Communications of the ACM, Volume 56

Refine list

showing all ?? records

Volume 56, Number 1, January 2013 (EE)

From the president Letters to the Editor BLOG@CACM News Technology strategy and management The business of software Law and technology Historical reflections Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 2, February 2013

From the president BLOG@CACM News Privacy and security Inside risks Kode Vicious Education Economic and business dimensions Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 3, March 2013

From the president Letters to the editor BLOG@CACM News Legally speaking Broadening participation The profession of IT Computing ethics Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 4, April 2013

From the president Letters to the Editor BLOG@CACM News Technology strategy and management Emerging markets Kode vicious Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 5, May 2013

From the president Letters to the Editor BLOG@CACM News Law and technology Historical reflections Education Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 6, June 2013

From the president Letters to the Editor BLOG@CACM News Privacy and security The business of software Kode Vicious The profession of IT Inside risks Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 7, July 2013

From the president Letters to the Editor BLOG@CACM News Legally speaking Computing ethics Technology strategy and management Broadening participation Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 8, August 2013

Letter from the Editors-in-Chief of CACM and JACM From the president Letters to the Editor BLOG@CACM News Emerging markets Economic and business dimensions Privacy and security Kode vicious Education Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 9, September 2013

From the president Letters to the Editor BLOG@CACM News Law and technology Historical reflections The profession of IT Viewpoint Interview Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 10, October 2013

From the president Letters to the Editor BLOG@CACM News Technology strategy and management The business of software Kode Vicious Inside risks Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 11, November 2013

From the president Letters to the Editor BLOG@CACM News Privacy and security Legally speaking Computing ethics Economic and business dimensions Education Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 56, Number 12, December 2013

From the president Letters to the Editor BLOG@CACM News Emerging markets Historical reflections The profession of IT Kode Vicious Broadening participation Viewpoint Practice Contributed articles Review articles Research highlights Last byte
a service of  Schloss Dagstuhl - Leibniz Center for Informatics