Journal: Communications of the ACM

Volume 46, Issue 8

9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Hal Berghel. The discipline of Internet forensics
21 -- 23Robert L. Glass. A mugwump s-eye view of Web work
25 -- 28William W. Agresti. Discovery informatics
29 -- 31David L. Dill, Bruce Schneier, Barbara Simons. Voting and technology: who gets to count your vote?
32 -- 34Bjorn De Sutter, Koenraad De Bosschere. Introduction
35 -- 40Frank Tip, Peter F. Sweeney, Chris Laffra. Extracting library-based Java applications
41 -- 46Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter. Post-pass compaction techniques
47 -- 52Arvind Krishnaswamy, Rajiv Gupta. Mixed-width instruction sets
54 -- 60Saumya K. Debray, William S. Evans. Cold code decompression at runtime
61 -- 66William S. Evans, Christopher W. Fraser. Grammar-based compression of interpreted code
67 -- 72Padmal Vitharana. Risks and challenges of component-based software development
74 -- 79Richard E. Potter. How CIOs manage their superiors expectations
80 -- 84Thomas W. Jackson, Ray Dawson, Darren Wilson. Understanding email interaction increases organizational productivity
85 -- 89Bruce Russell, Sangit Chatterjee. Relationship quality: the undervalued dimension of software quality
91 -- 95Michael E. Whitman. Enemy at the gate: threats to information security
96 -- 101Gert-Jan de Vreede, Robert M. Davison, Robert O. Briggs. How a silver bullet may lose its shine
103 -- 107Kenneth R. Walsh. Analyzing the application ASP concept: technologies, economies, and strategies
109 -- 114Thiagarajan Ravichandran, Marcus A. Rothenberger. Software reuse strategies and component markets
115 -- 119Zhiying Zhou. CMM in uncertain environments
120 -- 124Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis. Third generation and beyond wireless systems
136 -- 0Lauren Weinstein. Spam wars