![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Communications of the ACM (CACM), Volume 43, 2000
Volume 43, Number 1, January 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Brock N. Meeks:
Bugging Out: Y2K Fallout or Business As Usual? 15-17
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Barry Fishman, Joseph Krajcik, Ronald Marx:
K-12 and the Internet. 19-23
- Tom Porter, Galyn Susman:
Creating Lifelike Characters in Pixar Movies. 25-29
- Barbara Simons:
Building Big Brother. 31-32
- Prabhudev Konana, Nirup M. Menon, Sridhar Balasubramanian:
The Implications of Online Investing. 34-41 - Cecilia M. Gorriz, Claudia Medina:
Engaging Girls with Computers Through Software Games. 42-49 - Eszter Hargittai
:
Radio's Lessons for the Internet. 50-57 - Mark S. Ackerman, Christine A. Halverson:
Reexamining Organizational Memory. 58-64 - Mike Robinson, Mikko Kovalainen, Esa Auramäki:
Diary as Dialogue in Papermill Process Control. 65-70 - Jagdish Chandra, Salvatore T. March, Satyen Mukherjee, Will Pape, Ram Ramesh, H. Raghav Rao, Ray O. Waddoups:
Information Systems Frontiers. 71-79 - Srinarayan Sharma, Arun Rai:
CASE Deployment in IS Organizations. 80-88 - Ruben Gonzalez, Greg Cranitch
, Jun Jo:
Academic Directions of Multimedia Education. 89-95
- Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. 160
Volume 43, Number 2, February 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Hal Berghel:
Identity Theft, Social Security Numbers, and the Web. 17-21
- Andrew Grosso:
The Promise and Problems of the No Electronic Theft Act. 23-26
- Felipe Castel:
Exploring Virtuality. 27-28 - Fran Allen, Paula B. Hawthorn, Barbara Simons:
Not Now, Not Like This. 29-30
- Mark T. Maybury:
News on Demand: Introduction. 32-34 - Stanley Boykin, Andrew Merlino:
Machine Learning of Event Segmentation for News on Demand. 35-41 - Howard D. Wactlar, Alexander G. Hauptmann, Michael G. Christel
, Ricky Houghton, Andreas M. Olligschlaeger:
Complementary Video and Audio Analysis for Broadcast News Archives. 42-47 - Francis Kubala, Sean Colbath, Daben Liu, Amit Srivastava, John Makhoul:
Integrated Technologies for Indexing Spoken Language. 48-56 - MAESTRO: Conductor of Multimedia Analysis Technologies. 57-63
- Jean-Luc Gauvain, Lori Lamel, Gilles Adda:
Transcribing Broadcast News for Audio and Video Indexing. 64-70 - Sadaoki Furui, Katsutoshi Ohtsuki, Zhipeng Zhang:
Japanese Broadcast News Transcription and Information Extraction. 71-73 - David S. Pallett, John S. Garofolo, Jonathan G. Fiscus:
Measurements in Support of Research Accomplishments. 75-79
- Varun Grover
, Pradeep Vaswani:
Partnerships in the U.S. Telecommunications Industry. 80-89 - Anil K. Jain, Lin Hong, Sharath Pankanti:
Biometric Identification. 90-98 - Rudy Hirschheim, Mary C. Lacity:
The Myths and Realities of Information Technology Insourcing. 99-107 - Kai R. T. Larsen, Peter A. Bloniarz:
A Cost and Performance Model for Web Service Investment. 109-116
- David Gillibrand:
Essential Business Object Design. 117-119
- Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. 152
Volume 43, Number 3, March 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Robert L. Glass:
Y2K and Believing in Software Practice. 17-18
- James A. Rodger, Parag C. Pendharkar:
Using Telemedicine in the Department of Defense. 19-20
- Roy Rada, John Ketchell:
Standardizing the European Information Society. 21-25
- Barbara Simons:
Trademarking the Net. 27-28
- Mohamed Khalifa, Robert M. Davison
:
Exploring the Telecommuting Paradox. 29-31
- Matthew A. Turk, George G. Robertson:
Perceptual User Interfaces: Introduction. 32-34 - Alex Pentland:
Perceptual Intelligence. 35-44 - Hong Z. Tan
:
Haptic Interfaces. 40-41 - Sharon L. Oviatt, Philip R. Cohen:
Multimodal Interfaces That Process What Comes Naturally. 45-53 - Rosalind W. Picard:
Affective Perception. 50-51 - James L. Crowley, Joëlle Coutaz, François Bérard:
Things That See. 54-64 - Aaron F. Bobick, Stephen S. Intille, James W. Davis, Freedom Baird, Claudio S. Pinhanez
, Lee W. Campbell, Yuri A. Ivanov, Arjan Schütte, Andrew D. Wilson:
The KidsRoom. 60-61 - Byron Reeves, Clifford Nass:
Perceptual Bandwidth. 65-70
- Henry Lieberman:
Programming by Example: Introduction. 72-74 - David Canfield Smith, Allen Cypher, Lawrence G. Tesler:
Novice Programming Comes of Age. 75-81 - Brad A. Myers, Richard G. McDaniel, David Wolber:
Intelligence in Demonstrational Interfaces. 82-89 - Alexander Repenning
, Corrina Perrone
:
Programming by Analogous Examples. 90-97 - Mathias Bauer, Dietmar Dengler, Gabriele Paul, Markus Meyer:
Programming by Demonstration for Information Agents. 98-103 - Kenneth M. Kahn:
Generalizing by Removing Detail. 104-106 - Robert St. Amant, Henry Lieberman, Richard Potter, Luke Zettlemoyer:
Visual Generalization in Programming by Example. 107-114
- Mohamed E. Fayad, Mauri Laitinen, Robert P. Ward:
Software Engineering in the Small. 115-118
- Peter G. Neumann:
A Tale of Two Thousands. 144
Volume 43, Number 4, April 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: Securing User Passwords. 11-12 - Rosemary McGuinness:
ACM Fellows. 13-14
- Neil Munro:
A Patchwork of Legislation and Regulation. 15-17
- Meg McGinity:
Surfing the Turf. 19-21
- Kuldeep Kumar, Jos van Hillegersberg:
Enterprise Resource Planning: Introduction. 22-26 - Yvonne van Everdingen, Jos van Hillegersberg, Eric Waarts:
ERP Adoption by European Midsize Companies. 27-31 - Leslie P. Willcocks, Richard Sykes:
The Role of the CIO and It Function in ERP. 32-38 - Irma Becerra-Fernandez, Kenneth E. Murphy, Steven John Simon:
Integrating ERP in the Business School Curriculum. 39-41 - M. Lynne Markus, Cornelis Tanis, Paul C. van Fenema
:
Multisite ERP Implementations. 42-46 - Christina Soh, Sia Siew Kien, Joanne Tay-Yap:
Cultural Fits and Misfits: Is ERP a Universal Solution? 47-51 - Mark Kremers, Han van Dissel:
ERP System Migrations. 53-56 - August-Wilhelm Scheer, Frank Habermann:
Making ERP a Success. 57-61 - David Sprott:
Componentizing the Enterprise Application Packages. 63-69
- Justine Cassell:
Embodied Conversational Interface Agents+. 70-78 - Albert Semtner:
Ocean and Climate Modeling. 80-89 - Jonathan P. Bowen
:
The Ethics of Safety-Critical Systems. 91-97 - Tim Bass
:
Intrusion Detection Systems and Multisensor Data Fusion. 99-105
- Munindar P. Singh
, Mona Singh:
Deconstructing the "any" Key. 107-108 - Jerzy W. Grzymala-Busse, Wojciech Ziarko:
Data Mining and Rough Set Theory. 108-109 - Friedrich Steimann:
Abstract Class Hierarchies, Factories, and Stable Designs. 109-111
- Peter G. Neumann:
Denial-of-Service Attacks. 136
Volume 43, Number 5, May 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Larry Press:
From P-books to E-books. 17-21
- Hal Berghel:
Predatory Disintermediation. 23-29
- Barbara Simons:
To DVD or Not to DVD. 31-32
- Steve Mann:
Existential Education in the Era of Personal Cybernetics. 33-36
- Deborah Estrin, Ramesh Govindan, John S. Heidemann:
Embedding the Internet: Introduction. 38-41 - David L. Tennenhouse:
Proactive Computing. 43-50 - Gregory J. Pottie, William J. Kaiser:
Wireless Integrated Network Sensors. 51-58 - Gaetano Borriello, Roy Want:
Embedded Vomputation Meets the World Wide Web. 59-66 - Gaurav S. Sukhatme, Maja J. Mataric:
Embedding Robots into the Internet. 67-73 - Harold Abelson, Don Allen, Daniel Coore, Chris Hanson, George Homsy, Thomas F. Knight Jr., Radhika Nagpal
, Erik Rauch, Gerald J. Sussman, Ron Weiss:
Amorphous Computing. 74-82
- Ben Shneiderman:
Universal Usability. 84-91 - John P. Baron, Michael J. Shaw, Andrew D. Bailey:
Web-based E-catalog systems in B2B Procurement. 93-100 - Marshall Cline, Mike Girou:
Enduring Business Themes. 101-106 - Laurie A. Williams, Robert R. Kessler:
All I Really Need to Know About Pair Programming I Learned in Kindergarten. 108-114
- Susan Landau:
Designing Cryptography for the New Century. 115-120
- Lauren Weinstein, Peter G. Neumann:
Internet Risks. 144
Volume 43, Number 6, June 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Anthony M. Townsend, Robert J. Aalberts, Steven A. Gibson:
Libel and Slander on the Internet. 15-17
- Brock N. Meeks:
Bad Moon Rising. 19-21
- Elliot Soloway, Henry Jay Becker, Cathleen A. Norris, Neal Topp:
Teachers and Technology: Easing the Way. 23-26
- Richard M. Stallman:
Why We Must Fight UCITA. 27-28 - Tim O'Reilly:
The Internet Patent Land Grab. 29-31
- Wilhelm Hasselbring:
Information System Integration: Introduction. 32-38 - Jian Yang, Mike P. Papazoglou
:
Interoperation Support for Electronic Business. 39-47 - Jane Grimson, William Grimson, Wilhelm Hasselbring:
The SI Challenge in Health Care. 48-55 - Elke A. Rundensteiner, Andreas Koeller, Xin Zhang:
Maintaining Data Warehouses over Changing Information Sources. 57-62 - Nabil R. Adam, Vijayalakshmi Atluri
, Igg Adiwijaya:
SI in Digital Libraries. 64-72
- Upkar Varshney, Ronald J. Vetter:
Emerging Mobile and Wireless Networks. 73-81 - Thomas A. Phelps, Robert Wilensky:
Multivalent Documents. 82-90 - Terry L. Huston, Janis L. Huston:
Is Telemedicine a Practical Reality? 91-95 - Richard T. Watson, George M. Zinkhan, Leyland F. Pitt:
Integrated Internet Marketing. 97-102 - Gerard Parr, Kevin Curran:
A Paradigm Shift in the Distribution of Multimedia. 103-109
- Detlef Schoder, Torsten Eymann
:
The Real Challenges of Mobile Agents. 111-112
- Lauren Weinstein:
Risks of Internet Voting. 128
Volume 43, Number 7, July 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Robert L. Glass:
On personal technical obsolescence. 15-17
- Phillip Ein-Dor, Seymour E. Goodman, Peter Wolcott:
International perspectives: From Via Maris to electronic highway: the Internet in Canaan. 19-23
- Dori Kornfeld:
Deliberating on ICANN. 25-26
- Les Earnest:
E2A is worse than Y2K. 27-28
- Andrew Rosenbloom:
Physically based computer animation: introduction. 30-32 - Chris Hecker:
Physics in computer games. 34-39 - John Funge:
Cognitive modeling for games and animation. 40-48 - Zoran Popovic:
Controlling physics in realistic character animation. 50-58 - Nick Foster, Dimitris N. Metaxas:
Modeling water for computer animation. 60-67 - James F. O'Brien
, Jessica K. Hodgins:
Animating fracture. 68-75 - Jos Stam:
Interacting with smoke and fire in real time. 76-83 - Przemyslaw Prusinkiewicz:
Simulation modeling of plants and plant ecosystems. 84-93
- Torsten Fröhlich:
The virtual oceanarium. 94-101 - Jakub Segen, Senthil Kumar:
Look ma, no mouse! Simplifying human-computer interaction by using hand gesture. 102-109 - Deborah K. Smith, David B. Paradice
, Steven M. Smith:
Prepare your mind for creativity. 110-116 - Veda C. Storey, Detmar W. Straub, Kathy A. Stewart, Richard J. Welke:
A conceptual investigation of the e-commerce industry. 117-123
- Gurpreet Dhillon, James Backhouse:
Information system security management in the new millennium. 125-128
- Peter G. Neumann:
Risks in retrospect. 144
Volume 43, Number 8, August 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Andrew Grosso:
The economic espionage act: touring the minefields. 15-18
- Phillip G. Armour:
The case for a new business model. 19-22
- Daniel Berleant:
Does typography affect proposal assessment? 24-25
- Doug Riecken:
Introduction: personalized views of personalization. 26-28 - Nigel Wells, Jeff Wolfers:
The business of personalization: finance with a personalized touch. 30-34 - Udi Manber, Ash Patel, John Robison:
The business of personalization: experience with personalization of Yahoo! 35-39 - Doug Riecken:
The business of personalization: personalized communication networks. 41-42 - Joseph Kramer, Sunil Noronha, John Vergo:
The human element: a user-centered design approach to personalization. 44-48 - John Karat, Clare-Marie Karat, Jacob P. Ukelson:
The human element: affordances, motivation, and the design of user interfaces. 49-51 - Edith Schonberg, Thomas Cofino, Robert Hoch, Mark Podlaseck, Susan L. Spraragen:
The human element: measuring success. 53-57 - Nicholas J. Belkin:
The human element: helping people find what they don't know. 58-61 - Linda Candy, Ernest A. Edmonds:
The human element: creativity enhancement with emerging technologies. 62-65 - Marvin Minsky:
Deep issues: commonsense-based interfaces. 66-73 - John McCarthy:
Deep issues: phenomenal data mining. 75-79 - Edwin P. D. Pednault:
Deep issues: representation is everything. 80-83 - Eugene Volokh:
Deep issues: personalization and privacy. 84-88 - Doug Riecken:
Deep issues: personal end-user tools. 89-91 - David Canfield Smith:
Deep issues: building personal tools by programming. 92-95 - Paul P. Maglio, Rob Barrett:
Enabling technologies: intermediaries personalize information streams. 96-101 - Haym Hirsh, Chumki Basu, Brian D. Davison
:
Enabling technologies: learning to personalize. 102-106 - Barry Smyth, Paul Cotter:
Enabling technologies: a personalized television listings service. 107-111 - Paul B. Kantor, Endre Boros
, Benjamin Melamed, Vladimir Menkov, Bracha Shapira
, David J. Neu:
Enabling technologies: capturing human intelligence in the Net. 112-115 - Wlodek Zadrozny, Malgorzata Budzikowska, Joyce Yue Chai, Nanda Kambhatla, Sylvie Levesque, Nicolas Nicolov:
Enabling technologies: natural language dialogue for personalized interaction. 116-120 - Maurice D. Mulvenna
, Sarabjot S. Anand, Alex G. Büchner:
Personalization on the Net using Web mining: introduction. 122-125 - Myra Spiliopoulou:
Web usage mining for Web site evaluation. 127-134 - Ibrahim Cingil, Asuman Dogac, Ayca Azgin:
A broader approach to personalization. 136-141 - Bamshad Mobasher, Robert Cooley, Jaideep Srivastava:
Automatic personalization based on Web usage mining. 142-151 - Mike Perkowitz, Oren Etzioni:
Adaptive Web sites. 152-158
- Barbara Simons:
Shrink-wrapping our rights. 168
Volume 43, Number 9, September 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-12
- Neil Munro:
Ethics, schmethics. 13-15
- Meg McGinity:
Body of technology. 17-19
- Andrew W. Appel
, Edward W. Felten:
Technological access control interferes with noninfringing scholarship. 21-23
- Jennifer C. Lai:
Conversational Interfaces - Guest Editor's Introduction. 24-27 - Susan J. Boyce:
Natural spoken dialogue systems for telephony applications. 29-34 - Clifford Nass, Li Gong:
Speech interfaces from an evolutionary perspective. 36-43 - Sharon L. Oviatt:
Taming recognition errors with a multimodal interface. 45-51 - Bruce Lucas:
VoiceXML for Web-based distributed conversational applications. 53-57 - Mark Lucente:
Conversational interfaces for e-commerce applications. 59-61 - Ben Shneiderman:
The limits of speech recognition. 63-65 - Judith A. Markowitz:
Voice biometrics. 66-73
- Kenneth P. Fishkin, Anuj Gujar, Beverly L. Harrison, Thomas P. Moran, Roy Want:
Embodied user interfaces for really direct manipulation. 74-80 - Ram D. Gopal
, G. Lawrence Sanders:
Global software piracy: you can't get blood out of a turnip. 82-89 - Robert M. Davison
, Robert O. Briggs
:
GSS for presentation support. 91-97 - Antonis C. Stylianou, Ram L. Kumar:
An integrative framework for IS quality management. 99-104
- Mauri Laitinen, Mohamed Fayad, Robert P. Ward:
The problem with scalability. 105-107
- Peter G. Neumann:
Missile defense. 128
Volume 43, Number 10, October 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: what defines a programming relic? 11-12
- Brock N. Meeks:
Being blank in bright waters. 13-16
- Phillip G. Armour:
The five orders of ignorance. 17-20
- Edmund M. A. Ronald, Moshe Sipper
:
What use is a turing chatterbox? 21-23
- Grant Larsen:
Component-based enterprise frameworks - Guest Editor's Introduction. 24-26 - Jon Hopkins:
Component primer. 27-30 - Cris Kobryn:
Modeling components and frameworks with UML. 31-38 - Mohamed E. Fayad, David S. Hamu, Davide Brugali:
Enterprise frameworks characteristics, criteria, and challanges. 39-46 - Michael Sparling:
Lessons learned: through six years of component-based development. 47-53 - Jian Lu, Yingjun Li, Xiaoxing Ma
, Cai Min, XianPing Tao, Guanqun Zhang, Jianzhong Liu:
A hierarchical framework: for parallel seismic applications. 55-59 - Peter Fingar:
Component-based frameworks for e-commerce. 61-67
- Richard A. Johnson:
The ups and downs of object-oriented systems development. 68-73 - Sudip Bhattacharjee, Ram Ramesh:
Enterprise computing environments and cost assessment. 74-82 - Ritu Agarwal, Prabuddha De, Atish P. Sinha, Mohan Tanniru
:
On the usability of OO representations. 83-89 - Garland Brown, Marshall L. Fisher, Ned Stoll, Dave Beeksma, Mark Black, Ron Taylor, Choe Seok Yon, Aaron J. Williams, William Bryant, Bernard J. Jansen
:
Using the lessons of Y2K to improve information systems architecture. 90-97
- Zakaria Maamar, Jeff Sutherland:
Toward intelligent business objects. 99-101
- Matt Blaze, Steven M. Bellovin:
Tapping on my network door. 136
Volume 43, Number 11, November 2000
- Diane Crawford:
Editorial. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Hal Berghel:
Digital Politics 2000. 17-22
- Seymour E. Goodman, Timothy Kelly, Michael Minges, Larry Press:
Computing at the top of the world. 23-27
- Jason W. Fouts:
An "Out-of-Box" Experience. 28-29
- Steven Clift:
An Internet of democracy. 31-32
- Lambertus Hesselink:
Ultra-high-density data storage - Guest Editor's Introduction. 33-36 - Garth A. Gibson, Rodney Van Meter
:
Network attached storage architecture. 37-45 - Sergei Orlov:
Volume holographic data storage. 46-54 - Terry W. McDaniel:
Magneto-optical data storage. 56-63 - Henk van Houten, Wouter Leibbrandt:
Phase change recording. 64-71 - L. Richard Carley, Gregory R. Ganger, David Nagle:
MEMS-based integrated-circuit mass-storage systems. 72-80
- Ming Fan, Jan Stallaert, Andrew B. Whinston:
The Internet and the future of financial markets. 82-88 - Philip Ginzboorg:
Seven comments on charging and billing. 89-92 - Ziming Liu, David G. Stork:
Is paperless really more? 94-97 - Amit Bhatnagar, Sanjog Misra, H. Raghav Rao:
On risk, convenience, and Internet shopping behavior. 98-105 - Ned Kock:
Benefits for virtual organizations from distributed groups. 107-112
- Robert P. Ward, Mauri Laitinen, Mohamed Fayad:
Management in the small. 113-116
- Rebecca Mercuri:
Voting automation (early and often?). 176
Volume 43, Number 11es, November 2000
- Ritu Agarwal, Jayesh Prasad, Mohan Tanniru
, John Lynch:
Risks of rapid application development. 1 - Zafar Ali, Arif Ghafoor:
Synchronized delivery of multimedia information over ATM networks. 2 - Elisa Bertino, Elena Pagani
, Gian Paolo Rossi
, Pierangela Samarati
:
Protecting information on the Web. 3 - Joseph D. Blackburn, Gary D. Scudder, Luk N. Van Wassenhove:
Concurrent software development. 4 - Susanne Bødker
:
Coordinating technical support platforms. 5 - Manhoi Choy, Hong Va Leong, Man Hon Wong:
Disaster recovery techniques for database systems. 6 - Deborah A. Dahl, Lewis M. Norton, K. W. Scholz:
Commercialization of natural language processing technology. 7 - David E. Douglas, Bill C. Hardgrave:
Object-oriented curricula in academic programs. 8 - Ajit Kambil, Arnold Kamis
, Marios Koufaris, Henry C. Lucas Jr.:
Influences on the corporate adoption of Web technology. 9 - Donald W. Loveland:
Automated deduction: achievements and future directions. 10 - Daniel E. O'Leary
, Peter G. Selfridge:
Knowledge management for best practices. 11 - Derek Partridge:
Non-programmed computation. 12 - Arik Ragowsky, Niv Ahituv, Seev Neumann:
The benefits of using information systems. 13 - Louise Scott, Levente Horvath, Donald L. Day:
Characterizing case constraints. 14 - Vijayan Sugumaran
, Mohan Tanniru
, Veda C. Storey:
Supporting reuse in systems analysis. 15
Volume 43, Number 12, December 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum: Software piracy is not just economics anymore. 11-13
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Ronald Marx, Joseph Krajcik, Barry Fishman:
The three Ts of elementary education. 15-19
- Roy Rada, John Craparo:
Sharing standards: standardizing software projects. 21-25
- Boaz Gelbord:
Signing your 011001010 - The problems of digital signatures. 27-28
- Andrew Rosenbloom:
Trusting technology: Introduction. 31-32 - Batya Friedman, Peter H. Kahn Jr., Daniel C. Howe:
Trust online. 34-40 - Judith S. Olson, Gary M. Olson:
i2i trust in e-commerce. 41-44 - Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman:
Reputation systems. 45-48 - Justine Cassell, Timothy W. Bickmore:
External manifestations of trustworthiness in the interface. 50-56 - Ben Shneiderman:
Designing trust into online experiences. 57-59 - Eric M. Uslaner:
Social capital and the net. 60-64
- Jennifer Kreie, Timothy Paul Cronan:
Making ethical decisions. 66-71 - Detlef Schoder, Pai-Ling Yin:
Building firm trust online. 73-79 - Sara Jones
, Marc Wilikens, Philip Morris, Marcelo Masera:
Trust requirements in e-business. 81-87 - Trevor T. Moores, Gurpreet Dhillon:
Software piracy: a view from Hong Kong. 88-93
- Masud Ahmad Malik:
On the perils of programming. 95-97
- Bruce Schneier:
Semantic network attacks. 168
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.