Communications of the ACM (CACM), Volume 47, 2004
Volume 47, Number 1, January 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
Staying connected
- Meg McGinity:
RFID: is this game of tag fair play? 15-18
The business of software
- Phillip G. Armour:
When executives code. 19-22 - ACM annual report for FY03. 23-29
Special Issue:
Multimodal interfaces that flex, adapt, and persist
- Sharon L. Oviatt, Trevor Darrell, Myron Flickner:
Introduction. 30-33 - Anil K. Jain, Arun Ross:
Multibiometric systems. 34-40 - Philip R. Cohen, David McGee:
Tangible multimodal interfaces for safety-critical applications. 41-46 - Roberto Pieraccini, Krishna Dayanidhi, Jonathan Bloom, Jean-Gui Dahan, Michael Phillips, Bryan R. Goodman, K. Venkatesh Prasad:
Multimodal conversational systems for automobiles. 47-49 - Harriet J. Nock, Giridharan Iyengar, Chalapathy Neti:
Multimodal processing by finding common cause. 51-56 - Leah Reeves, Jennifer C. Lai, James A. Larson, Sharon L. Oviatt, T. S. Balaji, Stéphanie Buisine, Penny Collings, Philip R. Cohen, Ben Kraal
, Jean-Claude Martin, Michael F. McTear, T. V. Raman, Kay M. Stanney, Hui Su, Qian Ying Wang:
Guidelines for multimodal user interface design. 57-59 - Matthew A. Turk:
Computer vision in the interface. 60-67 - Li Deng, Xuedong Huang:
Challenges in adopting speech recognition. 69-75
Articles
- Cynthia F. Cohen, Stanley J. Birkin, Monica J. Garfield, Harold W. Webb:
Managing conflict in software testing. 76-81 - Albert B. Schwarzkopf, Roberto J. Mejias, Jon Jasperson
, Carol S. Saunders, Hermann Gruenwald
:
Effective practices for IT skills staffing. 83-88 - B. Craig Cumberland, Joseph S. Valacich, Leonard M. Jessup:
Understanding meteor burst communications technologies. 89-92 - Robert J. Aiken, Javad Boroumand, Stephen S. Wolff:
Network and computing research infrastructure: back to the future. 93-98 - Ronald Dattero, Stuart Diaz Galup:
Programming languages and gender. 99-102 - Seungkyoon Shin, Ram D. Gopal
, G. Lawrence Sanders, Andrew B. Whinston:
Global software piracy revisited. 103-107 - Wenhong Luo, Mohammad Najdawi:
Trust-building measures: a review of consumer health portals. 108-113
Inside risks
- Marcus J. Ranum:
Believing in myths. 144
Volume 47, Number 2, February 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
Legally speaking
- Pamela Samuelson:
What's at stake in MGM v. Grokster? 15-20
Viewpoint
- Gregory J. Pottie:
Privacy in the global e-village. 21-23
Practical programmer
- Robert L. Glass:
A look at the economics of open source. 25-27
Special Issue:
Information cities
- Jakka Sairamesh, Alison Lee, Loretta Anania:
Introduction. 28-31 - Lee S. Sproull, John F. Patterson:
Making information cities livable. 33-37 - Elizabeth F. Churchill, Andreas Girgensohn, Les Nelson, Alison Lee:
Blending digital and physical spaces for ubiquitous community participation. 38-44 - Donald F. Ferguson, Jakka Sairamesh, Stuart I. Feldman:
Open frameworks for information cities. 45-49 - Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi:
What makes a Web site popular? 50-55
Articles
- Luis von Ahn, Manuel Blum, John Langford:
Telling humans and computers apart automatically. 56-60 - Yossi Lichtenstein:
Puzzles in software development contracting. 61-65 - Conan C. Albrecht:
How clean is the future of SOAP? 66-68 - Rajiv Kishore, Hong Zhang, Ram Ramesh:
A Helix-Spindle model for ontological engineering. 69-75 - Pearl Brereton:
The software customer/supplier relationship. 77-81 - Elizabeth M. Pierce:
Assessing data quality with control matrices. 82-86 - Patrick Y. K. Chau, Paul Jen-Hwa Hu:
Technology implementation for telemedicine programs. 87-92 - Csaba J. Egyhazy, Raj Mukherji:
Interoperability architecture using RM-ODP. 93-97
Technical opinion
- Ruth Bolotin Schwartz, Michele C. Russo:
How to quickly find articles in the top IS journals. 98-101
Inside risks
- Lauren Weinstein:
Outsourced and out of control. 120
Volume 47, Number 3, March 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
Security Watch
- Rebecca Mercuri:
Superscaled security. 15-18 - ACM fellows. 19-20
The Business of Software
- Phillip G. Armour:
Beware of counting LOC. 21-24
Technology Strategy and Management
- Michael A. Cusumano:
Who is liable for bugs and security flaws in software? 25-27
Viewpoint
- John G. Messerly:
How computer games affect CS (and other) students' school performance. 29-31
Special Issue:
Emerging technologies for homeland security
- John Yen:
Introduction to the special issue on emerging technologies for homeland security. 32-35 - Robert L. Popp, Thomas Armour, Ted E. Senator, Kristen Numrych:
Countering terrorism through information technology. 36-43 - Thayne Coffman, Seth Greenblatt, Sherry Marcus:
Graph-based technologies for intelligence analysis. 45-47 - Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar:
Proactive information gathering for homeland security teams. 48-50 - O. Sami Saydjari:
Cyber defense: art to science. 52-57 - Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph
, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. 58-61 - Steve Sawyer, Andrea H. Tapia, Leonard Pesheck, John Davenport:
Mobility and the first responder. 62-65 - Robin R. Murphy:
Rescue robotics for homeland security. 66-68
Articles
Inside risks
- Mark Stamp:
Risks of monoculture. 120
Volume 47, Number 4, April 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
ACM's Professional Development Centre expands learning opportunities
- John White:
ACM's Professional Development Centre expands learning opportunities. 14
The profession of IT
- Peter J. Denning:
The social life of innovation. 15-19
Digital village
- Hal Berghel, Natasa Brajkovska:
Wading into alternate data streams. 21-27
Viewpoint
- Eric M. Uslaner:
Trust online, trust offline. 28-29
Special Issue:
Human-computer etiquette:
managing expectations with intentional agents
- Christopher A. Miller:
Introduction. 30-34 - Clifford Nass:
Etiquette equality: exhibitions and expectations of computer politeness. 35-37 - Timothy W. Bickmore:
Unspoken rules of spoken interaction. 38-44 - Punya Mishra
, Kathryn A. Hershey:
Etiquette and the design of educational technology. 45-49 - Raja Parasuraman, Christopher A. Miller:
Trust and etiquette in high-criticality automated systems. 51-55 - Jennifer Preece:
Etiquette online: from nice to necessary. 56-61
Articles
- Srinivas Krishna, Sundeep Sahay, Geoff Walsham:
Managing cross-cultural issues in global software outsourcing. 62-66 - Linda G. Wallace, Mark Keil:
Software project risks and their effect on outcomes. 68-73 - Blake Ives, Kenneth R. Walsh, Helmut Schneider
:
The domino effect of password reuse. 75-78 - Anat Hovav, Paul Gray:
Managing academic e-journals. 79-82 - Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat
, Andreas S. Pomportsis:
The economics of wireless networks. 83-86 - Kevin C. Desouza
, J. Roberto Evaristo:
Managing knowledge in distributed projects. 87-91 - Xiaotong Li:
Informational cascades in IT adoption. 93-97
Technical opinion
- John Gerdes Jr.:
The viability of supporting anonymous employees. 98-100
Inside risks
- James J. Horning:
Coincidental risks. 112
Volume 47, Number 5, May 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
Staying connected
- Meg McGinity:
It's alive. 15-18
Practical programmer
- Robert L. Glass:
Matching methodology to problem domain. 19-21
Viewpoint
- Jeff Grove:
Wanted: public policies that foster creation of knowledge. 23-25
New architectures for financial services
- Kuldeep Kumar, Jos van Hillegersberg:
Introduction. 26-30 - Krishnan Dandapani:
Success and failure in Web-based financial services. 31-33 - Ulrich Homann, Michael Rill, Andreas Wimmer:
Flexible value structures in banking. 34-36 - Alberto Pan, Ángel Viña:
An alternative architecture for financial data integration. 37-40 - Niina Mallat, Matti Rossi, Virpi Kristiina Tuunainen:
Mobile banking services. 42-46 - N. Chandrasekaran, Geert Ensing:
ODC: a global IT services delivery model. 47-49 - Jeroen Tas, Shyam Sunder:
Financial services business process outsourcing. 50-52 - John S. Zdanowicz:
Detecting money laundering and terrorist financing via data mining. 53-55 - Ton Slewe, Mark Hoogenboom:
Who will rob you on the digital highway? 56-60
Articles
- Sarv Devaraj, S. Ramesh Babu:
How to measure the relationship between training and job performance. 62-67 - Weidong Xia, Gwanhoo Lee
:
Grasping the complexity of IS development projects. 68-74 - Dongsong Zhang, J. Leon Zhao, Lina Zhou, Jay F. Nunamaker Jr.:
Can e-learning replace classroom learning? 75-79 - I. Robert Chiang, Vijay S. Mookerjee:
Improving software team productivity. 89-93 - Rishi Toshniwal, Dharma P. Agrawal:
Tracing the roots of markup languages. 95-98
2004 ACM elections
- Gerald Segal:
2004 ACM elections. 80-89
Technical opinion
- Masanori Arita:
Comma-free design for DNA words. 99-100
Inside risks
Volume 47, Number 6, June 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
The Business of Software
- Phillip G. Armour:
Real work, necessary friction, optional chaos. 15-18
Legally Speaking
- Pamela Samuelson:
Why reform the U.S. patent system? 19-23
Viewpoint
- Stephen Lau:
The Spinning Cube of Potential Doom. 25-26
On Site
- Allan Glaser, Snow Fu, Mark Tumelty:
Growing a participatory programming environment. 27-29
Wireless Sensor Networks
- David E. Culler, Wei Hong:
Wireless Sensor Networks - Introduction. 30-33 - Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan M. Mainwaring, Deborah Estrin:
Habitat monitoring with sensor networks. 34-40 - Jason L. Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy:
The platforms enabling wireless sensor networks. 41-46 - Alec Woo, Samuel Madden, Ramesh Govindan:
Networking support for query processing in sensor networks. 47-52 - Adrian Perrig, John A. Stankovic, David A. Wagner:
Security in wireless sensor networks. 53-57
Articles
- Janice C. Sipior, Burke T. Ward, P. Gregory Bonner:
Should spam be on the menu? 59-63 - Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria:
How to retain online customers. 64-70 - Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich:
Emerging business models for mobile brokerage services. 71-77 - Narasimhaiah Gorla, Yan Wah Lam:
Who should work with whom?: building effective software project teams. 79-82 - Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education. 83-88 - Robert L. Glass, Venkataraman Ramesh, Iris Vessey:
An analysis of research in computing disciplines. 89-94 - Weiling Ke, Kwok Kee Wei
:
Successful e-government in Singapore. 95-99
Technical Opinion
- Hartmut Wedekind, Erich Ortner:
Toward universal literacy: from computer science upward. 101-104
Inside risks
- Peter G. Neumann:
Optimistic optimization. 112
Volume 47, Number 7, July 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
The profession of IT
- Peter J. Denning:
The field of programmers myth. 15-20
On site
- Victor Wacham A. Mbarika:
Is telemedicine the panacea for Sub-Saharan Africa's medical nightmare? 21-24
Security watch
- Rebecca Mercuri:
The HIPAA-potamus in health care data security. 25-28
Technology strategy and management
- Michael A. Cusumano:
More lawyers than programmers? 29-31
Viewpoint
- Catherine L. Mann:
What global sourcing means for U.S. IT workers and for the U.S. economy. 33-35
Articles
- Donna L. Hoffman, Thomas P. Novak, Alladi Venkatesh:
Has the Internet become indispensable? 37-42 - Linda A. Jackson, Alexander von Eye, Gretchen Barbatsis, Frank A. Biocca, Hiram E. Fitzgerald, Yong Zhao:
The impact of Internet use on the other side of the digital divide. 43-47 - Warren Harrison, George Heuston, Sarah Mocas, Mark Morrissey, John Richardson:
High-tech forensics. 49-52 - George P. Schell:
Universities marginalize online courses. 53-56 - Kaushal Chari, Saravanan Seshadri:
Demystifying integration. 59-63 - Maris G. Martinsons
:
ERP in China: one package, two profiles. 65-68 - Huigang Liang, Yajiong Xue, William R. Boulton, Terry Anthony Byrd:
Why Western vendors don't dominate China's ERP market. 69-72 - Troy J. Strader, Sridhar N. Ramaswami:
Investor perceptions of traditional and online channels. 73-76 - Graeme G. Shanks
, Elizabeth Tansley, Ron Weber:
Representing composites in conceptual modeling. 77-80 - Narasimha Bolloju:
Improving the quality of business object models using collaboration patterns. 81-86 - Huseyin Cavusoglu
, Birendra K. Mishra, Srinivasan Raghunathan:
A model for evaluating IT security investments. 87-92
Inside risks