Journal: Communications of the ACM

Volume 39, Issue 9

11 -- 12Thomas L. Sterling. The Scientific Workstation of the Future May Be a Pile of PCs
13 -- 15Brock N. Meeks. Dragging a Kicking-and-Screaming Government into the 21st Century
22 -- 25Ellen Isaacs, John C. Tang. Technology Transfer: So Much Research, So Few Godd Producs (Introduction to the Special Section)
26 -- 27Jean Scholtz. Technology Transfer Through Prototypes
28 -- 29Allan Kuchinsky. Transfer Means More Than Just Technology
30 -- 31James D. Foley. Technology Transfer from University to Industry
32 -- 34Jeff A. Johnson. R<->D, Not R&D
35 -- 36John L. Bennett. Building Relationships for Technology Transfer
38 -- 40Nayeem Islam, Roy H. Campbell. Latest Developments in Operating Systems (Introduction to the Special Section)
41 -- 51Peter Druschel. Operating System Support for High-Speed Communication: Techniques to Eliminate Processing Bottlenecks in High-Speed Networking are Present
52 -- 61Mendel Rosenblum, John Chapin, Dan Teodosiu, Scott Devine, Tirthankar Lahiri, Anoop Gupta. Implementing Efficient Fault Containment for Multiprocessors: Confining Faults in a Shared-Memory Multiprocessor Environment
62 -- 69John Rosenberg, Alan Dearle, David Hulse, Anders Lindström, Stephen Norris. Operating System Support for Persistant and Recoverable Computations: Guaranteeing data recovery and consistency, the authors experimental Grasshopper persistent operating system simplifies application development and encourages construction of integrate
70 -- 77Jochen Liedtke. Toward Real Microkernels: The inefficient, inflexible first generation inspired development of the vastly improved second generation, which may yet support a variety of operating systems
78 -- 87Mark R. Cutkosky, Jay M. Tenenbaum, Jay Glicksman. Madefast: Collaborative Engineering over the Internet
88 -- 91Uzi Vishkin. Can Parallel Algorithms Enhance Seriel Implementation?
92 -- 104Kenneth C. Laudon. Markets and Privacy
130 -- 0Lauren Weinstein. Behind the State of the Art

Volume 39, Issue 8

13 -- 15Jonah Sieger. Communications Decency Act is Defeated: Landmark Victory for Netizens
17 -- 21James W. Moore, Roy Rada. Organizational Badge Collecting
23 -- 24Steve Mann. Smart Clothing: The Shift to Wearable Computing
28 -- 30Ted Selker. New Paradigms for Computing (Introduction to the Special Section)
30 -- 0John Seely Brown. To Dream the Invisible Dream
38 -- 48Henry Lieberman. Intelligent Graphics
49 -- 59Kenneth M. Kahn. Drawings on Napkins, Video-Game Animation, and Other Ways to Program Computers: Programming can be as easy as child s play
60 -- 69Ted Selker. New Paradigms for Using Computers
70 -- 82Donald R. Gentner, Jakob Nielsen. The Anti-Mac Interface
83 -- 0Elliot Soloway, Amanda Pryor. Using Computational Media to Facilitate Learning (Introduction to the Special Section)
84 -- 85Andee Rubin, Scott Bresnahan, Ted Ducas. Cartwheeling Through CamMotion
86 -- 87Jere Confrey, Alan Maloney. Function Probe
88 -- 90Wallace Feurzeig, John Richards. Function Machines
94 -- 96Judah L. Schwartz. Motion Toys for Eye and Mind
97 -- 99Jeremy Roschelle, James J. Kaput. SimCalc Mathworlds for the Mathematics of Change
100 -- 102Paul Horwitz, Eric P. Neumann, Joyce Schwartz. Teaching Science at Multiple Space Time Scales
103 -- 105Pierre Dillenbourg, John A. Self. What If the Computer Doesn t Know the Answer?
106 -- 109. A Multimedia Literacy Series
130 -- 0Herbert Lin. Cryptography s Role in Securing Information
9193 -- 0Margo Cappo, Kathy Darling. Measurement In Motion

Volume 39, Issue 7

11 -- 15Lawrence T. Greenberg, Seymour E. Goodman. Is Big Brother Hanging by His Bootstrap?
17 -- 22Pamela Samuelson. Regulation of Technologies to Protect Copyrighted Works
25 -- 26Andrew Grosso. Why Won t the President Enforce the Constitution?
27 -- 28H. Raghav Rao, Kichan Nam, Abhijit Chaudhury. Information Systems Outsourcing (Introduction to the Special Section)
29 -- 35Paul Nelson, William Richmond, Abraham Seidmann. Two Dimensions of Software Acquisition
36 -- 44Kichan Nam, H. Raghav Rao, Abhijit Chaudhury. A Two-Level Investigation of Information Systems Outsourcing
45 -- 46Vijay Gurbaxani. The New World of Information Technology Outsourcing
47 -- 54Sandra Slaughter, Soon Ang. Employment Outsourcing in Information Systems
55 -- 61Gordon Bell, Jim Gemmell. On-ramp Prospects for the Information Superhighway Dream
62 -- 73Lynn A. Streeter, Robert E. Kraut, Henry C. Lucas Jr., Laurence Caby. How Open Data Networks Influence Business Performance and Market Structure
74 -- 83Karen D. Loch, Sue A. Conger. Evaluating Ethical Decision Making and Computer Use
84 -- 90Jack Dongarra, Steve W. Otto, Marc Snir, David W. Walker. A Message Passing Standard for MPP and Workstations
114 -- 0Peter G. Neumann. Using Formal Methods to Reduce Risks

Volume 39, Issue 6

11 -- 14Elliot Soloway. Teachers are the Key
15 -- 18Hal Berghel. U.S. Technology Policy in the Information Age
22 -- 0Raymond Pyle. Electronic Commerce and the Internet (Introduction to the Special Section)
24 -- 28John R. Sivori. Evaluated Receipts and Settlements at Bell Atlantic
29 -- 35Anish Bhimani. Securing The Commercial Internet
36 -- 44Nathaniel S. Borenstein. Perils and Pitfalls of Practical Cybercommerce
51 -- 58Matti Hämäläinen, Andrew B. Whinston, Svetlana Vishik. Electronic Markets for Learning: Education Brokerages on the Internet
59 -- 60Kilnam Chon. Internet Inroads (Introduction to the Special Section)
61 -- 71Robert M. Hinden. IP Next Generation Overview
72 -- 78Peng Hwa Ang, Berlinda Nadarjan. Censorship and the Internet: A Singapore Perspective
79 -- 86Tim O Reilly. Publishing Models for Internet Commerce
87 -- 99Peter T. Kirstein, Goli Montasser-Kohsari. The C-ODA Project: Online Access to Electronic Journals
100 -- 105Bruno Mannoni. Bringing Museums Online
106 -- 108James E. Pitkow, Colleen M. Kehoe. Emerging Trends in the WWW User Population
130 -- 0Teresa F. Lunt. Securing the Information Infrastructure

Volume 39, Issue 5

13 -- 17. Professor Katz Goes to Washington
19 -- 0Larry Press. Windows NT as a Personal or Intranet Server
24 -- 26Brock N. Meeks. The Game Plan to Save Cyberspace
27 -- 30Peter J. Denning. The University s Next Challenges
33 -- 36Gurminder Singh, Steven Feiner, Daniel Thalmann. Virtual Reality Software and Technology (Introduction to the Special Section)
37 -- 45Tim Poston, Luis Serra. Dextrous Virtual Work
46 -- 53Mark Green, Sean Halliday. A Geometric Modeling and Animation System
54 -- 61Michael F. Deering. The HoloSketch VR Sketching System
62 -- 71Steve Bryson. Virtual Reality in Scientific Visualization
72 -- 76Salvador Bayarri, Marcos Fernández, Mariano Pérez. Virtual Reality for Driving Simulation
77 -- 85Ronald Fagin, Moni Naor, Peter Winkler. Comparing Information Without Leaking It
86 -- 96Henry C. Lucas Jr., Donald J. Berndt, Greg Truman. A Reengineering Framework for Evaluating a Financial Imaging System
97 -- 104Edward A. Feigenbaum. How the What Becomes the How - Turing Award Lecture
105 -- 112Raj Reddy. To Dream The Possible Dream - Turing Award Lecture
113 -- 121Raymond McLeod Jr.. Comparing Undergraduate Courses in Systems Analysis and Design
154 -- 0Peter G. Neumann. Linguistic Risks

Volume 39, Issue 4

11 -- 15Michael D. Myers. Can Kiwis Fly? Computing in New Zealand
16 -- 18Elliot Soloway, Amanda Pryor. The Next Generation in Human-Computer Interaction
24 -- 27Donald A. Norman, James C. Spohrer. Learner-Centered Education (Introduction to the Special Section)
28 -- 29Roger C. Schank, Alex Kass. A Goal-Based Scenario for High School Students
30 -- 31Beverly Park Woolf. Intelligent Multimedia Tutoring Systems
32 -- 33Daniel C. Edelson, Roy D. Pea, Louis M. Gomez. The Collaboratory Notwbook
34 -- 35Marcia C. Linn. Key to the Information Highway
36 -- 37Marlene Scardamalia, Carl Bereiter. Student Cummunities for the Advancement of Knowledge
38 -- 39Yasmin B. Kafai. Software by Kids for Kids
40 -- 42Hal Eden, Michael Eisenberg, Gerhard Fischer, Alexander Repenning. Making Learning a Part of Life
43 -- 45Mark Guzdial, Janet L. Kolodner, Cindy E. Hmelo, N. Hari Narayanan, David Carlson, Noel Rappin, Roland Hübscher, J. Turns, Wendy Newstetter. Computer Support for Learning through Complex Problem Solving
46 -- 47Mary Beth Rosson, John M. Carroll. Scaffolded Examples for Learning Object-Oriented Design
48 -- 49Shari L. Jackson, Steven J. Stratford, Joseph Krajcik, Elliot Soloway. A Learner-Centered Tool for Students Building Models
50 -- 53David Powell. Group Communication (Introduction to the Special Section)
54 -- 63Louise E. Moser, P. M. Melliar-Smith, Deborah A. Agarwal, Ravi K. Budhia, Colleen A. Lingley-Papadopoulos. Totem: A Fault-Tolerant Multicast Group Communication System
64 -- 70Danny Dolev, Dalia Malki. The Transis Approach to High Availability Cluster Communication
71 -- 74Michael K. Reiter. Distributed Trust with the Rampart Toolkit
76 -- 83Robbert van Renesse, Kenneth P. Birman, Silvano Maffeis. Horus: A Flexible Group Communication System
84 -- 87André Schiper, Michel Raynal. From Group Communication to Transactions in Distributed Systems
88 -- 97Flaviu Cristian. Synchronous and Asynchronous Group Communication
122 -- 0Peter G. Neumann. A Risks-related Bookshelf

Volume 39, Issue 3

17 -- 20Roy Rada. ISO 9000 Reflects the Best in Standards
21 -- 30Randall Davis, Pamela Samuelson, Mitchell Kapor, Jerome Reichman. A New View of Intellectual Property and Software
32 -- 33Ravi Ganesan. How to Use Key Escrow (Introduction to the Special Section)
34 -- 40Dorothy E. Denning, Dennis K. Branstad. A Taxonomy for Key Escrow Encryption Systems
41 -- 47Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson. Commercial Key Recovery
48 -- 53David Paul Maher. Crypto Backup and Key Escrow
55 -- 60Ravi Ganesan. The Yaksha Security System
61 -- 68Frederick P. Brooks Jr.. The Computer Scientist as a Toolsmith II
69 -- 77A. T. Wood-Harper, Steve Corder, J. R. G. Wood, Heather Watson. How We Profess: The Ethical Systems Analyst
78 -- 84Anthony Ralston. The Demographics of Candidates for Faculty Positions in Computer Science
85 -- 97Guy E. Blelloch. Programming Parallel Algorithms
122 -- 0Robert N. Charette. Taking Responsibility for Our Risks

Volume 39, Issue 2

19 -- 22Hal Berghel. HTML Compliance and the Return of the Test Pattern
23 -- 29Larry Press. The Role of Computer Networks in Development
32 -- 33Michael J. Wozny, William C. Regli. Computing in Manufacturing (Introduction to the Special Section)
34 -- 45Joseph W. Erkes, Kevin B. Kenny, John W. Lewis, Brion D. Sarachan, Michael W. Sobolewski, Robert N. Sum Jr.. Implementing Shared Manufacturing Services on the World-Wide Web
46 -- 54Martin Hardwick, David L. Spooner, Tom Rando, K. C. Morris. Sharing Manufacturing Information in Virtual Enterprises
55 -- 61Vijay Kumar, Ruzena Bajcsy, William Harwin, Patrick Harker. Rapid Design and Prototyping of Customized Rehabilitation Aids
62 -- 0George A. Bekey. Trends in Robotics
63 -- 70Susan Finger, M. Terk, E. Subrahmanian, Chris Kasabach, Fritz B. Prinz, Daniel P. Siewiorek, Asim Smailagic, John Stivoric, Lee E. Weiss. Rapid Design and Manufacture of Wearable Computers
71 -- 76Aristides A. G. Requicha. Geometric Reasoning for Intelligent Manufacturing
77 -- 85Martti Mäntylä, Dana S. Nau, Jami J. Shah. Challenges in Feature-Based Manufacturing Research
86 -- 98. Middleware: A Model for Distributed System Services
99 -- 107James W. Candler, Prashant C. Palvia, Jane D. Thompson, Steven M. Zeltmann. The ORION Project: Staged Business Process Reengineering at FedEx
108 -- 121Mohamed E. Fayad, Wei-Tek Tsai, Milton L. Fulghum. Transition To Object-Oriented Software Development
154 -- 0Peter G. Neumann, Peter J. Denning. W(h)ither Research and Education?

Volume 39, Issue 12es

167 -- 174Alejandro Barrero. Implementation of Abstract Data Types with Arrays of Unbounded Dimensions
175 -- 201Zbigniew Michalewicz, Cezary Z. Janikow. GENOCOP: A Genetic Algorithm for Numerical Optimization Problems with Linear Constraints
202 -- 206Barak A. Pearlmutter. Garbage Collection with Pointers to Individual Cells
207 -- 215Raúl Rojas. A Graph Labelling Proof of the Backpropagation Algorithm
216 -- 230Wesley W. Chu, Kuorong Chiang, Chih-Cheng Hsu, Henrick Yau. An Error-based Conceptual Clustering Method for Providing Approximate Query Answers
231 -- 238Randolph D. Nelson. Including Queueing Effects in Amdahl s Law
239 -- 255Ronald E. Prather. Harmonic Analysis from the Computer Representation of a Musical Score
273 -- 297Guy E. Blelloch, Charles E. Leiserson, Bruce M. Maggs, C. Greg Plaxton, Stephen J. Smith, Marco Zagha. A Comparison of Sorting Algorithms for the Connection Machine CM-2
298 -- 311Nathaniel S. Borenstein. CMU s Andrew Project: A Retrospective
312 -- 321James H. Morris. War Stories from Andrew

Volume 39, Issue 12

11 -- 15Seymour E. Goodman. War, Information Technologies, and International Asymmetries
17 -- 23Pamela Samuelson. Legal Protection for Database Contents
27 -- 31A. Michael Noll. CyberNetwork Technology: Issues and Uncertainties
33 -- 35Robert E. Kraut. The Internet @ Home (Introduction to the Special Section)
36 -- 46Donna L. Hoffman, William D. Kalsbeek, Thomas P. Novak. Internet and Web Use in the US
47 -- 54Alladi Venkatesh. Computers and Other Interactive Technologies for the Home
55 -- 63Robert E. Kraut, William L. Scherlis, Tridas Mukhopadhyay, Jane Manning, Sara B. Kiesler. The HomeNet Field Trial of Residential Internet Services
64 -- 66Marita Franzke, Anne P. McClard. Winona Gets Wired: Technical Difficulties in the Home
67 -- 68George T. Duncan. Is My Research Ethical?
69 -- 74John M. Carroll, Mary Beth Rosson. Developing the Blacksburg Electronic Village
75 -- 84C. Dianne Martin, Chuck Huff, Donald Gotterbarn, Keith W. Miller. Implementing A Tenth Strand in the CS Curriculum
85 -- 95Henry MacKay Walker, G. Michael Schneider. A Revised Model Curriculum for a Liberal Arts Degree in Computer Science
96 -- 99Robert Geist, Madhu Chetuparambil, Stephen T. Hedetniemi, A. Joe Turner. Computing Research Programs in the US
162 -- 0Peter G. Neumann. Risks of Anonymity

Volume 39, Issue 11

11 -- 13Robert L. Glass. The Relationship Between Theory and Practice in Software Engineering
15 -- 17Neil Munro. Sketching a National Information Warfare Defense Plan
24 -- 26Usama M. Fayyad, Ramasamy Uthurusamy. Data Mining and Knowledge Discovery in Databases (Introduction to the Special Section)
27 -- 34Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth. The KDD Process for Extracting Useful Knowledge from Volumes of Data
35 -- 41Clark Glymour, David Madigan, Daryl Pregibon, Padhraic Smyth. Statistical Inference and Data Mining
42 -- 48Ronald J. Brachman, Tom Khabaza, Willi Klösgen, Gregory Piatetsky-Shapiro, Evangelos Simoudis. Mining Business Databases
49 -- 50W. H. Inmon. The Data Warehouse and Data Mining
51 -- 57Usama M. Fayyad, David Haussler, Paul E. Stolorz. Mining Scientific Data
58 -- 64Tomasz Imielinski, Heikki Mannila. A Database Perspective on Knowledge Discovery
65 -- 68Oren Etzioni. The World-Wide Web: Quagmire or Gold Mine?
69 -- 77David Abramson, Ian T. Foster, John Michalakes, Rok Sosic. A New Methodology for Debugging Scientific Applications
78 -- 85David E. Culler, Richard M. Karp, David A. Patterson, Abhijit Sahay, Eunice E. Santos, Klaus E. Schauser, Ramesh Subramonian, Thorsten von Eicken. LogP: A Practical Model of Parallel Computation
86 -- 95Yair Wand, Richard Y. Wang. Anchoring Data Quality Dimensions in Ontological Foundations
130 -- 0Peter G. Neumann. Distributed Systems have Distributed Risks

Volume 39, Issue 10

11 -- 17Larry Press. Seeding Networks: The Federal Role
19 -- 25Hal Berghel. Digital Politics
27 -- 28Mark Luker. NSF s New Program for High-Performance Internet Connections
36 -- 39Douglas C. Schmidt, Mohamed Fayad, Ralph E. Johnson. Software Patterns (Introduction to the Special Section)
40 -- 46Alistair Cockburn. The Interaction of Social Issues and Software Architecture
47 -- 49Marshall Cline. The Pros and Cons of Adopting and Applying Design Patterns in the Real World
50 -- 58Amund Aarsten, Davide Brugali, Giuseppe Menga. Designing Concurrent and Distributed Control Systems
58 -- 59Mohamed E. Fayad, Marshall Cline. Aspects of Software Adaptability
60 -- 64Brandon Goldfedder, Linda Rising. A Training Experience with Aptterns
65 -- 74Nayeem Islam, Murthy V. Devarakonda. An Essential Design Pattern for Fault-Tolerant Distributed State Sharing
75 -- 82Paul E. McKenney. Selecting Locking Primitives for Parallel Programming
87 -- 93Paul Resnick, James Miller. PICS: Internet Access Controls Without Censorship
94 -- 103Juhani Iivari. Why Are Case Tools Not Used?
104 -- 116Victor R. Basili, Lionel C. Briand, Walcélio L. Melo. How Reuse Influences Productivity in Object-Oriented Systems
138 -- 0Peter G. Neumann. Disinformation Theory

Volume 39, Issue 1

15 -- 17Thomas Erickson. The World-Wide Web as Social Hypertext
19 -- 22Roy Rada. Who Will Test Conformance?
23 -- 28Pamela Samuelson. Intellectual Property Rights and the Global Information Economy
30 -- 40Hal Berghel. The Client s Side of the World-Wide Web
41 -- 49Stephen Haag, M. K. Raja, Lawrence L. Schkade. Quality Function Deployment Usage in Software Development
50 -- 59Matthew Cheyney, Peter A. Gloor, Donald B. Johnson, Fillia Makedon, James Matthews, Panagiotis Takis Metaxas. Toward Multimedia Conference Proceedings
63 -- 72Louise Guthrie, James Pustejovsky, Yorick Wilks, Brian M. Slator. The Role of Lexicons in Natural Language Processing
73 -- 79Margaret King. Evaluating Natural Language Processing Systems
80 -- 91James R. Cowie, Wendy G. Lehnert. Information Extraction
92 -- 101David D. Lewis, Karen Sparck Jones. Natural Language Processing for Information Retrieval
102 -- 111Janyce Wiebe, Graeme Hirst, Diane Horton. Language Use in Context
154 -- 0Peter G. Neumann. Risks in Digital Commerce