


default search action
ACM Queue, Volume 7
Volume 7, Number 1, January 2009
- George V. Neville-Neil

:
Pride and Prejudice: (The Vasa). 6-7
- John Stanik:

A Conversation with Van Jacobson. 8-16
- Mike Shapiro:

Purpose-Built Languages. 18-24
- Mache Creeger:

Virtualization: Part One. 26-35
- Benjamin Boer:

The Obama Campaign: A Programmer's Perspective. 36-39
- Alessandro Berni:

Review of "Wireless Ad Hoc and Sensor Networks (1st ED.) by Houda Labiod, " John Wiley & Sons, Inc., 2008, ISBN 1848210035. 40 - S. Balaraman:

Review of "Pro Web 2.0 Application Development with GWT by S. Balaraman, " Jeff Dwyer, Apress, 2008, ISBN 9781590599853. 40
- John Stanik:

Calendar. 41
- Stan Kelly-Bootle:

The Flaws of Nature. 42-45
- Jeff Norwalk:

Featured Case Study: Making the Move to AJAX. - Peter Christy:

Commentary: A Trip Without a Roadmap. - Eric Schrock:

Featured Article: Debugging AJAX in Production.
Volume 7, Number 2, February 2009
- James Maurer:

Introducing...acmqueue. 5
- George V. Neville-Neil:

Don't be Typecast as a Software Developer. 6-9
- Thomas Wadlow, Vlad Gorelik:

Security in the Browser. 40-41 - Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis:

Cybercrime 2.0: When the Cloud Turns Dark. 46-47 - Ian T. Foster

, Savas Parastatidis, Paul Watson, Mark McKeown:
How Do I Model State? Let Me Count the Ways. 54-55
- Matt Zandstra, Robert Martin:

Book Reviews. 75
Volume 7, Number 3, April 2009
- Jonathan M. Smith:

Fighting Physics: A Tough Battle. 20-21 - Mike O'Dell:

Network Front-end Processors, Yet Again. 28-29
- Charles Beeler, Craig Partridge:

All-Optical Computing and All-Optical Networks are Dead.
Volume 7, Number 4, May 2009
- George V. Neville-Neil

:
Whither Sockets? 34-35
- Stan Kelly-Bootle:

One Peut-Être, Two Peut-Être, Three Peut-Être, More. 77-80
Volume 7, Number 5, June 2009
- Mache Creeger:

Cloud Computing: An Overview. 2
- Charles Reis, Adam Barth, Carlos Pizano:

Browser Security: Lessons from Google Chrome. 3
Volume 7, Number 6, July 2009
- Adam Jacobs:

The Pathologies of Big Data. 10
- Stan Kelly-Bootle:

Words Fail Them. 20-24
- Bruce Johnson:

Reveling in Constraints. 30
- Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan

:
Monitoring and Control of Large Systems with MonALISA. 40
Volume 7, Number 7, August 2009
- Marshall K. McKusick, Sean Quinlan:

GFS: Evolution on Fast-forward. 10
- George V. Neville-Neil

:
The Meaning of Maintenance. 20-22
- Bryan O'Sullivan:

Making Sense of Revision-control Systems. 30 - Katie Shilton:

Four Billion Little Brothers?: Privacy, mobile phones, and ubiquitous data collection. 40
Volume 7, Number 8, September 2009
- Whitfield Diffie, Susan Landau:

Communications Surveillance: Privacy and Security at Risk. 10
Volume 7, Number 9, October 2009
- Jim Waldo, Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary:

A Threat Analysis of RFID Passports. 10 - Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein

, Kevin W. Eliceiri, Werner Benger, Christoph Best:
Unifying Biological Image Formats with HDF5. 20 - James C. Phillips

, John E. Stone:
Probing Biomolecular Machines with Graphics Processors. 30 - Samantha Kleinberg, Bud Mishra:

Metamorphosis: the Coming Transformation of Translational Systems Biology. 40 - Paul D. Stachour, David Collier-Brown:

You Don't Know Jack About Software Maintenance. 50
- George V. Neville-Neil

:
Merge Early, Merge Often. 60-62
Volume 7, Number 10, November 2009
- Paul Vixie:

What DNS Is Not: DNS is many things to many people - perhaps too many things to too many people. 10-15 - Stephen Petschulat:

Other People's Data. 20 - Alexandra Fedorova, Juan Carlos Saez

, Daniel Shelepov, Manuel Prieto
:
Maximizing Power Efficiency with Asymmetric Multicore Systems. 30
Volume 7, Number 11, December 2009
- Stan Kelly-Bootle:

Some Rules and Restrictions May Apply. 1-3
- Julian Hyde:

Data in Flight. 20 - Adam Leventhal:

Triple-Parity RAID and Beyond. 30
- George V. Neville-Neil

:
Standards Advice. 40-43

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














