Journal: Communications of the ACM

Volume 50, Issue 10

5 -- 0Diane Crawford. Editorial pointers
7 -- 8. News track
13 -- 14. Forum
15 -- 18Michael A. Cusumano. Extreme programming compared with Microsoft-style iterative development
19 -- 23Pamela Samuelson. Does copyright law need to be reformed?
25 -- 28Katia Passerini, Karen Patten, Michael R. Bartolacci, Jerry Fjermestad. Reflections and trends in the expansion of cellular wireless services in the U.S. and China
29 -- 31Sebastian Thrun. Why we compete in DARPA s Urban Challenge autonomous robot race
33 -- 39Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu. Post-conflict communications: the case of Liberia
40 -- 46Erran Carmel, Pamela Abbott. Why nearshore means that distance matters
45 -- 0Erran Carmel, Pamela Abbott. Nearshore locations in three principal global clusters and their respective attributes
47 -- 52Matt E. Thatcher, David E. Pingry. [Software patents] The good, the bad, and the messy
53 -- 58Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios. Knowledge services on the semantic web
60 -- 66U. N. Umesh, Leonard M. Jessup, Minh Q. Huynh. [Getting ideas to market] Current issues faced by technology entrepreneurs
67 -- 71Asli Yagmur Akbulut, Clayton A. Looney. Inspiring students to pursue computing degrees
72 -- 78Prabhudev Konana, Gautam Ray. Physical product reengineering with embedded information technology
79 -- 85Mike P. Papazoglou, Willem-Jan van den Heuvel. Business process development life cycle methodology
86 -- 93William L. Kuechler Jr.. Business applications of unstructured text
94 -- 100Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer. Social phishing
101 -- 106Wade H. Baker, Loren Paul Rees, Peter S. Tippett. Necessary measures: metric-driven information security risk assessment and decision making
107 -- 111Richard J. Goeke, Robert H. Faley. Leveraging the flexibility of your data warehouse
113 -- 117John D Arcy, Anat Hovav. Deterring internal information systems misuse
118 -- 0. Top 10 downloads from ACM s digital library
128 -- 0Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman. Toward a safer and more secure cyberspace