Communications CACM.ACM.ORG of the ACM 11/2010 VOL.53 NO.11
Total Page:16
File Type:pdf, Size:1020Kb
COMMuNICATIONS CACM.ACM.ORG OF THE ACM 11/2010 VOL.53 NO.11 using complexity to Protect elections Association for Computing Machinery CALL FOR PARTICIPATION CTSCTS 20112011 Philadelphia, Pennsylvania, USA The 2011 International Conference on Collaboration Technologies and Systems May 23 – 27, 2011 The Sheraton University City Hotel Philadelphia, Pennsylvania, USA Important Dates: Paper Submission Deadline ----------------------------------------- December 15, 2010 Workshop/Special Session Proposal Deadline ----------------- November 15, 2010 Tutorial/Demo/Panel Proposal Deadline ------------------------- January 8, 2011 Notification of Acceptance ------------------------------------------- February 1, 2011 Final Papers Due ------------------------------------------------------- March 1, 2011 For more information, visit the CTS 2011 web site at: http://cts2011.cisedu.info/ In cooperation with the ACM, IEEE, IFIP ABCD springer.com Springer References & Key Library Titles Handbook of Handbook Encyclopedia of Ambient of Natural Machine Intelligence Computing Learning and Smart G. Rozenberg, T. Bäck, C. Sammut, G. I. Webb Environments J. N. Kok, Leiden Univer- (Eds.) sity, The Netherlands H. Nakashima, Future The first reference work (Eds.) University, Hakodate, on Machine Learning Hokkaido, Japan; We are now witnessing Comprehensive A-Z H. Aghajan, Stanford University, Stanford, an exciting interaction between computer coverage of this complex subject area makes CA, USA; J. C. Augusto, University of Ulster at science and the natural sciences. Natural this work easily accessible to professionals and Jordanstown, Newtownabbey, UK (Eds.) Computing is an important catalyst for this researchers in all fields who are interested in a interaction, and this handbook is a major particular aspect of Machine LearningTargeted Provides readers with comprehensive, up-to- record of this important development. literature references provide additional value date coverage in this emerging field. Organizes for researchers looking to study a topic in more all major concepts, theories, methodologies, 2011. Approx. 1700 p. (In 3 volumes, not available detail. trends and challenges into a coherent, unified seperately) Hardcover repository. Covers a wide range of applications ISBN 978-3-540-92909-3 7 $749.00 2010. 800 p. Hardcover relevant to both ambient intelligence and eReference ISBN 978-0-387-30768-8 7 approx. $549.00 smart environments. Examines case studies ISBN 978-3-540-92910-9 7 $749.00 eReference of recent major projects to present the reader 2010. 800 p. with a global perspective of actual develop- Print + eReference ISBN 978-0-387-30164-8 7 approx. $549.00 ments. 2011. Approx. 1700 p. ISBN 978-3-540-92911-6 7 $939.00 Print + eReference 2010. XVIII, 1294 p. 100 illus. Hardcover 2010. 800 p. ISBN 978-0-387-93807-3 7 $229.00 Handbook of ISBN 978-0-387-34558-1 7 approx. $689.00 Biomedical Handbook of Handbook of Imaging Peer-to-Peer Multimedia N. Paragios, École for Digital Centrale de Paris, France; Networking J. Duncan, Yale Univer- X. Shen, University of Entertainment sity, USA; N. Ayache, Waterloo, ON, Canada; and Arts INRIA, France (Eds.) H. Yu, Huawei Technolo- B. Furht, Florida Atlantic This book offers a unique guide to the entire gies, Bridgewater, NJ, University, Boca Raton, chain of biomedical imaging, explaining how USA; J. Buford, Avaya FL, USA (Ed.) image formation is done, and how the most Labs Research, Basking Ridge, NJ, USA; M. Akon, University of Waterloo, ON, The first comprehensive handbook to cover appropriate algorithms are used to address Canada (Eds.) recent research and technical trends in the field demands and diagnoses. It is an exceptional of digital entertainment and art. Includes an tool for radiologists, research scientists, senior Offers elaborate discussions on fundamentals outline for future research directions within undergraduate and graduate students in health of peer-to-peer computing model, networks this explosive field. The main focus targets sciences and engineering, and university and applications. Provides a comprehensive interactive and online games, edutainment, professors. study on recent advancements, crucial design e-performance, personal broadcasting, innova- choices, open problems, and possible solution tive technologies for digital arts, digital visual 2010. Approx. 590 p. Hardcover strategies. Written by a team of leading and other advanced topics. ISBN 978-0-387-09748-0 7 approx. $179.00 international researchers and professionals. 2009. XVI, 769 p. 300 illus., 150 in color. Hardcover 2010. XLVIII, 1500 p. Hardcover ISBN 978-0-387-89023-4 7 $199.00 ISBN 978-0-387-09750-3 7 $249.00 Easy Ways to Order for the Americas 7 Write: Springer Order Department, PO Box 2485, Secaucus, NJ 07096-2485, USA 7 Call: (toll free) 1-800-SPRINGER 7 Fax: 1-201-348-4505 7 Email: [email protected] or for outside the Americas 7 Write: Springer Customer Service Center GmbH, Haberstrasse 7, 69126 Heidelberg, Germany 7 Call: +49 (0) 6221-345-4301 7 Fax : +49 (0) 6221-345-4229 7 Email: [email protected] 7 Prices are subject to change without notice. All prices are net prices. 014712x communications of the acm Departments News Viewpoints 5 Editor’s Letter 24 Economic and Business Dimensions On P, NP, and The Divergent Online Computational Complexity News Preferences of By Moshe Y. Vardi Journalists and Readers Reading between the lines of the 6 Letters To The Editor thematic gap between the supply How to Think About Objects and demand of online news. By Pablo J. Boczkowski 9 In the Virtual Extension 27 Education 10 BLOG@CACM K–12 Computational Learning Rethinking the Systems Enhancing student learning and Review Process understanding by combining Tessa Lau launches a discussion theories of learning with the about the acceptance criteria computer’s unique attributes. for HCI systems papers at CHI, By Stephen Cooper, Lance C. Pérez, UIST, and other conferences. 13 Turning Data Into Knowledge and Daphne Rainey Today’s data deluge is leading to 12 CACM Online new approaches to visualize, analyze, 30 Legally Speaking A Preference for PDF and catalog enormous datasets. Why Do Software Startups By David Roman By Gregory Goth Patent (or Not)? Assessing the controversial results 31 Calendar 16 Security in the Cloud of a recent empirical study Cloud computing offers many of the role of intellectual property 103 Careers advantages, but also involves security in software startups. risks. Fortunately, researchers are By Pamela Samuelson devising some ingenious solutions. Last Byte By Gary Anthes 33 Privacy and Security Why Isn’t Cyberspace More Secure? 112 Puzzled 19 Career Opportunities Evaluating governmental Rectangles Galore What are the job prospects for actions—and inactions—toward By Peter Winkler today’s—and tomorrow’s— improving cyber security and graduates? addressing future challenges. By Leah Hoffmann By Joel F. Brenner 23 Wide Open Spaces 36 Viewpoint The U.S. Federal Communications Sensor Networks for the Sciences Commission’s decision to open Lessons from the field derived frequencies in the broadcast from developing wireless sensor spectrum could enable broadband networks for monitoring active networks in rural areas, permit smart and hazardous volcanoes. electric grids, and more. By Matt Welsh By Neil Savage on In Support of Computer Science I Teachers and the CSTA orporat c A call to action to clarify the computer science SST definition to K–12 students. By Duncan Buell Association for Computing Machinery Advancing Computing as a Science & Profession Image courtesy of L 2 communications of the acm | november 2010 | vol. 53 | no. 11 11/2010 vol. 53 no. 11 Practice Contributed Articles Review Articles 74 Using Complexity to Protect Elections Computational complexity may truly be the shield against election manipulation. By Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra Research Highlights 84 Technical Perspective Data Races are Evil with No Exceptions 47 By Sarita Adve 42 The Case Against Data Lock-in 58 Understanding Throughput-Oriented 85 Goldilocks: A Race-Aware Want to keep your users? Architectures Java Runtime Just make it easy for them to leave. For workloads with abundant By Tayfun Elmas, Shaz Qadeer, By Brian W. Fitzpatrick and JJ Lueck parallelism, GPUs deliver higher and Serdar Tasiran peak computational throughput 47 Keeping Bits Safe: than latency-oriented CPUs. 93 FastTrack: Efficient and Precise How Hard Can It Be? By Michael Garland and David B. Kirk Dynamic Race Detection As storage systems grow larger By Cormac Flanagan and larger, protecting their data 67 Regulating the Information and Stephen N. Freund for long-term storage is becoming Gatekeepers ever more challenging. Concerns about biased By David S.H. Rosenthal manipulation of search results may require intervention involving 56 Sir, Please Step Away government regulation. from the ASR-33! By Patrick Vogl and Michael Barrett To move forward with programming languages we must first break free Relative Status of Journal from the tyranny of ASCII. and Conference Publications By Poul-Henning Kamp in Computer Science Citations represent a trustworthy Articles’ development led by measure of CS research quality— queue.acm.org whether in articles in conference proceedings or in CS journals. By Jill Freyne, Lorcan Coyle, Barry Smyth, and Padraig Cunningham about the cover: Vulnerabilities in the election process Supporting Ubiquitous Location have been around for Information in Interworking centuries. this