default search action
Communications of the ACM (CACM), Volume 46, 2003
Volume 46, Number 1, January 2003
- Diane Crawford:
Editorial pointers. 5-8 - Robert Fox:
News tracks. 9-10 - Diane Crawford:
Forum. 11-12
- Meg McGinity:
Hibernating during telecom winter. 13-15
- Rebecca Mercuri:
On auditing trails. 17-20
- Alan H. Karp:
Making money selling content that others are giving away. 21-22
- Gary Marchionini, Hanan Samet, Larry Brandt:
Introduction. 24-27 - Hsinchun Chen, Daniel Dajun Zeng, Homa Atabakhsh, Wojciech Wyzga, Jennifer Schroeder:
COPLINK: manging law enforcement data and knowledge. 28-34 - Steve Goddard, Sherri K. Harms, Stephen E. Reichenbach, Tsegaye Tadesse, William J. Waltman:
Geospatial decision support for drought risk management. 35-37 - Lois M. L. Delcambre, Timothy Tolle:
Harvesting information to sustain forests. 38-39 - Sharon S. Dawes, Lise Préfontaine:
Understanding new models of collaboration for delivering governments services. 40-42 - Jane E. Fountain:
Prospects for improving the regulatory process using e-rulemaking. 43-44 - Sarah Nusser, Leslie L. Miller, Keith C. Clarke, Michael F. Goodchild:
Geospatial IT for mobile field data collection. 45-46 - Eduard H. Hovy:
Using an ontology to simplify data access. 47-49 - Leana Golubchik, William C. Cheng, Cheng-Fu Chou, Samir Khuller, Hanan Samet, C. Justin Wan:
Bistro: a scalable and secure data transfer service for digital government applications. 50-51 - Carol A. Hert, Elizabeth D. Liddy, Ben Shneiderman, Gary Marchionini:
Supporting statistical electronic table usage by citizens. 52-54 - Cathryn S. Dippo:
FedStats: the gateway to federal statistics. 55 - Alan F. Karr, Adrian Dobra, Ashish P. Sanil:
Table servers protect confidentiality in tabular data releases. 57-58 - Alan M. MacEachren, Frank Hardisty, Xiping Dai, Linda Pickle:
Supporting visual analysis of federal geospatial statistics. 59-60 - Hanan Samet, Houman Alborzi, Frantisek Brabec, Claudio Esperança, Gísli R. Hjaltason, Frank Morgan, Egemen Tanin:
Use of the SAND spatial browser for digital government applications. 61-64 - Peggy Agouris, Anthony Stefanidis:
Efficient summarization of spatiotemporal events. 65-66 - William L. Scherlis, Jon Eisenberg:
IT research, innovation, and e-government. 67-68 - Melvyn Ciment:
A personal history of the NSF digital government program. 69-70
- Diomidis Spinellis:
The decay and failures of web references. 71-77 - David E. Avison, Guy Fitzgerald:
Where now for development methodologies?. 78-82 - Ken Peffers, Charles E. Gengler:
How to identify new high-payoff information systems for the organization. 83-88 - Mario Cannataro, Domenico Talia:
The knowledge grid. 89-93 - Pak Chung Wong, Kwong-kwok Wong, Harlan Foote:
Organic data memory using the DNA approach. 95-98
- Kevin C. Desouza:
Barriers to effective use of knowledge management systems in software engineering. 99-101
- Michael Lesk:
The mindset of dependability. 136
Volume 46, Number 2, February 2003
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Brock N. Meeks:
Conspicuous in their silence. 15-16
- Phillip G. Armour:
The reorg cycle. 19-22
- Jessica Brazelton, G. Anthony Gorry:
Creating a knowledge-sharing community: if you build it, will they come? 23-25
- Diane Crawford:
ACM fellows. 26
- Detlef Schoder, Kai Fischbach:
Peer-to-peer prospects. 27-29
- Richard A. Lethin:
Introduction. 30-32 - John Kubiatowicz:
Extracting guarantees from chaos. 33-38 - Philip E. Agre:
P2P and the promise of internet equality. 39-42 - Hari Balakrishnan, M. Frans Kaashoek, David R. Karger, Robert Tappan Morris, Ion Stoica:
Looking up data in P2P systems. 43-48 - Jintae Lee:
An end-user perspective on file-sharing systems. 49-53
- Jinyoul Lee, Keng Siau, Soongoo Hong:
Enterprise integration with ERP and EAI. 54-60 - Bay Arinze, Murugan Anandarajan:
A framework for using OO mapping methods to rapidly configure ERP systems. 61-65 - Amitava Dutta, Rahul Roy:
Anticipating internet diffusion. 66-71 - James J. Jiang, Gary Klein, Debbie B. Tesch, Houn-Gee Chen:
Closing the user and provider service quality gap. 72-76 - Ravindra Krovi, Akhilesh Chandra, Balaji Rajagopalan:
Information flow parameters for managing organizational processes. 77-82 - Xinping Shi, Philip C. Wright:
E-commercializing business operations. 83-87
- Nayeem Islam, Mohamed E. Fayad:
Toward ubiquitous acceptance of ubiquitous computing. 89-92
- Peter G. Neumann:
Gambling on system accountability. 120
Volume 46, Number 3, March 2003
- Diane Crawford:
Editorial printers. 5-8 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Michael A. Cusumano:
Finding your balance in the products and services debate. 15-17
- Peter J. Denning, Robert Dunham:
The missing customer. 19-23
- Mohammad Rob:
The rise and fall of an e-commerce program. 25-26
- Bob Besaha:
Bounty hunting in the patent base. 27-29
- Roel Vertegaal:
Introduction. 30-33 - Shumin Zhai:
What's in the eyes for attentive input. 34-39 - Jeffrey S. Shell, Ted Selker, Roel Vertegaal:
Interacting with groups of computers. 40-46 - Paul P. Maglio, Christopher S. Campbell:
Attentive agents. 47-51 - Eric Horvitz, Carl Myers Kadie, Tim Paek, David Hovel:
Models of attention in computing and communication: from principles to applications. 52-59 - Patrick Baudisch, Douglas DeCarlo, Andrew T. Duchowski, Wilson S. Geisler:
Focusing on the essential: considering attention in display design. 60-66 - D. Scott McCrickard, Christa M. Chewar:
Attuning notification design to user goals and attention costs. 67-72
- José del R. Millán:
Adaptive brain interfaces. 74-80 - Lawrence A. Gordon, Martin P. Loeb, Tashfeen Sohail:
A framework for using insurance for cyber-risk management. 81-85 - Gustavo da Rocha Barreto Pinto, Sergio P. J. Medeiros, Jano Moreira de Souza, Julia Celia M. Strauch, Carlete Rosana Ferreira Marques:
Spatial data integration in a collaborative design framework. 86-90 - Mark C. Anderson, Rajiv D. Banker, Sury Ravindran:
The new productivity paradox. 91-94 - Roger Evernden, Elaine Evernden:
Third-generation information architecture. 95-98 - David W. Chadwick:
Deficiencies in LDAP when used to support PKI. 99-104
- Gary F. Templeton:
Object-oriented programming of integrated circuits. 105-108
- Barbara Simons, Eugene H. Spafford:
Risks of total surveillance. 120
Volume 46, Number 4, April 2003
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Hal Berghel, Kim Womack:
Anonymizing the net. 15-20
- Jeff Grove:
Legal and technological efforts to lock up content threaten innovation. 21-22 - Ramesh C. Jain:
Folk computing. 27-29
- Meg McGinity:
Getting real. 23-26
- Deirdre K. Mulligan:
Introduction. 30-33 - John S. Erickson:
Fair use, DRM, and trusted computing. 34-39 - Pamela Samuelson:
DRM {and, or, vs.} the law. 41-45 - Julie E. Cohen:
DRM and privacy. 46-49 - Séverine Dusollier:
Fair use by design in the European copyright directive of 2001. 51-55 - Edward W. Felten:
A skeptical view of DRM and fair use. 56-59 - Barbara Fox, Brian A. LaMacchia:
Encouraging recognition of fair uses in DRM systems. 61-63 - Brian Fitzgerald, Nancy L. Russo, Tom O'Kane:
Software development method tailoring at Motorola. 64-70 - François Pachet:
Content management for electronic music distribution. 71-75 - Susan A. Brown, Viswanath Venkatesh:
Bringing non-adopters along: the challenge facing the PC industry. 76-80 - Julia Brande Earp, David L. Baumer:
Innovative web use to learn about consumer behavior and online privacy. 81-83 - Ali F. Farhoomand, Pauline S. P. Ng, William Conley:
Building a successful e-business: the FedEx story. 84-89 - Keng Siau, Zixing Shen:
Building customer trust in mobile commerce. 91-94 - Shan Ling Pan, Jae-Nam Lee:
Using e-CRM for a unified view of the customer. 95-99
- Peter Wegner, Dina Q. Goldin:
Computation beyond turing machines. 100-102
- Andrew K. Wright:
On Sapphire and type-safe languages. 120
Volume 46, Number 5, May 2003
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
In the zone: the need for flexible roles. 15-19
- Robert L. Glass:
One giant step backward. 21-23
- Dennis Tsichritzis:
Life beyond the bubbles. 25-27
- Aviel D. Rubin:
Introduction. 28-30 - Russell Housley, William A. Arbaugh:
Security problems in 802.11-based networks. 31-34 - Nancy Cam-Winget, Russell Housley, David A. Wagner, Jesse Walker:
Security flaws in 802.11 data link protocols. 35-39 - Simon D. Byers, David P. Kormann:
802.11b access point mapping. 41-46 - Terry Schmidt, Anthony M. Townsend:
Why Wi-Fi wants to be free. 47-52 - Amir Herzberg:
Payments and banking with mobile personal devices. 53-58 - Jae Kyu Lee, Mye M. Sohn:
The eXtensible Rule Markup Language. 59-64 - Julie Smith David, William E. McCarthy, Brian S. Sommer:
Agility: the key to survival of the fittest in the software market. 65-69 - Leah Graham, Panagiotis Takis Metaxas:
"Of course it's true; I saw it on the Internet!": critical thinking in the Internet era. 70-75 - Amrit Tiwana:
Affinity to infinity in peer-to-peer knowledge platforms. 76-80 - Ziqi Liao:
Real-time taxi dispatching using Global Positioning Systems. 81-83 - Jae-Nam Lee, Minh Q. Huynh, Ron Chi-Wai Kwok, Shih-Ming Pi:
IT outsourcing evolution: past, present, and future. 84-89
- George Marsaglia:
Seeds for random number generators. 90-93
- Peter G. Neumann:
E-epistemology and misinformation. 104
Volume 46, Number 6, June 2003
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Rebecca Mercuri:
Analyzing security costs. 15-18
- Pamela Samuelson:
Trade secrets vs. free speech. 19-23
- Tom DeMarco:
The McCarthy protocols. 24-25
- Thomas F. Stafford:
Introduction. 26-28 - Heather Kreger:
Fulfilling the Web services promise. 29-34 - Christopher Ferris, Joel A. Farrell:
What are Web services? 31 - Roland T. Rust, P. K. Kannan:
E-service: a new paradigm for business in the electronic environment. 36-42 - Ruth N. Bolton:
Marketing challenges of e-services. 43-44 - Hongjun Song:
E-services at FedEx. 45-46 - M. Kathryn Brohman, Richard T. Watson, Gabriele Piccoli, A. Parasuraman:
Data completeness: a key to effective net-based customer service systems. 47-51 - K. Douglas Hoffman:
Marketing + MIS = e-service. 53-55 - Neal G. Shaw, Christopher W. Craighead:
Technology enablers to recover from failures in e-services. 56-57 - Joseph Williams:
The Web services debate: J2EE vs. .NET. 58-63