default search action
Communications of the ACM (CACM), Volume 48, 2005
Volume 48, Number 1, January 2005
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
The unconscious art of software testing. 15-18
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Meg McGinity:
Let your fingers do the talking. 21-23
- David A. Patterson:
Minority-minority and minority-majority technology transfer. 25-26
- Deborah Anderson:
Global linguistic diversity for the internet. 27-28 - Chris Stephenson:
Creating a national K-12 computer science community. 29-31
- Allison Druin, Juan Pablo Hourcade:
Introduction. 32-34 - David Kestenbaum:
The challenges of IDC: what have we learned from our past? 35-38 - Mona Leigh Guha, Allison Druin, Gene Chipman, Jerry Alan Fails, Sante Simms, Allison Farber:
Working with young children as technology design partners. 39-42 - Johanna Höysniemi, Perttu Hämäläinen, Laura Turkki, Teppo Rouvi:
Children's intuitive gestures in vision-based action games. 44-50 - Michael Eisenberg:
The material side of educational technology. 51-54 - Yvonne Rogers, Sara Price, Cliff Randell, Danae Stanton Fraser, Mark J. Weal, Geraldine Fitzpatrick:
Ubi-learning integrates indoor and outdoor experiences. 55-59 - Judy Robertson, Judith Good:
Story creation in virtual game worlds. 61-65 - RadhaKanta Mahapatra, Vincent S. Lai:
Evaluating end-user training programs. 66-70 - Andreas Holzinger:
Usability engineering methods for software developers. 71-74 - John Tillquist, Waymond Rodgers:
Using asset specificity and asset scope to measure the value of IT. 75-80 - Rodrigo C. Fonseca, Virgílio A. F. Almeida, Mark Crovella:
Locality in a web of streams. 82-88 - Ganesh Vaidyanathan:
A framework for evaluating third-party logistics. 89-94 - Michael Ettredge, John Gerdes Jr.:
Timeliness of investor relations data at corporate web sites. 95-100 - Ines Herrero, Jose L. Salmeron:
Using the DEA methodology to rank software technical efficiency. 101-105
- Stuart J. Barnes:
Assessing the value of IS journals. 110-112
- George Ledin Jr.:
Not teaching viruses and worms is harmful. 144
Volume 48, Number 2, February 2005
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- David A. Patterson:
Why join ACM? 14
- Michael A. Cusumano:
Google: what it is and what it is not. 15-17
- Jon Crowcroft:
On the nature of computing. 19-20
- SIGs announce candidates for election. 21-22
- Diane Crawford:
Top 10 downloads from ACM's digital library. 23-24
- Dimitris N. Metaxas:
Introduction. 26-29 - Hervé Delingette, Nicholas Ayache:
Hepatic surgery simulation. 31-36 - Arie E. Kaufman, Sarang Lakare, Kevin Kreeger, Ingmar Bitter:
Virtual colonoscopy. 37-41 - Kyoungju Park, Albert Montillo, Dimitris N. Metaxas, Leon Axel:
Volumetric heart modeling and analysis. 43-48 - Celina Imielinska, Pat Molholt:
Incorporating 3D virtual anatomy into the medical curriculum. 49-54 - Terry S. Yoo, Michael J. Ackerman:
Open source software for medical image processing and visualization. 55-59 - Notice of intent to de-charter professional chapters. 61-62
- Notice of intent to de-charter student chapters. 63-65
- J. Roberto Evaristo, Kevin C. Desouza, Kevin Hollister:
Centralization momentum: the pendulum swings back again. 66-71 - Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh:
Trust in e-commerce. 72-77 - Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb:
Evaluating information security investments using the analytic hierarchy process. 78-83 - Fiona Fui-Hoon Nah, Keng Siau, Hong Sheng:
The value of mobile applications: a utility company study. 85-90 - R. Kelly Rainer Jr., Mark D. Miller:
Examining differences across journal rankings. 91-94 - Yufei Yuan, Brian Detlor:
Intelligent mobile crisis response systems. 95-98
- Chenglie Hu:
Dataless objects considered harmful. 99-101 - Shirley Ann Becker:
E-government usability for older adults. 102-104
- Peter G. Neumann:
Responsibilities of technologists. 128
Volume 48, Number 3, March 2005
- Diane Crawford:
Editorial pointers. 5
News track
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- ACM Fellows. 14
- David A. Patterson:
20th century vs. 21st century C&C: the SPUR manifesto. 15-16
- Phillip G. Armour:
Project portfolios: organizational management of risk. 17-20
- Diane Crawford:
Top 10 downloads from ACM's digital library. 21-22
- Gregory J. Conti:
Why computer scientists should attend hacker conferences. 23-24
- Robert L. Glass:
The first business application: a significant milestone in software history. 25-26
- Pamela Samuelson:
Legislative challenges to the Sony safe harbor rule. 27-31
- Norbert A. Streitz, Paddy Nixon:
Introduction. 32-35 - Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon:
Delivering real-world ubiquitous location systems. 36-41 - Daniel M. Russell, Norbert A. Streitz, Terry Winograd:
Building disappearing computers. 42-48 - Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan:
Context is key. 49-53 - Steve Benford, Carsten Magerkurth, Peter Ljungstrand:
Bridging the physical and digital in pervasive gaming. 54-57 - Saadi Lahlou, Marc Langheinrich, Carsten Röcker:
Privacy and trust issues with invisible computers. 59-60 - Liam J. Bannon, Steve Benford, John Bowers, Christian Heath:
Hybrid design creates innovative museum experiences. 62-65 - Hans Gellersen:
Smart-Its: computers for artifacts in the physical world. 66 - Spyros Lalis, Alexandros Karypidis, Anthony Savidis:
Ad-hoc composition in wearable and mobile computing. 67-68 - Achilles Kameas, Irene Mavrommati:
Extrovert gadgets. 69 - Joseph A. Paradiso:
Sensate media. 70 - Anatole Gershman, Andrew E. Fano:
Examples of commercial applications of ubiquitous computing. 71 - Jacques Cohen:
Computer science and bioinformatics. 72-78 - Arun Sen, Atish P. Sinha:
A comparison of data warehousing methodologies. 79-84
- SIGs announce candidates for election. 85
- Trevor T. Moores:
Do consumers understand the role of privacy seals in e-commerce? 86-91 - Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau:
A multiagent system for U.S. defense research contracting. 93-97 - William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:
Java distributed components for numerical visualization in VisAD. 98-104 - Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom T. Carey:
The state of user-centered design practice. 105-109 - Xiaoni Zhang, Victor R. Prybutok:
How the mobile communication markets differ in China, the U.S., and Europe. 111-114
- Marco Gori, Ian H. Witten:
The bubble of web visibility. 115-117
- Peter G. Neumann:
Anticipating disasters. 128
Volume 48, Number 4, April 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration. 15-20
- David A. Patterson:
The state of funding for new initiatives in computer science and engineering. 21-25
- Peter J. Denning:
Is computer science science? 27-31
- Diane Crawford:
Top 10 downloads from ACM's digital library. 33-34
- Richard P. Suttmeier:
A new technonationalism?: China and the development of technical standards. 35-37 - Vinton G. Cerf:
Spam, spim, and spit. 39-43
- Maris G. Martinsons:
Introduction. 44-48 - Jonathan J. H. Zhu, Enhai Wang:
Diffusion, use, and effect of the internet in China. 49-53 - Xunhua Guo, Guoqing Chen:
Internet diffusion in Chinese companies. 54-58 - Maris G. Martinsons:
The internet enlightens and empowers Chinese society. 59-60 - Robert M. Davison, Douglas R. Vogel, Roger W. Harris:
The e-transformation of western China. 62-67 - Jing Quan, Qing Hu, Xinan Wang:
IT is not for everyone in China. 69-72 - Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons:
Knowledge management in China. 73-76 - Qiang Tu, Kanliang Wang, Qin Shu:
Computer-related technostress in China. 77-81 - Charalambos L. Iacovou, Albert S. Dexter:
Surviving IT project cancellations. 83-86 - Christian S. Collberg, Stephen G. Kobourov:
Self-plagiarism in computer science. 88-94 - Ellen Christiaanse:
Performance benefits through integration hubs. 95-100 - Bettina Berendt, Oliver Günther, Sarah Spiekermann:
Privacy in e-commerce: stated preferences vs. actual behavior. 101-106 - Dursun Delen, Nikunj P. Dalal, Perakath C. Benjamin:
Integrated modeling: the key to holistic understanding of the enterprise. 107-112 - Kay Chen Tan, Mingliang Wang, Wei Peng:
A P2P genetic algorithm environment for the internet. 113-116
- Hai Zhuge:
Semantic grid: scientific issues, infrastructure, and methodology. 117-119
- Bruce Schneier:
Two-factor authentication: too little, too late. 136
Volume 48, Number 5, May 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Rebecca T. Mercuri:
Trusting in transparency. 15-19
- Diane Crawford:
Top 10 downloads from ACM's digital library. 21-22
- Meg McGinity Shannon:
It's the FCC on the line. 23-26
- David A. Patterson:
Recognizing individual excellence helps us all. 27-28
- Satish Nambisan:
How to prepare tomorrow's technologists for global networks of innovation. 29-31
- Anand Desai:
Introduction. 32-35 - Joseph K. Tan, H. Joseph Wen, Neveen Awad:
Health care and services delivery systems as complex adaptive systems. 36-44 - Albert T. Jones, Abhijit Deshmukh:
Test beds for complex systems. 45-50 - Jay Ramanathan:
Fractal architecture for the adaptive complex enterprise. 51-57 - Rajiv Ramnath, David Landsbergen:
IT-enabled sense-and-respond strategies in complex public organizations. 58-64
- Ashley A. Bush, Amrit Tiwana:
Designing sticky knowledge networks. 66-71 - Sridhar P. Nerur, RadhaKanta Mahapatra, George Mangalaraj:
Challenges of migrating to agile methodologies. 72-78 - Vincent S. Lai, Bo K. Wong:
Business types, e-strategies, and performance. 80-85 - Suzanne D. Pawlowski, Pratim Datta, Andrea L. Houston:
The (gradually) changing face of state IT jobs. 87-91 - Kenneth R. Fleischmann, William A. Wallace:
A covenant with transparency: opening the black box of models. 93-97 - Alex Potanin, James Noble, Marcus R. Frean, Robert Biddle:
Scale-free geometry in OO programs. 99-103 - Baihua Zheng, Dik Lun Lee:
Information dissemination via wireless broadcast. 105-110 - Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell database research self-assessment. 111-118
- Ben Light:
Potential pitfalls in packaged software adoption. 119-121
- Bruce Schneier:
Risks of third-party data. 136
Volume 48, Number 6, June 2005
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Sarbanes-Oxley and software projects. 15-17
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Pamela Samuelson:
The Supreme Court revisits the Sony safe harbor. 21-25