- 2007
- Robert J. Aalberts, Percy Poon, Paul D. Thistle:
Trespass, nuisance, and spam: 11th century common law meets the internet. Commun. ACM 50(12): 40-45 (2007) - Hossin Abdeldayem, Donald O. Frazier:
Optical computing: need and challenge. Commun. ACM 50(9): 60-62 (2007) - Patricia S. Abril, Robert Plant:
The patent holder's dilemma: buy, sell, or troll? Commun. ACM 50(1): 36-44 (2007) - Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Enabling the 21st century health care information technology revolution. Commun. ACM 50(2): 34-42 (2007) - Asli Yagmur Akbulut, Clayton A. Looney:
Inspiring students to pursue computing degrees. Commun. ACM 50(10): 67-71 (2007) - Atsushi Akera:
Edmund Berkeley and the origins of ACM. Commun. ACM 50(5): 30-35 (2007) - Sabah S. Al-Fedaghi:
Conferences under scrutiny. Commun. ACM 50(7): 123-126 (2007) - Stephen J. Andriole:
The 7 habits of highly effective technology leaders. Commun. ACM 50(3): 66-72 (2007) - Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) - Masashi Aono, Masahiko Hara, Kazuyuki Aihara:
Amoeba-based neurocomputing with chaotic dynamics. Commun. ACM 50(9): 69-72 (2007) - Phillip G. Armour:
Agile ... and offshore. Commun. ACM 50(1): 13-16 (2007) - Phillip G. Armour:
Mortality play. Commun. ACM 50(3): 15-18 (2007) - Phillip G. Armour:
Twenty percent. Commun. ACM 50(6): 21-23 (2007) - Phillip G. Armour:
The conservation of uncertainty. Commun. ACM 50(9): 25-28 (2007) - David E. Avison, Terry Young:
Time to rethink health care and ICT? Commun. ACM 50(6): 69-74 (2007) - Dave Bacon, Debbie W. Leung:
Toward a world with quantum computers. Commun. ACM 50(9): 55-59 (2007) - Wade H. Baker, Loren Paul Rees, Peter S. Tippett:
Necessary measures: metric-driven information security risk assessment and decision making. Commun. ACM 50(10): 101-106 (2007) - Ranieri Baraglia, Fabrizio Silvestri:
Dynamic personalization of web sites without user intervention. Commun. ACM 50(2): 63-67 (2007) - Earl T. Barr, Matt Bishop, Mark A. Gondree:
Fixing federal e-voting standards. Commun. ACM 50(3): 19-24 (2007) - Victor R. Basili, Marvin V. Zelkowitz:
Empirical studies to build a science of computer science. Commun. ACM 50(11): 33-37 (2007) - Russell Beale:
Slanty design. Commun. ACM 50(1): 21-24 (2007) - Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) - Hal Berghel:
Hiding data, forensics, and anti-forensics. Commun. ACM 50(4): 15-20 (2007) - Hal Berghel:
Better-than-nothing security practices. Commun. ACM 50(8): 15-18 (2007) - Hal Berghel:
Credit Card Forensics. Commun. ACM 50(12): 11-14 (2007) - Thomas J. Bergin:
A history of the history of programming languages. Commun. ACM 50(5): 69-74 (2007) - Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu:
Post-conflict communications: the case of Liberia. Commun. ACM 50(10): 33-39 (2007) - Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2): 81-87 (2007) - Markus Biehl:
Success factors for implementing global information systems. Commun. ACM 50(1): 52-58 (2007) - Matt Bishop, David A. Wagner:
Risks of e-voting. Commun. ACM 50(11): 120 (2007)