


default search action
ACM Queue, Volume 3
Volume 3, Number 1, February 2005
- Edward Grossman:

Puttin' the Queue in QA. 8
- Edward Grossman:

Letters. 10
- Edward Grossman:

What's on your hard drive? 11
- George V. Neville-Neil:

Kode vicious: the return. 12-13
- Jim Gray:

A conversation with Tim Bray. 20-25
- Stuart I. Feldman:

Quality assurance: much more than testing. 26-29 - Keith Stobie:

Too darned big to test. 30-37 - William W. White:

Sifting through the software sandbox: SCM meets QA. 38-44 - Michael Donat:

Orchestrating an automated test lab. 46-53
- Mark Kobayashi-Hillary:

A passage to India. 54-60
- Arun Ektare:

Review of "Designing Software for the Mobile Context: A Practitioner's Guide (Computer Communications and Networks) by Roman Longoria (Ed.)". 61 - Radu State:

Review of "Network Security Architectures by Sean Convery". 61
- Edward Grossman:

Calendar. 62
- Terry Coatta:

Traipsing through the QA tools desert. 64-
Volume 3, Number 2, March 2005
- David J. Brown:

An update on software updates. 10-11
- Edward Grossman:

Letters. 12-14
- John Stanik:

News 2.0. 16
- Edward Grossman:

What's on your hard drive? 18
- George V. Neville-Neil:

Kode vicious reloaded. 20
- Joseph Dadzie:

Understanding software patching. 24-30 - George Brandman:

Patching the enterprise. 32-39 - Dorian Birsan:

On plug-ins and extensible architectures. 40-46
- Alex E. Bell:

UML fever: diagnosis and recovery. 48-56
- R. S. Chang:

Review of "Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk". 58 - David Bellin:

Review of "PHP5 and MySQL Bible by Tim Converse and Joyce Park". 58
- Edward Grossman:

Calendar. 60
- Jef Raskin:

Comments are more important than code. 64-
Volume 3, Number 3, April 2005
- Edward Grossman:

I am an abstraction layer. 8
- Edward Grossman:

Letters. 10
- John Stanik:

News 2.0. 11
- Edward Grossman:

What's on your hard drive. 14
- George V. Neville-Neil:

Kode vicious battles on. 15-17
- James R. Hamilton:

A conversation with Pat Selinger. 18-28
- Jim Gray, Mark Compton:

A call to arms. 30-38 - James Ostell:

Databases of discovery. 40-48 - Margo I. Seltzer:

Beyond relational databases. 50-58
- André Mariën:

Review of "Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw". 60 - Carlos F. Enguix:

Review of "Explorer's Guide to the Semantic Web by Thomas B. Passin". 61
- Edward Grossman:

Calendar. 62
- Stan Kelly-Bootle:

File under "unknowable!". 64-
Volume 3, Number 4, May 2005
- John Stanik:

Mobile applications get real. 8
- Edward Grossman:

Letters. 10
- John Stanik:

News 2.0. 14
- Edward Grossman:

What's on your hard drive. 15
- George V. Neville-Neil:

Kode vicious vs. Mothra. 16-18
- Marshall K. McKusick:

A conversation with Tim Marsland. 20-28
- Bruce Zenel:

Enterprise-grade wireless. 30-37 - Frederick L. Kitson:

Mobile media: making it a reality. 38-47 - Streams and standards: delivering mobile video. 48-53

- Kevin R. Fall, Steven McCanne:

You don't know jack about network performance. 54-59
- Review of "Expert .NET Programming by Simon Robinson". 60

- Review of "Building Clustered Linux Systems by Robert W. Lucke". 60

- Edward Grossman:

Calendar. 61
- Phillip A. Laplante:

Mal managerium: a field guide. 64-
Volume 3, Number 5, June 2005
- Randy Harr:

On feeling secure in an unsafe world. 8
- Jim Maurer:

Letters. 12
- John Stanik:

News 2.0. 14
- Jim Maurer:

What's on your hard drive? 16
- George V. Neville-Neil

:
Kode vicious gets dirty. 18-20
- Jim Maurer:

A conversation with Peter Tippett and Steven Hofmeyr. 22-32
- Thomas Wadlow:

The answer is 42 of course. 34-39 - John Viega:

Security---problem solved? 40-50 - Bruce Schneier:

Attack trends: 2004 and 2005. 52-53
- Ken Arnold:

Programmers are people, too. 54-59
- Don Chand:

Review of "Privacy: What Developers and IT Professionals Should Know by J. C. Cannon". 60 - André Mariën:

Review of "IPv6 Network Programming by Jun-ichiro itojun Hagino". 60
- Jim Maurer:

Calendar. 61
- Rodney Bates:

Syntactic heroin. 64-
Volume 3, Number 6, July/August 2005
- Stuart I. Feldman:

Distributed computing in the modern enterprise. 8
- John Stanik:

News 2.0. 10
- Jim Maurer:

What's on your hard drive? 12
- George V. Neville-Neil

:
Kode vicious. 14-16
- Jim Maurer:

A conversation with David Anderson. 18-25
- Ian T. Foster

, Steven Tuecke
:
Describing the elephant: the different faces of IT as service. 26-29 - Dean Jacobs:

Enterprise software as service. 36-42 - Pankaj Kumar:

Web services and IT management. 44-49 - Paul Strong:

Enterprise grid computing. 50-59
- Sajjad Khan:

Review of "Struts Recipes by George Franciscus and Danilo Gurovich". 60 - Radu State:

Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". 60
- Jim Maurer:

Calendar. 61
- Stanley Kelly-Bootle:

Call that gibberish. 64-
Volume 3, Number 7, September 2005
- Jim Maurer:

News 2.0. 8
- Jim Maurer:

What's on your hard drive? 10
- George V. Neville-Neil

:
Kode vicious. 12-14
- Jim Maurer:

A conversation with Roger Sessions and Terry Coatta. 16-25
- Kunle Olukotun, Lance Hammond:

The future of microprocessors. 26-29 - Richard McDougall:

Extreme software scaling. 36-46 - Luiz André Barroso:

The price of performance. 48-53 - Herb Sutter, James R. Larus:

Software and the concurrency revolution. 54-62
- Mache Creeger:

Multicore CPUs for the masses. 64-
Volume 3, Number 8, October 2005
- Charlene O'Hanlon:

Unstructured, but not really. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 12
- George V. Neville-Neil

:
Kode Vicious unscripted. 14-16
- Daniela Florescu:

Managing semi-structured data. 18-24 - Adam Bosworth:

Learning from the web. 26-32 - C. M. Sperberg-McQueen:

XML <and semi-structured data>. 34-41 - Natalya Fridman Noy:

Order from chaos. 42-49 - Alon Y. Halevy:

Why your data won't mix. 50-58
- John S. Edwards:

Review of "Slamming Spam: A Guide for System Adminstrators by Robert Haskins and Dale Nielsen". 60 - Neil Karl:

Review of "Official Eclipse 3.0 FAQs by John Arthorne and Chris Laffra". 60
- Charlene O'Hanlon:

Calendar. 61
- Chris Suver:

The cost of data. 64-
Volume 3, Number 9, November 2005
- Charlene O'Hanlon:

Socially acceptable behavior. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 12
- George V. Neville-Neil

:
Kode Vicious unscripted. 14-16
- Charlene O'Hanlon:

A conversation with Ray Ozzie. 18-26
- David R. Millen, Jonathan Feinberg, Bernard Kerr:

Social bookmarking in the enterprise. 28-35 - Andreas Gustafsson:

Threads without the pain. 34-41 - Vipul Ved Prakash, Adam J. O'Donnell:

Fighting spam with reputation systems. 36-41 - Andrew McCallum:

Information extraction: distilling structured data from unstructured text. 48-57
- G. K. Jenkins:

Review of "The Linux enterprise cluster by Karl Kopper", No Starch Press, 2005, Isbn 1593270364. 58 - Fernando Berzal Galiano:

Review of "Working effectively with legacy code by Michael Feathers". 58
- Charlene O'Hanlon:

Calendar. 60
- David A. Patterson:

Stop whining about outsourcing! 64-
Volume 3, Number 10, December 2005
- Charlene O'Hanlon:

In with the new. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 11
- George V. Neville-Neil:

Vicious XSS. 12-15
- Charlene O'Hanlon:

A conversation with Phil Smoot. 16-24
- Daniel Rogers:

Lessons from the floor. 26-32 - Bill Hoffman:

Monitoring, at your service. 34-43 - Friedrich Steimann

, Thomas Kühne
:
Coding for the code. 44-51
- A. K. Menon:

Review of "Open Systems and Standards for Software Product Development by P. A. Dargan". 52 - Andreas Tomek:

Review of "Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin". 52
- Stan Kelly-Bootle:

Anything Su Doku, I can do better. 56-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














