Journal: Communications of the ACM

Volume 44, Issue 9

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 0Diane Crawford. Forum
17 -- 18Robert L. Glass. Of Model Changeovers, Style, and Fatware
21 -- 23Meg McGinity. Siut Yourselt
25 -- 27Jane C. Ginsburg. What to Know Before Reissuing Old Titles as E-Books
29 -- 33Nikolaos A. Mylonopoulos, Vasilis Theoharakis. Global Perception of IS Journals
34 -- 37Vinton G. Cerf. Beyond the Post-PC Internet
38 -- 40Adrian Hooke. The interplanetary Internet
41 -- 45Leonard Kleinrock. Breaking loose
47 -- 54José A. Corrales. An Asturian view of networking 2015
55 -- 59Lada A. Adamic, Bernardo A. Huberman. The Web s hidden order
61 -- 68Mark Weiser. Whatever happened to the next-generation Internet?
70 -- 75Lawrence A. Gordon, Martin P. Loeb. Using information security as a response to competitor analysis systems
76 -- 82Alvin T. S. Chan, Jiannong Cao, Henry C. B. Chan, Gilbert H. Young. A web-enabled framework for smart card applications in health services
83 -- 88Glenn B. Bell, Anil Sethi. Matching records in a national medical patient index
89 -- 94Terry L. Huston. Security issues for implementation of e-medical records
95 -- 98Mohamed E. Fayad, Adam Altman. An Introduction to Software Stability
120 -- 0Emil Sit, Kevin Fu. Web Cookies: Not Just a Privacy Risk

Volume 44, Issue 8

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
15 -- 17Hal Berghel. The Y2K e-commerce tumble
19 -- 22Peter J. Denning. The IT schools movement
23 -- 25David S. Touretzky. Free speech rights for programmers
27 -- 29Eric M. Freedman. Viewpoint: Pondering pixelized pixies
31 -- 37Nahum D. Gershon, Ward Page. What storytelling can do for information visualization
38 -- 44Daniel A. Keim. Visual exploration of large data sets
45 -- 50Stephen G. Eick. Visualizing online activity
52 -- 60Fred Mintzer, Gordon W. Braudaway, Francis P. Giordano, Jack C. Lee, Karen A. Magerlein, Silvana D Auria, Amnon Ribak, Gil Shapir, Fabio Schiattarella, John Tolva, Andrey Zelenkov. Populating the Hermitage Museum s new web site
62 -- 68Calvin K. M. Lam, Bernard C. Y. Tan. The Internet is changing the music industry
69 -- 75Henry Lieberman, Christopher Fry, Louis Weitzman. Exploring the Web with reconnaissance agents
76 -- 82Nong Ye, Joseph Giordano, John Feldman. A process control approach to cyber attack detection
83 -- 88John Benamati, Albert L. Lederer. Coping with rapid changes in IT
112 -- 0Albert Levi, Çetin Kaya Koç. Risks in email security

Volume 44, Issue 7

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
14 -- 0John White. ACM Opens portal
17 -- 20Andrew Grosso. The individual in the new age
21 -- 23Phillip G. Armour. Matching process to types of teams
25 -- 26Quentin Stafford-Fraser. The life and times of the first Web Cam
27 -- 28Scott Hazelhurst. Viewpoint: Developing IT skills internationally: who s developing whom?
30 -- 33David B. Arnold, Fred Niederman. The global IT work force: Introduction
40 -- 41Phalguni Gupta. Growth scenario of IT industries in India
43 -- 44Keith Mander. The decline and fall of the American programmer
46 -- 52Liisa von Hellens, Susan H. Nielsen. Australian women in IT0
53 -- 54Philip J. Sallis. Some thoughts on IT employment in New Zealand
54 -- 0Diane Crawford. ACM general elections
55 -- 55Linda Marshall. A perspective on the IT industry in South Africa
58 -- 64Ritu Agarwal, Thomas W. Ferratt. Crafting an HR strategy to meet the need for IT workers
65 -- 66Kam-Fai Wong. Labor shortfall in Hong Kong s IT industry
67 -- 68Maria M. Klawe. Refreshing the nerds
70 -- 73Jo Ellen Moore, Susan E. Yager, Mary Sumner, Galen B. Crow. Facilitating career changes into IT
74 -- 75Eileen M. Trauth. Mapping information-sector work to the work force
76 -- 0Wang Shan. The IT work force in China
77 -- 78Uladzimir Anishchanko. The IT staffing situation in Belarus
79 -- 85Steve Benford, Chris Greenhalgh, Tom Rodden, James Pycock. Collaborative virtual environments
87 -- 93Karim K. Hirji. Exploring data mining implementation
95 -- 100Vincent S. Lai. Intraorganizational communication with intranets
112 -- 0James J. Horning. Learning from experience

Volume 44, Issue 6

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News track
11 -- 14Diane Crawford. Forum
15 -- 20Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Barry Fishman, Joseph Krajcik, Ronald Marx. Log on education: Handheld devices are ready-at-hand
21 -- 26Seymour E. Goodman, James B. Gottstein, Diane S. Goodman. Wiring the wilderness in Alaska and the Yukon
27 -- 30Paul De Palma. Why women avoid computer science
31 -- 32Rajiv M. Dewan, Abraham Seidmann. Current issues in e-banking: introduction
33 -- 38Kemal Saatcioglu, Jan Stallaert, Andrew B. Whinston. Design of a financial portal
39 -- 44Yoram (Jerry) Wind. The challenge of "customerization" in financial services
45 -- 47Kemal Altinkemer. Bundling e-banking services
48 -- 52Niv Ahituv. The open information society
53 -- 57Christopher P. Holland, John B. Westwood. Product-market and technology strategies in banking
58 -- 61Kuldeep Kumar. Technology for supporting supply chain management: introduction
62 -- 66Steve John Simon. The art of military logistics
67 -- 73Bill Welty, Irma Becerra-Fernandez. Managing trust and commitment in collaborative supply chain relationships
74 -- 79Rob Zuidwijk, Jo van Nunen, Diana van Eijk, Jos van Hillegersberg. Supporting return flows in the supply chain
80 -- 82Girish Ramachandran, Sanjay Tiwari. Challenges in the air cargo supply chain
83 -- 87R. Krishnan. Technology in the Indian retail supply chain
88 -- 94David Schuff, Robert D. St. Louis. Centralization vs. decentralization of application software
95 -- 102Gary Klein, James J. Jiang, Marion G. Sobol. A new view of IS personnel performance evaluation
103 -- 108Terry Shepard, Margaret Anne Lamb, Diane Kelly. More testing should be taught
109 -- 119Michael McCormick. Programming extremism
120 -- 0Richard Forno, William Feinbloom. PKI: a question of trust and value

Volume 44, Issue 5

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 12Diane Crawford. Forum: Evolving commitment to the profession of computer science
15 -- 18Neil Munro. The unhappy but beneficial coexistence of the FBI and the tech elite
19 -- 22Hal Berghel. Caustic Cookies
23 -- 24Alan Howard. Software engineering project management
25 -- 28Krzysztof R. Apt. Viewpoint: One more revolution to make: free scientific publishing
30 -- 32Edward A. Fox, Gary Marchionini. Digital libraries: Introduction
34 -- 40Gregory Crane, Robert F. Chavez, Anne Mahoney, Thomas L. Milbank, Jeffrey A. Rydberg-Cox, David A. Smith, Clifford E. Wulfman. Drudgery and deep thought
41 -- 42Craig G. Nevill-Manning. The biological digital library
43 -- 0Alan S. Inouye. A digital strategy for the library of congress
45 -- 46Paul Jones. Open (source)ing the doors for contributor-run digital libraries
47 -- 0Ian H. Witten, David Bainbridge, Stefan J. Boddie. Greenstone: Open-source DL software
48 -- 54Alexa T. McCray, Marie E. Gallagher. Principles for digital library development
55 -- 56Catherine C. Marshall, Gene Golovchinsky, Morgan N. Price. Digital libraries and mobility
57 -- 59Michael S. Brown, W. Brent Seales, Stephen B. Webb, Christopher O. Jaynes. Building large-format displays for digital libraries
60 -- 62Michael L. Nelson, Kurt Maly. Buckets: smart objects for digital libraries
63 -- 65Henry M. Gladney, Arthur Cantu. Authorization management for digital libraries
66 -- 68Christine L. Borgman. Where is the librarian in the digital library?
68 -- 0William Y. Arms. Uniform resource names: handles, PURLs, and digital object identifiers
69 -- 70Helen R. Tibbo. Archival perspectives on the emerging digital library
72 -- 78Erik Duval, Eddy Forte, Kris Cardinaels, Bart Verhoeven, Rafaël Van Durm, Koen Hendrikx, Maria Wentland Forte, Norbert Ebel, Maciej Macowicz, Ken Warkentyne, Florence Haenni. The Ariadne knowledge pool system
79 -- 0David McArthur, Sarah Giersch, Bill Graves, Charles R. Ward, Richard Dillaman, Russell L. Herman, Gabriel G. Lugo, James H. Reeves, Ronald J. Vetter, Deborah Knox, G. Scott Owen. Toward a sharable digital library of reusable teaching resources
80 -- 81Mary Marlino, Tamara Sumner, David Fulker, Cathryn Manduca, David Mogk. The digital library for earth system education: building community, building the library
82 -- 85Ian H. Witten, Michel Loots, Maria F. Trujillo, David Bainbridge. The promise of digital libraries in developing countries
83 -- 0Lee L. Zia. The NSF national science, mathematics, engineering, and technology education digital library program
86 -- 87Mark D. Apperley, Sally Jo Cunningham, Te Taka Keegan, Ian H. Witten. NIUPEPA: a historical newspaper collection
88 -- 89Shalini R. Urs, K. S. Raghavan. Vidyanidhi: Indian digital library of electronic theses
90 -- 91Bernard Rous. The ACM digital library
92 -- 98Greg Baster, Prabhudev Konana, Judy E. Scott. Business components: a case study of bankers trust Australia limited
99 -- 107Mark Astley, Daniel C. Sturman, Gul Agha. Customizable middleware for modular distributed software
108 -- 114Joanne McGrath Cohoon. Toward improving female retention in the computer science major
128 -- 0Lauren Weinstein. Be seeing you!

Volume 44, Issue 4

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
13 -- 15Diane Crawford. Forum: Participatory Vs. Representative Democracy
17 -- 18Robert L. Glass. Practical programmer: academics, and the scarlet letter A
21 -- 25Peter J. Denning. Crossing the Chasm
27 -- 29David L. Lanning. On bias, science, equal protection, and liability
30 -- 33Sahin Albayrak. Agent-oriented technology for telecommunications: introduction
35 -- 41Nicholas R. Jennings. An agent-based approach for building complex software systems
43 -- 48Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler, Sahin Albayrak. Agent-based telematic services and telecom applications
49 -- 54Munindar P. Singh, Bin Yu, Mahadevan Venkatraman. Community-based service location
55 -- 61Marcus Brunner, Bernhard Plattner, Rolf Stadler. Service creation and management in active telecom networks
63 -- 69Francisco Valera, Jorge E. López de Vergara, José I. Moreno, Víctor A. Villagrá, Julio Berrocal. Communication management experiences in e-commerce
71 -- 77Mike P. Papazoglou. Agent-oriented technology in support of e-business
79 -- 86Varun Grover, James T. C. Teng. E-commerce and the information market
87 -- 93Mark Keil, Daniel Robey. Blowing the whistle on troubled software projects
94 -- 98Tanya L. Cheyne, Frank E. Ritter. Targeting audiences on the internet
99 -- 104Gerti Kappel, S. Rausch-Schott, Werner Retschitzegger, Markku Sakkinen. Bottom-up design of active object-oriented databases
105 -- 107Robert P. Ward, Mohamed Fayad, Mauri Laitinen. Software process improvement in the small
128 -- 0Bruce Schneier. Cyber underwriters lab

Volume 44, Issue 3

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News track
13 -- 14Phillip G. Armour. Software as Currency
17 -- 20Hal Berghel. A cyberpublishing manifesto
28 -- 31Gordon Bell, Jim Gray. Digital immortality
31 -- 32Rita R. Colwell. Closing the circle of information technology
33 -- 35Norman I. Badler. Virtual beings
36 -- 37Donald A. Norman. Cyborgs
38 -- 40Ramesh Jain. Digital experience
41 -- 43Joseph Jacobson. The desktop fab
44 -- 0Dan Bricklin. Look to the past to envision the future
45 -- 0Ted Selker. Affecting humanity
46 -- 47Leon A. Kappelman. The future is ours
48 -- 49V. Michael Bove Jr.. Astronauts and mosquitoes
50 -- 52Andries van Dam. User interfaces: disappearing, dissolving, and evolving
53 -- 55Eric A. Brewer. When everything is searchable
55 -- 57Martin Cooper. Bandwidth and the creation of awareness
58 -- 59Thomas A. Horan. The paradox of place
60 -- 61Ronald J. Vetter. The wireless web
62 -- 65Usama M. Fayyad. The digital physics of data mining
66 -- 67Jennifer C. Lai. When computers speak, hear, and understand
68 -- 69Jim Waldo. When the network is everything
70 -- 71Steven J. Schwartz. Wearables in 2048
72 -- 73Cameron Miner. Pushing functionality into even smaller devices
74 -- 76Christopher R. Johnson. Computational bioimaging for medical diagnosis and treatment
76 -- 77Jacques Cohen. Computers and biology
78 -- 80Thomas L. Sterling. Continuum computer architecture for exaflops computation
81 -- 0Jon Crowcroft. Never lost, never forgotten
82 -- 83Michael J. Muller, Ellen Christiansen, Bonnie A. Nardi, Susan M. Dray. Spiritual life and information technology
84 -- 86Whitfield Diffie. Ultimate cryptography
88 -- 91Raymond Kurzweil. Promise and peril-the deeply intertwined poles of 21st century technology
92 -- 0Edsger W. Dijkstra. The end of computing science?
93 -- 0Hal R. Varian. The computer-mediated economy
96 -- 97Brock N. Meeks. Accountability through transparency;: life in 2050
98 -- 99Pamela Samuelson. Toward a new politics of intellectual property
100 -- 101Dennis Tsichritzis. Forget the past to win the future
102 -- 103Andrew Grosso. The demise of sovereignty
104 -- 106Anthony M. Townsend, James T. Bennett. Electronic empire
106 -- 107Ari Schwartz. A larger role in the public policy process for user control
108 -- 110Karen Holtzblatt. Inventing the future
111 -- 0Richard M. Stallman. Can freedom withstand e-books?
112 -- 113Peter J. Denning. Many zeros ahead
114 -- 115Bruce Schneier. Insurance and the computer industry
116 -- 117Kilnam Chon. The future of the internet digital divide
118 -- 121Grady Booch. Developing the future
122 -- 124Henry Lieberman, Christopher Fry. Will software ever work?
125 -- 0Ann Winblad, Mark Gorenberg. A just-in-time software-based world
126 -- 129Larry L. Constantine. Back to the future
130 -- 0Cherri M. Pancake. The ubiquitous beauty of user-aware software
131 -- 132Steven M. Bellovin. Computer security - an end state?
132 -- 133Doug Riecken. A commonsense opportunity for computing
134 -- 135Ravi Ganesan. Keep (over)reaching for the stars
139 -- 141Anita Borg. Universal literacy - a challenge for computing in the 21st Century
142 -- 143Roger C. Schank. The computer isn t the medium, it s the message
144 -- 145Mitchel Resnick. Closing the fluency gap
168 -- 0Peter G. Neumann, David Lorge Parnas. Computers: boon or bane?

Volume 44, Issue 2

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 19Peter J. Denning. Who Are We?
21 -- 23Meg McGinity. Name is the Game
25 -- 27Steven Bellman, Eric J. Johnson, Gerald L. Lohse. To Opt-In or Opt-Out? It Depends on the Question
28 -- 20Imran Bashir, Enrico Serafini, Kevin Wall. Securing network software applications: introduction
31 -- 36John Viega, Tadayoshi Kohno, Bruce Potter. Trust (and mistrust) in secure applications
38 -- 44James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford. Security models for web-based applications
45 -- 50David M. Martin Jr., Richard M. Smith, Michael Brittain, Ivan Fetch, Hailin Wu. The privacy practices of web browser extensions
51 -- 57Anup K. Ghosh, Tara M. Swaminatha. Software security and privacy risks in mobile e-commerce
58 -- 64Chris I. Dalton, Tse Huong Choo. An operating system approach to securing e-services
66 -- 68Pamela Samuelson. Intellectual property for an information age: introduction
69 -- 75Dan L. Burk. Copyrightable functions and patentable speech
77 -- 83Randall Davis. The digital dilemma
84 -- 90Yochai Benkler. The battle over the institutional ecosystem in the digital environment
91 -- 97A. Michael Froomkin. The collision of trademarks, domain names, and due process in cyberspace
98 -- 103Maureen A. O Rourke. Is virtual trespass an apt analogy?
136 -- 0Peter G. Neumann. What to know about risks

Volume 44, Issue 12

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 19Hal Berghel. The Code Red Worm
21 -- 24Roger C. Schank. Revolutionizing the Traditional Classroom Course
25 -- 28Ka-Ping Yee. Operating an Emergency Information Service
29 -- 31Jon M. Peha. The Growing Debate Over Science and Technology Advice for Congress
33 -- 34Vir V. Phoha. The DMCA Needs Fixing
35 -- 38Zakaria Maamar, Eric Dorion, Catherine Daigle. Toward Virtual Marketplaces for E-Commerce Support
40 -- 43James M. Ragusa, Grace M. Bochenek. Collaborative Virtual Design Environments: Introduction
45 -- 48Randall C. Smith. Shared Vision
49 -- 50R. Bowen Loftin. Design Engineering in Virtual Environments
51 -- 54Mark T. Maybury. Collaborative Virtual Environments for Analysis and Decision Support
55 -- 56Mark T. Maybury, Raymond J. D Amore, David House. Expert Finding for Collaborative Virtual Environments
57 -- 58Simon Su, R. Bowen Loftin. A Shared Virtual Environment for Exploring and Designing Molecules
59 -- 63Imre Horváth, Zoltán Rusák. Collaborative Shape Conceptualization in Virtual Design Environments
64 -- 67Cristian Luciano, Pat Banerjee, Sanjay Mehrotra. 3D Animation of Telecollaborative Anthropomorphic Avatars
68 -- 70Robert M. Davison, Gert-Jan de Vreede. Global Applications of Collaborative Technology: Introduction
71 -- 73Line Dubé, Guy Paré. Global Virtual Teams
74 -- 76Sue Newell, Shan Ling Pan, Robert D. Galliers, Jimmy C. Huang. The Myth of the Boundaryless Organization
77 -- 79Séamas Kelly, Matthew Jones. Groupware and the Social Infrastructure of Communication
80 -- 82Gerardine DeSanctis, Matthew Wright, Lu Jiang. Building A Global Learning Community
83 -- 84Anne P. Massey, Mitzi M. Montoya-Weiss, Yu-Ting Caisy Hung, V. Ramesh. Cultural Perceptions of Task-Technology Fit
85 -- 88Sajda Qureshi, Ilze Zigurs. Paradoxes and Prerogatives in Global Virtual Collaboration
89 -- 0J. Roberto Evaristo. Nonconsensual Negotiation in Distributed Collaboration
91 -- 96Ram D. Gopal, Zhiping D. Walter, Arvind K. Tripathi. Admediation: New Horizons in Effective Email Advertising
97 -- 102Eric J. Glover, Steve Lawrence, Michael D. Gordon, William P. Birmingham, C. Lee Giles. Web Search - Your Way
103 -- 109J. Leon Zhao, Vincent H. Resh. Internet Publishing and Transformation of Knowledge Processes
176 -- 0Peter G. Neumann, Lauren Weinstein. Risks of National Identity Cards

Volume 44, Issue 11

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 15Diane Crawford. Forum
17 -- 20Brock N. Meeks. Blanking on Rebellion: Where the Future is Nabster
21 -- 25Peter J. Denning, Robert Dunham. The Core of the Third-Wave Professional
27 -- 28Francine Berman. From TeraGrid to Knowledge Grid
29 -- 32Albert Huang. Innovative Use of Email for Teaching
34 -- 41Brad A. Myers. Using handhelds and PCs together
42 -- 50Ravi Bapna, Paulo B. Goes, Alok Gupta. Insights and Analyses of Online Auctions
51 -- 56Michael Ettredge, Vernon J. Richardson, Susan Scholz. A Web Site Design Model for Financial Information
57 -- 63Alina M. Chircu, Robert J. Kauffman, Doug Keskey. Maximizing the Value of Internet-based Corporate Travel Reservation Systems
65 -- 69John Gray. The End of Career
70 -- 76John Backus. Funding the Computing Revolution s Third Wave
77 -- 81Nicholas Carriero, David Gelernter. A Computational Model of Everything
82 -- 88Mark Burgin. How We Know What Technology Can Do
89 -- 96Henry C. Lucas Jr.. Information Technology and Physical Space
97 -- 102Steve Sawyer. A market-based perspective on information systems development
152 -- 0Lauren Weinstein, Peter G. Neumann. Inside Risks: Risks of Panic

Volume 44, Issue 10

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 12Diane Crawford. Forum
13 -- 15Phillip G. Armour. Zeppelins and jet planes: a metaphor for modern software projects
17 -- 19Neil Munro. Considering the broadband debate
21 -- 22Keith Devlin. The real reason why software engineers need math
23 -- 26Barbara Simons. The ACM declaration in Felten v. RIAA
29 -- 32Tzilla Elrad, Robert E. Filman, Atef Bader. Aspect-oriented programming - introduction
33 -- 38Tzilla Elrad, Mehmet Aksit, Gregor Kiczales, Karl J. Lieberherr, Harold Ossher. Discussing aspects of AOP
39 -- 41Karl J. Lieberherr, Doug Orleans, Johan Ovlinger. Aspect-oriented programming with adaptive methods
43 -- 50Harold Ossher, Peri L. Tarr. Using multidimensional separation of concerns to (re)shape evolving software
51 -- 57Lodewijk Bergmans, Mehmet Aksit. Composing crosscutting concerns using composition filters
59 -- 65Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold. Getting started with ASPECTJ
66 -- 73J. Andrés Díaz Pace, Marcelo R. Campo. Analyzing the role of aspects in software design
75 -- 77Gail C. Murphy, Robert J. Walker, Elisa L. A. Baniassad, Martin P. Robillard, Albert Lai, Mik Kersten. Does aspect-oriented programming work?
79 -- 82Yvonne Coady, Gregor Kiczales, Michael J. Feeley, Norman C. Hutchinson, Joon Suan Ong. Structuring operating system aspects
83 -- 85Paniti Netinant, Tzilla Elrad, Mohamed Fayad. A layered approach to building open aspect-oriented systems
87 -- 93Jeffrey G. Gray, Ted Bapty, Sandeep Neema, James Tuck. Handling crosscutting constraints in domain-specific modeling
95 -- 97Gregory T. Sullivan. Aspect-oriented programming using reflection and metaobject protocols
98 -- 101Cherri M. Pancake, Christian Lengauer. High-performance Java - introduction
102 -- 109José E. Moreira, Samuel P. Midkiff, Manish Gupta, Pedro V. Artigas, Peng Wu, George S. Almasi. The NINJA project
110 -- 117Thilo Kielmann, Philip J. Hatcher, Luc Bougé, Henri E. Bal. Enabling Java for high-performance computing
118 -- 125Vladimir Getov, Gregor von Laszewski, Michael Philippsen, Ian T. Foster. Multiparadigm communications in Java for grid computing
126 -- 128Henry F. Ledgard. The emperor with no clothes
129 -- 130Ralph Westfall. Hello, World considered harmful
168 -- 0Stephan Somogyi, Bruce Schneier. The perils of port 80

Volume 44, Issue 1

5 -- 0Diane Crawford. Editorial Pointers
9 -- 0Robert Fox. News Track
11 -- 13Robert L. Glass. An embarrassing, yet rewarding, ending to a previous column
19 -- 21Leonard N. Foner. Fixing a flawed domain name system
22 -- 26Åke Grönlund. Democracy in an IT-framed society: introduction
27 -- 30Richard T. Watson, Bryan Mundy. A strategic perspective of electronic democracy
36 -- 38Per-Olof Ågren. Is online democracy in the EU for professionals only?
45 -- 48Ignace Snellen. ICTs, bureaucracies, and the future of democracy
49 -- 51Joachim Åström. Should democracy online be quick, strong, or thin?
52 -- 57Doug Schuler. Computer professionals and the next culture of democracy
58 -- 62John A. Taylor, Eleanor Burt. Not-for-profits in the democratic polity
63 -- 67Todd M. La Porte, Chris C. Demchak, Christian Friis. Webbing governance: global trends across national-level public agencies
69 -- 71Lance J. Hoffman, Lorrie Faith Cranor. Internet voting for public officials: introduction
72 -- 85Joe Mohen, Julia Glidden. The case for internet voting
86 -- 91Gordon Bell. A personal digital store
93 -- 98Thomas M. Chen. Increasing the observability of Internet behavior
99 -- 104Abhijit Chaudhury, Debasish Mallick, H. Raghav Rao. Web channels in e-commerce
105 -- 107Simon N. Foley, Robert Dumigan. Are handheld viruses a significant threat?
160 -- 0Rebecca Mercuri, Peter G. Neumann. System integrity revisited
1517 -- 0Phillip G. Armour. The laws of software process
3135 -- 0Ari-Veikko Anttiroiko. Toward the European information society