Journal: Communications of the ACM

Volume 49, Issue 1

5 -- 7Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 16Diane Crawford. Top 10 downloads from ACM s digital library
17 -- 20Phillip G. Armour. Counting boulders and measuring mountains
29 -- 32Meg McGinity Shannon. The network of life
33 -- 35David A. Patterson. New Directions for ::::CACM::::?
37 -- 39Scott Campbell. How to think about security failures
40 -- 43Jaime Teevan, William Jones, Benjamin B. Bederson. Introduction
44 -- 50Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci. Digital memories in an era of ubiquitous computing and abundant storage
51 -- 55Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels. Personal health information management
56 -- 57Clare-Marie Karat, Carolyn Brodie, John Karat. Usable privacy and security for personal information management
58 -- 64Edward Cutrell, Susan T. Dumais, Jaime Teevan. Searching to eliminate personal information management
66 -- 67Catherine C. Marshall, William Jones. Keeping encountered information
68 -- 73Steve Whittaker, Victoria Bellotti, Jacek Gwizdka. Email in personal information management
74 -- 75Thomas Erickson. From PIM to GIM: personal information management in group contexts
77 -- 82David R. Karger, William Jones. Data unification in personal information management
84 -- 86Diane Kelly. Evaluating personal information management behaviors and tools
88 -- 95Jim Gemmell, Gordon Bell, Roger Lueder. MyLifeBits: a personal database for everything
96 -- 100Kevin C. Desouza, Yukika Awazu, Amrit Tiwana. Four dynamics for bringing use back into software reuse
101 -- 106George Pallis, Athena Vakali. Insight and perspectives for content delivery networks
107 -- 113Grace J. Johnson, Paul J. Ambrose. Neo-tribes: the power and potential of online communities in health care
114 -- 119Tim Chenoweth, Karen Corral, Haluk Demirkan. Seven key interventions for data warehouse success
121 -- 125Lawrence A. Gordon, Martin P. Loeb. Budgeting process for information security expenditures
126 -- 130Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers. Ethnocomputing: ICT in cultural and social context
131 -- 134Christoph Meinel, Volker Klotz. The first 10 years of the ECCC digital library
160 -- 0John C. Knight, Nancy G. Leveson. Software and higher education