


Остановите войну!
for scientists:


default search action
Communications of the ACM (CACM), Volume 49, 2006
Volume 49, Number 1, January 2006
- Diane Crawford:
Editorial pointers. 5-7
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Diane Crawford:
Top 10 downloads from ACM's digital library. 15-16
- Phillip G. Armour:
Counting boulders and measuring mountains. 17-20
- ACM annual report for FY05. 21-30
- Meg McGinity Shannon:
The network of life. 29-32
- David A. Patterson:
New Directions for CACM? 33-35
- Scott Campbell:
How to think about security failures. 37-39
- Jaime Teevan, William Jones, Benjamin B. Bederson:
Introduction. 40-43 - Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci
:
Digital memories in an era of ubiquitous computing and abundant storage. 44-50 - Wanda Pratt
, Kenton T. Unruh, Andrea Civan
, Meredith M. Skeels:
Personal health information management. 51-55 - Clare-Marie Karat, Carolyn Brodie, John Karat:
Usable privacy and security for personal information management. 56-57 - Edward Cutrell, Susan T. Dumais, Jaime Teevan:
Searching to eliminate personal information management. 58-64 - Catherine C. Marshall, William Jones:
Keeping encountered information. 66-67 - Steve Whittaker, Victoria Bellotti, Jacek Gwizdka
:
Email in personal information management. 68-73 - Thomas Erickson:
From PIM to GIM: personal information management in group contexts. 74-75 - David R. Karger
, William Jones:
Data unification in personal information management. 77-82 - Diane Kelly:
Evaluating personal information management behaviors and tools. 84-86
- Jim Gemmell, Gordon Bell, Roger Lueder:
MyLifeBits: a personal database for everything. 88-95 - Kevin C. Desouza
, Yukika Awazu, Amrit Tiwana:
Four dynamics for bringing use back into software reuse. 96-100 - George Pallis
, Athena Vakali
:
Insight and perspectives for content delivery networks. 101-106 - Grace J. Johnson, Paul J. Ambrose:
Neo-tribes: the power and potential of online communities in health care. 107-113 - Tim Chenoweth, Karen Corral, Haluk Demirkan:
Seven key interventions for data warehouse success. 114-119 - Lawrence A. Gordon, Martin P. Loeb:
Budgeting process for information security expenditures. 121-125 - Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers
:
Ethnocomputing: ICT in cultural and social context. 126-130
- Christoph Meinel, Volker Klotz:
The first 10 years of the ECCC digital library. 131-134
- John C. Knight, Nancy G. Leveson:
Software and higher education. 160
Volume 49, Number 2, February 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Gary F. Templeton:
Video image stabilization and registration technology. 15-18
- Siri Birgitte Uldal, Muhammad Aimal Marjan:
Computing in post-war Afghanistan. 19-24
- Pamela Samuelson:
Regulating technical design. 25-30
- Michael A. Cusumano:
Where does Russia fit into the global software industry? 31-34
- Nanda Kumar, Abbe Mowshowitz:
Who should govern the internet? 35-37
- Diane Crawford:
Top 10 downloads from ACM's digital library. 39-40
- David A. Patterson:
Offshoring: finally facts vs. folklore. 41-42
- Brajendra Panda, Joseph Giordano, Daniel Kalil:
Introduction. 44-47 - Eoghan Casey
:
Investigating sophisticated security breaches. 48-55 - Brian D. Carrier:
Risks of live digital forensic analysis. 56-61 - Frank Adelstein:
Live forensics: diagnosing your system without killing it first. 63-66 - The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage. 67-68
- Chet Hosmer:
Digital evidence bag. 69-70 - Sheldon Teelink, Robert F. Erbacher:
Improving the computer forensic analysis process through visualization. 71-75 - Golden G. Richard III
, Vassil Roussev:
Next-generation digital forensics. 76-80 - Rahul Bhaskar:
State and local law enforcement is not ready for a cyber Katrina. 81-83 - Simson L. Garfinkel
:
AFF: a new format for storing hard drive images. 85-87 - Ganesan Shankaranarayanan, Adir Even:
The metadata enigma. 88-94 - Pak-Lok Poon
, Amy H. L. Lau:
The present B2C implementation framework. 96-103 - Jan Damsgaard, Mihir A. Parikh, Bharat Rao:
Wireless commons perils in the common good. 104-109
- Student de-charter notice. 110
- Henry M. Gladney:
Principles for digital preservation. 111-116 - Stephen Owen, Pearl Brereton, David Budgen
:
Protocol analysis: a neglected practice. 117-122 - Deborah J. Armstrong:
The quarks of object-oriented development. 123-128 - Roli Varma:
Making computer science minority-friendly. 129-134
- Peter G. Neumann:
Trustworthy systems revisited. 152
Volume 49, Number 3 , March 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
The operational executive sponsor. 15-18
- Robert L. Glass:
Is the crouching tiger a threat? 19-20
- Bertrand Meyer
, Willy Zwaenepoel:
Europe's computer scientists take fate into their own hands. 21-24
- Call for nominations for advanced member grades in the ACM. 25-26
- David A. Patterson:
Computer science education in the 21st century. 27-30 - David A. Patterson:
Reviving your favorite CS books. 31
- Jeannette M. Wing:
Computational thinking. 33-35
- Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs
:
Introduction. 36-39 - Paul Robertson, Brian Charles Williams:
Automatic recovery from software failure. 41-47 - George Porter, Randy H. Katz:
Effective web service load balancing through statistical monitoring. 48-54 - Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju:
Supporting application quality of service in shared resource pools. 55-60 - Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata:
Biologically inspired self-adaptive multi-path routing in overlay networks. 62-67 - Atul Singh, Mads Haahr
:
Creating an adaptive network of hubs using Schelling's model. 69-73
- ACM fellows. 74-75
- Martin Halvey
, Mark T. Keane, Barry Smyth:
Mobile web surfing is the same as web surfing. 76-81 - Vicki R. McKinney, Mary M. Whiteside:
Maintaining distributed relationships. 82-86 - Zhiping D. Walter, George M. Scott:
Management issues of internet/web systems. 87-91 - Aldo de Moor, Mark Aakhus
:
Argumentation support: from technologies to tools. 93-98 - Juan E. Gilbert:
Applications quest: computing diversity. 99-104 - Robert C. Beatty, Craig D. Williams:
ERP II: best practices for successfully implementing an ERP upgrade. 105-109 - Mazliza Othman, Rodziah Latih:
Women in computer science: no shortage here! 111-114
- Brian L. Dos Santos, Andrew L. Wright:
Using bulletin boards in an educational setting. 115-118
- Top 10 downloads from ACM's digital library. 126-127
- Marc Rotenberg:
Real id, real trouble? 128
Volume 49, Number 4 , April 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Peter J. Denning:
Hastily formed networks. 15-20
- Hal Berghel:
Phishing mongers and posers. 21-25 - Statewide databases of registered voters. 26-28
- Top 10 Downloads from ACM's Digital Library. 29-30
- David A. Patterson:
Seven reasons to shave your head and three reasons not to: the bald truth. 31-32
- Shlomo Argamon, Mark Olsen:
Toward meaningful computing. 33-35
- Ryen W. White, Bill Kules, Steven Mark Drucker, Monica M. C. Schraefel
:
Introduction. 36-39 - Gary Marchionini
:
Exploratory search: from finding to understanding. 41-46 - Monica M. C. Schraefel
, Max L. Wilson
, Alistair Russell, Daniel A. Smith:
mSpace: improving information access to multimedia domains with multimodal exploratory search. 47-49 - Edward Cutrell, Susan T. Dumais:
Exploring personal information. 50-51 - Edward A. Fox, Fernando Adrian Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan:
Exploring the computing literature with visualization and stepping stones & pathways. 52-58 - Marti A. Hearst:
Clustering versus faceted categories for information exploration. 59-61 - John Gersh
, Bessie Lewis, Jaime Montemayor, Christine D. Piatko
, Russell Turner:
Supporting insight-based information exploration in intelligence analysis. 63-68 - Ben Shneiderman, Benjamin B. Bederson, Steven Mark Drucker:
Find that photo!: interface strategies to annotate, browse, and share. 69-71 - Bernard J. Jansen
:
Using temporal patterns of interactions to design effective automated searching assistance. 72-74
- Jiexun Li, Rong Zheng, Hsinchun Chen:
From fingerprint to writeprint. 76-82 - Nenad Jukic:
Modeling strategies and alternatives for data warehousing projects. 83-88 - Andrea Ordanini
:
What drives market transactions in B2B exchanges? 89-93 - Moshe Zviran, Dov Te'eni, Yuval Gross:
Does color in email make a difference? 94-99 - Rosario Vidal
, Elena Mulet
:
Thinking about computer systems to support design synthesis. 100-104 - Harvey G. Enns, Thomas W. Ferratt, Jayesh Prasad:
Beyond stereotypes of IT professionals: implications for IT HR practices. 105-109
- Sang M. Lee, Choong Kwon Lee:
IT managers' requisite skills. 111-114
- Lauren Weinstein:
Fake ID: batteries not included. 120
Volume 49, Number 5, May 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13 - Diane Crawford:
Top 10 downloads from ACM's digital library. 15-16
- Rebecca T. Mercuri:
Scoping identity theft. 17-21
- Meg McGinity Shannon:
Private lives. 23-26
- David A. Patterson:
Revisiting my campaign statement. 27-30
- Thomas A. Easton:
Beyond the algorithmization of the sciences. 31-33
- Hans Weigand:
Introduction. 44-46 - Peter J. Denning, Robert Dunham:
Innovation as language action. 47-52 - Göran Goldkuhl:
Action and media in interorganizational interaction. 53-57 - Jan L. G. Dietz:
The deep structure of business processes. 58-64 - Dov Te'eni:
The language-action perspective as a basis for communication support systems. 65-70 - Terry Winograd:
Designing a new foundation for design. 71-74 - Mareike Schoop, Aldo de Moor, Jan L. G. Dietz:
The pragmatic web: a manifesto. 75-76
- Dawn G. Gregg, Steven Walczak
:
Adaptive web information extraction. 78-84 - Stephen J. Andriole:
The collaborate/integrate business technology strategy. 85-90 - Brian Whitworth, Jerry Fjermestad, Edward Mahinda:
The web of system performance. 92-99 - Hai Zhuge:
Discovery of knowledge flow in science. 101-107 - Brian Dobing, Jeffrey Parsons
:
How UML is used. 109-113 - Pairin Katerattanakul, Bernard T. Han, Alan Rea:
Is information systems a reference discipline? 114-118 - William E. Spangler, Kathleen S. Hartzel, Mordechai Gal-Or:
Exploring the privacy implications of addressable advertising and viewer profiling. 119-123