, ingest input, and produce output that has a perceptible effect.
  • Have browser vendors kept up in protecting users? Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil discuss "Browser Security: Appearances Can Be Deceiving."
Communications is also available through our mobile applications, including the ACM CACM app for Android devices, at bit.ly/QythPc, the ACM CACM app for the iPhone, at bit.ly/HWEAfw, and the ACM CACM HD app for the iPad, at bit.ly/MEa0JR.
We also invite you to visit the Communications website at http://cacm.acm.org, a digital hub of industry news, commentary, observations, and practical research. A version of the site for mobile devices is at http://m.cacm.acm.org.
As always, we welcome your thoughts and comments on Communications. Please forward your feedback to: cacmfe...@acm.org.
Sincerely,
Scott Delman
Director, Group Publishing
Association for Computing Machinery

Table of Contents
 

Who begat computing?
Moshe Y. Vardi

Pages: 5-5
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

DEPARTMENT: From the president
What's a robot?
Vinton G. Cerf

Pages: 7-7
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

DEPARTMENT: Letters to the Editor
Computer science is not a science
CACM Staff

Pages: 8-9
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

ACM's annual report
Alain Chesnais

Pages: 11-15
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

DEPARTMENT: BLOG@CACM
Lost in translation
Daniel Reed

Pages: 16-17
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter ...


COLUMN: News
Stopping the leaks
Neil Savage

Pages: 19-21
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Side channels give out information that can be used to crack secrets, but researchers are identifying the holes and trying to close them.


Beyond Hadoop
Gregory Mone

Pages: 22-24
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

The leading open source system for processing big data continues to evolve, but new approaches with added features are on the rise.


Just the facts
Marina Krakovsky

Pages: 25-27
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

In repackaging other companies' news, some news aggregators are diverting readers and ad dollars, and, critics argue, undercutting the incentive to spend money on original reporting. It is an economic and ethical problem without a clear legal fix.


COLUMN: Technology strategy and management
The Apple-Samsung lawsuits
Michael A. Cusumano

Pages: 28-31
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

In search of a middle ground in the intellectual property wars.


COLUMN: The business of software
How we build things: …and why things are 90% complete.
Phillip G. Armour

Pages: 32-33
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

COLUMN: Law and technology
Beyond location: data security in the 21st century
Deven Desai

Pages: 34-36
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Viewing evolving data security issues as engineering problems to be solved.


COLUMN: Historical reflections
Five lessons from really good history
Thomas Haigh

Pages: 37-40
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Lessons learned from four award-winning books on the history of information technology.


COLUMN: Viewpoint
What college could be like
Salman Khan

Pages: 41-43
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Imagining an optimized education model.


Conference-journal hybrids
Jonathan Grudin, Gloria Mark, John Riedl

Pages: 44-49
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Considering how to combine the best elements of conferences and journals.


SECTION: Practice
Condos and clouds
Pat Helland

Pages: 50-59
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Constraints in an environment empower the services.


Browser security: appearances can be deceiving
CACM Staff

Pages: 60-67
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil


The web won't be safe or secure until we break it
Jeremiah Grossman

Pages: 68-72
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.


SECTION: Contributed articles
Human mobility characterization from cellular network data
Richard Becker, Ram243;n C225;ceres, Karrie Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky

Pages: 74-82
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.


Abstractions for genomics
Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese

Pages: 83-93
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Large genomic databases with interactive access require new, layered abstractions, including separating "evidence" from "inference."


SECTION: Review articles
Computer security and the modern home
Tamara Denning, Tadayoshi Kohno, Henry M. Levy

Pages: 94-103
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

A framework for evaluating security risks associated with technologies used at home.


SECTION: Research highlights
Visualization, understanding, and design: technical perspective
Doug DeCarlo, Matthew Stone

Pages: 105-105
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Illustrating how mechanical assemblies work
Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala

Pages: 106-114
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for generating such visualizations. Starting with a 3D CAD model of an assembly, we first ...


Finding people in depth: technical perspective
James M. Rehg

Pages: 115-115
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

Real-time human pose recognition in parts from single depth images
Jamie Shotton, Toby Sharp, Alex Kipman, Andrew Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore

Pages: 116-124
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

We propose a new method to quickly and accurately predict human pose---the 3D positions of body joints---from a single depth image, without depending on information from preceding frames. Our approach is strongly rooted in current object recognition ...


COLUMN: Last byte
Future tense
Rudy Rucker

Pages: 136-ff
Full text: HtmlHtml  PDFPDF
Other formats: Digital EditionDigital Edition

From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.I self-publish, and you get to sail my aether wave for free.



 

Reply all
Reply to author
Forward
0 new messages