COMMUNICATIONS Cacm.Acm.Org of THEACM 02/2012 VOL.55 NO.02 Text-Mining the Voice of the People
Total Page:16
File Type:pdf, Size:1020Kb
COMMUNICATIONS cAcM.AcM.org OF THEACM 02/2012VoL.55No.02 Text-Mining the Voice of the People Bufferbloat: What’s Wrong with the Internet? Intelligent Vehicle Area Networks The Social Life of Robots Yet Another Technology Cusp Association for Computing Machinery 1&1 SERVERS NEXT GENERATION NEW HARDWARE, NEW CONFIGURATIONS, NOW WITH INTEL® Flexibility: Choose between AMD or Intel® processors Security: All 1&1 servers are housed in high-tech data centers owned and operated by 1&1 Speed: INCLUDED IN THE NEW 1&1 SERVER PORTFOLIO: Unlimited traffi c, high- speed connectivity SERVER SERVER SERVER Control: 4i XL6 XL 8i Parallels® Plesk Panel 10.4 for ■ Intel® Xeon® E3-1220 ■ AMD Hexa-Core ■ Intel® Xeon® E3-1270 unlimited domains ■ 4 Cores with up to 3.4 GHz ■ 6 Cores with up to 3.3 GHz ■ 4 (8 HT) Cores with up to 3.8 GHz Value: ® (Intel Turbo Boost (AMD Turbo Core) (Intel® Turbo Boost Technology 2.0) More power, Technology 2.0) ■ 16 GB ECC RAM ■ 24 GB ECC RAM great pricing ■ 12 GB ECC RAM ■ 2 x 1,000 GB 3 MONTHS ■ 2 X 1,500 GB SATA HDD ■ 2 x 1,000 GB SATA HDD SATA HDD FREE!* $ .99 $ .99 $ .99 99 per month 129 per month 299 per month ® 1-877-461-2631 www.1and1.com 1-855-221-2631 www.1and1.ca * 3 Months Free offer valid for a limited time only, 12 month minimum contract term applies. Set-up fee and other terms and conditions may apply. Visit www.1and1.com for full promotional offer details. Program and pricing specifi cations and availability subject to change without notice. 1&1 and the 1&1 logo are trademarks of 1&1 Internet, all other trademarks are the property of their respective owners. © 2012 1&1 Internet. All rights reserved. Frederick P. Charles P. (Chuck) Charles W. Barbara BROOKS, JR. THACKER BACHMAN LISKOV Richard M. Leslie G. Marvin Adi KARP VALIANT MINSKY SHAMIR Richard E. John Robert E. Vinton G. STEARNS HOPCROFT KAHN CERF Robert Ivan Butler Juris TARJAN SUTHERLAND LAMPSON HARTMANIS THE ACM TURING CENTENARY CELEBRATION A ONCE-IN-A-LIFETIME Andrew C. Donald E. Dana S. Raj EVENT THAT YOU’LL YAO KNUTH SCOTT REDDY NEVER FORGET… AND YOU’RE INVITED! WHAT DO YOU GET WHEN YOU PUT YOU WHEN GET YOU DO WHAT CHAIR: Fernando J. Edward A. Alan C. William (Velvel) Vint Cerf, ’04 Turing Award Winner, CORBATÓ FEIGENBAUM KAY KAHAN Chief Internet Evangelist, Google PROGRAM CO-CHAIRS: Mike Schroeder, Microsoft Research John Thomas, IBM Research Moshe Vardi, Rice University MODERATOR: Paul Saffo Frances E. E. Allen Niklaus Ken , Managing Director of Foresight, Discern ALLEN EMERSON WIRTH THOMPSON Analytics and Consulting Associate Professor, Stanford WHEN: June 15th & June 16th 2012 WHERE: Palace Hotel, San Francisco CA HOW: Register for the event at turing100.acm.org Leonard Ronald Edmund Joseph ADLEMAN RIVEST CLARKE SIFAKIS REGISTRATION IS FREE-OF-CHARGE! THE A.M. TURING AWARD, often referred to as the "Nobel Prize" in computing, was named in honor of Alan Mathison Turing (1912–1954), a British mathematician and computer scientist. He made fundamental advances in computer architecture, algorithms, formalization of computing, and artificial intelligence. Turing was also instrumental in British code-breaking work during World War II. commuNicAtioNsofthe acM Departments News Viewpoints 5 ACM Europe Council Chair’s Letter 24 Economic and Business Dimensions Revisiting ACM Europe Incentive Auctions By Fabrizio Gagliardi Reallocating valuable wireless spectrum can generate billions 6 Letters To The Editor of dollars in revenue to the U.S. Credit Non-Anonymous federal government while Reviewers with a Name also benefiting consumers. By Gregory Rosston 10 BLOG@CACM Researchers’ Big Data Crisis; 27 Education Understanding Design and Peer Instruction: A Teaching Method Functionality to Foster Deep Understanding Michael Stonebraker issues a call How the computing education to arms about research groups’ community can learn from data-management problems. 19 physics education. Jason Hong discusses the nature of By Beth Simon and Quintin Cutts functionality with respect to design. 13 The Science of Better Science Researchers are exploring networked 30 Inside Risks 37 Calendar computational analysis, formal Yet Another Technology Cusp: classification, and topic modeling Confusion, Vendor Wars, 122 Careers to better identify relevant scientists, and Opportunities ideas, and trends. Considering the unexpected By Gregory Goth risks associated with seemingly Last Byte minor technological changes. 16 The War Against Botnets By Donald A. Norman 128 Puzzled Increasingly sophisticated botnets Where Sets Meet (Venn Diagrams) have emerged during the last several 33 Kode Vicious By Peter Winkler years. However, security researchers, Wanton Acts of Debuggery businesses, and governments Keep your debug messages clear, are attacking botnets from a number useful, and not annoying. of different angles—and sometimes By George V. Neville-Neil winning. By Samuel Greengard 35 Privacy and Security Emotion and Security 19 The Social Life of Robots Examining the role of human Researchers are trying to build robots emotional response in making capable of working together with complex security-related decisions. minimal human supervision. By Rose McDermott But will they ever learn to get along? By Alex Wright 38 Viewpoint What Have We Learned 23 ACM Fellows Inducted About Software Engineering? Forty-six men and women are Upon closer examination, everything recognized as 2011 ACM Fellows. old appears to be new again in mons im s the realm of software engineering. d ei By Marvin V. Zelkowitz r courtesy of h P Association for Computing Machinery Advancing Computing as a Science & Profession Photogra 2 communicaTions of The acM | FebruarY 2012 | VoL. 55 | No. 2 02/2012 VoL.55 no.02 Practice Contributed Articles Review Articles 48 70 40 BufferBloat: What’s Wrong 62 Text-Mining the Voice of the People 90 Progress and Challenges in with the Internet? Statistical techniques help Intelligent Vehicle Area Networks A discussion with Vint Cerf, public leaders turn text in Vehicle area networks form the Van Jacobson, Nick Weaver, unstructured citizen feedback backbone of future intelligent and Jim Gettys. into responsive e-democracy. transportation systems. By Nicholas Evangelopoulos By Miad Faezipour, Mehrdad Nourani, 48 You Don’t Know Jack About Shared and Lucian Visinescu Adnan Saeed, and Sateesh Addepalli Variables or Memory Models Data races are evil. 70 Programming by Optimization By Hans-J. Boehm and Sarita V. Adve Avoid premature commitment, Research Highlights seek design alternatives, and 55 Advances and Challenges automatically generate 102 Technical Perspective s gary in Log Analysis performance-optimized software. Compiling What to How me a Logs contain a wealth of information By Holger H. Hoos By Rastislav Bodik to help manage systems. By Adam Oliner, Archana Ganapathi, 81 Software as a Service 103 Software Synthesis Procedures ustration by J and Wei Xu for Data Scientists By Viktor Kuncak, Mikaël Mayer, ll i Globus Online manages Ruzica Piskac, and Philippe Suter son, el fire-and-forget file transfers for Articles’ development led by n ce queue.acm.org big-data, high-performance oi r scientific collaborations. 112 Technical Perspective By Bryce Allen, John Bresnahan, Modeling High-Dimensional Data Lisa Childers, Ian Foster, By Santosh S. Vempala Gopi Kandaswamy, Raj Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, 113 Disentangling Gaussians COMMUNICATIONS about the cover: Karl Pickett, and Steven Tuecke By Adam Tauman Kalai, Ankur Moitra, CACMACMORG OF THEACM 02/ 012 VOL 55 NO 02 statistical tools are helping world leaders and Gregory Valiant Text-Mining the Voice of and government the People officials distill streams of text messages from their citizenry, turning unstructured data into responsive e-democracy. Bufferbloat What’s Wrong this month’s cover story wi h the Internet? Inte ligent Veh cle (p. 62) explores enabling Area Networks The Soc al Life of Robots technologies that let the Yet Another Technology Cusp voice of the people be A ti f C i M i heard. cover illustration llustration by agsandrew / shutterstock.com, Visualization by i by ryan alexander. February 2012 | VoL. 55 | No. 2 | communicaTions of The acM 3 commuNicAtioNsofthe acM trustedinsightsforcomputing’sleadingprofessionals. Communications of the ACM is the leading monthly print and online magazine for the computing and information technology fields. Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional. Communications brings its readership in-depth coverage of emerging areas of computer science, new trends in information technology, and practical applications. industry leaders use Communications as a platform to present and debate various technology implications, public policies, engineering challenges, and market trends. the prestige and unmatched reputation that Communications of the ACM enjoys today is built upon a 50-year commitment to high-quality editorial content and a steadfast dedication to advancing the arts, sciences, and applications of information technology. ACM, the world’s largest educational STAFF editorial Board and scientific computing society, delivers Director of Group PublishInG resources that advance computing as a scott e. delman Editor-In-ChieF science and profession. ACM provides the [email protected] moshe y. Vardi ACM Copyright notice computing field’s premier Digital Library [email protected] copyright © 2012 by association for Executive Editor and serves its members and the computing News