Journal: Communications of the ACM

Volume 49, Issue 2

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Gary F. Templeton. Video image stabilization and registration technology
19 -- 24Siri Birgitte Uldal, Muhammad Aimal Marjan. Computing in post-war Afghanistan
25 -- 30Pamela Samuelson. Regulating technical design
31 -- 34Michael A. Cusumano. Where does Russia fit into the global software industry?
35 -- 37Nanda Kumar, Abbe Mowshowitz. Who should govern the internet?
39 -- 40Diane Crawford. Top 10 downloads from ACM s digital library
41 -- 42David A. Patterson. Offshoring: finally facts vs. folklore
44 -- 47Brajendra Panda, Joseph Giordano, Daniel Kalil. Introduction
48 -- 55Eoghan Casey. Investigating sophisticated security breaches
56 -- 61Brian D. Carrier. Risks of live digital forensic analysis
63 -- 66Frank Adelstein. Live forensics: diagnosing your system without killing it first
67 -- 68. The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage
69 -- 70Chet Hosmer. Digital evidence bag
71 -- 75Sheldon Teelink, Robert F. Erbacher. Improving the computer forensic analysis process through visualization
76 -- 80Golden G. Richard III, Vassil Roussev. Next-generation digital forensics
81 -- 83Rahul Bhaskar. State and local law enforcement is not ready for a cyber Katrina
85 -- 87Simson L. Garfinkel. AFF: a new format for storing hard drive images
88 -- 94Ganesan Shankaranarayanan, Adir Even. The metadata enigma
96 -- 103Pak-Lok Poon, Amy H. L. Lau. The present B2C implementation framework
104 -- 109Jan Damsgaard, Mihir A. Parikh, Bharat Rao. Wireless commons perils in the common good
110 -- 0. Student de-charter notice
111 -- 116Henry M. Gladney. Principles for digital preservation
117 -- 122Stephen Owen, Pearl Brereton, David Budgen. Protocol analysis: a neglected practice
123 -- 128Deborah J. Armstrong. The quarks of object-oriented development
129 -- 134Roli Varma. Making computer science minority-friendly
152 -- 0Peter G. Neumann. Trustworthy systems revisited