default search action
Communications of the ACM (CACM), Volume 50, 2007
Volume 50, Number 1, January 2007
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Forum. 11-12
- Phillip G. Armour:
Agile ... and offshore. 13-16
- Meg McGinity Shannon:
Shannon's eleven. 17-20
- Russell Beale:
Slanty design. 21-24 - ACM Annual Report for FY06. 25-32
- Patricia S. Abril, Robert Plant:
The patent holder's dilemma: buy, sell, or troll? 36-44 - Huimin Zhao:
Semantic matching across heterogeneous data sources. 45-50 - Markus Biehl:
Success factors for implementing global information systems. 52-58 - Nitin Singh, Kee-hung Lai, T. C. Edwin Cheng:
Intra-organizational perspectives on IT-enabled supply chains. 59-65 - Sharon McDonald, Helen M. Edwards:
Who should test whom? 66-71 - Sami Surakka:
What subjects and skills are important for software developers? 73-78 - Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. 79-83 - Peter Naur:
Computing versus human thinking. 85-94
- Top 10 Downloads from ACM's Digital Library. 95-96
- Lauren Weinstein:
Ma Bell's revenge: the battle for network neutrality. 128
Volume 50, Number 2, February 2007
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Forum. 11-13
- Student de-charter notice. 14
- Michael A. Cusumano:
What road ahead for Microsoft the company? 15-18
- Pamela Samuelson:
Patent reform through the courts. 19-23
- Joshua Goodman, Gordon V. Cormack, David Heckerman:
Spam and the ongoing battle for the inbox. 24-33 - Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Enabling the 21st century health care information technology revolution. 34-42 - Grant A. Jacoby, Luqi:
Intranet model and metrics. 43-50 - Bonnie Glassberg, Jeffrey W. Merhout:
: Electronic markets hypothesis redux: where are we now? 51-55 - Galen A. Grimes:
Compliance with the CAN-SPAM Act of 2003. 56-62 - Ranieri Baraglia, Fabrizio Silvestri:
Dynamic personalization of web sites without user intervention. 63-67 - Joon Koh, Young-Gul Kim, Brian Butler, Gee-Woo Bock:
Encouraging participation in virtual communities. 68-73 - Dongsong Zhang:
Web content adaptation for mobile handheld devices. 75-79 - SIGs Announce Candidates for Election. 80
- Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
An integrated approach to federated identity and privilege management in open systems. 81-87 - Benjamin B. M. Shao, Julie Smith David:
The impact of offshore outsourcing on IT workers in developed countries. 89-94
- Rolf Oppliger:
IT security: in search of the Holy Grail. 96-98
- Top 10 downloads from ACM's digital library. 99-100
- Peter G. Neumann:
Widespread network failures. 112
Volume 50, Number 3, March 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Forum. 11-13
- ACM A.M. Turing Award nominations solicited. 14
- Phillip G. Armour:
Mortality play. 15-18
- Earl T. Barr, Matt Bishop, Mark A. Gondree:
Fixing federal e-voting standards. 19-24
- SIGs announce candidates for election. 25
- ACM fellows. 26-27
- Bartel A. Van de Walle, Murray Turoff:
Introduction. 29-31 - Liz Carver, Murray Turoff:
Human-computer interaction: the human and computer as a team in emergency management information systems. 33-38 - Simon French, Murray Turoff:
Decision support systems. 39-40 - Frank Fiedrich, Paul Burghardt:
Agent-based systems for disaster management. 41-42 - David Mendonça, Theresa I. Jefferson, John R. Harrald:
Collaborative adhocracies and mix-and-match technologies in emergency management. 44-49 - B. S. Manoj, Alexandra Hubenko Baker:
Communication challenges in emergency response. 51-53 - Leysia Palen, Starr Roxanne Hiltz, Sophia B. Liu:
Online forums supporting grassroots participation in emergency preparedness and response. 54-58 - Art Botterell, Ronja Addams-Moring:
Public warning in the networked age: open standards to the rescue? 59-60 - Paul Currion, Chamindra de Silva, Bartel A. Van de Walle:
Open source software for disaster management. 61-65 - Stephen J. Andriole:
The 7 habits of highly effective technology leaders. 66-72 - Thomas A. Horan, Benjamin L. Schooley:
Time-critical information services. 73-78 - Sridhar P. Nerur, Venugopal Balijepally:
Theoretical reflections on agile development methodologies. 79-83 - Scott McCoy, Andrea Everard, Peter Polak, Dennis F. Galletta:
The effects of online advertising. 84-88 - Ning Zhong, Jiming Liu, Yiyu Yao:
Envisioning intelligent information technologies through the prism of web intelligence. 89-94 - James A. Hall, Stephen L. Liedtka:
The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. 95-100
- Top 10 downloads from ACM's Digital Library. 101-102
- Nigel G. Ward:
The (un)predictability of computer science graduate school admissions. 104-106
- Donn B. Parker:
Risks of risk-based security. 120
Volume 50, Number 4, April 2007
- Diane Crawford:
Editorial pointers. 5
- Diane Crawford:
Stop chasing the AI illusion. 7-9
- News track. 13-14
- Hal Berghel:
Hiding data, forensics, and anti-forensics. 15-20
- Peter J. Denning:
Mastering the mess. 21-25
- ACM honors distinguished members. 26-27
- Call for nominations for advanced member grades in ACM. 28-29
- Proposal to dissolve SIGAPL. 29
- Jenova Chen:
Flow in games (and everything else). 31-34 - Jeff Kramer:
Is abstraction the key to computing? 36-42 - Dorit Nevo, Michael R. Wade:
How to avoid disappointment by design. 43-48 - Levent V. Orman:
Consumer support systems. 49-54 - Stefano Ceri, Maristella Matera, Francesca Rizzo, Vera Demaldé:
Designing data-intensive web applications for content accessibility using web marts. 55-61 - Ido Green, Tzvi Raz, Moshe Zviran:
Analysis of active intrusion prevention data for predicting hostile activity in computer networks. 63-68 - Sachidanandam Sakthivel:
Managing risk in offshore systems development. 69-75 - Jeffrey A. Stone, Elinor M. Madigan:
Inconsistencies and disconnects. 76-79 - Dianne J. Hall, David B. Paradice:
Investigating value-based decision bias and mediation: do you do as you think? 81-85 - Michael Chau, Xiao Fang, Olivia R. Liu Sheng:
What are people searching on government web sites? 87-92
- Top 10 downloads from ACM's digital library. 93-94
- E. Sonny Butler, Cheryl Aasheim, Susan R. Williams:
Does telecommuting improve productivity? 101-103
- Jim Horning:
Risks of virtual professionalism. 104
Volume 50, Number 5, May 2007
- Diane Crawford:
Editorial pointers. 5-6
- Forum. 7
- Stuart I. Feldman:
ACM's past helps steer its future. 10
- News track. 11-12
- Meg McGinity Shannon:
The pearly gates of Internet TV. 13-15
- Stephen B. Jenkins:
The rime of the ancyent programmer. 17-20
- Robert L. Glass:
One man's quest for the state of software engineering's practice. 21-23
- David S. Wise:
Introduction. 24-26 - Bernadette Longo:
ACM established to develop communication about computing. 27-29 - Atsushi Akera:
Edmund Berkeley and the origins of ACM. 30-35 - Thomas Haigh:
Sources for ACM history: what, where, why. 36-41 - Charles Care:
Not only digital: a review of ACM's early involvement with analog computing technology. 42-45 - David Hemmendinger:
The ACM and IEEE-CS guidelines for undergraduate CS education. 46-53 - Judy Brown, Steve Cunningham:
A history of ACM SIGGRAPH. 54-61 - Chris Edmondson-Yurkanan:
SIGCOMM's archaeological journey into networking's past. 63-68 - Thomas J. Bergin:
A history of the history of programming languages. 69-74 - Matthew R. McBride:
The software architect. 75-81 - Zeljko Obrenovic, Julio Abascal, Dusan Starcevic:
Universal accessibility as a multimodal design issue. 83-88 - Michael L. Harris, Kris Aebischer, Tim Klaus:
The whitewater process: software product development in small IT businesses. 89-93 - Bin He, Mitesh Patel, Zhen Zhang, Kevin Chen-Chuan Chang:
Accessing the deep web. 94-101 - Viviane Torres da Silva, Carlos José Pereira de Lucena:
Modeling multi-agent systems. 103-108 - Alessandra Devito Da Cunha, David Greathead:
Does personality matter?: an analysis of code-review ability. 109-112
- Geoffrey Goodell, Paul F. Syverson:
The right place at the right time. 113-117
- Top 10 downloads from ACM's digital library. 124-125
- Bruce Schneier:
The psychology of security. 128
Volume 50, Number 6, June 2007
- Diane Crawford:
Editorial pointers. 5
- Forum. 7-9
- News track. 13-14
- Pamela Samuelson:
Software patents and the metaphysics of Section 271(f). 15-19
- Phillip G. Armour:
Twenty percent. 21-23
- Ben Shneiderman:
Web science: a provocative invitation to computer science. 25-27 - Eric van Heck, Peter Vervest:
Smart business networks: how the network wins. 28-37 - Sasha Dekleva, Jung P. Shim, Upkar Varshney, Geoffrey Knoerzer:
Evolution and emerging issues in mobile wireless networks. 38-43 - Amy Friedlander, Allison Mankin, W. Douglas Maughan, Stephen D. Crocker:
DNSSEC: a protocol toward securing the internet infrastructure. 44-50 - Ioanna D. Constantiou, Jan Damsgaard, Lars Andreas Knutsen:
The four incremental steps toward advanced mobile service adoption. 51-55 - Mark J. Cotteleer, Christopher A. Cotteleer, Andrew Prochnow:
Cutting checks: challenges and choices in B2B e-payments. 56-61 - Anand Jeyaraj, Vicki L. Sauter:
An empirical investigation of the effectiveness of systems modeling and verification tools. 62-67 - David E. Avison, Terry Young:
Time to rethink health care and ICT? 69-74 - Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström:
Design patterns for managing product life cycle information. 75-79 - Jie Ren, Richard N. Taylor:
Automatic and versatile publications ranking for research institutions and scholars. 81-85
- Top 10 downloads from ACM's digital library. 86-87
- Mihail Cocosila, Ofir Turel, Norman P. Archer, Yufei Yuan:
Perceived health risks of 3G cell phones: do users care? 89-92
- Peter A. Freeman:
Risks are your responsibility. 104
Volume 50, Number 7, July 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Peter J. Denning:
Computing is a natural science. 13-18
- Michael A. Cusumano:
The changing labyrinth of software pricing. 19-22