default search action
Communications of the ACM (CACM), Volume 42, 1999
Volume 42, Number 1, January 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
The Communications Decency Act Is not as Dead as You Think. 15-17
- Hal Berghel:
Value-Added Publishing. 19-23
- Max Hailperin:
The COPA Battle and the Future of Free Speech. 24-25
- Barbara Simons:
Starr Wars. 26-27
- Hermann Kaindl, John M. Carroll:
Symbolic Modeling in Practice - Introduction. 28-30 - John Mylopoulos, Lawrence Chung, Eric S. K. Yu:
From Object-Oriented to Goal-Oriented Requirements Analysis. 31-37 - Keith A. Butler, Chris Esposito, Ron Hebron:
Connecting the Design of Software to the Design of Work. 38-46 - Matthias Jarke:
Scenarios for Modelling. 47-48 - Mary Beth Rosson:
Integrating Development of Task and Object Models. 49-56 - Brian R. Gaines, Mildred L. G. Shaw:
Embedding Formal Knowledge Models in Active Documents. 57-63
- Jakob Nielsen:
User Interface Directions for the Web. 65-72 - Donald P. Ballou, Giri Kumar Tayi:
Enhancing Data Quality in Data Warehouse Environments. 73-78 - John R. Nicol, Yechezkal-Shimon Gutfreund, James Paschetto, Kimberly S. Rush, Christopher Martin:
How the Internet Helps Build Collaborative Multimedia Applications. 79-85 - Pierre N. Robillard:
The Role of Knowledge in Software Development. 87-92 - David E. Avison, Francis Y. Lau, Michael D. Myers, Peter Axel Nielsen:
Action Research. 94-97
- Satish Nambisan, Yu-Ming Wang:
Roadblocks to Web Technology Adoption? 98-101
- Fred B. Schneider, Steven M. Bellovin:
Evolving Telephone Networks. 160
Volume 42, Number 2, February 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-11 - Diane Crawford:
Forum: More Ugly Truths about Consulting Assignments. 21-24
- Larry Press:
The Next Generation of Business Data Processing. 13-16
- Brock N. Meeks:
The Privacy Hoax. 17-19
- Ghinwa Jalloul:
Computing in Lebanon. 25-26
- Lorrie Faith Cranor:
Internet Privacy - Introduction. 28-31 - Michael K. Reiter, Aviel D. Rubin:
Anonymous Web Transactions with Crowds. 32-38 - David M. Goldschlag, Michael G. Reed, Paul F. Syverson:
Onion Routing. 39-41 - Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer:
Consistent, Yet Anonymous, Web Access with LPWA. 42-47 - Joseph Reagle, Lorrie Faith Cranor:
The Platform for Privacy Preferences. 48-55 - Paola Benassi:
TRUSTe: An Online Privacy Seal Program. 56-59 - Roger Clarke:
Internet Privacy Concerns Confirm the Case for Intervention. 60-67
- J. Arthur Gowan, Chris Jesse, Richard G. Mathieu:
Y2K Compliance and the Distributed Enterprise. 68-73 - Robert L. Glass:
The Realities of Software Payoffs. 74-79 - Rajiv Sabherwal:
The Role of Trust in Outsourced IS Development Projects. 80-86
- Wilhelm Hasselbring:
On Defining Computer Science Terminology. 88-91
- Peter G. Neumann:
Robust Open-Source Software. 128
Volume 42, Number 3, March 1999
- Andrew Rosenbloom:
Editorial Pointers. 5 - Robert Fox:
News Track. 11-12 - Diane Crawford:
Forum. 27-32
- Kalle Lyytinen, Seymour E. Goodman:
Finland: The Unknown Soldier on the IT Front. 13-17
- Pamela Samuelson:
Good News and Bad News on the Intellactual Property Front. 19-24
- Donald E. Rickert, Thomas Nagy:
Focus Groups, Theory or the Kid in the Garage? 34-36
- Anupam Joshi, Munindar P. Singh:
Multiagent Systems on the Net - Introduction. 38-40 - Rune Gustavsson:
Agents with Power. 41-47 - Tzvetan T. Drashansky, Elias N. Houstis, Naren Ramakrishnan, John R. Rice:
Networked Agents for Scientific Computing. 48-54 - Douglas E. Dyer:
Multiagent Systems and DARPA. 53 - Fumio Hattori, Takeshi Ohguro, Makoto Yokoo, Shigeo Matsubara, Sen Yoshida:
Socialware: Multiagent Systems for Supporting Network Communities. 55-61 - Alok R. Chaturvedi, Shailendra Raj Mehta:
Simulations in Economics and Management. 60-61 - Anuj K. Jain, Manuel Aparicio IV, Munindar P. Singh:
Agents for Process Coherence in Virtual Enterprises. 62-69 - Richard Green, Sangam Pant:
Multiagent Data Collection in Lycos. 70 - Aaron Sloman, Brian Logan:
Building Cognitively Rich Agents Using the SIM_AGENT Toolkit. 71-77 - Jeremy W. Baxter, Richard T. Hepplewhite:
Agents in Tank Battle Simulations. 74-75
- Moses Ma:
Agents in E-Commerce - Introduction. 78-80 - Pattie Maes, Robert H. Guttman, Alexandros Moukas:
Agents That Buy and Sell. 81-91 - Tuomas Sandholm:
Automated Negotiation. 84-85 - Danny B. Lange, Mitsuru Oshima:
Seven Good Reasons for Mobile Agents. 88-89 - David Wong, Noemi Paciorek, Dana Moore:
Java-based Mobile Agents. 92-102 - Reuven Koblick:
Concordia. 96-97 - Hideki Tai, Kazuya Kosaka:
The Aglets Project. 100-101 - Barbara Hayes-Roth, M. Vaughan Johnson Jr., Robert van Gent, Keith Wescourt:
Staffing the Web with Interactive Characters. 103-105 - Robert J. Glushko, Jay M. Tenenbaum, Bart Meltzer:
An XML Framework for Agent-Based E-Commerce. 106-114 - Howard Smith, Kevin Poulter:
Share the Ontology in XML-based Trading Architectures. 110-111
- Albert Alderson, Hanifa Shah:
Viewpoints on Legacy Systems. 115-116
- Lauren Weinstein:
Bit-Rot Roulette. 144
Volume 42, Number 4, April 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 11-12 - Diane Crawford:
Forum. 13-16 - John White:
ACM Digital Library Enhancements. 30-31
- Robert L. Glass:
Inspections - Some Surprising Findings. 17-19
- Roy Rada:
IT Skills Standards. 21-26
- Donald J. Bagert:
Taking the Lead in Licensing Software Engineers. 27-29
- Tim O'Reilly:
Lessons from Open-Source Software Development - Introduction. 32-37 - Linus Torvalds:
The Linux Edge. 38-39 - Larry Wall:
The Origin of the Camel Lot in the Breakdown of the Bilingual Unix. 40-41 - Roy T. Fielding:
Shared Leadership in the Apache Project. 42-43 - John K. Ousterhout:
Free Software Needs Profit. 44-45
- Xin Yao:
Following the Path of Evolvable Hardware - Introduction. 46-49 - Moshe Sipper, Daniel Mange, Eduardo Sanchez:
Quo Vadis Evolvable Hardware? 50-56 - Pierre Marchal:
Field-Programmable Gate Arrays. 57-59 - Tetsuya Higuchi, Nobuki Kajihara:
Evolvable Hardware Chips for Industrial Applications. 60-66 - Tomofumi Hikage, Hitoshi Hemmi, Katsunori Shimohara:
Hardware Evolution System AdAM. 64-65 - Jason D. Lohn:
Experiments on Evolving Software Models of Analog Circuits. 67-69 - Adrian Thompson, Paul J. Layzell:
Analysis of Unconventional Evolved Electronics. 71-79
- Donna L. Hoffman, Thomas P. Novak, Marcos Peralta:
Building Consumer Trust Online. 80-85 - Tomasz Imielinski, Julio C. Navas:
GPS-Based Geographic Addressing, Routing, and Resource Discovery. 86-92 - Niv Ahituv, Moshe Zviran, Chanan Glezer:
Top Management Toolbox for Managing Corporate IT. 93-99
- Rachid Guerraoui, Mohamed Fayad:
OO Distributed Programming is Not Distributed OO Programming. 101-104
- Lauren Weinstein:
Just a Matter of Bandwidth. 120
Volume 42, Number 5, May 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10
- Hal Berghel:
How Xday Figures in the Y2K Countdown. 11-15
- Gerald V. Post:
How Often Should a Firm Buy New PCs? 17-21
- Leon A. Kappelman:
Saving Our Sacred Honor. 23-25
- B. J. Fogg:
Persuasive Technologies - Introduction. 26-29 - Phillip King, Jason Tester:
The Landscape of Persuasive Technologies. 31-38 - Shawn Tseng, B. J. Fogg:
Credibility and Computing Technology. 39-44 - Julie Khaslavsky, Nathan Shedroff:
Understanding the Seductive Experience. 45-49 - Daniel Berdichevsky, Erik Neunschwander:
Toward an Ethics of Persuasive Technology. 51-58
- Kim Halskov Madsen:
The Diversity of Usability Practices - Introduction. 60-62 - Jacob Buur, Kirsten Bagger:
Replacing Usability Testing with User Dialogue. 63-66 - Karel Vredenburg:
Increasing Ease of Use. 67-71 - Klaus B. Bærentsen, Henning Slavensky:
A Contribution to the Design Process. 72-77 - Julia Gardner:
Strengthening the Focus on Users' Working Practices. 79-82 - William R. Dolan, Joseph S. Dumas:
A Flexible Approach to Third-Party Usability. 83-85 - Michael J. Muller, Mary Czerwinski:
Organizing Usability Work to Fit the Full Product Range. 87-90 - Thea Borgholm, Kim Halskov Madsen:
Cooperative Usability Practices. 91-97
- Jeffrey S. Poulin:
Reuse: Been There, Done That. 98-100
- David Lorge Parnas:
Ten Myths About Y2K Inspections. 128
Volume 42, Number 6, June 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10
- Robert L. Glass:
Is Criticism of Computing Academe Inevitably Divisive? 11-13
- Richard B. Heeks:
Software Strategies in developing Countries. 15-20
- Wei-Lung Wang:
Information in the Information Age. 23-24
- Barbara Simons:
Melissa's Message. 25-26
- Milton Mueller:
Emerging Internet Infrastructures Worldwide - Introduction. 28-30 - Ben Petrazzini, Mugo Kibati:
The Internet in Developing Countries. 31-36 - Robert B. Cohen:
Moving Toward a Non-U.S.-Centric International Internet. 37-40 - Milton Mueller:
Commentary: ICANN and Internet Regulation. 41-43 - Zixiang (Alex) Tan, William Foster, Seymour E. Goodman:
China's State-coordinated Internet Infrastructure. 44-52 - P. K. Agarwal:
Building India's National Internet Backbone. 53-58 - Mugo Kibati, Donyaprueth Krairit:
The Wireless Local Loop in Developing Regions. 60-66 - Jon M. Peha:
Lessons from Haiti's Internet Development. 67-72
- Samir Chatterjee, Suzanne D. Pawlowski:
All-Optical Networks. 74-83 - Randall D. Beer, Hillel J. Chiel, Richard F. Drushel:
Using Autonomous Robotics to Teach Science and Engineering. 85-92 - Dennis Tsichritzis:
Reengineering the University. 93-100 - Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
Considerations for an Effective Telecommunications-Use Policy. 101-108 - Vicki L. Sauter:
Intuitive Decision-Making. 109-115 - David S. Wise:
Changes in ACM's Revised Copyright Policy. 116-119
- A. Michael Noll:
Does Data Traffic exceed voice Traffic? 121-124
- Peter G. Neumann, Declan McCullagh:
Risks of Y2K. 144
Volume 42, Number 7, July 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Meg McGinity:
Telecom Act, Scene One. 15-18
- Neil Munro:
Inforwar: AK-47s, Lies, and Videotape. 19-22
- Scott R. Tilley:
The Need for Speed. 23-26
- John Gallaugher:
Challenging to New Conventional Wisdom of Net Commerce Strategies. 27-29
- Brajendra Panda, Joseph Giordano:
Defensive Information Warfare - Introduction. 30-32 - Shiu-Kai Chin:
High-Confidence Design for Security: Don't Trust - Verify. 33-37 - Anup K. Ghosh, Jeffrey M. Voas:
Inoculating Software for Survivability. 38-44 - Terrance Goan:
A Cop on the Beat Collecting and Appraising Intrusion Evidence. 46-52 - Robert Durst, Terrence G. Champion, Brian Witten, Eric Miller, Luigi Spagnuolo:
Testing and Evaluating: Computer Intrusion Detection Systems. 53-61 - Matthew Stillerman, Carla Marceau, Maureen Stillman:
Intrusion Detection for Distributed Applications. 62-69 - Sushil Jajodia, Catherine D. McCollum, Paul Ammann:
Trusted Recovery. 71-75
- Jim Waldo:
The Jini Architecture for Network-Centric Computing. 76-82 - David W. Plummer, Larry J. Dalton, Frank Peter:
The Recodable Locking Device. 83-87 - Janice C. Sipior, Burke T. Ward:
The Dark Side of Employee Email. 88-95 - Ned Kock:
A Case of Academic Plagiarism. 96-104
- Peter G. Neumann:
Information is a Double-Edged Sword. 120
Volume 42, Number 8, August 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Robert L. Glass:
Buzzwordism and the Epic $150 Million Software Debacle. 17-19
- Elliot Soloway, Wayne C. Grant, Robert Tinger, Jeremy Roschelle, Mike Mills, Mitchel Resnick, Robert Berg, Michael Eisenberg:
Science in the Palms of Their Hands. 21-26
- Andrew Rosenbloom:
Toward an Image Indistinguishable from Reality - Introduction. 28-31 - Demetri Terzopoulos:
Artificial Life for Computer Graphics. 32-42 - Donald P. Greenberg:
A Framework for Realistic Image Synthesis. 44-53 - George W. Fitzmaurice, Ravin Balakrishnan, Gordon Kurtenbach:
Sampling, Synthesis, and Input Devices. 54-63 - Norman I. Badler, Martha Stone Palmer, Rama Bindiganavale:
Animation Control for Real-Time Virtual Humans. 64-73 - John Kenneth Salisbury Jr.:
Making Graphics Physically Tangible. 74-81 - Steve Bryson, David N. Kenwright, Michael Cox, David A. Ellsworth, Robert Haimes:
Visually Exploring Gigabyte Data Sets in Real Time. 82-90
- Surendra N. Singh, Nikunj P. Dalal:
Web Home Pages as Advertisements. 91-98 - David S. Ebert, Edward Bedwell, Stephen Maher, Laura Smoliar, Elizabeth Downing:
Realizing 3D Visualization Using Grossed-beam Volumetric Displays. 100-107 - Richard G. Vedder, Michael T. Vanecek, Carl Stephen Guynes, James J. Cappel:
CEO and CIO Perspectives on Competitive Intelligence. 108-116 - Duane P. Truex, Richard L. Baskerville, Heinz K. Klein:
Growing Systems in Emergent Organizations. 117-123
- Rachid Guerraoui, Mohamed Fayad:
Object-oriented Abstractions for Distributed Programming. 125-127
- Bruce Schneier:
The Uses and Abuses of Biometrics. 136
Volume 42, Number 9, September 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Pamela Samuelson:
Why the Anticircumvention Regulations Need Revision. 17-21
- William K. McHenry:
Y2K International Status and Opportunities. 23-27
- Vir V. Phoha:
Can a Course Be Taught Entirely Via Email? 29-30
- Jonathan W. Palmer, Lars Bo Eriksen:
Digital Newspapers Explore Marketing on the Internet. 32-40 - Stewart Robertson, Philip Powell:
Exploiting the Benefits of Y2K Preparation. 42-48 - Rachna Dhamija, Rachelle S. Heller, Lance J. Hoffman:
Teaching E-Commerce to a Multidisciplinary Class. 50-55 - Alok Gupta, Dale O. Stahl, Andrew B. Whinston:
The Economics of Network Management. 57-63
- Ram Ramesh, Dee H. Andrews:
Distributed Mission Training: Teams, Virtual Reality, and Real-time Networking - Introduction. 64-67 - Lynn A. Carroll:
Multimodal Integrated Team Training. 68-71 - Herbert H. Bell:
The Effectiveness of Distributed Mission Training. 72-78 - Judith S. Dahmann, James O. Calvin, Richard M. Weatherly:
A Reusable Architecture for Simulations. 79-84 - Philipp W. Peppler, Steve Stephens:
Image Generation Systems in Virtual Training Platforms. 85-88 - Peter Crane:
Implementing Distributed Mission Training. 90-94
- Eric W. Tatham:
Getting the Best of Both Real and Virtual Worlds. 96-98
- Bruce Schneier:
The Trojan Horse Race. 128
Volume 42, Number 10, October 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Neil Munro:
The Ongoing Tug-of-War for E-Commerce Control. 17-20
- Larry Press:
The Post-PC Era. 21-24
- Barbara Simons:
The Heroes Among Us. 25
- Grady Booch:
UML in Action - Guest Editor's Introduction. 26-28 - Cris Kobryn:
UML 2001: A Standardization Odyssey. 29-37 - Grant Larsen:
Designing Component-Based Frameworks Using Patterns in the UML. 38-45 - Bran Selic:
Turning Clockwise: Using UML in the Real-Time Domain. 46-54 - Alex E. Bell, Ryan W. Schmidt:
UMLoquent Expression of AWACS Software Design. 55-61 - Jim Conallen:
Modeling Web Application Architectures with UML. 63-70
- Michael A. Cusumano, David B. Yoffie:
What Netscape Learned from Cross-Platform Software Development. 72-78 - Michael Mattsson, Jan Bosch, Mohamed Fayad:
Framework Integration Problems, Causes, Solutions. 80-87 - Tessa A. Lau, Oren Etzioni, Daniel S. Weld:
Privacy Interfaces for Information Management. 88-94 - Håkon Wium Lie, Janne Saarela:
Multipurpose Web Publishing Using HTML, XML, and CSS. 95-101 - Donald Gotterbarn, Keith W. Miller, Simon Rogerson:
Software Engineering Code of Ethics is Approved. 102-107
- Lutz Prechelt:
Comparing Java vs. C/C++ Efficiency Differences to Interpersonal Differences. 109-112
- Bruce Schneier:
Risks of Relying on Cryptography. 144
Volume 42, Number 11, November 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 21-24
- Hal Berghel:
The Cost of Having Analog Executives in a Digital World. 11-15
- Robert L. Glass:
Evolving a New Theory of Project Success. 17-19
- Toshinori Munakata:
Knowledge Discovery - Introduction. 26-29 - Tom M. Mitchell:
Machine Learning and Data Mining. 30-36 - Raúl E. Valdés-Pérez:
Discovery Tools for Science Apps. 37-41 - Stephen H. Muggleton:
Scientific Knowledge Discovery Using Inductive Logic Programming. 42-46 - LiMin Fu:
Knowledge Discovery Based on Neural Networks. 47-50 - Kenneth A. De Jong:
Evolutionary Computation for Discovery. 51-53 - Wojciech Ziarko:
Discovery Through Rough Set Theory. 54-57 - Kevin Knight:
Mining Online Text. 58-61 - Steffen Schulze-Kremer:
Discovery in the Human Genome Project. 62-64 - Murray Campbell:
Knowledge Discovery in Deep Blue. 65-67
- Ravi Ganesan:
The Messyware Advantage: The Precipitous Rise of the Middleman. 68-73 - Sharon L. Oviatt:
Ten Myths of Multimodal Interaction. 74-81 - George S. Nezlek, Hemant K. Jain, Derek L. Nazareth:
An Integrated Approach to Enterprise Computing Architectures. 82-90 - Dawn G. Gregg, Michael Goul:
A Proposal for an Open DSS Protocol. 91-96
- Pascal Felber, Rachid Guerraoui, Mohamed Fayad:
Putting OO Distributed Programming to Work. 97-101
- Peter G. Neumann, Lauren Weinstein:
Risks of Content Filtering. 152
Volume 42, Number 12, December 1999
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Mike Godwin:
Net to Worry. 15-17
- Meg McGinity:
Staying Connected: Flying Wireless, With a Net. 19-21
- Patrick Walsh, Adamantios Koumpis:
The Espirt ATLAS Project. 23-26
- Amr El-Kadi:
Stop That Divorce! 27-28 - Dennis J. Frailey:
Licensing Software Engineers. 29-30
- Steven Bellman, Gerald L. Lohse, Eric J. Johnson:
Predictors of Online Buying Behavior. 32-38 - Anne Adams, Martina Angela Sasse:
Users Are Not The Enemy. 40-46 - William H. Dutton, Anita Elberse, Matthew Hale:
A Case Study of a Netizen's Guide to Elections. 48-54 - Kai R. T. Larsen:
Voting Technology Implementation. 55-57 - Richard T. Watson, Sigmund Akselsen, Bente Evjemo, Nils Aaraæther:
Teledemocracy in Local Government. 58-63 - Magid Igbaria:
The Driving Forces in the Virtual Society. 64-70 - Hilda Tellioglu, Ina Wagner:
Software Cultures. 71-77 - Pearl Brereton, David Budgen, Keith H. Bennett, Malcolm Munro, Paul J. Layzell, Linda A. Macaulay, David Griffiths, Charles Stannett:
The Future of Software. 78-84 - Fay Cobb Payton, Patricia Flatley Brennan:
How a Community Health Information Network is Really Used. 85-89
- Frank Cuccias:
The FAA's Y2K Preparedness. 91-92 - Leon A. Kappelman:
Risk, Reality, and Readiness. 93-94
- Peter G. Neumann:
Risks of Insiders. 160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.