


default search action
Communications of the ACM (CACM), Volume 48, 2005
Volume 48, Number 1, January 2005
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- Phillip G. Armour:

The unconscious art of software testing. 15-18
- Diane Crawford:

Top 10 downloads from ACM's digital library. 19-20
- Meg McGinity:

Let your fingers do the talking. 21-23
- David A. Patterson:

Minority-minority and minority-majority technology transfer. 25-26
- Deborah Anderson:

Global linguistic diversity for the internet. 27-28 - Chris Stephenson:

Creating a national K-12 computer science community. 29-31
- Allison Druin, Juan Pablo Hourcade

:
Introduction. 32-34 - David Kestenbaum:

The challenges of IDC: what have we learned from our past? 35-38 - Mona Leigh Guha, Allison Druin, Gene Chipman, Jerry Alan Fails

, Sante Simms, Allison Farber:
Working with young children as technology design partners. 39-42 - Johanna Höysniemi, Perttu Hämäläinen, Laura Turkki, Teppo Rouvi:

Children's intuitive gestures in vision-based action games. 44-50 - Michael Eisenberg:

The material side of educational technology. 51-54 - Yvonne Rogers, Sara Price

, Cliff Randell, Danae Stanton Fraser
, Mark J. Weal, Geraldine Fitzpatrick:
Ubi-learning integrates indoor and outdoor experiences. 55-59 - Judy Robertson

, Judith Good
:
Story creation in virtual game worlds. 61-65 - RadhaKanta Mahapatra, Vincent S. Lai:

Evaluating end-user training programs. 66-70 - Andreas Holzinger

:
Usability engineering methods for software developers. 71-74 - John Tillquist, Waymond Rodgers

:
Using asset specificity and asset scope to measure the value of IT. 75-80 - Rodrigo C. Fonseca, Virgílio A. F. Almeida, Mark Crovella:

Locality in a web of streams. 82-88 - Ganesh Vaidyanathan:

A framework for evaluating third-party logistics. 89-94 - Michael Ettredge, John Gerdes Jr.:

Timeliness of investor relations data at corporate web sites. 95-100 - Ines Herrero, Jose L. Salmeron

:
Using the DEA methodology to rank software technical efficiency. 101-105
- Stuart J. Barnes:

Assessing the value of IS journals. 110-112
- George Ledin Jr.:

Not teaching viruses and worms is harmful. 144
Volume 48, Number 2, February 2005
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- David A. Patterson:

Why join ACM? 14
- Michael A. Cusumano:

Google: what it is and what it is not. 15-17
- Jon Crowcroft:

On the nature of computing. 19-20
- SIGs announce candidates for election. 21-22

- Diane Crawford:

Top 10 downloads from ACM's digital library. 23-24
- Dimitris N. Metaxas:

Introduction. 26-29 - Hervé Delingette

, Nicholas Ayache
:
Hepatic surgery simulation. 31-36 - Arie E. Kaufman, Sarang Lakare, Kevin Kreeger, Ingmar Bitter:

Virtual colonoscopy. 37-41 - Kyoungju Park, Albert Montillo, Dimitris N. Metaxas, Leon Axel

:
Volumetric heart modeling and analysis. 43-48 - Celina Imielinska, Pat Molholt:

Incorporating 3D virtual anatomy into the medical curriculum. 49-54 - Terry S. Yoo, Michael J. Ackerman:

Open source software for medical image processing and visualization. 55-59 - Notice of intent to de-charter professional chapters. 61-62

- Notice of intent to de-charter student chapters. 63-65

- J. Roberto Evaristo, Kevin C. Desouza

, Kevin Hollister:
Centralization momentum: the pendulum swings back again. 66-71 - Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh:

Trust in e-commerce. 72-77 - Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb:

Evaluating information security investments using the analytic hierarchy process. 78-83 - Fiona Fui-Hoon Nah

, Keng Siau
, Hong Sheng:
The value of mobile applications: a utility company study. 85-90 - R. Kelly Rainer Jr., Mark D. Miller:

Examining differences across journal rankings. 91-94 - Yufei Yuan, Brian Detlor:

Intelligent mobile crisis response systems. 95-98
- Chenglie Hu:

Dataless objects considered harmful. 99-101 - Shirley Ann Becker:

E-government usability for older adults. 102-104
- Peter G. Neumann:

Responsibilities of technologists. 128
Volume 48, Number 3, March 2005
- Diane Crawford:

Editorial pointers. 5
News track
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- ACM Fellows. 14

- David A. Patterson:

20th century vs. 21st century C&C: the SPUR manifesto. 15-16
- Phillip G. Armour:

Project portfolios: organizational management of risk. 17-20
- Diane Crawford:

Top 10 downloads from ACM's digital library. 21-22
- Gregory J. Conti:

Why computer scientists should attend hacker conferences. 23-24
- Robert L. Glass:

The first business application: a significant milestone in software history. 25-26
- Pamela Samuelson:

Legislative challenges to the Sony safe harbor rule. 27-31
- Norbert A. Streitz

, Paddy Nixon:
Introduction. 32-35 - Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon:

Delivering real-world ubiquitous location systems. 36-41 - Daniel M. Russell, Norbert A. Streitz

, Terry Winograd:
Building disappearing computers. 42-48 - Joëlle Coutaz, James L. Crowley, Simon Dobson

, David Garlan:
Context is key. 49-53 - Steve Benford

, Carsten Magerkurth, Peter Ljungstrand:
Bridging the physical and digital in pervasive gaming. 54-57 - Saadi Lahlou

, Marc Langheinrich
, Carsten Röcker:
Privacy and trust issues with invisible computers. 59-60 - Liam J. Bannon, Steve Benford

, John Bowers, Christian Heath:
Hybrid design creates innovative museum experiences. 62-65 - Hans Gellersen

:
Smart-Its: computers for artifacts in the physical world. 66 - Spyros Lalis

, Alexandros Karypidis, Anthony Savidis:
Ad-hoc composition in wearable and mobile computing. 67-68 - Achilles Kameas, Irene Mavrommati:

Extrovert gadgets. 69 - Joseph A. Paradiso:

Sensate media. 70 - Anatole Gershman, Andrew E. Fano:

Examples of commercial applications of ubiquitous computing. 71 - Jacques Cohen:

Computer science and bioinformatics. 72-78 - Arun Sen, Atish P. Sinha:

A comparison of data warehousing methodologies. 79-84
- SIGs announce candidates for election. 85

- Trevor T. Moores:

Do consumers understand the role of privacy seals in e-commerce? 86-91 - Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau:

A multiagent system for U.S. defense research contracting. 93-97 - William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:

Java distributed components for numerical visualization in VisAD. 98-104 - Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom T. Carey:

The state of user-centered design practice. 105-109 - Xiaoni Zhang

, Victor R. Prybutok
:
How the mobile communication markets differ in China, the U.S., and Europe. 111-114
- Marco Gori, Ian H. Witten

:
The bubble of web visibility. 115-117
- Peter G. Neumann:

Anticipating disasters. 128
Volume 48, Number 4, April 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Hal Berghel:

The two sides of ROI: return on investment vs. risk of incarceration. 15-20
- David A. Patterson:

The state of funding for new initiatives in computer science and engineering. 21-25
- Peter J. Denning:

Is computer science science? 27-31
- Diane Crawford:

Top 10 downloads from ACM's digital library. 33-34
- Richard P. Suttmeier:

A new technonationalism?: China and the development of technical standards. 35-37 - Vinton G. Cerf:

Spam, spim, and spit. 39-43
- Maris G. Martinsons

:
Introduction. 44-48 - Jonathan J. H. Zhu

, Enhai Wang:
Diffusion, use, and effect of the internet in China. 49-53 - Xunhua Guo

, Guoqing Chen:
Internet diffusion in Chinese companies. 54-58 - Maris G. Martinsons

:
The internet enlightens and empowers Chinese society. 59-60 - Robert M. Davison

, Douglas R. Vogel, Roger W. Harris:
The e-transformation of western China. 62-67 - Jing Quan, Qing Hu, Xinan Wang:

IT is not for everyone in China. 69-72 - Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons

:
Knowledge management in China. 73-76 - Qiang Tu, Kanliang Wang, Qin Shu:

Computer-related technostress in China. 77-81 - Charalambos L. Iacovou, Albert S. Dexter:

Surviving IT project cancellations. 83-86 - Christian S. Collberg, Stephen G. Kobourov

:
Self-plagiarism in computer science. 88-94 - Ellen Christiaanse:

Performance benefits through integration hubs. 95-100 - Bettina Berendt, Oliver Günther

, Sarah Spiekermann:
Privacy in e-commerce: stated preferences vs. actual behavior. 101-106 - Dursun Delen

, Nikunj P. Dalal, Perakath C. Benjamin:
Integrated modeling: the key to holistic understanding of the enterprise. 107-112 - Kay Chen Tan

, Mingliang Wang, Wei Peng:
A P2P genetic algorithm environment for the internet. 113-116
- Hai Zhuge:

Semantic grid: scientific issues, infrastructure, and methodology. 117-119
- Bruce Schneier:

Two-factor authentication: too little, too late. 136
Volume 48, Number 5, May 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Rebecca T. Mercuri:

Trusting in transparency. 15-19
- Diane Crawford:

Top 10 downloads from ACM's digital library. 21-22
- Meg McGinity Shannon:

It's the FCC on the line. 23-26
- David A. Patterson:

Recognizing individual excellence helps us all. 27-28
- Satish Nambisan

:
How to prepare tomorrow's technologists for global networks of innovation. 29-31
- Anand Desai:

Introduction. 32-35 - Joseph K. Tan, H. Joseph Wen, Neveen Awad:

Health care and services delivery systems as complex adaptive systems. 36-44 - Albert T. Jones, Abhijit Deshmukh:

Test beds for complex systems. 45-50 - Jay Ramanathan:

Fractal architecture for the adaptive complex enterprise. 51-57 - Rajiv Ramnath, David Landsbergen:

IT-enabled sense-and-respond strategies in complex public organizations. 58-64
- Ashley A. Bush

, Amrit Tiwana:
Designing sticky knowledge networks. 66-71 - Sridhar P. Nerur, RadhaKanta Mahapatra, George Mangalaraj:

Challenges of migrating to agile methodologies. 72-78 - Vincent S. Lai, Bo K. Wong:

Business types, e-strategies, and performance. 80-85 - Suzanne D. Pawlowski, Pratim Datta, Andrea L. Houston:

The (gradually) changing face of state IT jobs. 87-91 - Kenneth R. Fleischmann, William A. Wallace:

A covenant with transparency: opening the black box of models. 93-97 - Alex Potanin

, James Noble
, Marcus R. Frean, Robert Biddle:
Scale-free geometry in OO programs. 99-103 - Baihua Zheng

, Dik Lun Lee
:
Information dissemination via wireless broadcast. 105-110 - Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis

, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis
, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell database research self-assessment. 111-118
- Ben Light

:
Potential pitfalls in packaged software adoption. 119-121
- Bruce Schneier:

Risks of third-party data. 136
Volume 48, Number 6, June 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Phillip G. Armour:

Sarbanes-Oxley and software projects. 15-17
- Diane Crawford:

Top 10 downloads from ACM's digital library. 19-20
- Pamela Samuelson:

The Supreme Court revisits the Sony safe harbor. 21-25
- David A. Patterson:

Do you Queue? 27-28
- Jacques Cohen:

Updating computer science education. 29-31
- Andrew Rosenbloom:

Introduction. 32-35 - Paul K. Wright:

Rapid prototyping in consumer product design. 36-41 - Mike Bailey:

Layered manufacturing for scientific visualization. 42-48 - Sara McMains:

Layered manufacturing technologies. 50-56 - Thomas A. Funkhouser, Michael M. Kazhdan, Patrick Min, Philip Shilane

:
Shape-based retrieval and analysis of 3d models. 58-64 - Carlo H. Séquin:

Rapid prototyping: a 3d visualization tool takes on sculpture and mathematical forms. 66-73 - David Koller, Marc Levoy:

Protecting 3d graphics content. 74-80
- U. N. Umesh, Minh Q. Huynh, Leonard M. Jessup:

Creating successful entrepreneurial ventures in IT. 82-87 - Jo Ellen Moore, Mary Sue Love:

IT professionals as organizational citizens. 88-93 - James A. McHugh, Fadi P. Deek:

An incentive system for reducing malware attacks. 94-99 - Jennifer Jie Xu, Hsinchun Chen:

Criminal network analysis and visualization. 100-107 - Rahul Singh, Al Farooq Salam, Lakshmi S. Iyer:

Agents in e-supply chains. 108-115 - Fiona Fui-Hoon Nah

, Keng Siau
, Yuhong Tian:
Knowledge management mechanisms of financial service sites. 117-123 - Tapas Kanungo, Philip Resnik, Song Mao, Doe-Wan Kim, Qigong Zheng:

The Bible and multilingual optical character recognition. 124-130
- Younghwa Lee:

The CAN-SPAM Act: a silver bullet solution? 131-132
- Susan Landau:

What lessons are we teaching? 144
Volume 48, Number 7, July 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- David A. Patterson:

Reflections on a programming Olympiad. 15-16
- Diane Crawford:

Top 10 downloads from ACM's digital library. 17-18
- Peter J. Denning:

The locality principle. 19-24
- Michael A. Cusumano:

The puzzle of Japanese software. 25-27
- Naomi S. Baron:

Instant messaging and the future of language. 29-31
- Karen Holtzblatt:

Introduction. 32-35 - Jan Blom, Jan Chipchase, Jaakko Lehikoinen:

Contextual and cultural challenges for user mobility research. 37-41 - Colleen Page:

Mobile research strategies for a global market. 42-48 - T. S. Balaji, Brian Landers, Jesse Kates, Bob Moritz:

A carrier's perspective on creating a mobile multimedia service. 49-53 - Eeva Kangas, Timo Kinnunen:

Applying user-centered design to mobile application development. 55-59 - David B. Rondeau:

For mobile applications, branding is experience. 61-66
- Barbara P. Heath, David J. McArthur, Marilyn McClelland, Ronald J. Vetter:

Metadata lessons from the iLumina digital library. 68-74 - Gun A. Lee

, Gerard Jounghyun Kim, Mark Billinghurst
:
Immersive authoring: What You eXperience Is What You Get (WYXIWYG). 76-81 - Dennis F. Galletta

, Alexandra Durcikova, Andrea Everard, Brian M. Jones:
Does spell-checking software need a warning label? 82-86 - James J. Cappel, Victor R. Prybutok

, Benny Varghese:
A closer look at attention to detail. 87-92 - Mike Thelwall

:
Scientific web intelligence: finding relationships in university webs. 93-96 - Rudy Hirschheim:

The internet-based education bandwagon: look before you leap. 97-101
- Robert Davis, David Yung:

Understanding the interactivity between television and mobile commerce. 103-105
- Edward W. Felten:

DRM and public policy. 112
Volume 48, Number 8, August 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Robert L. Glass:

"Silver bullet" milestones in software history. 15-18
- Diane Crawford:

Top 10 downloads from ACM's digital library. 19-20
- Hal Berghel, Jacob Uecker:

WiFi attack vectors. 21-28
- David A. Patterson:

Does ACM support matter to conferences or journals? 29-30
- Sanjeev Arora, Bernard Chazelle:

Is the thrill gone? 31-33
- Thomas F. Stafford:

Introduction. 34-36 - Steve Gibson:

Spyware was inevitable. 37-39 - Roger Thompson:

Why spyware poses multiple threats to security. 41-43 - Xiaoni Zhang

:
What do consumers really know about spyware? 44-48 - Lee A. Freeman

, Andrew Urbaczewski
:
Why do people hate spyware? 50-53 - Neveen Farag Awad, Kristina Fitzgerald:

The deceptive behaviors that offend us most about spyware. 55-60 - Qing Hu, Tamara Dinev:

Is spyware an Internet nuisance or public menace? 61-66 - Mark B. Schmidt, Kirk P. Arnett:

Spyware: a little knowledge is a wonderful thing. 67-70 - Younghwa Lee, Kenneth A. Kozar:

Investigating factors affecting the adoption of anti-spyware systems. 72-77 - Merrill Warkentin

, Xin (Robert) Luo, Gary F. Templeton:
A framework for spyware assessment. 79-84 - Sudhindra Shukla, Fiona Fui-Hoon Nah

:
Web browsing and spyware intrusion. 85-90 - Kirk P. Arnett, Mark B. Schmidt:

Busting the ghost in the machine. 92-95 - Robin S. Poston, Thomas F. Stafford, Amy Hennington:

Spyware: a view from the (online) street. 96-99
- Indranil Bose, Raktim Pal:

Auto-ID: managing anything, anywhere, anytime in the supply chain. 100-106 - Yihua Philip Sheng, Peter P. Mykytyn Jr., Charles R. Litecky:

Competitor analysis and its defenses in the e-marketplace. 107-112 - Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman:

Emerging information technologies: developing a timely IT strategy. 113-117 - Gregory W. Bond:

Software as art. 118-124 - Don Hardaway:

Sharing research in the 21st century: borrowing a page from open source software. 125-128 - Jeanette Nasem Morgan:

Why the software industry needs a good ghostbuster. 129-133
- Harry L. Reif, Michel Mitri:

How university professors teach project management for information systems. 134-136
- Peter G. Neumann, Michael D. Byrne:

Disability-related risks. 144
Volume 48, Number 9, September 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Phillip G. Armour:

To plan, two plans. 15-19
- Meg McGinity Shannon:

Nanotechnology's shadow. 21-23
- David A. Patterson:

Restoring the popularity of computer science. 25-28
- Diane Crawford:

Top 10 downloads from ACM's digital library. 29-30
- Frank Stajano:

RFID is x-ray vision. 31-33
- Gaetano Borriello:

Introduction. 34-37 - Joshua R. Smith, Kenneth P. Fishkin, Bing Jiang, Alexander V. Mamishev, Matthai Philipose, Adam D. Rea, Sumit Roy, Kishore Sundara-Rajan:

RFID-based techniques for human-activity detection. 39-44 - Ramesh Raskar, Paul A. Beardsley, Paul H. Dietz, Jeroen van Baar:

Photosensing wireless tags for geometric procedures. 46-51 - Trevor Pering, Rafael Ballagas, Roy Want:

Spontaneous marriages of mobile devices and interactive spaces. 53-59 - Sherry Hsi, Holly Fait:

RFID enhances visitors' museum experience at the Exploratorium. 60-65 - Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita:

RFID privacy issues and technical challenges. 66-71 - Oliver Günther

, Sarah Spiekermann:
RFID and the perception of control: the consumer's view. 73-76 - Bruce Eckfeldt:

What does RFID do for the consumer? 77-79
- Rajiv C. Shah, Jay P. Kesan:

Nurturing software. 80-85 - James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista:

A question of trust. 87-91 - Zhenhui Jiang, Weiquan Wang, Izak Benbasat:

Multimedia-based interactive advising technology for online consumer decision support. 92-98 - Charles A. Wood, Terence T. Ow

:
WEBVIEW: an SQL extension for joining corporate data to data derived from the web. 99-104 - Ping Zhang

, Na Li:
The importance of affective quality. 105-108 - Hai Zhuge:

Exploring an epidemic in an e-science environment. 109-114 - Deborah K. Smith, Trevor T. Moores, Jerry Cha-Jan Chang:

Prepare your mind for learning. 115-118
- G. Anthony Gorry:

As simple as possible, but not simpler. 119-122
- Barbara B. Simons, Jim Horning:

Risks of technology-oblivious policy. 136
Volume 48, Number 10, October 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- David A. Patterson:

The new Professional Development Centre boasts 1, 000 courses, O'Reilly Books, and CS classics. 15-16
- Diane Crawford:

Top 10 downloads from ACM's digital library. 17-18
- Pamela Samuelson:

Did MGM really win the Grokster case? 19-24
- Michael A. Cusumano:

Software in Ireland: a balance of entrepreneurship and ... lifestyle management? 25-27
- Kenneth A. Ross:

Academic dishonesty and the Internet. 29-31
- Abbe Mowshowitz, Murray Turoff:

Introduction. 32-35 - Edward N. Wolff:

The growth of information workers in the U.S. economy. 37-42 - Sara J. Czaja, Starr Roxanne Hiltz:

Digital aids for an aging society. 43-44 - Elia T. Zureik, Abbe Mowshowitz:

Consumer power in the digital society. 46-51 - Barry Wellman:

Community: from neighborhood to network. 53-55 - Eli M. Noam:

Why the Internet is bad for democracy. 57-58 - Starr Roxanne Hiltz, Murray Turoff:

Education goes digital: the evolution of online learning and the revolution in higher education. 59-64 - Hal R. Varian:

Universal access to information. 65-66 - Peter G. Goldschmidt:

HIT and MIS: implications of health information technology and medical information systems. 68-74
- Yong Jin Kim, Rajiv Kishore, G. Lawrence Sanders:

From DQ to EQ: understanding data quality in the context of e-business systems. 75-81 - Gediminas Adomavicius, Alexander Tuzhilin

:
Personalization technologies: a process-oriented perspective. 83-90 - Bipin Prabhakar, Charles R. Litecky, Kirk P. Arnett:

IT skills in a tough job market. 91-94 - Dragomir R. Radev, Jahna Otterbacher

, Adam Winkel, Sasha Blair-Goldensohn:
NewsInEssence: summarizing online news topics. 95-98 - Sang M. Lee, Xin Tan, Silvana Trimi

:
Current practices of leading e-government countries. 99-104 - Arvind Malhotra, Albert H. Segars:

Investigating wireless web adoption patterns in the U.S. 105-110
- Alan R. Peslak:

The educational productivity paradox. 111-114
- Lauren Weinstein:

The best-laid plans: a cautionary tale for developers. 128
Volume 48, Number 11, November 2005
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Peter J. Denning, Andrew D. McGettrick:

Recentering computer science. 15-19
- Robert L. Glass:

The plot to deskill software engineering. 21-24
- Diane Crawford:

Top 10 downloads from ACM's digital library. 25-26
- Maria M. Klawe, Ben Shneiderman:

Crisis and opportunity in computer science. 27-28
- David A. Patterson:

Rescuing our families, our neighbors, and ourselves. 29-31
- Peter Kugel:

It's time to think outside the computational box. 32-37 - Alvin T. S. Chan:

Mobile cookies management on a smart card. 38-43 - Richard A. Frost:

Call for a public-domain SpeechWeb. 45-49 - Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote:

Detection and prevention of stack buffer overflow attacks. 50-56 - Eric Chuan-Fong Shih, Jason L. Dedrick, Kenneth L. Kraemer:

Rule of law and the international diffusion of e-commerce. 57-62 - Rana Tassabehji, Maria Vakola:

Business email: the killer impact. 64-70 - Sridhar P. Nerur, Riyaz Sikora, George Mangalaraj, Venugopal Balijepally:

Assessing the relative influence of journals in a citation network. 71-74 - Radha V. Mookerjee:

Maintaining enterprise software applications. 75-79 - Rosemary H. Wild, Kenneth A. Griggs, Eldon Y. Li

:
An architecture for distributed scenario building and evaluation. 80-86 - Michael Ettredge, John Gerdes Jr., Gilbert G. Karuga:

Using web-based search data to predict macroeconomic statistics. 87-92
- Bill C. Hardgrave, Deborah J. Armstrong:

Software process improvement: it's a journey, not a destination. 93-96
- Steven M. Bellovin, Matt Blaze, Susan Landau:

The real national-security needs for VoIP. 120
Volume 48, Number 12, December 2005
- Diane Crawford:

Editorial pointers. 5-6
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Diane Crawford:

Top 10 downloads from ACM's digital library. 15-16
- Rebecca Mercuri:

Challenges in forensic computing. 17-21
- Hal Berghel, David Hoelzer:

Pernicious ports. 23-30
- David A. Patterson:

Robots in the desert: a research parable for our times. 31-33
- Amy S. Bruckman:

Student research and the internet. 35-37
- Rahul Singh, Lakshmi S. Iyer, Al Farooq Salam:

Introduction. 38-41 - Jos de Bruijn, Dieter Fensel, Uwe Keller, Rubén Lara:

Using the web service modeling ontology to enable semantic e-business. 43-47 - JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman:

Secure knowledge management and the semantic web. 48-54 - Manoj A. Thomas

, Richard T. Redmond, Victoria Y. Yoon, Rahul Singh:
A semantic approach to monitor business process. 55-59 - Ejub Kajan

, Leonid Stoimenov
:
Toward an ontology-driven architectural framework for B2B. 60-66 - Thomas P. Moran, Alex Cozzi, Stephen P. Farrell:

Unified activity management: supporting people in e-business. 67-70 - Bhavani Thuraisingham:

Directions for security and privacy for semantic e-business applications. 71-73 - Juhnyoung Lee:

Model-driven business transformation and the semantic web. 75-77
- Michael J. O'Donnell:

Separate handles from names on the internet. 78-83 - Sanjiv Augustine, Bob Payne, Fred Sencindiver, Susan Woodcock:

Agile project management: steering from the edges. 85-89 - Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen:

Does avatar email improve communication? 91-95 - Torgeir Dingsøyr

, Hans Karim Djarraya, Emil Røyrvik:
Practical knowledge management tool use in a software consulting company. 96-100 - Akhilesh Chandra, Thomas Calderon:

Challenges and constraints to the diffusion of biometrics in information systems. 101-106 - Stephan Kudyba, G. Brent Hamar, William M. Gandy:

Enhancing efficiency in the health care industry. 107-110 - Philip F. Musa, Victor Wacham A. Mbarika, Peter Meso

:
Calling for programmed technology transfer and adoption strategies for sustainable LDC growth. 111-116
- Peter J. Denning, Jim Horning, David Lorge Parnas, Lauren Weinstein:

Wikipedia risks. 152

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














