Journal: Communications of the ACM

Volume 51, Issue 12

5 -- 0Ronald F. Boisvert, Holly E. Rushmeier. ACM publications: access and sustainability
7 -- 0Scott E. Delman. Looking back and forward
8 -- 0. Apple builds great platforms, too, not just products
10 -- 0David Roman. Previewing the new CACM web site
11 -- 13Kirk L. Kroeker. Living machines
14 -- 16Ted Selker. Touching the future
17 -- 19Samuel Greengard. Upwardly mobile
20 -- 0Leah Hoffmann. Making a difference
21 -- 23Alok Aggarwal. Emerging markets - Labor supply in the Indian IT industry
24 -- 26Cameron Wilson, Peter Harsha. IT policy - Advising policymakers is more than just providing advice
27 -- 28George Neville-Neil. Kode vicious - Permanence and change
29 -- 31Peter J. Denning, Chris Gunderson, Frederick Hayes-Roth. The profession of IT - Evolutionary system development
32 -- 35James R. Hamilton. Interview - Database dialogue with Pat Selinger
43 -- 49Mache Creeger. CTO virtualization roundtable, part II
50 -- 56Francine Berman. Got data?: a guide to data preservation in the information age
58 -- 67Ian Horrocks. Ontologies and the semantic web
68 -- 74Oren Etzioni, Michele Banko, Stephen Soderland, Daniel S. Weld. Open information extraction from the web
76 -- 0Michael Stonebraker. Technical perspective - One size fits all: an idea whose time has come and gone
77 -- 85Peter A. Boncz, Martin L. Kersten, Stefan Manegold. Breaking the memory wall in MonetDB
86 -- 0Martin C. Rinard. Technical perspective - Patching program errors
87 -- 95Gene Novark, Emery D. Berger, Benjamin G. Zorn. Exterminator: Automatically correcting memory errors with high probability
118 -- 0Peter Winkler. Puzzled - Solutions and sources
120 -- 0Cory Doctorow. Future tense - Pester power
121 -- 127Peter Duchessi, InduShobha N. Chengalur-Smith. Enhancing business performance via vendor managed inventory applications
128 -- 132Chee Wei Phang, Atreyi Kankanhalli. A framework of ICT exploitation for e-participation initiatives
133 -- 137Michael J. Davern, Carla Wilkin. Evolving innovations through design and use
138 -- 142Michael Näf, David A. Basin. Two approaches to an information security laboratory
143 -- 146Patrick Stacey, Joe Nandhakumar. Opening up to agile games development
147 -- 150Ross A. Malaga. Worst practices in search engine optimization
151 -- 154Pierre R. Berthon, Leyland F. Pitt, Richard T. Watson. From Genesis to Revelations: the technology diaspora
155 -- 157Vivien K. G. Lim, Thompson S. H. Teo, Jen Yuin Chin. Technical opinion - Bosses and their e-manners