default search action
Communications of the ACM (CACM), Volume 45, 2002
Volume 45, Number 1, January 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10
- Phillip G. Armour:
The spiritual life of projects. 11-14
- Neil Munro:
Too much of a good thing. 15-17
- Lloyd W. Bartholome, David H. Olsen:
A practical approach for implementing e-commerce programs in business schools. 19-21
- Anthony M. Townsend, Anthony R. Hendrickson, Samuel M. DeMarie:
Meeting the virtual work imperative. 23-26
- Michael Lewis, Jeffrey Jacobson:
Game engines in scientific research - Introduction. 27-31 - Michael Lewis:
The new cards. 30-31 - John E. Laird:
Research in human-level AI using computer games. 32-35 - Wayne Piekarski, Bruce H. Thomas:
ARQuake: the outdoor augmented reality gaming system. 36-38 - Jeffrey Jacobson, Zimmy Hwang:
Unreal tournament for immersive interactive theater. 39-42 - Gal A. Kaminka, Manuela M. Veloso, Steve Schaffer, Chris Sollitto, Rogelio Adobbati, Andrew N. Marshall, Andrew Scholer, Sheila Tejada:
GameBots: a flexible test bed for multiagent team research. 43-45 - Markus Bylund, Fredrik Espinoza:
Testing and demonstrating context-aware services with Quake III Arena. 46-48 - The ACM annual report FY01. 49-52
- Murugan Anandarajan:
Internet abuse in the workplace - Introduction. 53-54 - Jeffrey M. Stanton:
Company profile of the frequent internet user. 55-59 - Jo Ann Oravec:
Constructive approaches to internet recreation in the workplace. 60-63 - France Bélanger, Craig Van Slyke:
Abuse or learning? 64-65 - Vivien K. G. Lim, Thompson S. H. Teo, Geok Leng Loo:
How do I loaf here? let me count the ways. 66-70 - Claire A. Simmers:
Aligning internet usage with business priorities. 71-74 - Keng Siau, Fiona Fui-Hoon Nah, Limei Teng:
Acceptable internet use policy. 75-79 - Andrew Urbaczewski, Leonard M. Jessup:
Does electronic monitoring of employee internet usage work? 80-83 - Raymond R. Panko, Hazel Glenn Beh:
Monitoring for pornography and sexual harassment. 84-87
- Upkar Varshney, Andrew P. Snow, Matt McGivern, Christi Howard:
Voice over IP. 89-96 - Chittibabu Govindarajulu:
The status of helpdesk support. 97-100 - Julie Smith David, David Schuff, Robert D. St. Louis:
Managing your total IT cost of ownership. 101-106
- Cris Kobryn:
Will UML 2.0 be agile or awkward? 107-110
- Mohamed E. Fayad:
Accomplishing software stability. 111-115 - Robert E. Filman, Stuart Barrett, Diana D. Lee, Ted Linden:
Inserting ilities by controlling communications. 116-122
- Rebecca Mercuri:
Uncommon criteria. 172
Volume 45, Number 2, February 2002
- Diane Crawford:
Editorial pointers. 5-6 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-17
- Andrew Grosso:
Why the digital millennium copyright act is a failure of reason. 19-23
- Robert L. Glass:
Stodgy by design, and the notion of 'dumbing up'. 25-27
- Felipe Castel:
Ontological computing. 29-30 - Ben Shneiderman:
ACM's computing professionals face new challenges. 31-34
- Qing Bian Zhang, Patrick Y. K. Chau:
Creating e-commerce courses with regional intent. 35-37
- Michael Grüninger, Jintae Lee:
Ontology Applications and Design - Introduction. 39-41 - Clyde W. Holsapple, K. D. Joshi:
A collaborative approach to ontology design. 42-47 - Henry Kim:
Predicting how ontologies for the semantic web will evolve. 48-54 - John O. Everett, Daniel G. Bobrow, Reinhard Stolle, Richard S. Crouch, Valeria de Paiva, Cleo Condoravdi, Martin van den Berg, Livia Polanyi:
Making ontologies work for resolving redundancies across documents. 55-60 - Nicola Guarino, Christopher A. Welty:
Evaluating ontological decisions with OntoClean. 61-65
- Bert J. Dempsey, Debra Weiss, Paul Jones, Jane Greenberg:
Who is an open source software developer? 67-72 - Jo Ellen Moore, Lisa A. Burke:
How to turn around 'turnover culture' in IT. 73-78 - William J. Kettinger, Choong C. Lee:
Understanding the IS-user divide in IT innovation. 79-84 - Delvin Grant:
A wider view of business process reengineering. 85-90 - Gordon Bell, Jim Gray:
What's next in high-performance computing? 91-95 - Richard T. Snodgrass:
Progress on ACM's Becoming the Preferred Publisher, Rights and responsibilities in ACM publishing. 97-101
- Thomas Erickson:
Some problems with the notion of context-aware computing. 102-104
- Evgeniy Gabrilovich, Alex Gontmakher:
The homograph attack. 128
Volume 45, Number 3, March 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Peter J. Denning:
Internet time out. 15-18
- Meg McGinity:
Call it techonomics. 19-21
- A study of student privacy issues at Stanford University. 23-25
- Ananda Mitra:
Trust, authenticity, and discursive power in cyberspace. 27-29
- Gaurav S. Sukhatme, Maja J. Mataric:
Robots: Intelligence, Versatility, Adaptivity - Introduction. 30-32 - Rodney A. Brooks:
Humanoid robots. 33-38 - Daniela Rus, Zack J. Butler, Keith Kotay, Marsette Vona:
Self-reconfiguring robots. 39-45 - Oussama Khatib, Oliver Brock, Kyong-Sok Chang, François Conti, Diego C. Ruspini, Luis Sentis:
Robotics and interactive simulation. 46-51 - Sebastian Thrun:
Probabilistic robotics. 52-57 - Manuela M. Veloso:
Entertainment robotics. 59-63
- Richard T. Grenci, Peter A. Todd:
Solutions-driven marketing. 64-71 - John Cameron:
Configurable development processes. 72-77 - Leysia Palen:
Mobile telephony in a connected life. 78-82 - Huaiqing Wang, John Mylopoulos, Stephen Shaoyi Liao:
Intelligent agents and financial risk monitoring systems. 83-88 - Vincent S. Lai, Wingyan Chung:
Managing international data communications. 89-93
- Ruzena Bajcsy, Craig W. Reynolds:
Computer science: the science of and about information and computation. 94-98
- Peter J. Denning, James J. Horning:
Risks of linear thinking. 120
Volume 45, Number 4, April 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-16
- Mark Guzdial, Elliot Soloway:
Teaching the Nintendo generation to program. 17-21
- Hal Berghel:
Hijacking the web. 23-27
- Murray Turoff:
Past and future emergency response information systems. 29-32
- David Davenport:
Anonymity on the Internet: why the price may be too high. 33-35
- Jennifer Preece:
Supporting community and building social capital - Introduction. 37-39 - Thomas Erickson, Christine Halverson, Wendy A. Kellogg, Mark Laff, Tracee Wolf:
Social translucence: designing social infrastructures that make collective activity visible. 40-44 - Judith S. Donath:
A semantic approach to visualizing online conversations. 45-49 - Marc Smith:
Tools for navigating large social cyberspaces. 51-55 - Starr Roxanne Hiltz, Murray Turoff:
What makes learning networks effective? 56-59 - Amy S. Bruckman:
The future of e-learning communities. 60-63 - Dorine Andrews:
Audience-specific online community design. 64-68 - David R. Millen, Michael A. Fontaine, Michael J. Muller:
Understanding the benefit and costs of communities of practice. 69-73
- Judy E. Scott, Iris Vessey:
Managing risks in enterprise systems implementations. 74-81 - Thomas P. Schambach, J. Ellis Blanton:
The professional development challenge for IT professionals. 83-87 - Bonnie A. Nardi, Steve Whittaker, Ellen Isaacs, Mike Creech, Jeff A. Johnson, John Hainsworth:
Integrating communication and information through ContactMap. 89-95 - Mordechai Ben-Menachem, Roy Gelbard:
Integrated IT management tool kit. 96-102 - Arnd Weber:
Enabling crypto: how radical innovations occur. 103-107
- Mohamed E. Fayad:
How to deal with software stability. 109-112
- David W. J. Stringer-Calvert:
Digital Evidence. 128
- Marie-Michèle Boulet, Faouzi Ben Jebara, Fathi Bemmira, Serge Boudreault:
A comparison of three delivery systems for teaching an information technology course. 129-135 - Vladan Devedzic:
Understanding ontological engineering. 136-144 - Christos J. Georgiou, Petros S. Stefaneas:
Strategies for accelerating the worldwide adoption of e-commerce. 145-151 - T. Dean Hendrix, Michelle P. Schneider:
NASA's TReK project: a case study in using the spiral model of software development. 152-159 - William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:
Java distributed objects for numerical visualization in VisAD. 160-170 - Gretchen L. Robertson, Deborah Hix:
Making the computer accessible to mentally retarded adults. 171-183 - Beverly K. Kahn, Diane M. Strong, Richard Y. Wang:
Information quality benchmarks: product and service performance. 184-192 - Anandasivam Gopal, Tridas Mukhopadhyay, Mayuram S. Krishnan:
The role of software processes and communication in offshore software development. 193-200 - Ravi Patnayakuni, Arun Rai:
Development infrastructure characteristics and process capability. 201-210 - Leo Pipino, Yang W. Lee, Richard Y. Wang:
Data quality assessment. 211-218 - Moshe Zviran:
Securing PC applications: the relay race approach. 219-227
Volume 45, Number 5, May 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Robert L. Glass:
Searching for the holy grail of software engineering. 15-16
- Phillip G. Armour:
The organism and the mechanism of projects. 17-20
- Pratyush Bharati, Peter Tarasewich:
Global perceptions of journals publishing e-commerce research. 21-26
- Wei-Lung Wang:
Beware the engineering metaphor. 27-29
- Peter Brusilovsky, Mark T. Maybury:
From adaptive hypermedia to the adaptive web. 30-33 - Daniel Billsus, Clifford Brunk, Craig Evans, Brian Gladish, Michael J. Pazzani:
Adaptive interfaces for ubiquitous web access. 34-38 - Barry Smyth, Keith Bradley, Rachael Rafter:
Personalization techniques for online recruitment services. 39-40 - Josef Fink, Jürgen Koenemann, Stephan Noller, Ingo Schwab:
Putting personalization into practice. 41-42 - Elisabeth André, Thomas Rist:
From adaptive hypertext to personalized web companions. 43-46 - Keith Cheverst, Keith Mitchell, Nigel Davies:
The role of adaptive hypermedia in a context-aware tourist GUIDE. 47-51 - Liliana Ardissono, Anna Goy, Giovanna Petrone, Marino Segnan:
Personalization in business-to-customer interaction. 52-53 - Marc Light, Mark T. Maybury:
Personalized multimedia information access. 54-59 - Paul De Bra:
Adaptive educational hypermedia on the web. 60-61 - Diana Bental, Alison Cawsey:
Personalized and adaptive systems for medical consumer applications. 62-63 - Alfred Kobsa:
Personalized hypermedia and international privacy. 64-67
- Edieal J. Pinker, Abraham Seidmann, Reginald C. Foster:
Strategies for transitioning 'old economy' firms to e-business. 76-83 - Christian Wagner, Efraim Turban:
Are intelligent e-commerce agents partners or predators? 84-90 - Barry Wellman:
Designing the Internet for a networked society. 91-96 - John J. Helly, T. Todd Elvins, Don Sutton, David Martínez, Scott E. Miller, Steward Pickett, Aaron M. Ellison:
Controlled publication of digital scientific data. 97-101 - Ned Kock:
Managing with web-based IT in mind. 102-106
- Michael Tow Cheung, Ziqi Liao:
Time-asymmetry in business processes. 107-108
- Lauren Weinstein:
Risks of inaction. 120
Volume 45, Number 6, June 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum - Weighing in on the notion of 'dumbing up'. 11-13
- Peter J. Denning:
Flatlined. 15-19
- Meg McGinity:
Broadband to go. 21-24
- Harold W. Lawson:
Rebirth of the computer industry. 25-29
- Gul Agha:
Introduction. 30-32 - Fabio Kon, Fábio M. Costa, Gordon S. Blair, Roy H. Campbell:
The case for reflective middleware. 33-38 - Anand Tripathi:
Challenges designing next-generation middleware systems. 39-42 - Douglas C. Schmidt:
Middleware for real-time and embedded systems. 43-48 - Nalini Venkatasubramanian:
Safe 'composability' of middleware services. 49-52 - Valérie Issarny, Christos Kloukinas, Apostolos V. Zarras:
Systematic aid for developing middleware architectures. 53-58 - Jean Bacon, Ken Moody:
Toward open, secure, widely distributed services. 59-64
- Diane Crawford:
ACM fellows. 65
- Michael Ettredge, Vernon J. Richardson, Susan Scholz:
Timely financial reporting at corporate web sites? 67-71 - Kai Lung Hui, Patrick Y. K. Chau:
Classifying digital products. 73-79 - Gary Klein, James J. Jiang, Debbie B. Tesch:
Wanted: project teams with a blend of is professional orientations. 81-87 - Gloria Mark:
Extreme collaboration. 89-93 - Raquel Benbunan-Fich:
Improving education and training with IT. 94-99 - James A. Aries, Subhankar Banerjee, Marc S. Brittan, Eric Dillon, Janusz S. Kowalik, John P. Lixvar:
Capacity and performance analysis of distributed enterprise systems. 100-105
- Patrick P. Gelsinger:
Power play. 106
- Ross J. Anderson:
Free speech online and offline. 120
Volume 45, Number 7, July 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-12
- Brock N. Meeks:
True blue and vigilante, too. 13-15
- Neil Munro:
The ever-expanding network of local and federal databases. 17-19
- Shai Simonson:
A post-baccalaureate undergraduate-level program in computer science. 21-24
- Maris G. Martinsons, Valdis Martinsons:
Rethinking the value of IT, again. 25-26
- Andrew Rosenbloom:
How the virtual inspires the real. 28-31 - W. Daniel Hillis:
The power to shape the world. 32-35 - Alvy Ray Smith:
The reality of simulated actors. 36-39 - Theresa-Marie Rhyne:
Computer games and scientific visualization. 40-44 - Clemens Wagner, Markus A. Schill, Reinhard Männer:
Intraocular surgery on a virtual eye. 45-49 - Marc Pollefeys, Luc Van Gool:
From images to 3D models. 50-55 - Norman I. Badler, Charles A. Erignac, Ying Liu:
Virtual humans for validating maintenance procedures. 56-63 - Mark Billinghurst, Hirokazu Kato:
Collaborative augmented reality. 64-70
- Gordon Bell, Jim Gemmell:
A call for the home media network. 71-75 - Toru Ishida:
Digital city Kyoto. 76-81 - Katherine M. Shelfer, J. Drew Procaccino:
Smart card evolution. 83-88 - John Gallaugher:
E-commerce and the undulating distribution channel. 89-95 - Snehamay Banerjee, Ram L. Kumar:
Managing electronic interchange of business documents. 96-102 - Jonathon N. Cummings, Brian S. Butler, Robert E. Kraut:
The quality of online social relationships. 103-108
- Robert M. Davison:
Cultural complications of ERP. 109-111
- Donald A. Norman:
Beyond the computer industry. 120
Volume 45, Number 8, August 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News tracks. 9-10
- Diane Crawford:
Embrace the engineering metaphor. 11-14
- Cathleen A. Norris, Elliot Soloway, Terry Sullivan:
Examining 25 years of technology in U.S. education. 15-18
- Robert L. Glass:
The proof of correctness wars. 19-21
- Christof Teuscher, Moshe Sipper:
Hypercomputation: hype or computation?. 23-24
- Ross A. Malaga:
Additional methods when using email for teaching. 25-27
- Usama M. Fayyad, Ramasamy Uthurusamy:
Evolving data into mining solutions for insights. 28-31 - Padhraic Smyth, Daryl Pregibon, Christos Faloutsos:
Data-driven evolution of data mining algorithms. 33-37 - Paul S. Bradley, Johannes Gehrke, Raghu Ramakrishnan, Ramakrishnan Srikant:
Scaling mining algorithms to large databases. 38-43 - Ron Kohavi, Neal Rothleder, Evangelos Simoudis:
Emerging trends in business analytics. 45-48 - Chidanand Apté, Bing Liu, Edwin P. D. Pednault, Padhraic Smyth:
Business applications of data mining. 49-53 - Jiawei Han, Russ B. Altman, Vipin Kumar, Heikki Mannila, Daryl Pregibon:
Emerging scientific applications in data mining. 54-58 - Robert L. Grossman, Mark F. Hornick, Gregor Meyer:
Data mining standards initiatives. 59-61
- Peter Tarasewich, Patrick R. McMullen:
Swarm intelligence: power in numbers. 62-67 - Tim Coltman, Timothy M. Devinney, Alopi S. Latukefu, David F. Midgley:
Keeping e-business in perspective. 69-73 - Clayton A. Looney, Debabroto Chatterjee:
Web-enabled transformation of the brokerage industry. 75-81 - Craig Van Slyke, Christie L. Comunale, France Bélanger:
Gender differences in perceptions of web-based shopping. 82-86 - George Chin Jr., James D. Myers, David Hoyt:
Social networks in the virtual science laboratory. 87-92 - M. A. Quaddus, Lai Lai Tung:
Explaining cultural differences in decision conferencing. 93-98 - Lawrence G. Jones, Arthur L. Price:
Changes in computer science accreditation. 99-103
- Nick Ourosoff:
Primitive types in Java considered harmful. 105-106
- Tolga Acar, John R. Michener:
Risks in features vs. assurance. 112
Volume 45, Number 9, September 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10
- Diane Crawford:
Influencing factors in the computer industry. 11-14
- Hal Berghel:
Responsible web caching. 15-20
- Peter J. Denning:
Career redux. 21-26
- Paul F. Ross:
Whatever became of integrity? 27-28
- Maria M. Klawe:
Making a difference through computing communities. 29-30
- Ralph R. Miller:
Information management in the aftermath of 9/11. 31-33
- Simon Davies:
A year after 9/11: where are we now? 35-39
- Eric A. Brewer:
Introduction. 40-41 - Marti A. Hearst, Ame Elliott, Jennifer English, Rashmi R. Sinha, Kirsten Swearingen, Ka-Ping Yee:
Finding the flow in web site search. 42-49 - James E. Pitkow, Hinrich Schütze, Todd A. Cass, Robert Cooley, Don Turnbull, Andy Edmonds, Eytan Adar, Thomas M. Breuel:
Personalized search. 50-55 - Abbe Mowshowitz, Akira Kawaguchi:
Bias on the web. 56-60
- James H. Gerlach, Bruce Neumann, Edwin Moldauer, Martha Argo, Daniel Frisby:
Determining the cost of IT services. 61-67 - Ellen Isaacs, Alan Walendowski, Dipti Ranganathan:
Mobile instant messaging through Hubbub. 68-72 - Ritu Agarwal, Thomas W. Ferratt:
Enduring practices for managing IT professionals. 73-79 - Mike Morrison, Joline Morrison, Anthony Keys:
Integrating web sites and databases. 81-86 - Craig K. Tyran, Joey F. George:
Improving software inspections with group process support. 87-92 - William R. King, Peter V. Marks, Scott McCoy:
The most important issues in knowledge management. 93-97 - Nikolay V. Shilov, Kwangkeun Yi:
Engaging students with theory through ACM collegiate programming contest. 98-101
- Mohamed E. Fayad, Shasha Wu:
Merging multiple conventional models in one stable model. 102-106
- Mark Stamp:
Risks of digital rights management. 120
Volume 45, Number 10, October 2002
- Diane Crawford:
Editorial printers. 5-8 - Robert Fox:
News track. 9-10
- Rebecca Mercuri:
Computer security: quality rather than quantity. 11-14
- Pamela Samuelson:
Reverse engineering under siege. 15-20
- Robert S. Boyer, W. H. J. Feijen, David Gries, C. A. R. Hoare, Jayadev Misra, J. Moore, H. Richards:
In memoriam: Edsger W. Dijkstra 1930-2002. 21-22
- Rafael Palacios:
Remote automatic doorman via the internet. 23-25
- Alan Howard:
Rapid Application Development: rough and dirty or value-for-money engineering?. 27-29
- Ali Arsanjani:
Introduction. 30-34 - Ivica Crnkovic, Brahim Hnich, Torsten Jonsson, Zeynep Kiziltan:
Specification, implementation, and deployment of components. 35-40 - Erik Meijer, Clemens A. Szyperski:
Overcoming independent extensibility challenges. 41-44 - Keith Levi, Ali Arsanjani:
A goal-driven approach to enterprise component identification and specification. 45-52 - Ricardo Jardim-Gonçalves, Adolfo Steiger-Garção:
Implicit multilevel modeling in flexible busines environments. 53-57 - Jeff Sutherland, Willem-Jan van den Heuvel:
Enterprise application integration and complex adaptive systems. 59-64 - Aniruddha S. Gokhale, Douglas C. Schmidt, Balachandran Natarajan, Nanbor Wang:
Applying model-integrated computing to component middleware and enterprise applications. 65-70 - Michael Stal:
Web services: beyond component-based computing. 71-76 - Paul Fremantle, Sanjiva Weerawarana, Rania Khalaf:
Enterprise services. 77-82 - Soo Dong Kim:
Lessons learned from a nationwide CBD promotion project. 83-87
- Winslow Burleson, Ted Selker:
Introduction. 88-90 - Ernest A. Edmonds, Linda Candy:
Creativity, art practice, and knowledge. 91-95 - Lena Mamykina, Linda Candy, Ernest A. Edmonds:
Collaborative creativity. 96-99 - Sharon L. Greene:
Characteristics of applications that support creativity. 100-104 - Michael A. Terry, Elizabeth D. Mynatt:
Supporting experimentation with Side-Views. 106-108 - Chris Roast, Innes Ritchie, Stephanie Thomas:
Re-creating the reader: supporting active reading in literary research. 109-111 - John C. Thomas, Alison Lee, Catalina Danis:
Enhancing creative design via software tools. 112-115 - Ben Shneiderman:
Creativity support tools. 116-120
- E. Vance Wilson:
Email winners and losers. 121-126 - Ali F. Farhoomand, Donald H. Drury:
Managerial information overload. 127-131 - H. James Nelson, Deborah J. Armstrong, Mehdi Ghods:
Old dogs and new tricks. 132-137 - Patrick Y. K. Chau, Melissa Cole, Anne P. Massey, Mitzi M. Montoya-Weiss, Robert M. O'Keefe:
Cultural differences in the online behavior of consumers. 138-143
- Rajeswari Malladi, Dharma P. Agrawal:
Current and future applications of mobile and wireless networks. 144-146
- Fred B. Schneider:
Secure systems conundrum. 160
Volume 45, Number 11, November 2002
- Diane Crawford:
Editorial printers. 5-8 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Phillip G. Armour:
Ten unmyths of project estimation. 15-18
- Robert L. Glass:
Sorting out software complexity. 19-21
- Boaz Gelbord, Gert Roelofsen:
New surveillance techniques raise privacy concerns. 23-24
- Zakaria Maamar, Weiming Shen:
Introduction. 25-26 - Mark Klein, Hiroki Sayama, Peyman Faratin, Yaneer Bar-Yam:
A complex systems perspective on computer-supported collaborative design technology. 27-31 - Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough:
On-the-fly web content integrity check boosts users's confidence. 33-37 - Federico Bergenti, Agostino Poggi, Matteo Somacher:
A collaborative platform for fixed and mobile networks. 39-44 - Lihui Wang, Brian Wong, Weiming Shen, Sherman Y. T. Lang:
A Java 3d-enabled cyber workspace. 45-49
- Jim Gray, Alexander S. Szalay:
The world-wide telescope. 50-55 - David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, Dan Werthimer:
SETI@home: an experiment in public-resource computing. 56-61 - Jon D. Genetti:
Volume-rendered galactic animations. 62-66
- Joaquin Miller:
Introduction. 67-69 - Bran Selic, Guus J. Ramackers, Cris Kobryn:
Evolution, not revolution. 70-72 - Keith Duddy:
UML2 must enable a family of languages. 73-75 - Stephen J. Mellor:
Make models be assets. 76-78 - William Frank, Kevin P. Tyson:
Be clear, clean, concise. 79-81 - Dov Dori:
Why significant UML change is unlikely. 82-85
- John C. Knight, Nancy G. Leveson:
Should software engineers be licensed?. 87-90 - John White, Barbara Simons:
ACM's position on the licensing of software engineers. 91 - Donald J. Bagert:
Texas licensing of software engineers: all's quiet, for now. 92-94 - Ken Kennedy, Moshe Y. Vardi:
A Rice University perspective on software engineering licensing. 94-95 - David Lorge Parnas:
Licensing software engineers in Canada. 96-98 - Gordon I. McCalla:
Software engineering requires individual professionalism. 98-101
- Dennis de Champeaux:
Software engineering considered harmful. 102-104
- Rebecca Mercuri:
Florida 2002: sluggish systems, vanishing votes. 136
Volume 45, Number 12, December 2002
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-15
- Victor Wacham A. Mbarika, Mike Jensen, Peter Meso:
Cyberspace across sub-Saharan Africa. 17-21
- Jens Palsberg, Scott J. Baxter:
Teaching reviewing to graduate students. 22-24
- Felipe Castel:
Theory, theory on the wall. 25-26
- Upkar Varshney:
Multicast over wireless networks. 31-37 - Aviel D. Rubin:
Security considerations for remote electronic voting. 39-44 - Troy J. Strader, Sridhar N. Ramaswami:
The value of seller trustworthiness in C2C online markets. 45-49 - Christoph Schlueter, Michael J. Shaw:
Emergent patterns of integration in electronic channel systems. 50-55 - Wullianallur Raghupathi, Joseph K. Tan:
Strategic IT applications in health care. 56-61
- Kalle Lyytinen, Youngjin Yoo:
Introduction. 62-65 - Gordon B. Davis:
Anytime/anyplace computing and the future of knowledge work. 67-73 - Jonathan Grudin:
Group dynamics and ubiquitous computing. 74-78 - Daniel P. Siewiorek:
New frontiers of application design. 79-82 - Andrew E. Fano, Anatole Gershman:
The future of business services in the age of ubiquitous computing. 83-87 - Leonard M. Jessup, Daniel Robey:
The relevance of social issues in ubiquitous computing environments. 88-91
- Fernando Berzal Galiano, Ignacio J. Blanco, Juan C. Cubero, Nicolás Marín:
Comonent-based data mining frameworks. 97-100
- Avishai Wool:
Why security standards sometimes fail. 144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.