Sign in
ACM Crossroads
2000
2003
2007
2010
2000
2010
Keyphrases
Publications
volume 16, number 3, 2010
Gideon Juve
,
Ewa Deelman
Scientific workflows and clouds.
ACM Crossroads
16 (3) (2010)
Ramaswamy Chandramouli
,
Peter Mell
State of security readiness.
ACM Crossroads
16 (3) (2010)
Chris Harrison
Letter from the editor: plugging into the cloud.
ACM Crossroads
16 (3) (2010)
David Chiu
Elasticity in the cloud.
ACM Crossroads
16 (3) (2010)
Ymir Vigfusson
,
Gregory V. Chockler
Clouds at the crossroads: research perspectives.
ACM Crossroads
16 (3) (2010)
Sumit Narayan
,
Chris Heiden
The cloud at work: interviews with Pete Beckman of Argonne National Lab and Bradley Horowitz of Google.
ACM Crossroads
16 (3) (2010)
Ryan K. L. Ko
Cloud computing in plain English.
ACM Crossroads
16 (3) (2010)
David P. Anderson
Volunteer computing: the ultimate cloud.
ACM Crossroads
16 (3) (2010)
Guy Rosen
The business of clouds.
ACM Crossroads
16 (3) (2010)
volume 16, number 1, 2009
Tronster Hartley
Getting from here to there: an interview with Tronster Hartley, senior programmer at Firaxis games.
ACM Crossroads
16 (1) (2009)
Robert Dewar
,
Owen L. Astrachan
CS education in the U.S.: heading in the wrong direction.
ACM Crossroads
16 (1) (2009)
Michael DiBernardo
Don't change a thing: how adopting a service provider attitude can boost your career.
ACM Crossroads
16 (1) (2009)
Chris Harrison
,
Scott E. Hudson
Dynamic displays.
ACM Crossroads
16 (1) (2009)
Jeff Daniels
Server virtualization architecture and implementation.
ACM Crossroads
16 (1) (2009)
Justin Solomon
Introduction: maxed out?
ACM Crossroads
16 (1) (2009)
volume 16, number 2, 2009
Roya Feizy
,
Ian Wakeman
,
Dan Chalmers
Are your friends who they say they are?: data mining online identities.
ACM Crossroads
16 (2) (2009)
Grigorios Loukides
,
Aris Gkoulalas-Divanis
Privacy challenges and solutions in the social web.
ACM Crossroads
16 (2) (2009)
Sarita Yardi
Social learning and technical capital on the social web.
ACM Crossroads
16 (2) (2009)
Ian Li
,
Anind K. Dey
,
Jodi Forlizzi
Grafitter: leveraging social media for self reflection.
ACM Crossroads
16 (2) (2009)
Chris Harrison
Introduction: metamorphosis.
ACM Crossroads
16 (2) (2009)
Daniel W. Goldberg
Staying disciplined during an interdisciplinary degree.
ACM Crossroads
16 (2) (2009)
Gary Hsieh
Don't ask me: designing social Q&A services.
ACM Crossroads
16 (2) (2009)
volume 15, number 3, 2009
Daniel W. Goldberg
State considerations in distributed systems.
ACM Crossroads
15 (3) (2009)
Amit P. Sawant
,
Christopher G. Healey
,
Dongfeng Chen
,
Rada Chirkova
AmazonViz: visualizing Amazon.com purchase orders.
ACM Crossroads
15 (3) (2009)
Steve Clough
HCI and theology: Chalk and Cheese?
ACM Crossroads
15 (3) (2009)
Justin Solomon
Introduction.
ACM Crossroads
15 (3) (2009)
Caio Camargo
Modding: changing the game, changing the industry.
ACM Crossroads
15 (3) (2009)
volume 15, number 4, 2009
Aris Gkoulalas-Divanis
,
Vassilios S. Verykios
An overview of privacy preserving data mining.
ACM Crossroads
15 (4) (2009)
Justin Solomon
Introduction.
ACM Crossroads
15 (4) (2009)
Malay Bhattacharyya
Courier problems.
ACM Crossroads
15 (4) (2009)
Anna Ritchie
LibraryThing: an interview with Tim spalding.
ACM Crossroads
15 (4) (2009)
Sumit Narayan
Supercomputers: past, present and the future.
ACM Crossroads
15 (4) (2009)
Ryan K. L. Ko
A computer scientist's introductory guide to business process management (BPM).
ACM Crossroads
15 (4) (2009)
volume 15, number 1, 2008
James Hegarty
Geometric and path tracing methods for simulating light transport through volumes of water particles.
ACM Crossroads
15 (1) (2008)
Salik Syed
Motion planning for skateboard-like robots in dynamic environments.
ACM Crossroads
15 (1) (2008)
Ed DeHart
Data encryption: mixing up the message in the name of security.
ACM Crossroads
15 (1) (2008)
Justin Solomon
Introduction.
ACM Crossroads
15 (1) (2008)
Joe Bungo
The use of compiler optimizations for embedded systems software.
ACM Crossroads
15 (1) (2008)
volume 15, number 2, 2008
David Chiu
On teaching computer science: thoughts and advice for TAs.
ACM Crossroads
15 (2) (2008)
Joonghoon Lee
Exploring global terrorism data: a web-based visualization of temporal data.
ACM Crossroads
15 (2) (2008)
Cara Cocking
Digital blasphemy: an interview with Ryan Bliss.
ACM Crossroads
15 (2) (2008)
Justin Solomon
Introduction.
ACM Crossroads
15 (2) (2008)
William Ella
Detecting steganography on a large scale.
ACM Crossroads
15 (2) (2008)
Craig Thomas
Towards a user-friendly semantic formalism for natural language generation.
ACM Crossroads
15 (2) (2008)
volume 14, number 4, 2008
Justin Solomon
Introduction.
ACM Crossroads
14 (4) (2008)
Marie desJardins
How to succeed in graduate school: a guide for students and advisors.
ACM Crossroads
14 (4) (2008)
Shahriar Manzoor
Common mistakes in online and real-time contests.
ACM Crossroads
14 (4) (2008)
Craig Pfeifer
Information superwhichway?
ACM Crossroads
14 (4) (2008)
Richard Bergmair
Ethical lessons learned from computer science.
ACM Crossroads
14 (4) (2008)
Sid Stamm
Mixed nuts: atypical classroom techniques for computer science courses.
ACM Crossroads
14 (4) (2008)