default search action
Communications of the ACM (CACM), Volume 37, 1994
Volume 37, Number 1, January 1994
- Edward A. Feigenbaum, Peter Friedland, Bruce B. Johnson, H. Penny Nii, Herbert Schorr, Howard E. Shrobe, Robert S. Engelmore:
Knowledge-Based Systems in Japan (Report of the JTEC Panel). Commun. ACM 37(1): 17-19 (1994)
- Pamela Samuelson:
Copyright's Fair Use Doctrine and Digital Data. 21-27
- Doug Schuler:
Social Computing - Introduction to the Special Section. 28-29 - Gary Chapman:
The National Forum on Science and Technology Goals: Building a Democratic, Post-Cold War Science and Technology Policy. 30-37 - Doug Schuler:
Community Networks: Building a New Participatory Medium. 38-51 - Andrew Clement:
Computing at Work: Empowering Action By 'Low-level Users'. 52-63 - Batya Friedman, Peter H. Kahn Jr.:
Educating Computer Scientists: Linking the Social and Technical. 64-70 - Helen Nissenbaum:
Computing and Accountability. 72-80
- W. Robert Collins, Keith W. Miller, Bethany J. Spielman, Phillip Wherry:
How Good Is Good Enough? 81-91 - Jonathan Grudin:
Groupware and Social Dynamics: Eight Challenges for Developers. 92-105 - Renewing the Commitment To a Public Interest Telecommunications Policy. 106-108
- Robert D. Dorsett:
Risks in Aviation. 154
Volume 37, Number 2, February 1994
- Elliot Soloway:
Ways of Seeing. 15-20
- Seymour E. Goodman:
Computing in South Africa: An End to "Apartness"? 21-25
- Kaj Grønbæk, Randall H. Trigg:
Hypermedia - Introduction to the Special Section. 26-29 - Frank G. Halasz, Mayer D. Schwartz:
The Dexter Hypertext Reference Model. 30-39 - Kaj Grønbæk, Randall H. Trigg:
Design Issues for a Dexter-Based Hypermedia System. 40-49 - Lynda Hardman, Dick C. A. Bulterman, Guido van Rossum:
The Amsterdam Hypermedia Model: Adding Time and Context to the Dexter Model. 50-62 - Kaj Grønbæk, Jens A. Hem, Ole Lehrmann Madsen, Lennert Sloth:
Cooperative Hypermedia Systems: A dexter-Based Architecture. 65-74 - John J. Leggett, John L. Schnase:
Viewing Dexter with Open Eyes. 76-86
- Ehud Rivlin, Rodrigo A. Botafogo, Ben Shneiderman:
Navigating in Hyperspace: Designing a Structure-Based Toolbox. 87-96 - Gerard Salton, James Allan, Chris Buckley:
Automatic Structuring and Retrival of Large Text Files. 97-108
- Robert D. Dorsett:
Safety in the Air. 146
Volume 37, Number 3, March 1994
- Larry Press:
Emerging Dynabase Tools. 11-16
- Fred W. Weingarten:
Public Interest and the NII. 17-19
- Toshinori Munakata:
Commerical and Industrial AI - Indroduction to the Special Issue. 23-26 - Frederick Hayes-Roth, Neil Jacobstein:
The State of Knowledge-Based Systems. 27-39 - Bradley P. Allen:
Case-Based Reasoning: Business Applications. 40-42 - W. Eric L. Grimson, Joseph L. Mundy:
Computer Vision Applications. 45-51 - Alexander I. Rudnicky, Alexander G. Hauptmann, Kai-Fu Lee:
Survey of Current Speech Technology. 52-57 - Takeo Kanade, Michael L. Reed, Lee E. Weiss:
New Technologies and Applications in Robotics. 58-67 - Toshinori Munakata, Yashvant Jani:
Fuzzy Systems: An Overview. 69-76 - Lotfi A. Zadeh:
Fuzzy Logic, Neural Networks, and Soft Computing. 77-84 - David E. Rumelhart, Bernard Widrow, Michael A. Lehr:
The Basic Ideas in Neural Networks. 87-92 - Bernard Widrow, David E. Rumelhart, Michael A. Lehr:
Neural Networks: Applications in Industry, Business and Science. 93-105 - Kazuo Asakawa, Hideyuki Takagi:
Neural Networks in Japan. 106-112 - David E. Goldberg:
Genetic and Evolutionary Algorithms Come of Age. 113-119
- Peter G. Neumann:
Technology, Laws, and Society. 138
Volume 37, Number 4, April 1994
- Roy Rada, George S. Carson, Christopher T. Haynes:
The Role of Consensus. 15-16
- Marc Rettig:
Prototyping for Tiny Fingers. 21-27
- Adrian M. Tentner:
High Performance Computing - Introduction to the Special Section. 28-29 - William J. Camp, Steve Plimpton, Bruce Hendrickson, Robert W. Leland:
Massively Parallel Methods for Engineering and Science Problems. 31-41 - Allan S. Jacobson, Andrew L. Berkin, Martin N. Orton:
LinkWinds: Interactive Scientific Data Analysis and Visualization. 42-52 - Adrian M. Tentner, R. N. Blomquist, T. R. Canfield, P. L. Garner, E. M. Gelbard, K. C. Gross, M. Minkoff, R. A. Valentin:
Advances in Parallel Computing for Reactor Analysis and Safety. 54-64
- Jakob Nielsen, Jonathan Levy:
Measuring Usability: Preference vs. Performance. 66-75 - Richard A. Coll, Joan H. Coll, Ganesh Thankur:
Graphs and Tables: A Four-Factor Experiment. 76-86 - Academic Careers for Experimental Computer Scientists and Engineers. 87-90
- Peter G. Neumann:
Risks of Passwords. 126
Volume 37, Number 5, May 1994
- John Perry Barlow:
Dad's Invisible Guard-All Shield. 15-17
- Roger C. Schank:
Tractor Factories and Research in Software Design. 19-21
- Richard C. Waters, Elliot J. Chikofsky:
Reverse Engineeing - Introduction to the Special Section. 22-25 - Peter H. Aiken, Alice H. Muntz, Russ Richards:
DoD Legacy Systems: Reverse Engineering Data Requirements. 26-41 - William J. Premerlani, Michael R. Blaha:
An Approach for Reverse Engineering of Relational Databases. 42-49 - Jim Q. Ning, Andre Engberts, Wojtek Kozaczynski:
Automated Support for Legacy Code Understanding. 50-57 - Lawrence Markosian, Philip Newcomb, Russell Brand, Scott Burson, Ted Kitzmiller:
Using an Enabling Technology to Reengineer Legacy Systems. 58-70 - Ted J. Biggerstaff, Bharat G. Mitbander, Dallas E. Webster:
Program Understanding and the Concept Assigment Problem. 72-82 - Alex Quilici:
A Memory-Based Approach to Recognizing Programing Plans. 84-93
- Karl J. Lieberherr, Ignacio Silva-Lepe, Cun Xiao:
Adaptive Object-Oriented Programming Using Graph-Based Customization. 94-101 - Iris Vessey, Sue A. Conger:
Requirements Specification: Learning Object, Process, and Data Methodologies. 102-113
- Peter G. Neumann:
Alternative Passwords. 146
Volume 37, Number 6, June 1994
- Fred W. Weingarten:
The Politicizing of Science Policy. 13-15
- Gad Ariav, Seymour E. Goodman:
Israel: Of Swords and Software Plowshares. 17-21
- Nasr Ullah, Philip K. Brownfield:
The Making of the PowerPC - Introduction to the Special Section. 22-24 - Charles R. Moore, Russell C. Stanphill:
The PowerPC Alliance. 25-27 - Keith Diefendorff:
History of the PowerPC Architecture. 28-33 - Brad Burgess, Nasr Ullah, Peter Van Overen, Deene Ogden:
The PowerPC 603 Microprocessor. 34-42 - Brad W. Suessmith, George Paap III:
PowerPC 603 Microprocessor Power Management. 43-46 - Ali Poursepanj:
The POwerPC Performance Modeling Methodology. 47-55 - Julie Shipnes, Mike Philip:
A Modular Approach to Motorola PowerPC Compilers. 56-62 - William Anderson:
An Overview of Motorola's PowerPC Simulator Family. 64-69
- Stuart M. Shieber:
Lessons from a Restricted Turing Test. 70-78 - Hugh Gene Loebner:
Response to "Lessons from a Restricted Turing Test". Commun. ACM 37(6): 79-82 (1994) - Stuart M. Shieber:
On Loebner's Lessons. 83-84
- Peter G. Neumann:
Risks on the Information Superhighway. 114
Volume 37, Number 7, July 1994
- Larry Press:
Tomorrow's Campus. 13-17
- Doug Riecken:
Intelligent Agents - Introduction to the Special Issue. 18-21 - Marvin Minsky, Doug Riecken:
A Conversation with Marvin Minsky About Agents. 22-29 - Pattie Maes:
Agents that Reduce Work and Information Overload. 30-40 - Ernest A. Edmonds, Linda Candy, Rachel M. Jones, Bassel Soufi:
Support for Collaborative Design: Agents and Emergence. 41-47 - Michael R. Genesereth, Steven P. Ketchpel:
Software Agents. 48-53 - David Canfield Smith, Allen Cypher, James C. Spohrer:
KidSim: Programming Agents Without a Programming Language. 54-67 - Donald A. Norman:
How Might People Interact with Agents. 68-71 - Oren Etzioni, Daniel S. Weld:
A Softbot-Based Interface to the Internet. 72-76 - Tom M. Mitchell, Rich Caruana, Dayne Freitag, John P. McDermott, David Zabowski:
Experience with a Learning Personal Assistant. 80-91 - Ted Selker:
COACH: A Teaching Agent that Learns. 92-99 - Irene Greif:
Desktop Agents in Group-Enabled Products. 100-105 - Doug Riecken:
M: An Architecture of Integrated Agents. 106-116 - Margaret A. Boden:
Agents and Creativity. 117-121 - Joseph Bates:
The Role of Emotion in Believable Agents. 122-125 - Ramanathan V. Guha, Douglas B. Lenat:
Enabling Agents to Work Together. 126-142 - Henry A. Kautz, Bart Selman, Michael H. Coen:
Bottom-Up Design of Software Agents. 143-146
- Barbara Simons:
Questions about the NII. 170
Volume 37, Number 8, August 1994
- Robert E. Kahn:
The Role of Government in the Evolution of the Internet. 15-19
- Pamela Samuelson:
Self-Plagiarism or Fair Use? 21-25
- Seymour E. Goodman, Larry Press, Stephen R. Ruth, Anthony M. Rutkowski:
The Global Diffusion of the Internet: Patterns and Problems. 27-31
- Barry M. Leiner:
Internet Technology - Introduction to the Special Issue. 32-33 - Kimberly C. Claffy, Hans-Werner Braun, George C. Polyzos:
Tracking Long-Term Growth of the NSFNET. 34-45 - Håvard Eidnes:
Practical Considerations for Network Addressing Using CIDR. 46-53 - Hans Eriksson:
Mbone: The Multicast Backbone. 54-60 - John Moy:
Multicast Routing Extensions for OSPF. 61-66 - Fumio Teraoka, Keisuke Uehara, Hideki Sunahara, Jun Murai:
VIP: A Protocal Providing Host Mobility. 67-75 - Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret:
The World-Wide Web. 76-82 - Hiroshi Ishii, Minoru Kobayashi, Kazuho Arita:
Iterative Design of Seamless Collaboration Media. 83-97 - C. Mic Bowman, Peter B. Danzig, Udi Manber, Michael F. Schwartz:
Scalable Internet Discovery: Research Problems and Approaches. 98-107 - Katherine T. Fithen, Barbara Fraser:
CERT Incident Response. 108-113
- Susan Landau, Stephen T. Kent, Clinton Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel:
Crypto Policy Perspectives. 115-121
- Peter G. Neumann:
Friendly Fire. 138
Volume 37, Number 9, September 1994
- Yasmin B. Kafai, Elliot Soloway:
Computational Gifts for the Barney Generation. 19-22
- Roy Rada, George S. Carson:
The New Media. 23-25
- Robert V. Binder:
Object-Oriented Software Testing - Introduction to the Special Section. 28-29 - Paul C. Jorgensen, Carl Erickson:
Object-Oriented Integration Testing. 30-38 - Gail C. Murphy, Paul Townsend, Pok Sze Wong:
Experiences with Cluster and Class Testing. 39-47 - Robert M. Poston:
Automated Testing from Object Models. 48-58 - John D. McGregor, Timothy D. Korson:
Integrated Object-Oriented Testing and Development Processes. 59-77 - Thomas R. Arnold, William A. Fuson:
Testing "In A Perfect World". 78-86 - Robert V. Binder:
Design for Testability in Object-Oriented Systems. 87-101
- George W. Hart:
To Decode Short Cryptograms. 102-108 - Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts:
Cryptography Policy. 109-117
- Peter G. Neumann:
Expectations of Security and Privacy. 138
Volume 37, Number 10, October 1994
- Fred W. Weingarten:
University Research in a Squeeze. 15-17
- Tomasz Imielinski, B. R. Badrinath:
Mobile Wireless Computing: Challenges in Data Management. 18-28 - Effy Oz:
When Professional Standards are Lax: The CONFIRM Failure and its Lessons. 29-36 - Juris Hartmanis:
Turing Award Lecture: On Computational Complexity and the Nature of Computer Science. 37-43 - Richard T. Watson, Teck-Hua Ho, K. S. Raman:
Culture: A Fourth Dimension of Group Support. 44-55 - Hsinchun Chen, P. Hsu, Richard E. Orwig, L. Hoopes, Jay F. Nunamaker Jr.:
Automatic Concept Classification of Text from Electronic Meetings. 56-73 - Martin D. Fraser, Kuldeep Kumar, Vijay K. Vaishnavi:
Strategies for Incorporating Formal Specifications in Software Development. 74-86 - Rosemary H. Wild, Joseph J. Pignatiello Jr.:
Finding Stable System Designs: A reverse Simulation Technique. 87-98
- Benjamin Wright:
The Verdict on Plaintext Signatures: There're Legal. 122
Volume 37, Number 11, November 1994
- Larry Press:
Commercialization on the Internet. 17-21
- Brian A. Nejmeh:
Internet: A Strategic Tool for the Software Enterprise. 23-27
- Ravi Ganesan, Ravi S. Sandhu:
Securing Cyberspace - Introduction to the Special Section. 28-31 - Ross J. Anderson:
Why Cryptosystems Fail. 32-40 - Roger M. Needham:
Denail of Service: An Example. 42-46 - Ralf C. Hauser:
Does Licensing Require New Access Control Techniques? 48-55 - Gustavus J. Simmons:
Cryptanalysis and Protocol Failures. 56-65
- Paul C. Clark, Lance J. Hoffman:
BITS: A Smartcard Protected Operating System. 66-70 - Shekhar H. Kirani, Imran A. Zualkernan, Wei-Tek Tsai:
Evaluation of Expert System Testing Methods. 71-81 - Bruce I. Blum:
A Taxonomy of Software Development Methods. 82-94 - Richard Edwin Stearns:
Turing Award Lecture: It's Time to Reconsider Time. 95-99
- Herb Grosch:
Dehumanizing the Workplace. 122
Volume 37, Number 12, December 1994
- James W. Moore, David E. Emery, Roy Rada:
Language-Independent Standards. 17-20
- Pamela Samuelson:
The NII Intellectual Property Report. 21-27
- John M. Carroll:
Making Use a Design Representation. 28-35 - Gerald L. Lohse, Kevin Biolsi, Neff Walker, Henry H. Rueter:
A Classification of Visual Representations. 36-49 - Stephen G. Eick, Michael C. Nelson, Jeffrey D. Schmidt:
Graphical Analysis of Computer Log Files. 50-56 - Kim Halskov Madsen:
A Guide to Metaphorical Design. 57-62 - Steven C. Bagley, Gary E. Kopec:
Editing Images of Text. 63-72 - Manojit Sarkar, Marc H. Brown:
Graphical Fisheye Views. 73-84
- D. E. Stevenson:
Science, Computational Science, and Computer Science: At a Crossroads. 85-96 - Gerald J. Johnson:
Of Metaphore and the Difficulty of Computer Discourse. 97-102
- Peter G. Neumann:
Inside "Inside Risks". 154
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.