Communications / NetworkingComputer ApplicationsComputer SystemsHuman Computer InteractionComputers And SocietyData / Storage And RetrievalEducationHardwareInformation SystemsLegal AspectsManagementPerformance And ReliabilityPersonal ComputingSearchSecuritySoftwareTheory
AUTHOR
Anna WojnarowskaJohn L KingRan Libeskind-HadasBruce SchneierschneierDaniel TunkelangDaniel LemireKWReganPipRenee DopplickSimon PhippsEllen WalkerAlfred ThompsonMichael MitzenmacherzephoriaCSTA staff and volunteersrjliptonsite adminGail CarmichaelAndrew McCallum
Fast Sets of Integers
From Daniel Lemire's Blog
Maintaining a set of integers is a common problem in programming. It can also be implemented in many different ways. Maybe the
…
Daniel Lemire| November 13, 2012
Blogroll
From Daniel Lemire's Blog
What I do with my time
I am not a very productive person. I also do not work long hours. However, I sometimes give the impression that I productive. I have been asked to explain how I...Daniel Lemire From Daniel Lemire's Blog | November 21, 2012 at 11:19 PM
From Computer Science Teacher–Thoughts and Information From Alfred Thompson
ACM/IEEE-CS Computer Science Curricula 2013 - Ironman v0.8 Draft Available for Comments
Dear Colleagues, We are happy to announce the availability of the ACM/IEEE-CS Computer Science Curricula 2013 - Ironman v0.8 draft. The draft is available at...Alfred Thompson From Computer Science Teacher–Thoughts and Information From Alfred Thompson | November 21, 2012 at 11:19 PM
From The Eponymous Pickle
Mobile Marketing Toothpaste
Good overview of the use of mobile marketing for something as common as toothpaste. " ... Marketing toothpaste can be a challenge for brands because even though...Franz Dill From The Eponymous Pickle | November 21, 2012 at 09:43 PM
From Schneier on Security
Cell Phone Surveillance
Good article on the different ways the police can eavesdrop on cell phone calls.schneier From Schneier on Security | November 21, 2012 at 08:06 PM
From Computer Science Teachers Association
Seize the Professional Development!
The Philadelphia Area chapter started providing professional development workshops to our members because they asked for it. We regularly query our membership as... From Computer Science Teachers Association | November 21, 2012 at 07:47 PM
From The Computing Community Consortium Blog
Developing New Ways to Search for Web Images
Collections of photos, images, and videos are quickly coming to dominate the content available on the Web. But how can text be used to search visual mediums? Currently...Shar Steed From The Computing Community Consortium Blog | November 21, 2012 at 06:58 PM
From The Female Perspective of Computer Science
Things I Like About Python
Back in May I wrote a popular post about which was a better beginners language: Processing or Python. Although I concluded that Processing was better for the audiences...Gail Carmichael From The Female Perspective of Computer Science | November 21, 2012 at 03:36 PM
From The Eponymous Pickle
Midsize Insiders
Some of my blog posts will start to appear in Midsize Insiders. Quite an interesting group of other bloggers as I have read them so far: " ... Insiders are independent...Franz Dill From The Eponymous Pickle | November 21, 2012 at 03:05 PM
From The Eponymous Pickle
The Need for Thank You
In the HBR: In a long career, before search became common, and I had become a rumored expert, I was often asked to do a simple online search. Later their admins...Franz Dill From The Eponymous Pickle | November 21, 2012 at 02:52 PM
From Schneier on Security
Decrypting a Secret Society's Documents from the 1740s
Great story, both the cryptanalysis process and the Oculists.schneier From Schneier on Security | November 21, 2012 at 12:34 PM