default search action
Communications of the ACM (CACM), Volume 48, 2005
Volume 48, Number 1, January 2005
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
The unconscious art of software testing. 15-18
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Meg McGinity:
Let your fingers do the talking. 21-23
- David A. Patterson:
Minority-minority and minority-majority technology transfer. 25-26
- Deborah Anderson:
Global linguistic diversity for the internet. 27-28 - Chris Stephenson:
Creating a national K-12 computer science community. 29-31
- Allison Druin, Juan Pablo Hourcade:
Introduction. 32-34 - David Kestenbaum:
The challenges of IDC: what have we learned from our past? 35-38 - Mona Leigh Guha, Allison Druin, Gene Chipman, Jerry Alan Fails, Sante Simms, Allison Farber:
Working with young children as technology design partners. 39-42 - Johanna Höysniemi, Perttu Hämäläinen, Laura Turkki, Teppo Rouvi:
Children's intuitive gestures in vision-based action games. 44-50 - Michael Eisenberg:
The material side of educational technology. 51-54 - Yvonne Rogers, Sara Price, Cliff Randell, Danae Stanton Fraser, Mark J. Weal, Geraldine Fitzpatrick:
Ubi-learning integrates indoor and outdoor experiences. 55-59 - Judy Robertson, Judith Good:
Story creation in virtual game worlds. 61-65 - RadhaKanta Mahapatra, Vincent S. Lai:
Evaluating end-user training programs. 66-70 - Andreas Holzinger:
Usability engineering methods for software developers. 71-74 - John Tillquist, Waymond Rodgers:
Using asset specificity and asset scope to measure the value of IT. 75-80 - Rodrigo C. Fonseca, Virgílio A. F. Almeida, Mark Crovella:
Locality in a web of streams. 82-88 - Ganesh Vaidyanathan:
A framework for evaluating third-party logistics. 89-94 - Michael Ettredge, John Gerdes Jr.:
Timeliness of investor relations data at corporate web sites. 95-100 - Ines Herrero, Jose L. Salmeron:
Using the DEA methodology to rank software technical efficiency. 101-105
- Stuart J. Barnes:
Assessing the value of IS journals. 110-112
- George Ledin Jr.:
Not teaching viruses and worms is harmful. 144
Volume 48, Number 2, February 2005
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- David A. Patterson:
Why join ACM? 14
- Michael A. Cusumano:
Google: what it is and what it is not. 15-17
- Jon Crowcroft:
On the nature of computing. 19-20
- SIGs announce candidates for election. 21-22
- Diane Crawford:
Top 10 downloads from ACM's digital library. 23-24
- Dimitris N. Metaxas:
Introduction. 26-29 - Hervé Delingette, Nicholas Ayache:
Hepatic surgery simulation. 31-36 - Arie E. Kaufman, Sarang Lakare, Kevin Kreeger, Ingmar Bitter:
Virtual colonoscopy. 37-41 - Kyoungju Park, Albert Montillo, Dimitris N. Metaxas, Leon Axel:
Volumetric heart modeling and analysis. 43-48 - Celina Imielinska, Pat Molholt:
Incorporating 3D virtual anatomy into the medical curriculum. 49-54 - Terry S. Yoo, Michael J. Ackerman:
Open source software for medical image processing and visualization. 55-59 - Notice of intent to de-charter professional chapters. 61-62
- Notice of intent to de-charter student chapters. 63-65
- J. Roberto Evaristo, Kevin C. Desouza, Kevin Hollister:
Centralization momentum: the pendulum swings back again. 66-71 - Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh:
Trust in e-commerce. 72-77 - Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb:
Evaluating information security investments using the analytic hierarchy process. 78-83 - Fiona Fui-Hoon Nah, Keng Siau, Hong Sheng:
The value of mobile applications: a utility company study. 85-90 - R. Kelly Rainer Jr., Mark D. Miller:
Examining differences across journal rankings. 91-94 - Yufei Yuan, Brian Detlor:
Intelligent mobile crisis response systems. 95-98
- Chenglie Hu:
Dataless objects considered harmful. 99-101 - Shirley Ann Becker:
E-government usability for older adults. 102-104
- Peter G. Neumann:
Responsibilities of technologists. 128
Volume 48, Number 3, March 2005
- Diane Crawford:
Editorial pointers. 5
News track
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- ACM Fellows. 14
- David A. Patterson:
20th century vs. 21st century C&C: the SPUR manifesto. 15-16
- Phillip G. Armour:
Project portfolios: organizational management of risk. 17-20
- Diane Crawford:
Top 10 downloads from ACM's digital library. 21-22
- Gregory J. Conti:
Why computer scientists should attend hacker conferences. 23-24
- Robert L. Glass:
The first business application: a significant milestone in software history. 25-26
- Pamela Samuelson:
Legislative challenges to the Sony safe harbor rule. 27-31
- Norbert A. Streitz, Paddy Nixon:
Introduction. 32-35 - Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon:
Delivering real-world ubiquitous location systems. 36-41 - Daniel M. Russell, Norbert A. Streitz, Terry Winograd:
Building disappearing computers. 42-48 - Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan:
Context is key. 49-53 - Steve Benford, Carsten Magerkurth, Peter Ljungstrand:
Bridging the physical and digital in pervasive gaming. 54-57 - Saadi Lahlou, Marc Langheinrich, Carsten Röcker:
Privacy and trust issues with invisible computers. 59-60 - Liam J. Bannon, Steve Benford, John Bowers, Christian Heath:
Hybrid design creates innovative museum experiences. 62-65 - Hans Gellersen:
Smart-Its: computers for artifacts in the physical world. 66 - Spyros Lalis, Alexandros Karypidis, Anthony Savidis:
Ad-hoc composition in wearable and mobile computing. 67-68 - Achilles Kameas, Irene Mavrommati:
Extrovert gadgets. 69 - Joseph A. Paradiso:
Sensate media. 70 - Anatole Gershman, Andrew E. Fano:
Examples of commercial applications of ubiquitous computing. 71 - Jacques Cohen:
Computer science and bioinformatics. 72-78 - Arun Sen, Atish P. Sinha:
A comparison of data warehousing methodologies. 79-84
- SIGs announce candidates for election. 85
- Trevor T. Moores:
Do consumers understand the role of privacy seals in e-commerce? 86-91 - Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau:
A multiagent system for U.S. defense research contracting. 93-97 - William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:
Java distributed components for numerical visualization in VisAD. 98-104 - Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom T. Carey:
The state of user-centered design practice. 105-109 - Xiaoni Zhang, Victor R. Prybutok:
How the mobile communication markets differ in China, the U.S., and Europe. 111-114
- Marco Gori, Ian H. Witten:
The bubble of web visibility. 115-117
- Peter G. Neumann:
Anticipating disasters. 128
Volume 48, Number 4, April 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration. 15-20
- David A. Patterson:
The state of funding for new initiatives in computer science and engineering. 21-25
- Peter J. Denning:
Is computer science science? 27-31
- Diane Crawford:
Top 10 downloads from ACM's digital library. 33-34
- Richard P. Suttmeier:
A new technonationalism?: China and the development of technical standards. 35-37 - Vinton G. Cerf:
Spam, spim, and spit. 39-43
- Maris G. Martinsons:
Introduction. 44-48 - Jonathan J. H. Zhu, Enhai Wang:
Diffusion, use, and effect of the internet in China. 49-53 - Xunhua Guo, Guoqing Chen:
Internet diffusion in Chinese companies. 54-58 - Maris G. Martinsons:
The internet enlightens and empowers Chinese society. 59-60 - Robert M. Davison, Douglas R. Vogel, Roger W. Harris:
The e-transformation of western China. 62-67 - Jing Quan, Qing Hu, Xinan Wang:
IT is not for everyone in China. 69-72 - Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons:
Knowledge management in China. 73-76 - Qiang Tu, Kanliang Wang, Qin Shu:
Computer-related technostress in China. 77-81 - Charalambos L. Iacovou, Albert S. Dexter:
Surviving IT project cancellations. 83-86 - Christian S. Collberg, Stephen G. Kobourov:
Self-plagiarism in computer science. 88-94 - Ellen Christiaanse:
Performance benefits through integration hubs. 95-100 - Bettina Berendt, Oliver Günther, Sarah Spiekermann:
Privacy in e-commerce: stated preferences vs. actual behavior. 101-106 - Dursun Delen, Nikunj P. Dalal, Perakath C. Benjamin:
Integrated modeling: the key to holistic understanding of the enterprise. 107-112 - Kay Chen Tan, Mingliang Wang, Wei Peng:
A P2P genetic algorithm environment for the internet. 113-116
- Hai Zhuge:
Semantic grid: scientific issues, infrastructure, and methodology. 117-119
- Bruce Schneier:
Two-factor authentication: too little, too late. 136
Volume 48, Number 5, May 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Rebecca T. Mercuri:
Trusting in transparency. 15-19
- Diane Crawford:
Top 10 downloads from ACM's digital library. 21-22
- Meg McGinity Shannon:
It's the FCC on the line. 23-26
- David A. Patterson:
Recognizing individual excellence helps us all. 27-28
- Satish Nambisan:
How to prepare tomorrow's technologists for global networks of innovation. 29-31
- Anand Desai:
Introduction. 32-35 - Joseph K. Tan, H. Joseph Wen, Neveen Awad:
Health care and services delivery systems as complex adaptive systems. 36-44 - Albert T. Jones, Abhijit Deshmukh:
Test beds for complex systems. 45-50 - Jay Ramanathan:
Fractal architecture for the adaptive complex enterprise. 51-57 - Rajiv Ramnath, David Landsbergen:
IT-enabled sense-and-respond strategies in complex public organizations. 58-64
- Ashley A. Bush, Amrit Tiwana:
Designing sticky knowledge networks. 66-71 - Sridhar P. Nerur, RadhaKanta Mahapatra, George Mangalaraj:
Challenges of migrating to agile methodologies. 72-78 - Vincent S. Lai, Bo K. Wong:
Business types, e-strategies, and performance. 80-85 - Suzanne D. Pawlowski, Pratim Datta, Andrea L. Houston:
The (gradually) changing face of state IT jobs. 87-91 - Kenneth R. Fleischmann, William A. Wallace:
A covenant with transparency: opening the black box of models. 93-97 - Alex Potanin, James Noble, Marcus R. Frean, Robert Biddle:
Scale-free geometry in OO programs. 99-103 - Baihua Zheng, Dik Lun Lee:
Information dissemination via wireless broadcast. 105-110 - Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell database research self-assessment. 111-118
- Ben Light:
Potential pitfalls in packaged software adoption. 119-121
- Bruce Schneier:
Risks of third-party data. 136
Volume 48, Number 6, June 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Sarbanes-Oxley and software projects. 15-17
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Pamela Samuelson:
The Supreme Court revisits the Sony safe harbor. 21-25
- David A. Patterson:
Do you Queue? 27-28
- Jacques Cohen:
Updating computer science education. 29-31
- Andrew Rosenbloom:
Introduction. 32-35 - Paul K. Wright:
Rapid prototyping in consumer product design. 36-41 - Mike Bailey:
Layered manufacturing for scientific visualization. 42-48 - Sara McMains:
Layered manufacturing technologies. 50-56 - Thomas A. Funkhouser, Michael M. Kazhdan, Patrick Min, Philip Shilane:
Shape-based retrieval and analysis of 3d models. 58-64 - Carlo H. Séquin:
Rapid prototyping: a 3d visualization tool takes on sculpture and mathematical forms. 66-73 - David Koller, Marc Levoy:
Protecting 3d graphics content. 74-80
- U. N. Umesh, Minh Q. Huynh, Leonard M. Jessup:
Creating successful entrepreneurial ventures in IT. 82-87 - Jo Ellen Moore, Mary Sue Love:
IT professionals as organizational citizens. 88-93 - James A. McHugh, Fadi P. Deek:
An incentive system for reducing malware attacks. 94-99 - Jennifer Jie Xu, Hsinchun Chen:
Criminal network analysis and visualization. 100-107 - Rahul Singh, Al Farooq Salam, Lakshmi S. Iyer:
Agents in e-supply chains. 108-115 - Fiona Fui-Hoon Nah, Keng Siau, Yuhong Tian:
Knowledge management mechanisms of financial service sites. 117-123 - Tapas Kanungo, Philip Resnik, Song Mao, Doe-Wan Kim, Qigong Zheng:
The Bible and multilingual optical character recognition. 124-130
- Younghwa Lee:
The CAN-SPAM Act: a silver bullet solution? 131-132
- Susan Landau:
What lessons are we teaching? 144
Volume 48, Number 7, July 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- David A. Patterson:
Reflections on a programming Olympiad. 15-16
- Diane Crawford:
Top 10 downloads from ACM's digital library. 17-18
- Peter J. Denning:
The locality principle. 19-24
- Michael A. Cusumano:
The puzzle of Japanese software. 25-27
- Naomi S. Baron:
Instant messaging and the future of language. 29-31
- Karen Holtzblatt:
Introduction. 32-35 - Jan Blom, Jan Chipchase, Jaakko Lehikoinen:
Contextual and cultural challenges for user mobility research. 37-41 - Colleen Page:
Mobile research strategies for a global market. 42-48 - T. S. Balaji, Brian Landers, Jesse Kates, Bob Moritz:
A carrier's perspective on creating a mobile multimedia service. 49-53 - Eeva Kangas, Timo Kinnunen:
Applying user-centered design to mobile application development. 55-59 - David B. Rondeau:
For mobile applications, branding is experience. 61-66
- Barbara P. Heath, David J. McArthur, Marilyn McClelland, Ronald J. Vetter:
Metadata lessons from the iLumina digital library. 68-74 - Gun A. Lee, Gerard Jounghyun Kim, Mark Billinghurst:
Immersive authoring: What You eXperience Is What You Get (WYXIWYG). 76-81 - Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian M. Jones:
Does spell-checking software need a warning label? 82-86 - James J. Cappel, Victor R. Prybutok, Benny Varghese:
A closer look at attention to detail. 87-92 - Mike Thelwall:
Scientific web intelligence: finding relationships in university webs. 93-96 - Rudy Hirschheim:
The internet-based education bandwagon: look before you leap. 97-101
- Robert Davis, David Yung:
Understanding the interactivity between television and mobile commerce. 103-105
- Edward W. Felten:
DRM and public policy. 112
Volume 48, Number 8, August 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Robert L. Glass:
"Silver bullet" milestones in software history. 15-18
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Hal Berghel, Jacob Uecker:
WiFi attack vectors. 21-28
- David A. Patterson:
Does ACM support matter to conferences or journals? 29-30
- Sanjeev Arora, Bernard Chazelle:
Is the thrill gone? 31-33
- Thomas F. Stafford:
Introduction. 34-36 - Steve Gibson:
Spyware was inevitable. 37-39 - Roger Thompson:
Why spyware poses multiple threats to security. 41-43 - Xiaoni Zhang:
What do consumers really know about spyware? 44-48 - Lee A. Freeman, Andrew Urbaczewski:
Why do people hate spyware? 50-53 - Neveen Farag Awad, Kristina Fitzgerald:
The deceptive behaviors that offend us most about spyware. 55-60 - Qing Hu, Tamara Dinev:
Is spyware an Internet nuisance or public menace? 61-66 - Mark B. Schmidt, Kirk P. Arnett:
Spyware: a little knowledge is a wonderful thing. 67-70 - Younghwa Lee, Kenneth A. Kozar:
Investigating factors affecting the adoption of anti-spyware systems. 72-77 - Merrill Warkentin, Xin (Robert) Luo, Gary F. Templeton:
A framework for spyware assessment. 79-84 - Sudhindra Shukla, Fiona Fui-Hoon Nah:
Web browsing and spyware intrusion. 85-90 - Kirk P. Arnett, Mark B. Schmidt:
Busting the ghost in the machine. 92-95 - Robin S. Poston, Thomas F. Stafford, Amy Hennington:
Spyware: a view from the (online) street. 96-99
- Indranil Bose, Raktim Pal:
Auto-ID: managing anything, anywhere, anytime in the supply chain. 100-106 - Yihua Philip Sheng, Peter P. Mykytyn Jr., Charles R. Litecky:
Competitor analysis and its defenses in the e-marketplace. 107-112 - Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman:
Emerging information technologies: developing a timely IT strategy. 113-117 - Gregory W. Bond:
Software as art. 118-124 - Don Hardaway:
Sharing research in the 21st century: borrowing a page from open source software. 125-128 - Jeanette Nasem Morgan:
Why the software industry needs a good ghostbuster. 129-133
- Harry L. Reif, Michel Mitri:
How university professors teach project management for information systems. 134-136
- Peter G. Neumann, Michael D. Byrne:
Disability-related risks. 144
Volume 48, Number 9, September 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
To plan, two plans. 15-19
- Meg McGinity Shannon:
Nanotechnology's shadow. 21-23
- David A. Patterson:
Restoring the popularity of computer science. 25-28
- Diane Crawford:
Top 10 downloads from ACM's digital library. 29-30
- Frank Stajano:
RFID is x-ray vision. 31-33
- Gaetano Borriello:
Introduction. 34-37 - Joshua R. Smith, Kenneth P. Fishkin, Bing Jiang, Alexander V. Mamishev, Matthai Philipose, Adam D. Rea, Sumit Roy, Kishore Sundara-Rajan:
RFID-based techniques for human-activity detection. 39-44 - Ramesh Raskar, Paul A. Beardsley, Paul H. Dietz, Jeroen van Baar:
Photosensing wireless tags for geometric procedures. 46-51 - Trevor Pering, Rafael Ballagas, Roy Want:
Spontaneous marriages of mobile devices and interactive spaces. 53-59 - Sherry Hsi, Holly Fait:
RFID enhances visitors' museum experience at the Exploratorium. 60-65 - Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita:
RFID privacy issues and technical challenges. 66-71 - Oliver Günther, Sarah Spiekermann:
RFID and the perception of control: the consumer's view. 73-76 - Bruce Eckfeldt:
What does RFID do for the consumer? 77-79
- Rajiv C. Shah, Jay P. Kesan:
Nurturing software. 80-85 - James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista:
A question of trust. 87-91 - Zhenhui Jiang, Weiquan Wang, Izak Benbasat:
Multimedia-based interactive advising technology for online consumer decision support. 92-98 - Charles A. Wood, Terence T. Ow:
WEBVIEW: an SQL extension for joining corporate data to data derived from the web. 99-104 - Ping Zhang, Na Li:
The importance of affective quality. 105-108 - Hai Zhuge:
Exploring an epidemic in an e-science environment. 109-114 - Deborah K. Smith, Trevor T. Moores, Jerry Cha-Jan Chang:
Prepare your mind for learning. 115-118
- G. Anthony Gorry:
As simple as possible, but not simpler. 119-122
- Barbara B. Simons, Jim Horning:
Risks of technology-oblivious policy. 136
Volume 48, Number 10, October 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- David A. Patterson:
The new Professional Development Centre boasts 1, 000 courses, O'Reilly Books, and CS classics. 15-16
- Diane Crawford:
Top 10 downloads from ACM's digital library. 17-18
- Pamela Samuelson:
Did MGM really win the Grokster case? 19-24
- Michael A. Cusumano:
Software in Ireland: a balance of entrepreneurship and ... lifestyle management? 25-27
- Kenneth A. Ross:
Academic dishonesty and the Internet. 29-31
- Abbe Mowshowitz, Murray Turoff:
Introduction. 32-35 - Edward N. Wolff:
The growth of information workers in the U.S. economy. 37-42 - Sara J. Czaja, Starr Roxanne Hiltz:
Digital aids for an aging society. 43-44 - Elia T. Zureik, Abbe Mowshowitz:
Consumer power in the digital society. 46-51 - Barry Wellman:
Community: from neighborhood to network. 53-55 - Eli M. Noam:
Why the Internet is bad for democracy. 57-58 - Starr Roxanne Hiltz, Murray Turoff:
Education goes digital: the evolution of online learning and the revolution in higher education. 59-64 - Hal R. Varian:
Universal access to information. 65-66 - Peter G. Goldschmidt:
HIT and MIS: implications of health information technology and medical information systems. 68-74
- Yong Jin Kim, Rajiv Kishore, G. Lawrence Sanders:
From DQ to EQ: understanding data quality in the context of e-business systems. 75-81 - Gediminas Adomavicius, Alexander Tuzhilin:
Personalization technologies: a process-oriented perspective. 83-90 - Bipin Prabhakar, Charles R. Litecky, Kirk P. Arnett:
IT skills in a tough job market. 91-94 - Dragomir R. Radev, Jahna Otterbacher, Adam Winkel, Sasha Blair-Goldensohn:
NewsInEssence: summarizing online news topics. 95-98 - Sang M. Lee, Xin Tan, Silvana Trimi:
Current practices of leading e-government countries. 99-104 - Arvind Malhotra, Albert H. Segars:
Investigating wireless web adoption patterns in the U.S. 105-110
- Alan R. Peslak:
The educational productivity paradox. 111-114
- Lauren Weinstein:
The best-laid plans: a cautionary tale for developers. 128
Volume 48, Number 11, November 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Peter J. Denning, Andrew D. McGettrick:
Recentering computer science. 15-19
- Robert L. Glass:
The plot to deskill software engineering. 21-24
- Diane Crawford:
Top 10 downloads from ACM's digital library. 25-26
- Maria M. Klawe, Ben Shneiderman:
Crisis and opportunity in computer science. 27-28
- David A. Patterson:
Rescuing our families, our neighbors, and ourselves. 29-31
- Peter Kugel:
It's time to think outside the computational box. 32-37 - Alvin T. S. Chan:
Mobile cookies management on a smart card. 38-43 - Richard A. Frost:
Call for a public-domain SpeechWeb. 45-49 - Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote:
Detection and prevention of stack buffer overflow attacks. 50-56 - Eric Chuan-Fong Shih, Jason L. Dedrick, Kenneth L. Kraemer:
Rule of law and the international diffusion of e-commerce. 57-62 - Rana Tassabehji, Maria Vakola:
Business email: the killer impact. 64-70 - Sridhar P. Nerur, Riyaz Sikora, George Mangalaraj, Venugopal Balijepally:
Assessing the relative influence of journals in a citation network. 71-74 - Radha V. Mookerjee:
Maintaining enterprise software applications. 75-79 - Rosemary H. Wild, Kenneth A. Griggs, Eldon Y. Li:
An architecture for distributed scenario building and evaluation. 80-86 - Michael Ettredge, John Gerdes Jr., Gilbert G. Karuga:
Using web-based search data to predict macroeconomic statistics. 87-92
- Bill C. Hardgrave, Deborah J. Armstrong:
Software process improvement: it's a journey, not a destination. 93-96
- Steven M. Bellovin, Matt Blaze, Susan Landau:
The real national-security needs for VoIP. 120
Volume 48, Number 12, December 2005
- Diane Crawford:
Editorial pointers. 5-6
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Diane Crawford:
Top 10 downloads from ACM's digital library. 15-16
- Rebecca Mercuri:
Challenges in forensic computing. 17-21
- Hal Berghel, David Hoelzer:
Pernicious ports. 23-30
- David A. Patterson:
Robots in the desert: a research parable for our times. 31-33
- Amy S. Bruckman:
Student research and the internet. 35-37
- Rahul Singh, Lakshmi S. Iyer, Al Farooq Salam:
Introduction. 38-41 - Jos de Bruijn, Dieter Fensel, Uwe Keller, Rubén Lara:
Using the web service modeling ontology to enable semantic e-business. 43-47 - JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman:
Secure knowledge management and the semantic web. 48-54 - Manoj A. Thomas, Richard T. Redmond, Victoria Y. Yoon, Rahul Singh:
A semantic approach to monitor business process. 55-59 - Ejub Kajan, Leonid Stoimenov:
Toward an ontology-driven architectural framework for B2B. 60-66 - Thomas P. Moran, Alex Cozzi, Stephen P. Farrell:
Unified activity management: supporting people in e-business. 67-70 - Bhavani Thuraisingham:
Directions for security and privacy for semantic e-business applications. 71-73 - Juhnyoung Lee:
Model-driven business transformation and the semantic web. 75-77
- Michael J. O'Donnell:
Separate handles from names on the internet. 78-83 - Sanjiv Augustine, Bob Payne, Fred Sencindiver, Susan Woodcock:
Agile project management: steering from the edges. 85-89 - Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen:
Does avatar email improve communication? 91-95 - Torgeir Dingsøyr, Hans Karim Djarraya, Emil Røyrvik:
Practical knowledge management tool use in a software consulting company. 96-100 - Akhilesh Chandra, Thomas Calderon:
Challenges and constraints to the diffusion of biometrics in information systems. 101-106 - Stephan Kudyba, G. Brent Hamar, William M. Gandy:
Enhancing efficiency in the health care industry. 107-110 - Philip F. Musa, Victor Wacham A. Mbarika, Peter Meso:
Calling for programmed technology transfer and adoption strategies for sustainable LDC growth. 111-116
- Peter J. Denning, Jim Horning, David Lorge Parnas, Lauren Weinstein:
Wikipedia risks. 152
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.