Journal: Communications of the ACM

Volume 37, Issue 9

19 -- 22Yasmin B. Kafai, Elliot Soloway. Computational Gifts for the Barney Generation
23 -- 25Roy Rada, George S. Carson. The New Media
28 -- 29Robert V. Binder. Object-Oriented Software Testing - Introduction to the Special Section
30 -- 38Paul C. Jorgensen, Carl Erickson. Object-Oriented Integration Testing
39 -- 47Gail C. Murphy, Paul Townsend, Pok Sze Wong. Experiences with Cluster and Class Testing
48 -- 58Robert M. Poston. Automated Testing from Object Models
59 -- 77John D. McGregor, Timothy D. Korson. Integrated Object-Oriented Testing and Development Processes
78 -- 86Thomas R. Arnold, William A. Fuson. Testing In A Perfect World
87 -- 101Robert V. Binder. Design for Testability in Object-Oriented Systems
102 -- 108George W. Hart. To Decode Short Cryptograms
109 -- 117Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts. Cryptography Policy
138 -- 0Peter G. Neumann. Expectations of Security and Privacy

Volume 37, Issue 8

15 -- 19Robert E. Kahn. The Role of Government in the Evolution of the Internet
21 -- 25Pamela Samuelson. Self-Plagiarism or Fair Use?
27 -- 31Seymour E. Goodman, Larry Press, Stephen R. Ruth, Anthony M. Rutkowski. The Global Diffusion of the Internet: Patterns and Problems
32 -- 33Barry M. Leiner. Internet Technology - Introduction to the Special Issue
34 -- 45Kimberly C. Claffy, Hans-Werner Braun, George C. Polyzos. Tracking Long-Term Growth of the NSFNET
46 -- 53Håvard Eidnes. Practical Considerations for Network Addressing Using CIDR
54 -- 60Hans Eriksson. Mbone: The Multicast Backbone
61 -- 66John Moy. Multicast Routing Extensions for OSPF
67 -- 0Fumio Teraoka, Keisuke Uehara, Hideki Sunahara, Jun Murai. VIP: A Protocal Providing Host Mobility
76 -- 82Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret. The World-Wide Web
83 -- 97Hiroshi Ishii, Minoru Kobayashi, Kazuho Arita. Iterative Design of Seamless Collaboration Media
98 -- 107C. Mic Bowman, Peter B. Danzig, Udi Manber, Michael F. Schwartz. Scalable Internet Discovery: Research Problems and Approaches
108 -- 113Katherine T. Fithen, Barbara Fraser. CERT Incident Response
115 -- 121Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel. Crypto Policy Perspectives
138 -- 0Peter G. Neumann. Friendly Fire

Volume 37, Issue 7

13 -- 17Larry Press. Tomorrow s Campus
18 -- 21Doug Riecken. Intelligent Agents - Introduction to the Special Issue
22 -- 29Marvin Minsky, Doug Riecken. A Conversation with Marvin Minsky About Agents
30 -- 40Pattie Maes. Agents that Reduce Work and Information Overload
41 -- 47Ernest A. Edmonds, Linda Candy, Rachel M. Jones, Bassel Soufi. Support for Collaborative Design: Agents and Emergence
48 -- 0Michael R. Genesereth, Steven P. Ketchpel. Software Agents
54 -- 67David Canfield Smith, Allen Cypher, James C. Spohrer. KidSim: Programming Agents Without a Programming Language
68 -- 71Donald A. Norman. How Might People Interact with Agents
72 -- 76Oren Etzioni, Daniel S. Weld. A Softbot-Based Interface to the Internet
80 -- 91Tom M. Mitchell, Rich Caruana, Dayne Freitag, John P. McDermott, David Zabowski. Experience with a Learning Personal Assistant
92 -- 99Ted Selker. COACH: A Teaching Agent that Learns
100 -- 105Irene Greif. Desktop Agents in Group-Enabled Products
106 -- 0Doug Riecken. M: An Architecture of Integrated Agents
117 -- 121Margaret A. Boden. Agents and Creativity
122 -- 125Joseph Bates. The Role of Emotion in Believable Agents
126 -- 142Ramanathan V. Guha, Douglas B. Lenat. Enabling Agents to Work Together
143 -- 146Henry A. Kautz, Bart Selman, Michael H. Coen. Bottom-Up Design of Software Agents
170 -- 0Barbara Simons. Questions about the NII

Volume 37, Issue 6

13 -- 15Fred W. Weingarten. The Politicizing of Science Policy
17 -- 21Gad Ariav, Seymour E. Goodman. Israel: Of Swords and Software Plowshares
22 -- 24Nasr Ullah, Philip K. Brownfield. The Making of the PowerPC - Introduction to the Special Section
25 -- 27Charles R. Moore, Russell C. Stanphill. The PowerPC Alliance
28 -- 33Keith Diefendorff. History of the PowerPC Architecture
34 -- 42Brad Burgess, Nasr Ullah, Peter Van Overen, Deene Ogden. The PowerPC 603 Microprocessor
47 -- 55Ali Poursepanj. The POwerPC Performance Modeling Methodology
64 -- 69William Anderson. An Overview of Motorola s PowerPC Simulator Family
70 -- 78Stuart M. Shieber. Lessons from a Restricted Turing Test
79 -- 82Hugh Gene Loebner. Response to Lessons from a Restricted Turing Test
83 -- 84Stuart M. Shieber. On Loebner s Lessons
114 -- 0Peter G. Neumann. Risks on the Information Superhighway

Volume 37, Issue 5

15 -- 17John Perry Barlow. Dad s Invisible Guard-All Shield
19 -- 21Roger C. Schank. Tractor Factories and Research in Software Design
22 -- 25Richard C. Waters, Elliot J. Chikofsky. Reverse Engineeing - Introduction to the Special Section
26 -- 41Peter H. Aiken, Alice H. Muntz, Russ Richards. DoD Legacy Systems: Reverse Engineering Data Requirements
42 -- 0William J. Premerlani, Michael R. Blaha. An Approach for Reverse Engineering of Relational Databases
50 -- 57Jim Q. Ning, Andre Engberts, Wojtek Kozaczynski. Automated Support for Legacy Code Understanding
58 -- 70Lawrence Markosian, Philip Newcomb, Russell Brand, Scott Burson, Ted Kitzmiller. Using an Enabling Technology to Reengineer Legacy Systems
72 -- 82Ted J. Biggerstaff, Bharat G. Mitbander, Dallas E. Webster. Program Understanding and the Concept Assigment Problem
84 -- 93Alex Quilici. A Memory-Based Approach to Recognizing Programing Plans
94 -- 101Karl J. Lieberherr, Ignacio Silva-Lepe, Cun Xiao. Adaptive Object-Oriented Programming Using Graph-Based Customization
102 -- 113Iris Vessey, Sue A. Conger. Requirements Specification: Learning Object, Process, and Data Methodologies
146 -- 0Peter G. Neumann. Alternative Passwords

Volume 37, Issue 4

15 -- 16Roy Rada, George S. Carson, Christopher T. Haynes. The Role of Consensus
21 -- 27Marc Rettig. Prototyping for Tiny Fingers
28 -- 29Adrian M. Tentner. High Performance Computing - Introduction to the Special Section
31 -- 41William J. Camp, Steve Plimpton, Bruce Hendrickson, Robert W. Leland. Massively Parallel Methods for Engineering and Science Problems
42 -- 52Allan S. Jacobson, Andrew L. Berkin, Martin N. Orton. LinkWinds: Interactive Scientific Data Analysis and Visualization
54 -- 64Adrian M. Tentner, R. N. Blomquist, T. R. Canfield, P. L. Garner, E. M. Gelbard, K. C. Gross, M. Minkoff, R. A. Valentin. Advances in Parallel Computing for Reactor Analysis and Safety
66 -- 75Jakob Nielsen, Jonathan Levy. Measuring Usability: Preference vs. Performance
76 -- 86Richard A. Coll, Joan H. Coll, Ganesh Thankur. Graphs and Tables: A Four-Factor Experiment
87 -- 90. Academic Careers for Experimental Computer Scientists and Engineers
126 -- 0Peter G. Neumann. Risks of Passwords

Volume 37, Issue 3

11 -- 16Larry Press. Emerging Dynabase Tools
17 -- 19Fred W. Weingarten. Public Interest and the NII
23 -- 26Toshinori Munakata. Commerical and Industrial AI - Indroduction to the Special Issue
27 -- 39Frederick Hayes-Roth, Neil Jacobstein. The State of Knowledge-Based Systems
40 -- 42Bradley P. Allen. Case-Based Reasoning: Business Applications
45 -- 51W. Eric L. Grimson, Joseph L. Mundy. Computer Vision Applications
52 -- 57Alexander I. Rudnicky, Alexander G. Hauptmann, Kai-Fu Lee. Survey of Current Speech Technology
58 -- 67Takeo Kanade, Michael L. Reed, Lee E. Weiss. New Technologies and Applications in Robotics
69 -- 76Toshinori Munakata, Yashvant Jani. Fuzzy Systems: An Overview
77 -- 84Lotfi A. Zadeh. Fuzzy Logic, Neural Networks, and Soft Computing
87 -- 92David E. Rumelhart, Bernard Widrow, Michael A. Lehr. The Basic Ideas in Neural Networks
93 -- 105Bernard Widrow, David E. Rumelhart, Michael A. Lehr. Neural Networks: Applications in Industry, Business and Science
106 -- 112Kazuo Asakawa, Hideyuki Takagi. Neural Networks in Japan
113 -- 119David E. Goldberg. Genetic and Evolutionary Algorithms Come of Age
138 -- 0Peter G. Neumann. Technology, Laws, and Society

Volume 37, Issue 2

15 -- 20Elliot Soloway. Ways of Seeing
21 -- 25Seymour E. Goodman. Computing in South Africa: An End to Apartness ?
26 -- 29Kaj Grønbæk, Randall H. Trigg. Hypermedia - Introduction to the Special Section
30 -- 39Frank G. Halasz, Mayer D. Schwartz. The Dexter Hypertext Reference Model
40 -- 49Kaj Grønbæk, Randall H. Trigg. Design Issues for a Dexter-Based Hypermedia System
50 -- 62Lynda Hardman, Dick C. A. Bulterman, Guido van Rossum. The Amsterdam Hypermedia Model: Adding Time and Context to the Dexter Model
65 -- 74Kaj Grønbæk, Jens A. Hem, Ole Lehrmann Madsen, Lennert Sloth. Cooperative Hypermedia Systems: A dexter-Based Architecture
76 -- 86John J. Leggett, John L. Schnase. Viewing Dexter with Open Eyes
87 -- 96Ehud Rivlin, Rodrigo A. Botafogo, Ben Shneiderman. Navigating in Hyperspace: Designing a Structure-Based Toolbox
97 -- 108Gerard Salton, James Allan, Chris Buckley. Automatic Structuring and Retrival of Large Text Files
146 -- 0Robert D. Dorsett. Safety in the Air

Volume 37, Issue 12

17 -- 20James W. Moore, David E. Emery, Roy Rada. Language-Independent Standards
21 -- 27Pamela Samuelson. The NII Intellectual Property Report
28 -- 35John M. Carroll. Making Use a Design Representation
36 -- 49Gerald L. Lohse, Kevin Biolsi, Neff Walker, Henry H. Rueter. A Classification of Visual Representations
50 -- 56Stephen G. Eick, Michael C. Nelson, Jeffrey D. Schmidt. Graphical Analysis of Computer Log Files
57 -- 62Kim Halskov Madsen. A Guide to Metaphorical Design
63 -- 72Steven C. Bagley, Gary E. Kopec. Editing Images of Text
73 -- 84Manojit Sarkar, Marc H. Brown. Graphical Fisheye Views
85 -- 96D. E. Stevenson. Science, Computational Science, and Computer Science: At a Crossroads
97 -- 102Gerald J. Johnson. Of Metaphore and the Difficulty of Computer Discourse
154 -- 0Peter G. Neumann. Inside Inside Risks

Volume 37, Issue 11

17 -- 21Larry Press. Commercialization on the Internet
23 -- 27Brian A. Nejmeh. Internet: A Strategic Tool for the Software Enterprise
28 -- 31Ravi Ganesan, Ravi S. Sandhu. Securing Cyberspace - Introduction to the Special Section
32 -- 40Ross J. Anderson. Why Cryptosystems Fail
42 -- 46Roger M. Needham. Denail of Service: An Example
48 -- 55Ralf C. Hauser. Does Licensing Require New Access Control Techniques?
56 -- 65Gustavus J. Simmons. Cryptoanalysis and Protocol Failures
66 -- 70Paul C. Clark, Lance J. Hoffman. BITS: A Smartcard Protected Operating System
71 -- 81Shekhar H. Kirani, Imran A. Zualkernan, Wei-Tek Tsai. Evaluation of Expert System Testing Methods
82 -- 94Bruce I. Blum. A Taxonomy of Software Development Methods
95 -- 99Richard Edwin Stearns. Turing Award Lecture: It s Time to Reconsider Time

Volume 37, Issue 10

15 -- 17Fred W. Weingarten. University Research in a Squeeze
18 -- 28Tomasz Imielinski, B. R. Badrinath. Mobile Wireless Computing: Challenges in Data Management
29 -- 36Effy Oz. When Professional Standards are Lax: The CONFIRM Failure and its Lessons
37 -- 43Juris Hartmanis. Turing Award Lecture: On Computational Complexity and the Nature of Computer Science
44 -- 55Richard T. Watson, Teck Hua Ho, K. S. Raman. Culture: A Fourth Dimension of Group Support
56 -- 73Hsinchun Chen, P. Hsu, Richard E. Orwig, L. Hoopes, Jay F. Nunamaker. Automatic Concept Classification of Text from Electronic Meetings
74 -- 86Martin D. Fraser, Kuldeep Kumar, Vijay K. Vaishnavi. Strategies for Incorporating Formal Specifications in Software Development
87 -- 98Rosemary H. Wild, Joseph J. Pignatiello Jr.. Finding Stable System Designs: A reverse Simulation Technique
122 -- 0Benjamin Wright. The Verdict on Plaintext Signatures: There re Legal

Volume 37, Issue 1

17 -- 19Edward A. Feigenbaum, Peter Friedland, Bruce B. Johnson, H. Penny Nii, Herbert Schorr, Howard E. Shrobe, Robert S. Engelmore. Knowledge-Based Systems in Japan (Report of the JTEC Panel)
21 -- 27Pamela Samuelson. Copyright s Fair Use Doctrine and Digital Data
28 -- 29Doug Schuler. Social Computing - Introduction to the Special Section
30 -- 37Gary Chapman. The National Forum on Science and Technology Goals: Building a Democratic, Post-Cold War Science and Technology Policy
38 -- 51Doug Schuler. Community Networks: Building a New Participatory Medium
52 -- 0Andrew Clement. Computing at Work: Empowering Action By Low-level Users
64 -- 70Batya Friedman, Peter H. Kahn Jr.. Educating Computer Scientists: Linking the Social and Technical
72 -- 80Helen Nissenbaum. Computing and Accountability
81 -- 91W. Robert Collins, Keith W. Miller, Bethany J. Spielman, Phillip Wherry. How Good Is Good Enough?
92 -- 105Jonathan Grudin. Groupware and Social Dynamics: Eight Challenges for Developers
106 -- 108. Renewing the Commitment To a Public Interest Telecommunications Policy
154 -- 0Robert D. Dorsett. Risks in Aviation