Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

What role for computer science in the war on terror?

What role for computer science in the war on terror? letters to the editor DOI:10.1145/1498765.1498769 What Role for computer Science in the War on terror? T œThe Topology of Dark Networks  by Jennifer Xu and Hsinchun Chen (Oct. 2008) ignored sensitive cultural issues while addressing a subject that might by itself offend some people in Muslim societies, including those in the Middle East. The software system it described for fighting what some might call œIslamic terrorism  represents a highly charged political subject. A more appropriate place to publish would have been in a publication sponsored by, say, the U.S. Department of Defense, Central Intelligence Agency, or Federal Bureau of Investigation. ACM, which claims to be independent, with a clear mission to advance computer science while being open to members from around the world and free of geographic, ethnic, religious, or political affiliations, should stick to this mission and not involve itself in the so-called War on Terror. Science is a universal language that should be used to bridge gaps between cultures, promote understanding and cooperation, and avoid worsening damage caused by politicians who push the world toward trouble. ACM should not take on such a sensitive subject that only increases tensions and does not make the world a better place. This is my personal opinion. I would not seek to impose it on or cause offense to anyone. he contributed article understand illicit covert communication and interaction networks. We agree that computing research should not be used for political purposes. We also hope that our research supports the study and understanding of deeply complex social phenomena. Jennifer Xu, Waltham, MA hsinchun chen, Tucson, AZ separating P from NP. Such an error may be pardoned, even overlooked, in the science columns of a generalinterest newspaper or magazine, but not in Communications. madhavan mukund, Chennai, india Lindley Responds: Mukund is correct; this was a slip-up, though one that ™s easily rectified. In its earlier paragraphs, the story defined an NP problem as one for which no polynomial-time solution is known, then explained the distinction between NP and NP-complete, but in introducing the unresolved question of whether P and NP are truly distinct, I should have referred to NP problems generally, not NP-complete problems in particular. With this in mind, the paragraph in question would read correctly. David Lindley, Alexandria, vA Communications welcomes your opinion. to submit a letter to the editor, please limit your comments to 500 words or less and send to letters@cacm.acm.org. What Gates ™s most enduring Legacy Should Be Michael Cusumano ™s Viewpoint column œTechnology Strategy and Management  on œThe Legacy of Bill Gates  (Jan. 2009) displayed a rather stunning values system by saying that œgrow[ing] the PC software business ¦ should be Gates ™ most enduring legacy.  This is not a prediction of what will be Gates ™s most enduring legacy, though on this issue I would differ as well. Rather, it is a normative statement of what should be his most enduring legacy. Does Cusumano really hope that the massive changes now under way in international public health will not endure? His conclusion should not have been so surprising after he referred to Gates ™s philanthropy as œhighly laudable  but only in the context of bemoaning what a distraction it had become from his business interests. I still found my jaw dropping at the word œshould.  max hailperin, St. Peter, Mn Coming Next Month in COMMUNICATIONS Security in the Browser Spending Moore ™s Dividend Computing Needs Time Debugging AJAX Algorithmic System Biology Plus the latest news on compressive sampling; computational advertising, and international education. othman el moulat, rabat, Morocco Xu Responds: We apologize if our article appeared to be targeting particular groups. This was certainly not our intent. Our research tried to address the new Dark Network phenomenon using selected examples and available datasets. Our hope is to develop advanced, science-based, data-driven intelligence and security-informatics techniques that help analyze and nP-completeness not the Same as Separating P from nP In his news story œThe Limits of Computability  (Nov. 2008) David Lindley wrote: œShowing that a problem is NP-complete means proving that no known algorithm can solve it in polynomial time.  In fact, saying that a problem is NPcomplete means only that it is œas hard as  any other problem in NP. Lindley apparently confused the definition of NP-completeness with the problem of A P r i L 2 0 0 9 | vo L. 52 | n o. 4 | c om m u n ic At ion S of the Acm http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

What role for computer science in the war on terror?

Communications of the ACM , Volume 52 (4) – Apr 1, 2009

Loading next page...
 
/lp/association-for-computing-machinery/what-role-for-computer-science-in-the-war-on-terror-BNuOPcoru6

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2009 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/1498765.1498769
Publisher site
See Article on Publisher Site

Abstract

letters to the editor DOI:10.1145/1498765.1498769 What Role for computer Science in the War on terror? T œThe Topology of Dark Networks  by Jennifer Xu and Hsinchun Chen (Oct. 2008) ignored sensitive cultural issues while addressing a subject that might by itself offend some people in Muslim societies, including those in the Middle East. The software system it described for fighting what some might call œIslamic terrorism  represents a highly charged political subject. A more appropriate place to publish would have been in a publication sponsored by, say, the U.S. Department of Defense, Central Intelligence Agency, or Federal Bureau of Investigation. ACM, which claims to be independent, with a clear mission to advance computer science while being open to members from around the world and free of geographic, ethnic, religious, or political affiliations, should stick to this mission and not involve itself in the so-called War on Terror. Science is a universal language that should be used to bridge gaps between cultures, promote understanding and cooperation, and avoid worsening damage caused by politicians who push the world toward trouble. ACM should not take on such a sensitive subject that only increases tensions and does not make the world a better place. This is my personal opinion. I would not seek to impose it on or cause offense to anyone. he contributed article understand illicit covert communication and interaction networks. We agree that computing research should not be used for political purposes. We also hope that our research supports the study and understanding of deeply complex social phenomena. Jennifer Xu, Waltham, MA hsinchun chen, Tucson, AZ separating P from NP. Such an error may be pardoned, even overlooked, in the science columns of a generalinterest newspaper or magazine, but not in Communications. madhavan mukund, Chennai, india Lindley Responds: Mukund is correct; this was a slip-up, though one that ™s easily rectified. In its earlier paragraphs, the story defined an NP problem as one for which no polynomial-time solution is known, then explained the distinction between NP and NP-complete, but in introducing the unresolved question of whether P and NP are truly distinct, I should have referred to NP problems generally, not NP-complete problems in particular. With this in mind, the paragraph in question would read correctly. David Lindley, Alexandria, vA Communications welcomes your opinion. to submit a letter to the editor, please limit your comments to 500 words or less and send to letters@cacm.acm.org. What Gates ™s most enduring Legacy Should Be Michael Cusumano ™s Viewpoint column œTechnology Strategy and Management  on œThe Legacy of Bill Gates  (Jan. 2009) displayed a rather stunning values system by saying that œgrow[ing] the PC software business ¦ should be Gates ™ most enduring legacy.  This is not a prediction of what will be Gates ™s most enduring legacy, though on this issue I would differ as well. Rather, it is a normative statement of what should be his most enduring legacy. Does Cusumano really hope that the massive changes now under way in international public health will not endure? His conclusion should not have been so surprising after he referred to Gates ™s philanthropy as œhighly laudable  but only in the context of bemoaning what a distraction it had become from his business interests. I still found my jaw dropping at the word œshould.  max hailperin, St. Peter, Mn Coming Next Month in COMMUNICATIONS Security in the Browser Spending Moore ™s Dividend Computing Needs Time Debugging AJAX Algorithmic System Biology Plus the latest news on compressive sampling; computational advertising, and international education. othman el moulat, rabat, Morocco Xu Responds: We apologize if our article appeared to be targeting particular groups. This was certainly not our intent. Our research tried to address the new Dark Network phenomenon using selected examples and available datasets. Our hope is to develop advanced, science-based, data-driven intelligence and security-informatics techniques that help analyze and nP-completeness not the Same as Separating P from nP In his news story œThe Limits of Computability  (Nov. 2008) David Lindley wrote: œShowing that a problem is NP-complete means proving that no known algorithm can solve it in polynomial time.  In fact, saying that a problem is NPcomplete means only that it is œas hard as  any other problem in NP. Lindley apparently confused the definition of NP-completeness with the problem of A P r i L 2 0 0 9 | vo L. 52 | n o. 4 | c om m u n ic At ion S of the Acm

Journal

Communications of the ACMAssociation for Computing Machinery

Published: Apr 1, 2009

There are no references for this article.