Journal: Communications of the ACM

Volume 42, Issue 9

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 21Pamela Samuelson. Why the Anticircumvention Regulations Need Revision
23 -- 27William K. McHenry. Y2K International Status and Opportunities
29 -- 30Vir V. Phoha. Can a Course Be Taught Entirely Via Email?
32 -- 40Jonathan W. Palmer, Lars Bo Eriksen. Digital Newspapers Explore Marketing on the Internet
42 -- 48. Exploiting the Benefits of Y2K Preparation
50 -- 55Rachna Dhamija, Rachelle S. Heller, Lance J. Hoffman. Teaching E-Commerce to a Multidisciplinary Class
57 -- 63Alok Gupta, Dale O. Stahl, Andrew B. Whinston. The Economics of Network Management
64 -- 67R. Ramesh, Dee H. Andrews. Distributed Mission Training: Teams, Virtual Reality, and Real-time Networking - Introduction
68 -- 71Lynn A. Carroll. Multimodal Integrated Team Training
72 -- 78Herbert H. Bell. The Effectiveness of Distributed Mission Training
79 -- 84Judith S. Dahmann, James O. Calvin, Richard M. Weatherly. A Reusable Architecture for Simulations
85 -- 88Philipp W. Peppler, Steve Stephens. Image Generation Systems in Virtual Training Platforms
90 -- 94Peter Crane. Implementing Distributed Mission Training
96 -- 98Eric W. Tatham. Getting the Best of Both Real and Virtual Worlds
128 -- 0Bruce Schneier. The Trojan Horse Race

Volume 42, Issue 8

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 19Robert L. Glass. Buzzwordism and the Epic 150 Million Software Debacle
21 -- 26Elliot Soloway, Wayne C. Grant, Robert Tinger, Jeremy Roschelle, Mike Mills, Mitchel Resnick, Robert Berg, Michael Eisenberg. Science in the Palms of Their Hands
28 -- 31Andrew Rosenbloom. Toward an Image Indistinguishable from Reality - Introduction
32 -- 42Demetri Terzopoulos. Artificial Life for Computer Graphics
44 -- 53Donald P. Greenberg. A Framework for Realistic Image Synthesis
54 -- 63George W. Fitzmaurice, Ravin Balakrishnan, Gordon Kurtenbach. Sampling, Synthesis, and Input Devices
64 -- 73Norman I. Badler, Martha Stone Palmer, Rama Bindiganavale. Animation Control for Real-Time Virtual Humans
74 -- 81John Kenneth Salisbury Jr.. Making Graphics Physically Tangible
82 -- 90Steve Bryson, David N. Kenwright, Michael Cox, David Ellsworth, Robert Haimes. Visually Exploring Gigabyte Data Sets in Real Time
91 -- 98Surendra N. Singh, Nikunj P. Dalal. Web Home Pages as Advertisements
100 -- 107David S. Ebert, Edward Bedwell, Stephen Maher, Laura Smoliar, Elizabeth Downing. Realizing 3D Visualization Using Grossed-beam Volumetric Displays
108 -- 116Richard G. Vedder, Michael T. Vanecek, Carl Stephen Guynes, James J. Cappel. CEO and CIO Perspectives on Competitive Intelligence
117 -- 123Duane P. Truex, Richard Baskerville, Heinz K. Klein. Growing Systems in Emergent Organizations
125 -- 127Rachid Guerraoui, Mohamed Fayad. Object-oriented Abstractions for Distributed Programming
136 -- 0Bruce Schneier. The Uses and Abuses of Biometrics

Volume 42, Issue 7

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 18Meg McGinity. Telecom Act, Scene One
19 -- 22Neil Munro. Inforwar: AK-47s, Lies, and Videotape
23 -- 26Scott R. Tilley. The Need for Speed
27 -- 29John Gallaugher. Challenging to New Conventional Wisdom of Net Commerce Strategies
30 -- 32Brajendra Panda, Joseph Giordano. Defensive Information Warfare - Introduction
33 -- 37Shiu-Kai Chin. High-Confidence Design for Security: Don t Trust - Verify
38 -- 44Anup K. Ghosh, Jeffrey M. Voas. Inoculating Software for Survivability
46 -- 52Terrance Goan. A Cop on the Beat Collecting and Appraising Intrusion Evidence
53 -- 61Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo. Testing and Evaluating: Computer Intrusion Detection Systems
62 -- 69Matthew Stillerman, Carla Marceau, Maureen Stillman. Intrusion Detection for Distributed Applications
71 -- 75Sushil Jajodia, Catherine D. McCollum, Paul Ammann. Trusted Recovery
76 -- 82Jim Waldo. The Jini Architecture for Network-Centric Computing
83 -- 87David W. Plummer, Larry J. Dalton, Frank Peter. The Recodable Locking Device
88 -- 95Janice C. Sipior, Burke T. Ward. The Dark Side of Employee Email
96 -- 104Ned Kock. A Case of Academic Plagiarism
120 -- 0Peter G. Neumann. Information is a Double-Edged Sword

Volume 42, Issue 6

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Robert L. Glass. Is Criticism of Computing Academe Inevitably Divisive?
15 -- 20Richard B. Heeks. Software Strategies in developing Countries
23 -- 24Wei-Lung Wang. Information in the Information Age
25 -- 26Barbara Simons. Melissa s Message
28 -- 30Milton Mueller. Emerging Internet Infrastructures Worldwide - Introduction
31 -- 36Ben Petrazzini, Mugo Kibati. The Internet in Developing Countries
41 -- 43Milton Mueller. Commentary: ICANN and Internet Regulation
44 -- 52Zixiang (Alex) Tan, William Foster, Seymour E. Goodman. China s State-coordinated Internet Infrastructure
53 -- 58P. K. Agarwal. Building India s National Internet Backbone
60 -- 66Mugo Kibati, Donyaprueth Krairit. The Wireless Local Loop in Developing Regions
67 -- 72Jon M. Peha. Lessons from Haiti s Internet Development
74 -- 83Samir Chatterjee, Suzanne D. Pawlowski. All-Optical Networks
85 -- 92Randall D. Beer, Hillel J. Chiel, Richard F. Drushel. Using Autonomous Robotics to Teach Science and Engineering
93 -- 100Dennis Tsichritzis. Reengineering the University
101 -- 108Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts. Considerations for an Effective Telecommunications-Use Policy
109 -- 115Vicki L. Sauter. Intuitive Decision-Making
116 -- 119David S. Wise. Changes in ACM s Revised Copyright Policy
121 -- 124A. Michael Noll. Does Data Traffic exceed voice Traffic?
144 -- 0Peter G. Neumann, Declan McCullagh. Risks of Y2K

Volume 42, Issue 5

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Hal Berghel. How Xday Figures in the Y2K Countdown
17 -- 21Gerald V. Post. How Often Should a Firm Buy New PCs?
23 -- 25Leon A. Kappelman. Saving Our Sacred Honor
26 -- 29B. J. Fogg. Persuasive Technologies - Introduction
31 -- 38Phillip King, Jason Tester. The Landscape of Persuasive Technologies
39 -- 44Shawn Tseng, B. J. Fogg. Credibility and Computing Technology
45 -- 49Julie Khaslavsky, Nathan Shedroff. Understanding the Seductive Experience
51 -- 58Daniel Berdichevsky, Erik Neunschwander. Toward an Ethics of Persuasive Technology
60 -- 62Kim Halskov Madsen. The Diversity of Usability Practices - Introduction
63 -- 66Jacob Buur, Kirsten Bagger. Replacing Usability Testing with User Dialogue
67 -- 71Karel Vredenburg. Increasing Ease of Use
72 -- 77Klaus B. Bærentsen, Henning Slavensky. A Contribution to the Design Process
83 -- 85William R. Dolan, Joseph S. Dumas. A Flexible Approach to Third-Party Usability
87 -- 90Michael J. Muller, Mary Czerwinski. Organizing Usability Work to Fit the Full Product Range
91 -- 97Thea Borgholm, Kim Halskov Madsen. Cooperative Usability Practices
98 -- 100Jeffrey S. Poulin. Reuse: Been There, Done That
128 -- 0David Lorge Parnas. Ten Myths About Y2K Inspections

Volume 42, Issue 4

5 -- 0Diane Crawford. Editorial Pointers
11 -- 12Robert Fox. News Track
13 -- 16Diane Crawford. Forum
17 -- 19Robert L. Glass. Inspections - Some Surprising Findings
21 -- 26Roy Rada. IT Skills Standards
27 -- 29Donald J. Bagert. Taking the Lead in Licensing Software Engineers
30 -- 31John White. ACM Digital Library Enhancements
32 -- 37Tim O Reilly. Lessons from Open-Source Software Development - Introduction
38 -- 39Linus Torvalds. The Linux Edge
40 -- 41Larry Wall. The Origin of the Camel Lot in the Breakdown of the Bilingual Unix
42 -- 43Roy Thomas Fielding. Shared Leadership in the Apache Project
44 -- 45John K. Ousterhout. Free Software Needs Profit
46 -- 49Xin Yao. Following the Path of Evolvable Hardware - Introduction
50 -- 56Moshe Sipper, Daniel Mange, Eduardo Sanchez. Quo Vadis Evolvable Hardware?
57 -- 59Pierre Marchal. Field-Programmable Gate Arrays
60 -- 66Tetsuya Higuchi, Nobuki Kajihara. Evolvable Hardware Chips for Industrial Applications
64 -- 65Tomofumi Hikage, Hitoshi Hemmi, Katsunori Shimohara. Hardware Evolution System AdAM
67 -- 69Jason D. Lohn. Experiments on Evolving Software Models of Analog Circuits
71 -- 79Adrian Thompson, Paul J. Layzell. Analysis of Unconventional Evolved Electronics
80 -- 85Donna L. Hoffman, Thomas P. Novak, Marcos Peralta. Building Consumer Trust Online
86 -- 92Tomasz Imielinski, Julio C. Navas. GPS-Based Geographic Addressing, Routing, and Resource Discovery
93 -- 99Niv Ahituv, Moshe Zviran, Chanan Glezer. Top Management Toolbox for Managing Corporate IT
101 -- 104Rachid Guerraoui, Mohamed Fayad. OO Distributed Programming is Not Distributed OO Programming
120 -- 0Lauren Weinstein. Just a Matter of Bandwidth

Volume 42, Issue 3

5 -- 0Andrew Rosenbloom. Editorial Pointers
11 -- 12Robert Fox. News Track
13 -- 17Kalle Lyytinen, Seymour E. Goodman. Finland: The Unknown Soldier on the IT Front
19 -- 24Pamela Samuelson. Good News and Bad News on the Intellactual Property Front
27 -- 32Diane Crawford. Forum
34 -- 36Donald E. Rickert, Thomas Nagy. Focus Groups, Theory or the Kid in the Garage?
38 -- 40Anupam Joshi, Munindar P. Singh. Multiagent Systems on the Net - Introduction
41 -- 47Rune Gustavsson. Agents with Power
48 -- 54Tzvetan T. Drashansky, Elias N. Houstis, Naren Ramakrishnan, John R. Rice. Networked Agents for Scientific Computing
53 -- 0Douglas E. Dyer. Multiagent Systems and DARPA
55 -- 61Fumio Hattori, Takeshi Ohguro, Makoto Yokoo, Shigeo Matsubara, Sen Yoshida. Socialware: Multiagent Systems for Supporting Network Communities
60 -- 61Alok R. Chaturvedi, Shailendra Raj Mehta. Simulations in Economics and Management
62 -- 69Anuj K. Jain, Manuel Aparicio IV, Munindar P. Singh. Agents for Process Coherence in Virtual Enterprises
70 -- 0Richard Green, Sangam Pant. Multiagent Data Collection in Lycos
71 -- 77Aaron Sloman, Brian Logan. Building Cognitively Rich Agents Using the SIM_AGENT Toolkit
74 -- 75Jeremy W. Baxter, Richard T. Hepplewhite. Agents in Tank Battle Simulations
78 -- 80Moses Ma. Agents in E-Commerce - Introduction
81 -- 91Pattie Maes, Robert H. Guttman, Alexandros Moukas. Agents That Buy and Sell
84 -- 85Tuomas Sandholm. Automated Negotiation
88 -- 89Danny B. Lange, Mitsuru Oshima. Seven Good Reasons for Mobile Agents
92 -- 102David Wong, Noemi Paciorek, Dana Moore. Java-based Mobile Agents
100 -- 101Hideki Tai, Kazuya Kosaka. The Aglets Project
103 -- 105Barbara Hayes-Roth, M. Vaughan Johnson Jr., Robert van Gent, Keith Wescourt. Staffing the Web with Interactive Characters
106 -- 114Robert J. Glushko, Jay M. Tenenbaum, Bart Meltzer. An XML Framework for Agent-Based E-Commerce
110 -- 111Howard Smith, Kevin Poulter. Share the Ontology in XML-based Trading Architectures
115 -- 116Albert Alderson, Hanifa Shah. Viewpoints on Legacy Systems
144 -- 0Lauren Weinstein. Bit-Rot Roulette

Volume 42, Issue 2

5 -- 0. Editorial Pointers
9 -- 11Robert Fox. News Track
13 -- 16Larry Press. The Next Generation of Business Data Processing
17 -- 19Brock N. Meeks. The Privacy Hoax
21 -- 24Diane Crawford. Forum: More Ugly Truths about Consulting Assignments
21 -- 24Diane Crawford. Forum: More Ugly Truths about Consulting Assignments
25 -- 26Ghinwa Jalloul. Computing in Lebanon
28 -- 31Lorrie Faith Cranor. Internet Privacy - Introduction
32 -- 38Michael K. Reiter, Aviel D. Rubin. Anonymous Web Transactions with Crowds
39 -- 41David M. Goldschlag, Michael G. Reed, Paul F. Syverson. Onion Routing
42 -- 47Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer. Consistent, Yet Anonymous, Web Access with LPWA
48 -- 55Joseph Reagle, Lorrie Faith Cranor. The Platform for Privacy Preferences
56 -- 59Paola Benassi. TRUSTe: An Online Privacy Seal Program
60 -- 67Roger Clarke. Internet Privacy Concerns Confirm the Case for Intervention
68 -- 73J. Arthur Gowan, Chris Jesse, Richard G. Mathieu. Y2K Compliance and the Distributed Enterprise
74 -- 79Robert L. Glass. The Realities of Software Payoffs
80 -- 86Rajiv Sabherwal. The Role of Trust in Outsourced IS Development Projects
88 -- 91Wilhelm Hasselbring. On Defining Computer Science Terminology
128 -- 0Peter G. Neumann. Robust Open-Source Software

Volume 42, Issue 12

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 17Mike Godwin. Net to Worry
19 -- 21Meg McGinity. Staying Connected: Flying Wireless, With a Net
23 -- 26Patrick Walsh, Adamantios Koumpis. The Espirt ATLAS Project
27 -- 28Amr El-Kadi. Stop That Divorce!
29 -- 30Dennis J. Frailey. Licensing Software Engineers
32 -- 38Steven Bellman, Gerald L. Lohse, Eric J. Johnson. Predictors of Online Buying Behavior
40 -- 46Anne Adams, Martina Angela Sasse. Users Are Not The Enemy
48 -- 54William H. Dutton, Anita Elberse, Matthew Hale. A Case Study of a Netizen s Guide to Elections
55 -- 57Kai R. T. Larsen. Voting Technology Implementation
58 -- 63Richard T. Watson, Sigmund Akselsen, Bente Evjemo, Nils Aaraæther. Teledemocracy in Local Government
64 -- 70Magid Igbaria. The Driving Forces in the Virtual Society
71 -- 77Hilda Tellioglu, Ina Wagner. Software Cultures
78 -- 84Pearl Brereton, David Budgen, Keith H. Bennett, Malcolm Munro, Paul J. Layzell, Linda A. Macaulay, David Griffiths, Charles Stannett. The Future of Software
85 -- 89Fay Cobb Payton, Patricia Flatley Brennan. How a Community Health Information Network is Really Used
93 -- 94Leon A. Kappelman. Risk, Reality, and Readiness
160 -- 0Peter G. Neumann. Risks of Insiders

Volume 42, Issue 11

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Hal Berghel. The Cost of Having Analog Executives in a Digital World
17 -- 19Robert L. Glass. Evolving a New Theory of Project Success
21 -- 24Diane Crawford. Forum
26 -- 29Toshinori Munakata. Knowledge Discovery - Introduction
30 -- 36Tom M. Mitchell. Machine Learning and Data Mining
37 -- 41Raúl E. Valdés-Pérez. Discovery Tools for Science Apps
42 -- 46Stephen Muggleton. Scientific Knowledge Discovery Using Inductive Logic Programming
47 -- 50LiMin Fu. Knowledge Discovery Based on Neural Networks
51 -- 53Kenneth A. De Jong. Evolutionary Computation for Discovery
54 -- 57Wojciech Ziarko. Discovery Through Rough Set Theory
58 -- 61Kevin Knight. Mining Online Text
62 -- 64Steffen Schulze-Kremer. Discovery in the Human Genome Project
65 -- 67Murray Campbell. Knowledge Discovery in Deep Blue
68 -- 73Ravi Ganesan. The Messyware Advantage: The Precipitous Rise of the Middleman
74 -- 81Sharon L. Oviatt. Ten Myths of Multimodal Interaction
82 -- 90George S. Nezlek, Hemant K. Jain, Derek L. Nazareth. An Integrated Approach to Enterprise Computing Architectures
91 -- 96Dawn G. Gregg, Michael Goul. A Proposal for an Open DSS Protocol
97 -- 101Pascal Felber, Rachid Guerraoui, Mohamed Fayad. Putting OO Distributed Programming to Work
152 -- 0Peter G. Neumann, Lauren Weinstein. Risks of Content Filtering

Volume 42, Issue 10

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 14Diane Crawford. Forum
17 -- 20Neil Munro. The Ongoing Tug-of-War for E-Commerce Control
21 -- 24Larry Press. The Post-PC Era
25 -- 0Barbara Simons. The Heroes Among Us
26 -- 28Grady Booch. UML in Action - Guest Editor s Introduction
29 -- 37Cris Kobryn. UML 2001: A Standardization Odyssey
38 -- 45Grant Larsen. Designing Component-Based Frameworks Using Patterns in the UML
46 -- 54Bran Selic. Turning Clockwise: Using UML in the Real-Time Domain
55 -- 61Alex E. Bell, Ryan W. Schmidt. UMLoquent Expression of AWACS Software Design
63 -- 70Jim Conallen. Modeling Web Application Architectures with UML
72 -- 78Michael A. Cusumano, David B. Yoffie. What Netscape Learned from Cross-Platform Software Development
80 -- 87Michael Mattsson, Jan Bosch, Mohamed Fayad. Framework Integration Problems, Causes, Solutions
88 -- 94Tessa A. Lau, Oren Etzioni, Daniel S. Weld. Privacy Interfaces for Information Management
95 -- 101Håkon Wium Lie, Janne Saarela. Multipurpose Web Publishing Using HTML, XML, and CSS
102 -- 107Donald Gotterbarn, Keith W. Miller, Simon Rogerson. Software Engineering Code of Ethics is Approved
109 -- 112Lutz Prechelt. Comparing Java vs. C/C++ Efficiency Differences to Interpersonal Differences
144 -- 0Bruce Schneier. Risks of Relying on Cryptography

Volume 42, Issue 1

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 17Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts. The Communications Decency Act Is not as Dead as You Think
19 -- 23Hal Berghel. Value-Added Publishing
24 -- 25Max Hailperin. The COPA Battle and the Future of Free Speech
26 -- 27Barbara Simons. Starr Wars
28 -- 30Hermann Kaindl, John M. Carroll. Symbolic Modeling in Practice - Introduction
31 -- 37John Mylopoulos, Lawrence Chung, Eric S. K. Yu. From Object-Oriented to Goal-Oriented Requirements Analysis
38 -- 46Keith A. Butler, Chris Esposito, Ron Hebron. Connecting the Design of Software to the Design of Work
47 -- 48Matthias Jarke. Scenarios for Modelling
49 -- 56Mary Beth Rosson. Integrating Development of Task and Object Models
57 -- 63Brian R. Gaines, Mildred L. G. Shaw. Embedding Formal Knowledge Models in Active Documents
65 -- 72Jakob Nielsen. User Interface Directions for the Web
73 -- 78Donald P. Ballou, Giri Kumar Tayi. Enhancing Data Quality in Data Warehouse Environments
79 -- 85John R. Nicol, Yechezkal-Shimon Gutfreund, James Paschetto, Kimberly S. Rush, Christopher Martin. How the Internet Helps Build Collaborative Multimedia Applications
87 -- 92Pierre N. Robillard. The Role of Knowledge in Software Development
94 -- 97David E. Avison, Francis Lau, Michael D. Myers, Peter Axel Nielsen. Action Research
98 -- 101Satish Nambisan, Yu-Ming Wang. Roadblocks to Web Technology Adoption?
160 -- 0Fred B. Schneider, Steven M. Bellovin. Evolving Telephone Networks