


Остановите войну!
for scientists:


default search action
Communications of the ACM (CACM), Volume 41, 1998
Volume 41, Number 1, January 1998
- Robert Fox:
News Track. 9-10
- Roy Rada:
Corporate Shortcut to Standardization. 11-15
- Neil Munro:
Access Charges under Scrutiny. 17-19
- Nora H. Sabelli:
We Are No Longer A Priesthood. 20-21
- Jennifer Burg, Stan J. Thomas:
Computers Across Campus - Introduction. 22-25 - David G. Brown, Jennifer Burg, Jay L. Dominick:
A Strategic Plan for Ubiquitous Laptop Computing. 26-31 - Glenn MacDougall:
Acadia University's "Sandbox". 32-33 - Alan Candiotti, Neil Clarke:
Combining Universal Access with Faculty Development and Academic Facilities. 36-41 - Mark D. Weiser:
The Future of Ubiquitous Computing on Campus. 41-42 - Janice Biros:
Changes in Computer Purchase, Distribution, and Maintenance. 43-44 - Lynn Kiaer, David Mutchler, Jeffrey Froyd:
Laptop Computers in an Integrated First-Year Curriculum. 45-49 - Carolyn R. Watters, Marshall Conley, Cynthia Alexander:
The Digital Agora: Using Technolgy for Learning in the Social Sciences. 50-57 - Ann Deden:
Computers and Systemic Change in Higher Education. 58-63 - Richard J. LeBlanc, Steven L. Teal:
Hardware and Software Choices for Student Computer Initiatives. 64-69 - Samuel L. Grier, Larry W. Bryant:
The Case for Desktops. 70-71
- Ho Geun Lee:
Do Electronic Marketplaces Lower the Price of Goods? 73-80 - Sonya Freeman Cohen:
Quest for Java. 81-83
- Peter G. Neumann:
Protecting the Infrastructures. 128
Volume 41, Number 2, February 1998
- Robert Fox:
News Track. 9-10
- Elliot Soloway:
No One Is Making Money In Educational Software. 11-15
- Brock N. Meeks:
No Justice, No Peace. 17-19
- Jan Guynes Clark, Vincent S. Lai:
Internet Comes to Morocco. 21-23
- Brian C. Behrens, Reuven R. Levary:
Practical Legal Aspects of Software Reverse Engineering. 27-29 - Leon A. Kappelman, Darla Fent, Kellie B. Keeling, Victor R. Prybutok:
Calculating the Cost of Year-2000 Compliance. 30-39 - Varun Grover
, James T. C. Teng, Kirk D. Fiedler:
IS Investment Priorities in Contemporary Organizations. 40-48 - Philip M. Johnson:
Reengineering Inspection. 49-52
- Giri Kumar Tayi, Donald P. Ballou:
Examining Data Quality - Introduction. 54-57 - Richard Y. Wang:
A Product Perspective on Total Data Quality Management. 58-65 - Ken Orr:
Data Quality and System Theory. 66-71 - David Kaplan, Ramayya Krishnan, Rema Padman, James Peters:
Assessing Data Quality in Accouting Information Systems. 72-78 - Thomas C. Redman:
the Impact of Poor Data Quality on the Typical Enterprise. 79-82
- Mauri Laitinen, Mohamed Fayad:
Surviving a Process Performance Crash. 83-86
- Peter G. Neumann:
Internet Gambling. 112
Volume 41, Number 3, March 1998
- Robert Fox:
News Track. 9-11
- Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction. 13-17
- Grey E. Burkhart, Seymour E. Goodman:
The Internet Gains Acceptance in the Persian Gulf. 19-25
- Diane Crawford:
Praises Come With a Hitch. 26-29
- Charles H. House:
It's Time for a Change. 31
- H. Raghav Rao, Al Farooq Salam, Brian DosSantos:
Marketing and the Internet - Introduction. 32-34 - P. K. Kannan, Ai-Mei Chang, Andrew B. Whinston:
Marketing Information on the I-Way: Data Junkyard or Information Gold Mine? 35-43 - Jonathan W. Palmer, David A. Griffith:
An Emerging Model of Web Site Design for Marketing. 44-51 - Lauren B. Eder, Marvin E. Darter:
Physicians in Cyberspace. 52-54 - Greg Elofson, William N. Robinson:
Creating a Custom Mass-Production Channel on the Internet. 56-62 - Huaiqing Wang, Matthew K. O. Lee, Chen Wang:
Consumer Privacy Concerns about Internet Marketing. 63-70 - Robert M. O'Keefe, Tim McEachern:
Web-based Customer Decision Support Systems. 71-78 - Al Farooq Salam, H. Raghav Rao, C. Carl Pegels:
Content of Corporate Web Pages as Advertising Media. 76-77
- Mark Bohr:
Silicon Trends and Limits for Advanced Microprocessors. 80-87 - Robert J. Hall:
How to Avoid Unwanted Email. 88-95 - Bonnie A. Nardi, James R. Miller, David J. Wright:
Collaborative, Programmable Intelligent Agents. 96-104
- John T. Nosek:
The Case for Collaborative Programming. 105-108
- Peter G. Neumann:
Are Computers Addictive? 128
Volume 41, Number 4, April 1998
- Robert Fox:
News Track. 11-12
- Pamela Samuelson:
Encoding the Law into Digital Libraries. 13-18
- Nathaniel S. Borenstein:
Whose Net Is It Anyway? 19-21
- Edward A. Fox, Gary Marchionini
:
Toward a Worldwide Digital Library - Introduction. 28-32 - Andreas Paepcke, Kevin Chen-Chuan Chang, Hector Garcia-Molina, Terry Winograd:
Interoperability for Digital Libraries Worldwide. 33-43 - William E. Moen:
Accessing Distributed Cultural Heritage Information. 44-48 - H. M. Gladney, Fred Mintzer, Fabio Schiattarella, Julián Bescós, Martin Treu:
Digital Access to Antiques. 49-57 - Cathryn S. Dippo:
FedStats Promotes Statistical Literacy. 58-60 - Donald D. Cowan, Colin I. Mayfield, Frank Wm. Tompa
, W. Gasparini:
New Role for Community Networks. 61-63 - Akira Maeda, Myriam Dartois, Takehisa Fujita, Tetsuo Sakaguchi, Shigeo Sugimoto, Koichi Tabata:
Viewing Multilingual Documents on Your Local Web Browser. 64-65 - M. K. Leong, Ling Cao, Ying Lu:
Distributed Chinese Bibliographic Searching. 66-68 - Judith Klavans, Peter Schäuble:
NSF-EU Multilingual Information Access. 69 - Ian H. Witten, Craig G. Nevill-Manning, Rodger J. McNab, Sally Jo Cunningham:
A Public Library Based on Full-text Retrieval. 71-75 - Albert Endres, Norbert Fuhr:
Students Access Books and Journals through MeDoc. 76-77 - László Kovács:
Discovery of Resources within a Distributed Library System. 78-79 - Marcos André Gonçalves, Claudia Bauzer Medeiros:
Initiatives That Center on Scientific Dissemination. 80-81 - Sung-Hyon Myaeng:
R&D for a Nationwide General-Purpose System. 82-85 - Cliff McKnight:
Many Projects That Depend on Collaboration. 86-87 - Andrew E. Treloar
:
Libraries' New Role in Electronic Scholary Publishing. 88-89 - Annelise Mark Pejtersen:
Semantic Information Retrieval. 90-92 - Sanna Talja
, Rami Heinisuo, Eija-Liisa Kasesniemi, Harri Kemppainen, Sinikka Luukkainen, Kirsi Pispa, Kalervo Järvelin:
Discourse Analysis of User Request. 93-94 - Ben Shneiderman, Donald Byrd, W. Bruce Croft:
Sorting Out Searching: A User-Interface Framework for Text Searches. 95-98
- Iris Vessey, Robert L. Glass:
Strong Vs. Weak Approaches to Systems Development. 99-102 - Angela Sodan:
Yin and Yang in Computer Science. 103-111
- Fred B. Schneider:
On Concurrent Programming. 128
Volume 41, Number 5, May 1998
- Robert Fox:
News Track. 9-11
- Brock N. Meeks:
Don't Shoot Me, I'm Famous. 13-15
- Robert L. Glass:
Everything Old Is New Again. 17-20
- Bruce H. Barnes:
Assessing Computer Technology in Europe. 29-32
- James Veitch, Robert Laddaga:
Distributed Dynamic Systems - Introduction. 34-36 - Narinder Singh:
Unifying Heterogeneous Information Models. 37-44 - Jeffrey P. Morrill:
Distributed Recognition of Patterns in Time Series Data. 45-51 - James Veitch:
A Conversation with Paul Graham. 52-54 - David N. Gray, John Hotchkiss, Seth LaForge, Andrew Shalit, Toby Weinberg:
Modern Languages and Microsoft's Component Object Model. 55-65 - Janos Sztipanovits, Gabor Karsai, Ted Bapty:
Self-Adaptive Software for Signal Processing. 66-73
- Vicky Hardman, Martina Angela Sasse, Isidor Kouvelas:
Successful Multiparty Audio Communication over the Internet. 74-80 - Akira K. Onoma, Wei-Tek Tsai, Mustafa H. Poonawala, Hiroshi Suganuma:
Regression Testing in an Industrial Environment. 81-86 - Peter Duchessi, InduShobha N. Chengalur-Smith:
Client/Server Benefits, Problems, Best Practices. 87-94 - William N. Robinson, Vecheslav Volkov:
Supporting the Negotiation Life Cycle. 95-102
- Mohamed E. Fayad:
The Art of Managing Mutiple Processes. 103-105
- Rebecca Mercuri:
In Search of Academic Integrity. 136
- David Alan Grier:
Politics, Control, and Computer Networks: The Chinese Student Lobby of 1989. 137-145 - Michel Keable, Maurice Landry, Claude Banville:
The Legitimacy Gap Between IS Professionals and Users. 146-156 - Albert A. Angehrn, Soumitra Dutta:
Case-Based Decision Support. 157-165 - Christine Parent, Stefano Spaccapietra:
Issues and Approaches of Database Integration. 166-178 - Uma G. Gupta:
Automatic Tools for Testing Expert Systems. 179-184 - Jay K. Joiner, Wei-Tek Tsai:
Re-Engineering Legacy Cobol Programs. 185-197 - Takashi Nishiyama, Junji Nomura, Ryoji Nakajima, Tetsuji Miyanoh:
A Semi-Autonomous Security Robot Employing Telepresence. 198-205 - Arun Sen:
From DSS to DSP: A Taxonomic Retrospective. 206-216
Volume 41, Number 6, June 1998
- Robert Fox:
News Track. 9-10
- Stephen J. Lukasik, Lawrence T. Greenberg, Seymour E. Goodman:
Protecting an Invaluable and Ever-Widening Infrastructure. 11-16
- Larry Press:
Low-Cost Estimation of Travel Trade-offs. 17-20
- Wayne Madsen:
Internet Malcontents of the World - Unite! 27-28
- Christopher Morgan:
Building an Informational Bridge to China. 29-30
- Sandeep K. Singhal, Binh Q. Nguyen:
The Java Factor - Introduction. 34-37 - Paul Týma:
Why Are We Using Java Again? 38-42 - Kathy Bohrer, Verlyn M. Johnson, Anders Nilsson, Bradley Rubin:
Business Process Components for Distributed Object Applications. 43-48 - Kelvin D. Nilsen:
Adding Real-Time Capabilities to Java. 49-56 - Donald P. Brutzman:
The Virtual Reality Modeling Language and Java. 57-64 - James W. Cooper:
Using Design Patterns. 65-68
- Annie Chabert, Ed Grossman, Larry S. Jackson, Stephen Pietrowicz, Chris Seguin:
Java Object-Sharing in Habanero. 69-76 - Soumitra Dutta, Luk N. Van Wassenhove, Selvan Kulandaiswamy:
Benchmarking European Software Management Practices. 77-86 - Larry Wos:
Programs That Offer Fast, Flawless, Logical Reasoning. 87-95 - James T. C. Teng, Seung Ryul Jeong, Varun Grover
:
Profiling Successful Reengineering Projects. 96-102
- Harold W. Lawson:
Infrastructure Risk Reduction. 120
Volume 41, Number 7, July 1998
- Robert Fox:
News Track. 9-11
- Robert L. Glass:
Short-Term and Long-term Remedies for Runaway Projects. 13-15
- Roy Rada, Carl Cargill, John Klensin:
Consensus and the Web. 17-22
- Roger C. Schank:
Horses For Courses. 23-25
- Minerva M. Yeung:
Digital Watermarking - Introduction. 30-33 - Nasir D. Memon, Ping Wah Wong:
Protecting Digital Media Content. 34-43 - Scott Craver, Boon-Lock Yeo, Minerva M. Yeung:
Technical Trials and Legal Tribulations. 44-54 - Fred Mintzer, Gordon W. Braudaway, Alan E. Bell:
Opportunities for Watermarking Standards. 56-64 - Jian Zhao, Eckhard Koch, Chenghui Luo:
In Business Today and Tomorrow. 66-72 - John M. Acken:
How Watermarking Adds Value to Digital Content. 74-77
- Tomás Isakowitz
, Michael Bieber, Fabio Vitali:
Web Information Systems - Introduction. 78-80 - Gerald L. Lohse, Peter Spiller:
Electronic Shopping. 81-88 - Jay M. Tenenbaum:
WISs and Electronic Commerce. 89-90 - Ajit Kambil, Mark Ginsburg:
Public Access Web Information Systems: Lessons from the Internet EDGAR Project. 91-97 - Albert L. Lederer, Dinesh A. Mirchandani, Kenneth Sims:
Using WISs to enhance Competitiveness. Commun. ACM 41(7): 94-95 (1998) - Harri Oinas-Kukkonen:
What is Inside a Link? 98