0001-0782

Communications of the ACM (CACM) - Issue 625 论文列表

点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息
卷期号: Issue 625
发布时间:
卷期年份: 2010
卷期官网:
本期论文列表
Taking a flexible approach to ASPs.

Taking your network's temperature.

Informatics creativity: a role for abductive reasoning?

It takes two to tango: how relational investments improve IT outsourcing partnerships.

Wireless insecurity: examining user security behavior on public networks.

Improving disaster management.

A few billion lines of code later: using static analysis to find bugs in the real world.

Open access to scientific publications.

ACM Fellows honored.

Recent progress in quantum algorithms.

Software model checking takes off.

Want to be a bug buster?

Strange effects in high dimension.

Breaking chocolate bars.

Managing contention for shared resources on multicore processors.

Reversing the landslide in computer-related degree programs.

Alternate interface technologies emerge.

Assessing the changing U.S. IT R&D ecosystem.

Post-silicon bug localization for processors using IFRA.

Not seeing the crime for the cameras?

An issue of teamwork.

In the Virtual Extension.

An interview with Michael Rabin.

Connecting women and technology.

Power-efficient software.

Why an informatics degree?

Managing a corporate open source software asset.

Where the data is.

Type theory comes of age.

The need for a national cybersecurity research and development agenda.

Practical intelligence in IT: assessing soft skills of IT professionals.

Designs for effective implementation of trust assurances in internet stores.

Faster dimension reduction.