default search action
Communications of the ACM (CACM), Volume 50, 2007
Volume 50, Number 1, January 2007
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Forum. 11-12
- Phillip G. Armour:
Agile ... and offshore. 13-16
- Meg McGinity Shannon:
Shannon's eleven. 17-20
- Russell Beale:
Slanty design. 21-24 - ACM Annual Report for FY06. 25-32
- Patricia S. Abril, Robert Plant:
The patent holder's dilemma: buy, sell, or troll? 36-44 - Huimin Zhao:
Semantic matching across heterogeneous data sources. 45-50 - Markus Biehl:
Success factors for implementing global information systems. 52-58 - Nitin Singh, Kee-hung Lai, T. C. Edwin Cheng:
Intra-organizational perspectives on IT-enabled supply chains. 59-65 - Sharon McDonald, Helen M. Edwards:
Who should test whom? 66-71 - Sami Surakka:
What subjects and skills are important for software developers? 73-78 - Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. 79-83 - Peter Naur:
Computing versus human thinking. 85-94
- Top 10 Downloads from ACM's Digital Library. 95-96
- Lauren Weinstein:
Ma Bell's revenge: the battle for network neutrality. 128
Volume 50, Number 2, February 2007
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Forum. 11-13
- Student de-charter notice. 14
- Michael A. Cusumano:
What road ahead for Microsoft the company? 15-18
- Pamela Samuelson:
Patent reform through the courts. 19-23
- Joshua Goodman, Gordon V. Cormack, David Heckerman:
Spam and the ongoing battle for the inbox. 24-33 - Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Enabling the 21st century health care information technology revolution. 34-42 - Grant A. Jacoby, Luqi:
Intranet model and metrics. 43-50 - Bonnie Glassberg, Jeffrey W. Merhout:
: Electronic markets hypothesis redux: where are we now? 51-55 - Galen A. Grimes:
Compliance with the CAN-SPAM Act of 2003. 56-62 - Ranieri Baraglia, Fabrizio Silvestri:
Dynamic personalization of web sites without user intervention. 63-67 - Joon Koh, Young-Gul Kim, Brian Butler, Gee-Woo Bock:
Encouraging participation in virtual communities. 68-73 - Dongsong Zhang:
Web content adaptation for mobile handheld devices. 75-79 - SIGs Announce Candidates for Election. 80
- Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
An integrated approach to federated identity and privilege management in open systems. 81-87 - Benjamin B. M. Shao, Julie Smith David:
The impact of offshore outsourcing on IT workers in developed countries. 89-94
- Rolf Oppliger:
IT security: in search of the Holy Grail. 96-98
- Top 10 downloads from ACM's digital library. 99-100
- Peter G. Neumann:
Widespread network failures. 112
Volume 50, Number 3, March 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Forum. 11-13
- ACM A.M. Turing Award nominations solicited. 14
- Phillip G. Armour:
Mortality play. 15-18
- Earl T. Barr, Matt Bishop, Mark A. Gondree:
Fixing federal e-voting standards. 19-24
- SIGs announce candidates for election. 25
- ACM fellows. 26-27
- Bartel A. Van de Walle, Murray Turoff:
Introduction. 29-31 - Liz Carver, Murray Turoff:
Human-computer interaction: the human and computer as a team in emergency management information systems. 33-38 - Simon French, Murray Turoff:
Decision support systems. 39-40 - Frank Fiedrich, Paul Burghardt:
Agent-based systems for disaster management. 41-42 - David Mendonça, Theresa I. Jefferson, John R. Harrald:
Collaborative adhocracies and mix-and-match technologies in emergency management. 44-49 - B. S. Manoj, Alexandra Hubenko Baker:
Communication challenges in emergency response. 51-53 - Leysia Palen, Starr Roxanne Hiltz, Sophia B. Liu:
Online forums supporting grassroots participation in emergency preparedness and response. 54-58 - Art Botterell, Ronja Addams-Moring:
Public warning in the networked age: open standards to the rescue? 59-60 - Paul Currion, Chamindra de Silva, Bartel A. Van de Walle:
Open source software for disaster management. 61-65 - Stephen J. Andriole:
The 7 habits of highly effective technology leaders. 66-72 - Thomas A. Horan, Benjamin L. Schooley:
Time-critical information services. 73-78 - Sridhar P. Nerur, Venugopal Balijepally:
Theoretical reflections on agile development methodologies. 79-83 - Scott McCoy, Andrea Everard, Peter Polak, Dennis F. Galletta:
The effects of online advertising. 84-88 - Ning Zhong, Jiming Liu, Yiyu Yao:
Envisioning intelligent information technologies through the prism of web intelligence. 89-94 - James A. Hall, Stephen L. Liedtka:
The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. 95-100
- Top 10 downloads from ACM's Digital Library. 101-102
- Nigel G. Ward:
The (un)predictability of computer science graduate school admissions. 104-106
- Donn B. Parker:
Risks of risk-based security. 120
Volume 50, Number 4, April 2007
- Diane Crawford:
Editorial pointers. 5
- Diane Crawford:
Stop chasing the AI illusion. 7-9
- News track. 13-14
- Hal Berghel:
Hiding data, forensics, and anti-forensics. 15-20
- Peter J. Denning:
Mastering the mess. 21-25
- ACM honors distinguished members. 26-27
- Call for nominations for advanced member grades in ACM. 28-29
- Proposal to dissolve SIGAPL. 29
- Jenova Chen:
Flow in games (and everything else). 31-34 - Jeff Kramer:
Is abstraction the key to computing? 36-42 - Dorit Nevo, Michael R. Wade:
How to avoid disappointment by design. 43-48 - Levent V. Orman:
Consumer support systems. 49-54 - Stefano Ceri, Maristella Matera, Francesca Rizzo, Vera Demaldé:
Designing data-intensive web applications for content accessibility using web marts. 55-61 - Ido Green, Tzvi Raz, Moshe Zviran:
Analysis of active intrusion prevention data for predicting hostile activity in computer networks. 63-68 - Sachidanandam Sakthivel:
Managing risk in offshore systems development. 69-75 - Jeffrey A. Stone, Elinor M. Madigan:
Inconsistencies and disconnects. 76-79 - Dianne J. Hall, David B. Paradice:
Investigating value-based decision bias and mediation: do you do as you think? 81-85 - Michael Chau, Xiao Fang, Olivia R. Liu Sheng:
What are people searching on government web sites? 87-92
- Top 10 downloads from ACM's digital library. 93-94
- E. Sonny Butler, Cheryl Aasheim, Susan R. Williams:
Does telecommuting improve productivity? 101-103
- Jim Horning:
Risks of virtual professionalism. 104
Volume 50, Number 5, May 2007
- Diane Crawford:
Editorial pointers. 5-6
- Forum. 7
- Stuart I. Feldman:
ACM's past helps steer its future. 10
- News track. 11-12
- Meg McGinity Shannon:
The pearly gates of Internet TV. 13-15
- Stephen B. Jenkins:
The rime of the ancyent programmer. 17-20
- Robert L. Glass:
One man's quest for the state of software engineering's practice. 21-23
- David S. Wise:
Introduction. 24-26 - Bernadette Longo:
ACM established to develop communication about computing. 27-29 - Atsushi Akera:
Edmund Berkeley and the origins of ACM. 30-35 - Thomas Haigh:
Sources for ACM history: what, where, why. 36-41 - Charles Care:
Not only digital: a review of ACM's early involvement with analog computing technology. 42-45 - David Hemmendinger:
The ACM and IEEE-CS guidelines for undergraduate CS education. 46-53 - Judy Brown, Steve Cunningham:
A history of ACM SIGGRAPH. 54-61 - Chris Edmondson-Yurkanan:
SIGCOMM's archaeological journey into networking's past. 63-68 - Thomas J. Bergin:
A history of the history of programming languages. 69-74 - Matthew R. McBride:
The software architect. 75-81 - Zeljko Obrenovic, Julio Abascal, Dusan Starcevic:
Universal accessibility as a multimodal design issue. 83-88 - Michael L. Harris, Kris Aebischer, Tim Klaus:
The whitewater process: software product development in small IT businesses. 89-93 - Bin He, Mitesh Patel, Zhen Zhang, Kevin Chen-Chuan Chang:
Accessing the deep web. 94-101 - Viviane Torres da Silva, Carlos José Pereira de Lucena:
Modeling multi-agent systems. 103-108 - Alessandra Devito Da Cunha, David Greathead:
Does personality matter?: an analysis of code-review ability. 109-112
- Geoffrey Goodell, Paul F. Syverson:
The right place at the right time. 113-117
- Top 10 downloads from ACM's digital library. 124-125
- Bruce Schneier:
The psychology of security. 128
Volume 50, Number 6, June 2007
- Diane Crawford:
Editorial pointers. 5
- Forum. 7-9
- News track. 13-14
- Pamela Samuelson:
Software patents and the metaphysics of Section 271(f). 15-19
- Phillip G. Armour:
Twenty percent. 21-23
- Ben Shneiderman:
Web science: a provocative invitation to computer science. 25-27 - Eric van Heck, Peter Vervest:
Smart business networks: how the network wins. 28-37 - Sasha Dekleva, Jung P. Shim, Upkar Varshney, Geoffrey Knoerzer:
Evolution and emerging issues in mobile wireless networks. 38-43 - Amy Friedlander, Allison Mankin, W. Douglas Maughan, Stephen D. Crocker:
DNSSEC: a protocol toward securing the internet infrastructure. 44-50 - Ioanna D. Constantiou, Jan Damsgaard, Lars Andreas Knutsen:
The four incremental steps toward advanced mobile service adoption. 51-55 - Mark J. Cotteleer, Christopher A. Cotteleer, Andrew Prochnow:
Cutting checks: challenges and choices in B2B e-payments. 56-61 - Anand Jeyaraj, Vicki L. Sauter:
An empirical investigation of the effectiveness of systems modeling and verification tools. 62-67 - David E. Avison, Terry Young:
Time to rethink health care and ICT? 69-74 - Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström:
Design patterns for managing product life cycle information. 75-79 - Jie Ren, Richard N. Taylor:
Automatic and versatile publications ranking for research institutions and scholars. 81-85
- Top 10 downloads from ACM's digital library. 86-87
- Mihail Cocosila, Ofir Turel, Norman P. Archer, Yufei Yuan:
Perceived health risks of 3G cell phones: do users care? 89-92
- Peter A. Freeman:
Risks are your responsibility. 104
Volume 50, Number 7, July 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Peter J. Denning:
Computing is a natural science. 13-18
- Michael A. Cusumano:
The changing labyrinth of software pricing. 19-22
- Abbe Mowshowitz, Nanda Kumar:
Public vs. private interest on the internet. 23-25
- Michael Zyda:
Introduction. 26-29 - Merrilea J. Mayo:
Games for science and engineering education. 30-35 - Ralph E. Chatham:
Games for training. 36-43 - Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper:
How to build serious games. 44-49 - Randy Pausch, Donald Marinelli:
Carnegie Mellon's entertainment technology center: combining the left and right brain. 50-57 - Caitlin Kelleher, Randy Pausch:
Using storytelling to motivate programming. 58-64 - Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin:
Real-time sound synthesis and propagation for games. 66-73 - Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen:
Evaluating the efficacy of a terrorism question/answer system. 74-80 - In Lee:
An architecture for a next-generation holistic e-recruiting system. 81-85 - Harris Wu, Michael D. Gordon:
Collaborative structuring: organizing document repositories effectively and efficiently. 86-91 - Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon:
Examining RFID applications in supply chain management. 92-101 - Someswar Kesh, Pauline Ratnasingam:
A knowledge architecture for IT security. 103-108 - Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. 109-116 - Waymond Rodgers, Solomon Negash:
The effects of web-based technologies on knowledge transfer. 117-122
- Sabah S. Al-Fedaghi:
Conferences under scrutiny. 123-126
- Top 10 downloads from ACM's digital library. 135
- Charles Perrow:
Disasters evermore? 136
Volume 50, Number 8, August 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Forum. 13-14
- Call for nominations for ACM general election. 14
- Hal Berghel:
Better-than-nothing security practices. 15-18
- Amy S. Bruckman:
Software copyright and role models. 19-20
- Robert L. Glass:
A deja-vu look at software engineering researchers who care about practice. 21-23 - Alfred Kobsa:
Privacy-enhanced personalization. 24-33 - Ahmed Elfatatry:
Dealing with change: components versus services. 35-39 - Matt E. Thatcher, David E. Pingry:
Modeling the IT value paradox. 41-45 - John Erickson, Keng Siau:
Theoretical and practical complexity of modeling methods. 46-51 - Jesper Simonsen:
Involving top management in IT projects. 52-58 - Larry J. LeBlanc, Michael R. Galbreth:
Designing large-scale supply chain linear programs in spreadsheets. 59-64 - Yun Wan, Satya Menon, Arkalgud Ramaprasad:
A classification of product comparison agents. 65-71 - Janice C. Sipior, Burke T. Ward:
Unintended invitation: organizational wi-fi use by external roaming users. 72-77 - T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk:
Testing object-oriented industrial software without precise oracles or results. 78-85 - Sagnika Sen, Haluk Demirkan, Michael Goul:
Dynamic decision support through instantiation of UEML representations. 87-93 - Wullianallur Raghupathi:
Corporate governance of IT: a framework for development. 94-99
- Top 10 downloads from ACM's digital library. 100
- Sakgasit Ramingwong, A. S. M. Sajeev:
Offshore outsourcing: the risk of keeping mum. 101-103
- David Lorge Parnas:
Which is riskier: OS diversity or OS monopoly? 112
Volume 50, Number 9, September 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Forum. 13-14
- Neil L. Waters:
Why you can't cite Wikipedia in my class. 15-17
- Ronald F. Boisvert, Mary Jane Irwin, Holly E. Rushmeier:
Evolving the ACM journal distribution program. 19-20
- Meg McGinity Shannon:
Shaking hands, kissing babies, and ... blogging? 21-24
- Phillip G. Armour:
The conservation of uncertainty. 25-28
- Toshinori Munakata:
Introduction. 30-34 - Warren Robinett, Gregory S. Snider, Philip Kuekes, R. Stanley Williams:
Computing with a trillion crummy components. 35-39 - Jing Kong:
Computation with carbon nanotube devices. 40-42 - Robert Stadler:
Molecular, chemical, and organic computing. 43-45 - John H. Reif, Thomas H. LaBean:
Autonomous programmable biomolecular devices using self-assembled DNA nanostructures. 46-53 - Dave Bacon, Debbie W. Leung:
Toward a world with quantum computers. 55-59 - Hossin Abdeldayem, Donald O. Frazier:
Optical computing: need and challenge. 60-62 - David W. M. Marr, Toshinori Munakata:
Micro/nanofluidic computing. 64-68 - Masashi Aono, Masahiko Hara, Kazuyuki Aihara:
Amoeba-based neurocomputing with chaotic dynamics. 69-72 - Ami Marowka:
Parallel computing on any desktop. 74-78 - George Lepouras, Costas Vassilakis, Constantin Halatsis, Panagiotis Georgiadis:
Domain expert user development: the smartgov approach. 79-83 - Joseph S. Valacich, D. Veena Parboteeah, John D. Wells:
The online consumer's hierarchy of needs. 84-90 - Susan A. Brown, Norman L. Chervany, Bryan A. Reinicke:
What matters when introducing new information technology. 91-96 - Ashley Braganza, Arnoud Franken:
SOX, compliance, and power relationships. 97-102 - Irene Pollach:
What's wrong with online privacy policies? 103-108
- Thomas F. Stafford, Dennis Gonier:
The online research "bubble". 109-112
- Top 10 downloads from ACM's digital library. 118
- Peter G. Neumann:
E-migrating risks? 120
Volume 50, Number 10, October 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Forum. 13-14
- Michael A. Cusumano:
Extreme programming compared with Microsoft-style iterative development. 15-18
- Pamela Samuelson:
Does copyright law need to be reformed? 19-23
- Katia Passerini, Karen P. Patten, Michael R. Bartolacci, Jerry Fjermestad:
Reflections and trends in the expansion of cellular wireless services in the U.S. and China. 25-28
- Sebastian Thrun:
Why we compete in DARPA's Urban Challenge autonomous robot race. 29-31
- Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu:
Post-conflict communications: the case of Liberia. 33-39 - Erran Carmel, Pamela Abbott:
Why 'nearshore' means that distance matters. 40-46 - Erran Carmel, Pamela Abbott:
Nearshore locations in three principal global clusters and their respective attributes. 45 - Matt E. Thatcher, David E. Pingry:
[Software patents] The good, the bad, and the messy. 47-52 - Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios:
Knowledge services on the semantic web. 53-58 - U. N. Umesh, Leonard M. Jessup, Minh Q. Huynh:
[Getting ideas to market] Current issues faced by technology entrepreneurs. 60-66 - Asli Yagmur Akbulut, Clayton A. Looney:
Inspiring students to pursue computing degrees. 67-71 - Prabhudev Konana, Gautam Ray:
Physical product reengineering with embedded information technology. 72-78 - Mike P. Papazoglou, Willem-Jan van den Heuvel:
Business process development life cycle methodology. 79-85 - William L. Kuechler Jr.:
Business applications of unstructured text. 86-93 - Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer:
Social phishing. 94-100 - Wade H. Baker, Loren Paul Rees, Peter S. Tippett:
Necessary measures: metric-driven information security risk assessment and decision making. 101-106 - Richard J. Goeke, Robert H. Faley:
Leveraging the flexibility of your data warehouse. 107-111 - John D'Arcy, Anat Hovav:
Deterring internal information systems misuse. 113-117
- Top 10 downloads from ACM's digital library. 118
- Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman:
Toward a safer and more secure cyberspace. 128
Volume 50, Number 11, November 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Peter J. Denning:
The choice uncertainty principle. 9-14
- Robert L. Glass:
A research project with important practitioner-oriented findings. 15-16
- Stuart I. Feldman:
The rewards of ACM's awards. 17-18
- David Lorge Parnas:
Stop the numbers game. 19-21
- Dror G. Feitelson:
Introduction. 24-26 - Catherine C. McGeoch:
Experimental algorithmics. 27-31 - Victor R. Basili, Marvin V. Zelkowitz:
Empirical studies to build a science of computer science. 33-37 - Larry L. Peterson, Vivek S. Pai:
Experience-driven experimental systems research. 38-44 - Alan Jay Smith:
Workloads (creation and use). 45-50 - Ellen M. Voorhees:
TREC: Continuing information retrieval's tradition of experimentation. 51-54 - Larry D. Jackel, Douglas Hackett, Eric Krotkov, Michael Perschbacher, James Pippine, Charles Sullivan:
How DARPA structures its robotics programs to improve locomotion and navigation. 55-59 - Oded Nov:
What motivates Wikipedians? 60-64 - Paul P. Tallon, Richard Scannell:
Information life cycle management. 65-69 - Neil Foshay, Avinandan Mukherjee, Andrew Taylor:
Does data warehouse end-user metadata add value? 70-77 - Chris Sauer, Andrew Gemino, Blaize Horner Reich:
The impact of size and volatility on IT project performance. 79-84 - Dominic M. Thomas, Robert P. Bostrom, Marianne Gouge:
Making knowledge work in virtual teams. 85-90 - Hee-Woong Kim, Yunjie Xu:
Drivers of price Premium in e-markets. 91-95
- Top 10 downloads from ACM's digital library. 97
- Matt Bishop, David A. Wagner:
Risks of e-voting. 120
Volume 50, Number 12, December 2007
- Diane Crawford:
Editorial pointers. 5
- News track. 7-8
- Diane Crawford:
Forum. 9-10
- Hal Berghel:
Credit Card Forensics. 11-14
- Robert Gaskins:
PowerPoint at 20: back to basics. 15-17
- Ben Shneiderman:
Creativity support tools: accelerating discovery and innovation. 20-32 - Dongwon Lee, Jaewoo Kang, Prasenjit Mitra, C. Lee Giles, Byung-Won On:
Are your citations clean? 33-38 - Nominees for elections and report of the ACM nominating committee. 39
- Robert J. Aalberts, Percy Poon, Paul D. Thistle:
Trespass, nuisance, and spam: 11th century common law meets the internet. 40-45 - Antonio M. Lopez Jr., Frederick G. Lopez, Robert W. Lent, Madonna G. Constantine:
Multidisciplinary research on the datapath of the computing disciplines. 46-50 - Erica L. Wagner, Gabriele Piccoli:
Moving beyond user participation to achieve successful IS design. 51-55 - Wai Fong Boh, Christina Soh, Steven Yeo:
Standards development and diffusion: a case study of RosettaNet. 57-62 - Ilan Oshri, Sue Newell, Shan Ling Pan:
Implementing component reuse strategy in complex products environments. 63-67 - Kannan Mohan, Balasubramaniam Ramesh:
Tracing variations in software product families. 68-73 - Klaus Schild, Stefan Bussmann:
Self-organization in manufacturing operations. 74-79 - Varun Grover, Raymond M. Henry, Jason Bennett Thatcher:
Fix IT-business relationships through better decision rights. 80-86 - Gautam Ray, Waleed A. Muhanna, Jay B. Barney:
Competing with IT: the role of shared IT-business understanding. 87-91
- Emmeline de Pillis, Kimberly A. Furumo:
Counting the cost of virtual teams. 93-95 - Chuan-Hoo Tan, Hock-Hai Teo:
Training future software developers to acquire agile development skills. 97-98
- Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. 128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.