Journal: Communications of the ACM

Volume 43, Issue 9

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 12Diane Crawford. Forum
13 -- 15Neil Munro. Ethics, schmethics
17 -- 19Meg McGinity. Body of technology
21 -- 23Andrew W. Appel, Edward W. Felten. Technological access control interferes with noninfringing scholarship
24 -- 27Jennifer C. Lai. Conversational Interfaces - Guest Editor s Introduction
29 -- 34Susan J. Boyce. Natural spoken dialogue systems for telephony applications
36 -- 43Clifford Nass, Li Gong. Speech interfaces from an evolutionary perspective
45 -- 51Sharon L. Oviatt. Taming recognition errors with a multimodal interface
53 -- 57Bruce Lucas. VoiceXML for Web-based distributed conversational applications
59 -- 61Mark Lucente. Conversational interfaces for e-commerce applications
63 -- 65Ben Shneiderman. The limits of speech recognition
66 -- 73Judith A. Markowitz. Voice biometrics
74 -- 80Kenneth P. Fishkin, Anuj Gujar, Beverly L. Harrison, Thomas P. Moran, Roy Want. Embodied user interfaces for ::::really:::: direct manipulation
82 -- 89Ram D. Gopal, G. Lawrence Sanders. Global software piracy: you can t get blood out of a turnip
91 -- 97Robert M. Davison, Robert O. Briggs. GSS for presentation support
99 -- 104Antonis C. Stylianou, Ram L. Kumar. An integrative framework for IS quality management
105 -- 107Mauri Laitinen, Mohamed Fayad, Robert P. Ward. The problem with scalability
128 -- 0Peter G. Neumann. Missile defense

Volume 43, Issue 8

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 14Diane Crawford. Forum
15 -- 18Andrew Grosso. The economic espionage act: touring the minefields
19 -- 22Phillip G. Armour. The case for a new business model
24 -- 25Daniel Berleant. Does typography affect proposal assessment?
26 -- 28Doug Riecken. Introduction: personalized views of personalization
30 -- 34Nigel Wells, Jeff Wolfers. The business of personalization: finance with a personalized touch
35 -- 39Udi Manber, Ash Patel, John Robison. The business of personalization: experience with personalization of Yahoo!
41 -- 42Doug Riecken. The business of personalization: personalized communication networks
44 -- 48Joseph Kramer, Sunil Noronha, John Vergo. The human element: a user-centered design approach to personalization
49 -- 51John Karat, Clare-Marie Karat, Jacob P. Ukelson. The human element: affordances, motivation, and the design of user interfaces
53 -- 57Edith Schonberg, Thomas Cofino, Robert Hoch, Mark Podlaseck, Susan L. Spraragen. The human element: measuring success
58 -- 61Nicholas J. Belkin. The human element: helping people find what they don t know
62 -- 65Linda Candy, Ernest A. Edmonds. The human element: creativity enhancement with emerging technologies
66 -- 73Marvin Minsky. Deep issues: commonsense-based interfaces
75 -- 79John McCarthy. Deep issues: phenomenal data mining
80 -- 83Edwin P. D. Pednault. Deep issues: representation is everything
84 -- 88Eugene Volokh. Deep issues: personalization and privacy
89 -- 91Doug Riecken. Deep issues: personal end-user tools
92 -- 95David Canfield Smith. Deep issues: building personal tools by programming
96 -- 101Paul P. Maglio, Rob Barrett. Enabling technologies: intermediaries personalize information streams
102 -- 106Haym Hirsh, Chumki Basu, Brian D. Davison. Enabling technologies: learning to personalize
107 -- 111Barry Smyth, Paul Cotter. Enabling technologies: a personalized television listings service
112 -- 115Paul B. Kantor, Endre Boros, Benjamin Melamed, Vladimir Menkov, Bracha Shapira, David J. Neu. Enabling technologies: capturing human intelligence in the Net
116 -- 120Wlodek Zadrozny, Malgorzata Budzikowska, Joyce Yue Chai, Nanda Kambhatla, Sylvie Levesque, Nicolas Nicolov. Enabling technologies: natural language dialogue for personalized interaction
122 -- 125Maurice D. Mulvenna, Sarabjot S. Anand, Alex G. Büchner. Personalization on the Net using Web mining: introduction
127 -- 134Myra Spiliopoulou. Web usage mining for Web site evaluation
136 -- 141Ibrahim Cingil, Asuman Dogac, Ayca Azgin. A broader approach to personalization
142 -- 151Bamshad Mobasher, Robert Cooley, Jaideep Srivastava. Automatic personalization based on Web usage mining
152 -- 158Mike Perkowitz, Oren Etzioni. Adaptive Web sites
168 -- 0Barbara Simons. Shrink-wrapping our rights

Volume 43, Issue 7

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 14Diane Crawford. Forum
15 -- 17Robert L. Glass. On personal technical obsolescence
19 -- 23Phillip Ein-Dor, Seymour E. Goodman, Peter Wolcott. International perspectives: From Via Maris to electronic highway: the Internet in Canaan
25 -- 26Dori Kornfeld. Deliberating on ICANN
30 -- 32Andrew Rosenbloom. Physically based computer animation: introduction
34 -- 39Chris Hecker. Physics in computer games
40 -- 48John Funge. Cognitive modeling for games and animation
50 -- 58Zoran Popovic. Controlling physics in realistic character animation
60 -- 67Nick Foster, Dimitris N. Metaxas. Modeling water for computer animation
68 -- 75James F. O Brien, Jessica K. Hodgins. Animating fracture
76 -- 83Jos Stam. Interacting with smoke and fire in real time
84 -- 93Przemyslaw Prusinkiewicz. Simulation modeling of plants and plant ecosystems
94 -- 101Torsten Fröhlich. The virtual oceanarium
102 -- 109Jakub Segen, Senthil Kumar. Look ma, no mouse! Simplifying human-computer interaction by using hand gesture
110 -- 116Deborah K. Smith, David B. Paradice, Steven M. Smith. Prepare your mind for creativity
117 -- 123Veda C. Storey, Detmar W. Straub, Kathy A. Stewart, Richard J. Welke. A conceptual investigation of the e-commerce industry
125 -- 128Gurpreet Dhillon, James Backhouse. Information system security management in the new millennium
144 -- 0Peter G. Neumann. Risks in retrospect

Volume 43, Issue 6

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 14Diane Crawford. Forum
15 -- 17Anthony M. Townsend, Robert J. Aalberts, Steven A. Gibson. Libel and Slander on the Internet
19 -- 21Brock N. Meeks. Bad Moon Rising
23 -- 26Elliot Soloway, Henry Jay Becker, Cathleen A. Norris, Neal Topp. Teachers and Technology: Easing the Way
27 -- 28Richard M. Stallman. Why We Must Fight UCITA
29 -- 31Tim O Reilly. The Internet Patent Land Grab
32 -- 38Wilhelm Hasselbring. Information System Integration: Introduction
39 -- 47Jian Yang, Mike P. Papazoglou. Interoperation Support for Electronic Business
48 -- 55Jane Grimson, William Grimson, Wilhelm Hasselbring. The SI Challenge in Health Care
57 -- 62Elke A. Rundensteiner, Andreas Koeller, Xin Zhang. Maintaining Data Warehouses over Changing Information Sources
64 -- 72Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya. SI in Digital Libraries
73 -- 81Upkar Varshney, Ronald J. Vetter. Emerging Mobile and Wireless Networks
82 -- 90Thomas A. Phelps, Robert Wilensky. Multivalent Documents
91 -- 95Terry L. Huston, Janis L. Huston. Is Telemedicine a Practical Reality?
97 -- 102Richard T. Watson, George M. Zinkhan, Leyland F. Pitt. Integrated Internet Marketing
103 -- 109Gerard Parr, Kevin Curran. A Paradigm Shift in the Distribution of Multimedia
111 -- 112Detlef Schoder, Torsten Eymann. The Real Challenges of Mobile Agents
128 -- 0Lauren Weinstein. Risks of Internet Voting

Volume 43, Issue 5

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 21Larry Press. From P-books to E-books
23 -- 29Hal Berghel. Predatory Disintermediation
31 -- 32Barbara Simons. To DVD or Not to DVD
33 -- 36Steve Mann. Existential Education in the Era of Personal Cybernetics
38 -- 41Deborah Estrin, Ramesh Govindan, John S. Heidemann. Embedding the Internet: Introduction
43 -- 50David L. Tennenhouse. Proactive Computing
51 -- 58Gregory J. Pottie, William J. Kaiser. Wireless Integrated Network Sensors
59 -- 66Gaetano Borriello, Roy Want. Embedded Vomputation Meets the World Wide Web
67 -- 73Gaurav S. Sukhatme, Maja J. Mataric. Embedding Robots into the Internet
74 -- 82Harold Abelson, Don Allen, Daniel Coore, Chris Hanson, George Homsy, Thomas F. Knight Jr., Radhika Nagpal, Erik Rauch, Gerald Jay Sussman, Ron Weiss. Amorphous Computing
84 -- 91Ben Shneiderman. Universal Usability
93 -- 100John P. Baron, Michael J. Shaw, Andrew D. Bailey. Web-based E-catalog systems in B2B Procurement
101 -- 106Marshall Cline, Mike Girou. Enduring Business Themes
108 -- 114Laurie A. Williams, Robert R. Kessler. All I Really Need to Know About Pair Programming I Learned in Kindergarten
115 -- 120Susan Landau. Designing Cryptography for the New Century
144 -- 0Lauren Weinstein, Peter G. Neumann. Internet Risks

Volume 43, Issue 4

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 12Diane Crawford. Forum: Securing User Passwords
13 -- 14Rosemary McGuinness. ACM Fellows
15 -- 17Neil Munro. A Patchwork of Legislation and Regulation
19 -- 21Meg McGinity. Surfing the Turf
22 -- 26Kuldeep Kumar, Jos van Hillegersberg. Enterprise Resource Planning: Introduction
27 -- 31Yvonne van Everdingen, Jos van Hillegersberg, Eric Waarts. ERP Adoption by European Midsize Companies
32 -- 38Leslie P. Willcocks, Richard Sykes. The Role of the CIO and It Function in ERP
39 -- 41Irma Becerra-Fernandez, Kenneth E. Murphy, Steven J. Simon. Integrating ERP in the Business School Curriculum
42 -- 46M. Lynne Markus, Cornelis Tanis, Paul C. van Fenema. Multisite ERP Implementations
47 -- 51Christina Soh, Sia Siew Kien, Joanne Tay-Yap. Cultural Fits and Misfits: Is ERP a Universal Solution?
53 -- 56Mark Kremers, Han van Dissel. ERP System Migrations
57 -- 61August-Wilhelm Scheer, Frank Habermann. Making ERP a Success
63 -- 69David Sprott. Componentizing the Enterprise Application Packages
70 -- 78Justine Cassell. Embodied Conversational Interface Agents+
91 -- 97Jonathan P. Bowen. The Ethics of Safety-Critical Systems
99 -- 105Tim Bass. Intrusion Detection Systems and Multisensor Data Fusion
107 -- 108Munindar P. Singh, Mona Singh. Deconstructing the any Key
108 -- 109Jerzy W. Grzymala-Busse, Wojciech Ziarko. Data Mining and Rough Set Theory
109 -- 111Friedrich Steimann. Abstract Class Hierarchies, Factories, and Stable Designs
136 -- 0Peter G. Neumann. Denial-of-Service Attacks

Volume 43, Issue 3

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 18Robert L. Glass. Y2K and Believing in Software Practice
19 -- 20James A. Rodger, Parag C. Pendharkar. Using Telemedicine in the Department of Defense
21 -- 25Roy Rada, John Ketchell. Standardizing the European Information Society
27 -- 28Barbara Simons. Trademarking the Net
29 -- 31Mohamed Khalifa, Robert M. Davison. Exploring the Telecommuting Paradox
32 -- 34Matthew Turk, George G. Robertson. Perceptual User Interfaces: Introduction
35 -- 44Alex Pentland. Perceptual Intelligence
40 -- 41Hong Z. Tan. Haptic Interfaces
45 -- 53Sharon L. Oviatt, Philip R. Cohen. Multimodal Interfaces That Process What Comes Naturally
50 -- 51Rosalind W. Picard. Affective Perception
54 -- 64James L. Crowley, Joëlle Coutaz, François Bérard. Things That See
60 -- 61Aaron F. Bobick, Stephen S. Intille, James W. Davis, Freedom Baird, Claudio S. Pinhanez, Lee W. Campbell, Yuri A. Ivanov, Arjan Schütte, Andrew D. Wilson. The KidsRoom
65 -- 70Byron Reeves, Clifford Nass. Perceptual Bandwidth
72 -- 74Henry Lieberman. Programming by Example: Introduction
75 -- 81David Canfield Smith, Allen Cypher, Lawrence G. Tesler. Novice Programming Comes of Age
82 -- 89Brad A. Myers, Richard G. McDaniel, David Wolber. Intelligence in Demonstrational Interfaces
90 -- 97Alexander Repenning, Corrina Perrone. Programming by Analogous Examples
98 -- 103Mathias Bauer, Dietmar Dengler, Gabriele Paul, Markus Meyer. Programming by Demonstration for Information Agents
104 -- 106Kenneth M. Kahn. Generalizing by Removing Detail
107 -- 114Robert St. Amant, Henry Lieberman, Richard Potter, Luke S. Zettlemoyer. Visual Generalization in Programming by Example
115 -- 118Mohamed E. Fayad, Mauri Laitinen, Robert P. Ward. Software Engineering in the Small
144 -- 0Peter G. Neumann. A Tale of Two Thousands

Volume 43, Issue 2

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 21Hal Berghel. Identity Theft, Social Security Numbers, and the Web
23 -- 26Andrew Grosso. The Promise and Problems of the No Electronic Theft Act
27 -- 28Felipe Castel. Exploring Virtuality
29 -- 30Fran Allen, Paula B. Hawthorn, Barbara Simons. Not Now, Not Like This
32 -- 34Mark T. Maybury. News on Demand: Introduction
35 -- 41Stanley Boykin, Andrew Merlino. Machine Learning of Event Segmentation for News on Demand
42 -- 47Howard D. Wactlar, Alexander G. Hauptmann, Michael G. Christel, Ricky Houghton, Andreas M. Olligschlaeger. Complementary Video and Audio Analysis for Broadcast News Archives
48 -- 56Francis Kubala, Sean Colbath, Daben Liu, Amit Srivastava, John Makhoul. Integrated Technologies for Indexing Spoken Language
64 -- 70Jean-Luc Gauvain, Lori Lamel, Gilles Adda. Transcribing Broadcast News for Audio and Video Indexing
71 -- 73Sadaoki Furui, Katsutoshi Ohtsuki, Zhipeng Zhang. Japanese Broadcast News Transcription and Information Extraction
75 -- 79David S. Pallett, John S. Garofolo, Jonathan G. Fiscus. Measurements in Support of Research Accomplishments
80 -- 89Varun Grover, Pradeep Vaswani. Partnerships in the U.S. Telecommunications Industry
90 -- 98Anil K. Jain, Lin Hong, Sharath Pankanti. Biometric Identification
99 -- 107Rudy Hirschheim, Mary Lacity. The Myths and Realities of Information Technology Insourcing
109 -- 116Kai R. T. Larsen, Peter A. Bloniarz. A Cost and Performance Model for Web Service Investment
117 -- 119David Gillibrand. Essential Business Object Design
152 -- 0Carl M. Ellison, Bruce Schneier. Risks of PKI: E-Commerce

Volume 43, Issue 12

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum: Software piracy is not just economics anymore
15 -- 19Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Ronald Marx, Joseph Krajcik, Barry Fishman. The three Ts of elementary education
21 -- 25Roy Rada, John Craparo. Sharing standards: standardizing software projects
27 -- 28Boaz Gelbord. Signing your 011001010 - The problems of digital signatures
31 -- 32Andrew Rosenbloom. Trusting technology: Introduction
34 -- 40Batya Friedman, Peter H. Kahn Jr., Daniel C. Howe. Trust online
41 -- 44Judith S. Olson, Gary M. Olson. i2i trust in e-commerce
45 -- 48Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman. Reputation systems
50 -- 56Justine Cassell, Timothy W. Bickmore. External manifestations of trustworthiness in the interface
57 -- 59Ben Shneiderman. Designing trust into online experiences
60 -- 64Eric M. Uslaner. Social capital and the net
66 -- 71Jennifer Kreie, Timothy Paul Cronan. Making ethical decisions
73 -- 79Detlef Schoder, Pai-Ling Yin. Building firm trust online
81 -- 87Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera. Trust requirements in e-business
88 -- 93Trevor T. Moores, Gurpreet Dhillon. Software piracy: a view from Hong Kong
95 -- 97Masud Ahmad Malik. On the perils of programming
168 -- 0Bruce Schneier. Semantic network attacks

Volume 43, Issue 11es

1 -- 0Ritu Agarwal, Jayesh Prasad, Mohan Tanniru, John Lynch. Risks of rapid application development
2 -- 0Zafar Ali, Arif Ghafoor. Synchronized delivery of multimedia information over ATM networks
3 -- 0Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati. Protecting information on the Web
4 -- 0Joseph D. Blackburn, Gary D. Scudder, Luk Van Wassenhove. Concurrent software development
5 -- 0Susanne Bødker. Coordinating technical support platforms
6 -- 0Manhoi Choy, Hong Va Leong, Man Hon Wong. Disaster recovery techniques for database systems
7 -- 0Deborah A. Dahl, Lewis M. Norton, K. W. Scholz. Commercialization of natural language processing technology
8 -- 0David E. Douglas, Bill C. Hardgrave. Object-oriented curricula in academic programs
9 -- 0Ajit Kambil, Arnold Kamis, Marios Koufaris, Henry C. Lucas Jr.. Influences on the corporate adoption of Web technology
10 -- 0Donald W. Loveland. Automated deduction: achievements and future directions
11 -- 0Daniel E. O Leary, Peter G. Selfridge. Knowledge management for best practices
12 -- 0Derek Partridge. Non-programmed computation
13 -- 0Arik Ragowsky, Niv Ahituv, Seev Neumann. The benefits of using information systems
14 -- 0Louise Scott, Levente Horvath, Donald L. Day. Characterizing case constraints
15 -- 0Vijayan Sugumaran, Mohan Tanniru, Veda C. Storey. Supporting reuse in systems analysis

Volume 43, Issue 11

5 -- 0Diane Crawford. Editorial
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 22Hal Berghel. Digital Politics 2000
23 -- 27Seymour E. Goodman, Timothy Kelly, Michael Minges, Larry Press. Computing at the top of the world
28 -- 29Jason W. Fouts. An Out-of-Box Experience
31 -- 32Steven Clift. An Internet of democracy
33 -- 36Lambertus Hesselink. Ultra-high-density data storage - Guest Editor s Introduction
37 -- 45Garth A. Gibson, Rodney Van Meter. Network attached storage architecture
46 -- 54Sergei Orlov. Volume holographic data storage
56 -- 63Terry W. McDaniel. Magneto-optical data storage
64 -- 71Henk van Houten, Wouter Leibbrandt. Phase change recording
72 -- 80L. Richard Carley, Gregory R. Ganger, David Nagle. MEMS-based integrated-circuit mass-storage systems
82 -- 88Ming Fan, Jan Stallaert, Andrew B. Whinston. The Internet and the future of financial markets
89 -- 92Philip Ginzboorg. Seven comments on charging and billing
94 -- 97Ziming Liu, David G. Stork. Is paperless really more?
98 -- 105Amit Bhatnagar, Sanjog Misra, H. Raghav Rao. On risk, convenience, and Internet shopping behavior
107 -- 112Ned Kock. Benefits for virtual organizations from distributed groups
113 -- 116Robert P. Ward, Mauri Laitinen, Mohamed Fayad. Management in the small
176 -- 0Rebecca Mercuri. Voting automation (early and often?)

Volume 43, Issue 10

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 12Diane Crawford. Forum: what defines a programming relic?
13 -- 16Brock N. Meeks. Being blank in bright waters
17 -- 20Phillip G. Armour. The five orders of ignorance
21 -- 23Edmund M. A. Ronald, Moshe Sipper. What use is a turing chatterbox?
24 -- 26Grant Larsen. Component-based enterprise frameworks - Guest Editor s Introduction
31 -- 38Cris Kobryn. Modeling components and frameworks with UML
39 -- 46Mohamed E. Fayad, David S. Hamu, Davide Brugali. Enterprise frameworks characteristics, criteria, and challanges
47 -- 53Michael Sparling. Lessons learned: through six years of component-based development
55 -- 59Jian Lu, Yingjun Li, Xiaoxing Ma, Cai Min, XianPing Tao, Guanqun Zhang, Jianzhong Liu. A hierarchical framework: for parallel seismic applications
61 -- 67Peter Fingar. Component-based frameworks for e-commerce
68 -- 73Richard A. Johnson. The ups and downs of object-oriented systems development
74 -- 82Sudip Bhattacharjee, R. Ramesh. Enterprise computing environments and cost assessment
83 -- 89Ritu Agarwal, Prabuddha De, Atish P. Sinha, Mohan Tanniru. On the usability of OO representations
90 -- 97Garland Brown, Marshall Fisher, Ned Stoll, Dave Beeksma, Mark Black, Ron Taylor, Choe Seok Yon, Aaron J. Williams, William Bryant, Bernard J. Jansen. Using the lessons of Y2K to improve information systems architecture
99 -- 101Zakaria Maamar, Jeff Sutherland. Toward intelligent business objects
136 -- 0Matt Blaze, Steven M. Bellovin. Tapping on my network door

Volume 43, Issue 1

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 17Brock N. Meeks. Bugging Out: Y2K Fallout or Business As Usual?
19 -- 23Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Barry Fishman, Joseph Krajcik, Ronald Marx. K-12 and the Internet
25 -- 29Tom Porter, Galyn Susman. Creating Lifelike Characters in Pixar Movies
31 -- 32Barbara Simons. Building Big Brother
34 -- 41Prabhudev Konana, Nirup M. Menon, Sridhar Balasubramanian. The Implications of Online Investing
42 -- 49Cecilia M. Gorriz, Claudia Medina. Engaging Girls with Computers Through Software Games
50 -- 57Eszter Hargittai. Radio s Lessons for the Internet
58 -- 64Mark S. Ackerman, Christine A. Hadverson. Reexamining Organizational Memory
65 -- 70Mike Robinson, Mikko Kovalainen, Esa Auramäki. Diary as Dialogue in Papermill Process Control
71 -- 79Jagdish Chandra, Salvatore T. March, Satyen Mukherjee, Will Pape, Ram Ramesh, H. Raghav Rao, Ray O. Waddoups. Information Systems Frontiers
80 -- 88Srinarayan Sharma, Arun Rai. CASE Deployment in IS Organizations
89 -- 95Ruben Gonzalez, Greg Cranitch, Jun Jo. Academic Directions of Multimedia Education
160 -- 0Carl M. Ellison, Bruce Schneier. Risks of PKI: Secure Email