Journal: Communications of the ACM

Volume 45, Issue 9

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 14Diane Crawford. Influencing factors in the computer industry
15 -- 20Hal Berghel. Responsible web caching
21 -- 26Peter J. Denning. Career redux
27 -- 28Paul F. Ross. Whatever became of integrity?
29 -- 30Maria M. Klawe. Making a difference through computing communities
31 -- 33Ralph R. Miller. Information management in the aftermath of 9/11
35 -- 39Simon Davies. A year after 9/11: where are we now?
40 -- 41Eric A. Brewer. Introduction
42 -- 49Marti A. Hearst, Ame Elliott, Jennifer English, Rashmi R. Sinha, Kirsten Swearingen, Ka-Ping Yee. Finding the flow in web site search
50 -- 55James E. Pitkow, Hinrich Schütze, Todd A. Cass, Robert Cooley, Don Turnbull, Andy Edmonds, Eytan Adar, Thomas M. Breuel. Personalized search
56 -- 60Abbe Mowshowitz, Akira Kawaguchi. Bias on the web
61 -- 67James H. Gerlach, Bruce Neumann, Edwin Moldauer, Martha Argo, Daniel Frisby. Determining the cost of IT services
68 -- 72Ellen Isaacs, Alan Walendowski, Dipti Ranganathan. Mobile instant messaging through Hubbub
73 -- 79Ritu Agarwal, Thomas W. Ferratt. Enduring practices for managing IT professionals
81 -- 86Mike Morrison, Joline Morrison, Anthony Keys. Integrating web sites and databases
87 -- 92Craig K. Tyran, Joey F. George. Improving software inspections with group process support
93 -- 97William R. King, Peter V. Marks, Scott McCoy. The most important issues in knowledge management
98 -- 101Nikolay V. Shilov, Kwangkeun Yi. Engaging students with theory through ACM collegiate programming contest
102 -- 106Mohamed E. Fayad, Shasha Wu. Merging multiple conventional models in one stable model
120 -- 0Mark Stamp. Risks of digital rights management

Volume 45, Issue 8

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News tracks
11 -- 14Diane Crawford. Embrace the engineering metaphor
15 -- 18Cathleen A. Norris, Elliot Soloway, Terry Sullivan. Examining 25 years of technology in U.S. education
19 -- 21Robert L. Glass. The proof of correctness wars
23 -- 24Christof Teuscher, Moshe Sipper. Hypercomputation: hype or computation?
25 -- 27Ross A. Malaga. Additional methods when using email for teaching
28 -- 31Usama M. Fayyad, Ramasamy Uthurusamy. Evolving data into mining solutions for insights
33 -- 37Padhraic Smyth, Daryl Pregibon, Christos Faloutsos. Data-driven evolution of data mining algorithms
38 -- 43Paul S. Bradley, Johannes Gehrke, Raghu Ramakrishnan, Ramakrishnan Srikant. Scaling mining algorithms to large databases
45 -- 48Ron Kohavi, Neal Rothleder, Evangelos Simoudis. Emerging trends in business analytics
49 -- 53Chidanand Apté, Bing Liu, Edwin P. D. Pednault, Padhraic Smyth. Business applications of data mining
54 -- 58Jiawei Han, Russ B. Altman, Vipin Kumar, Heikki Mannila, Daryl Pregibon. Emerging scientific applications in data mining
59 -- 61Robert L. Grossman, Mark F. Hornick, Gregor Meyer. Data mining standards initiatives
62 -- 67Peter Tarasewich, Patrick R. McMullen. Swarm intelligence: power in numbers
69 -- 73Tim Coltman, Timothy M. Devinney, Alopi S. Latukefu, David F. Midgley. Keeping e-business in perspective
75 -- 81Clayton A. Looney, Debabroto Chatterjee. Web-enabled transformation of the brokerage industry
82 -- 86Craig Van Slyke, Christie L. Comunale, France Belanger. Gender differences in perceptions of web-based shopping
87 -- 92George Chin Jr., James D. Myers, David Hoyt. Social networks in the virtual science laboratory
93 -- 98M. A. Quaddus, Lai Lai Tung. Explaining cultural differences in decision conferencing
99 -- 103Lawrence G. Jones, Arthur L. Price. Changes in computer science accreditation
105 -- 106Nick Ourosoff. Primitive types in Java considered harmful
112 -- 0Tolga Acar, John R. Michener. Risks in features vs. assurance

Volume 45, Issue 7

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 12Diane Crawford. Forum
13 -- 15Brock N. Meeks. True blue and vigilante, too
17 -- 19Neil Munro. The ever-expanding network of local and federal databases
21 -- 24Shai Simonson. A post-baccalaureate undergraduate-level program in computer science
25 -- 26Maris G. Martinsons, Valdis Martinsons. Rethinking the value of IT, again
28 -- 31Andrew Rosenbloom. How the virtual inspires the real
32 -- 35W. Daniel Hillis. The power to shape the world
36 -- 39Alvy Ray Smith. The reality of simulated actors
40 -- 44Theresa-Marie Rhyne. Computer games and scientific visualization
45 -- 49Clemens Wagner, Markus A. Schill, Reinhard Männer. Intraocular surgery on a virtual eye
50 -- 55Marc Pollefeys, Luc J. Van Gool. From images to 3D models
56 -- 63Norman I. Badler, Charles A. Erignac, Ying Liu. Virtual humans for validating maintenance procedures
64 -- 70Mark Billinghurst, Hirokazu Kato. Collaborative augmented reality
71 -- 75Gordon Bell, Jim Gemmell. A call for the home media network
76 -- 81Toru Ishida. Digital city Kyoto
83 -- 88Katherine M. Shelfer, J. Drew Procaccino. Smart card evolution
89 -- 95John Gallaugher. E-commerce and the undulating distribution channel
96 -- 102Snehamay Banerjee, Ram L. Kumar. Managing electronic interchange of business documents
103 -- 108Jonathon N. Cummings, Brian S. Butler, Robert E. Kraut. The quality of online social relationships
109 -- 111Robert M. Davison. Cultural complications of ERP
120 -- 0Donald A. Norman. Beyond the computer industry

Volume 45, Issue 6

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum - Weighing in on the notion of dumbing up
15 -- 19Peter J. Denning. Flatlined
21 -- 24Meg McGinity. Broadband to go
25 -- 29Harold W. Lawson. Rebirth of the computer industry
30 -- 32Gul Agha. Introduction
33 -- 38Fabio Kon, Fábio M. Costa, Gordon S. Blair, Roy H. Campbell. The case for reflective middleware
39 -- 42Anand Tripathi. Challenges designing next-generation middleware systems
43 -- 48Douglas C. Schmidt. Middleware for real-time and embedded systems
49 -- 52Nalini Venkatasubramanian. Safe composability of middleware services
53 -- 58Valérie Issarny, Christos Kloukinas, Apostolos Zarras. Systematic aid for developing middleware architectures
59 -- 64Jean Bacon, Ken Moody. Toward open, secure, widely distributed services
65 -- 0Diane Crawford. ACM fellows
67 -- 71Michael Ettredge, Vernon J. Richardson, Susan Scholz. Timely financial reporting at corporate web sites?
73 -- 79Kai Lung Hui, Patrick Y. K. Chau. Classifying digital products
81 -- 87Gary Klein, James J. Jiang, Debbie B. Tesch. Wanted: project teams with a blend of is professional orientations
89 -- 93Gloria Mark. Extreme collaboration
94 -- 99Raquel Benbunan-Fich. Improving education and training with IT
100 -- 105James A. Aries, Subhankar Banerjee, Marc S. Brittan, Eric Dillon, Janusz S. Kowalik, John P. Lixvar. Capacity and performance analysis of distributed enterprise systems
106 -- 0Patrick P. Gelsinger. Power play
120 -- 0Ross J. Anderson. Free speech online and offline

Volume 45, Issue 5

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
15 -- 16Robert L. Glass. Searching for the holy grail of software engineering
17 -- 20Phillip G. Armour. The organism and the mechanism of projects
21 -- 26Pratyush Bharati, Peter Tarasewich. Global perceptions of journals publishing e-commerce research
27 -- 29Wei-Lung Wang. Beware the engineering metaphor
30 -- 33Peter Brusilovsky, Mark T. Maybury. From adaptive hypermedia to the adaptive web
34 -- 38Daniel Billsus, Clifford Brunk, Craig Evans, Brian Gladish, Michael J. Pazzani. Adaptive interfaces for ubiquitous web access
39 -- 40Barry Smyth, Keith Bradley, Rachael Rafter. Personalization techniques for online recruitment services
41 -- 42Josef Fink, Jürgen Koenemann, Stephan Noller, Ingo Schwab. Putting personalization into practice
43 -- 46Elisabeth André, Thomas Rist. From adaptive hypertext to personalized web companions
47 -- 51Keith Cheverst, Keith Mitchell, Nigel Davies. The role of adaptive hypermedia in a context-aware tourist GUIDE
52 -- 53Liliana Ardissono, Anna Goy, Giovanna Petrone, Marino Segnan. Personalization in business-to-customer interaction
54 -- 59Marc Light, Mark T. Maybury. Personalized multimedia information access
60 -- 61Paul De Bra. Adaptive educational hypermedia on the web
62 -- 63Diana Bental, Alison Cawsey. Personalized and adaptive systems for medical consumer applications
64 -- 67Alfred Kobsa. Personalized hypermedia and international privacy
76 -- 83Edieal J. Pinker, Abraham Seidmann, Reginald C. Foster. Strategies for transitioning old economy firms to e-business
84 -- 90Christian Wagner, Efraim Turban. Are intelligent e-commerce agents partners or predators?
91 -- 96Barry Wellman. Designing the Internet for a networked society
97 -- 101John J. Helly, T. Todd Elvins, Don Sutton, David Martinez, Scott E. Miller, Steward Pickett, Aaron M. Ellison. Controlled publication of digital scientific data
102 -- 106Ned Kock. Managing with web-based IT in mind
107 -- 108Michael Tow Cheung, Ziqi Liao. Time-asymmetry in business processes
120 -- 0Lauren Weinstein. Risks of inaction

Volume 45, Issue 4

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News Track
11 -- 16Diane Crawford. Forum
17 -- 21Mark Guzdial, Elliot Soloway. Teaching the Nintendo generation to program
23 -- 27Hal Berghel. Hijacking the web
29 -- 32Murray Turoff. Past and future emergency response information systems
33 -- 35David Davenport. Anonymity on the Internet: why the price may be too high
37 -- 39Jennifer Preece. Supporting community and building social capital - Introduction
40 -- 44Thomas Erickson, Christine Halverson, Wendy A. Kellogg, Mark Laff, Tracee Wolf. Social translucence: designing social infrastructures that make collective activity visible
45 -- 49Judith S. Donath. A semantic approach to visualizing online conversations
51 -- 55Marc Smith. Tools for navigating large social cyberspaces
56 -- 59Starr Roxanne Hiltz, Murray Turoff. What makes learning networks effective?
60 -- 63Amy Bruckman. The future of e-learning communities
64 -- 68Dorine Andrews. Audience-specific online community design
69 -- 73David R. Millen, Michael A. Fontaine, Michael J. Muller. Understanding the benefit and costs of communities of practice
74 -- 81Judy E. Scott, Iris Vessey. Managing risks in enterprise systems implementations
83 -- 87Thomas Schambach, J. Ellis Blanton. The professional development challenge for IT professionals
89 -- 95Bonnie A. Nardi, Steve Whittaker, Ellen Isaacs, Mike Creech, Jeff A. Johnson, John Hainsworth. Integrating communication and information through ContactMap
96 -- 102Mordechai Ben-Menachem, Roy Gelbard. Integrated IT management tool kit
103 -- 107Arnd Weber. Enabling crypto: how radical innovations occur
109 -- 112Mohamed E. Fayad. How to deal with software stability
128 -- 0David W. J. Stringer-Calvert. Digital Evidence
129 -- 135Marie-Michèle Boulet, Faouzi Ben Jebara, Fathi Bemmira, Serge Boudreault. A comparison of three delivery systems for teaching an information technology course
136 -- 144Vladan Devedzic. Understanding ontological engineering
145 -- 151Christos J. Georgiou, Petros S. Stefaneas. Strategies for accelerating the worldwide adoption of e-commerce
152 -- 159T. Dean Hendrix, Michelle P. Schneider. NASA s TReK project: a case study in using the spiral model of software development
160 -- 170William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson. Java distributed objects for numerical visualization in VisAD
171 -- 183Gretchen L. Robertson, Deborah Hix. Making the computer accessible to mentally retarded adults
184 -- 192Beverly K. Kahn, Diane M. Strong, Richard Y. Wang. Information quality benchmarks: product and service performance
193 -- 200Anandasivam Gopal, Tridas Mukhopadhyay, Mayuram S. Krishnan. The role of software processes and communication in offshore software development
201 -- 210Ravi Patnayakuni, Arun Rai. Development infrastructure characteristics and process capability
211 -- 218Leo Pipino, Yang W. Lee, Richard Y. Wang. Data quality assessment
219 -- 227Moshe Zviran. Securing PC applications: the relay race approach

Volume 45, Issue 3

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 14Diane Crawford. Forum
15 -- 18Peter J. Denning. Internet time out
19 -- 21Meg McGinity. Call it techonomics
27 -- 29Ananda Mitra. Trust, authenticity, and discursive power in cyberspace
30 -- 32Gaurav S. Sukhatme, Maja J. Mataric. Robots: Intelligence, Versatility, Adaptivity - Introduction
33 -- 38Rodney A. Brooks. Humanoid robots
39 -- 45Daniela Rus, Zack J. Butler, Keith Kotay, Marsette Vona. Self-reconfiguring robots
46 -- 51Oussama Khatib, Oliver Brock, Kyong-Sok Chang, François Conti, Diego C. Ruspini, Luis Sentis. Robotics and interactive simulation
52 -- 57Sebastian Thrun. Probabilistic robotics
59 -- 63Manuela M. Veloso. Entertainment robotics
64 -- 71Richard T. Grenci, Peter A. Todd. Solutions-driven marketing
72 -- 77John Cameron. Configurable development processes
78 -- 82Leysia Palen. Mobile telephony in a connected life
83 -- 88Huaiqing Wang, John Mylopoulos, Stephen Liao. Intelligent agents and financial risk monitoring systems
89 -- 93Vincent S. Lai, Wingyan Chung. Managing international data communications
94 -- 98Ruzena Bajcsy, Craig Reynolds. Computer science: the science of and about information and computation
120 -- 0Peter J. Denning, James J. Horning. Risks of linear thinking

Volume 45, Issue 2

5 -- 6Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 17Diane Crawford. Forum
19 -- 23Andrew Grosso. Why the digital millennium copyright act is a failure of reason
25 -- 27Robert L. Glass. Stodgy by design, and the notion of dumbing up
29 -- 30Felipe Castel. Ontological computing
31 -- 34Ben Shneiderman. ACM s computing professionals face new challenges
35 -- 37Qing Bian Zhang, Patrick Y. K. Chau. Creating e-commerce courses with regional intent
39 -- 41Michael Grüninger, Jintae Lee. Ontology Applications and Design - Introduction
42 -- 47Clyde W. Holsapple, Kshiti D. Joshi. A collaborative approach to ontology design
48 -- 54Henry Kim. Predicting how ontologies for the semantic web will evolve
55 -- 60John O. Everett, Daniel G. Bobrow, Reinhard Stolle, Richard Crouch, Valeria de Paiva, Cleo Condoravdi, Martin van den Berg, Livia Polanyi. Making ontologies work for resolving redundancies across documents
61 -- 65Nicola Guarino, Christopher A. Welty. Evaluating ontological decisions with OntoClean
67 -- 72Bert J. Dempsey, Debra Weiss, Paul Jones, Jane Greenberg. Who is an open source software developer?
73 -- 78Jo Ellen Moore, Lisa A. Burke. How to turn around turnover culture in IT
79 -- 84William J. Kettinger, Choong C. Lee. Understanding the IS-user divide in IT innovation
85 -- 90Delvin Grant. A wider view of business process reengineering
91 -- 95Gordon Bell, Jim Gray. What s next in high-performance computing?
97 -- 101Richard T. Snodgrass. Progress on ACM s Becoming the Preferred Publisher, Rights and responsibilities in ACM publishing
102 -- 104Thomas Erickson. Some problems with the notion of context-aware computing
128 -- 0Evgeniy Gabrilovich, Alex Gontmakher. The homograph attack

Volume 45, Issue 12

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 15Diane Crawford. Forum
17 -- 21. Cyberspace across sub-Saharan Africa
22 -- 24Jens Palsberg, Scott J. Baxter. Teaching reviewing to graduate students
25 -- 26Felipe Castel. Theory, theory on the wall
31 -- 37Upkar Varshney. Multicast over wireless networks
39 -- 44Aviel D. Rubin. Security considerations for remote electronic voting
45 -- 49Troy J. Strader, Sridhar N. Ramaswami. The value of seller trustworthiness in C2C online markets
50 -- 55Christoph Schlueter, Michael J. Shaw. Emergent patterns of integration in electronic channel systems
56 -- 61Wullianallur Raghupathi, Joseph K. Tan. Strategic IT applications in health care
62 -- 65Kalle Lyytinen, Youngjin Yoo. Introduction
67 -- 73Gordon B. Davis. Anytime/anyplace computing and the future of knowledge work
74 -- 78Jonathan Grudin. Group dynamics and ubiquitous computing
79 -- 82Daniel P. Siewiorek. New frontiers of application design
83 -- 87Andrew E. Fano, Anatole Gershman. The future of business services in the age of ubiquitous computing
88 -- 91Leonard M. Jessup, Daniel Robey. The relevance of social issues in ubiquitous computing environments
92 -- 96Guruduth Banavar, Abraham Bernstein. Software infrastructure and design challenges for ubiquitous computing applications
97 -- 100Fernando Berzal Galiano, Ignacio Blanco, Juan C. Cubero, Nicolás Marín. Comonent-based data mining frameworks
144 -- 0Avishai Wool. Why security standards sometimes fail

Volume 45, Issue 11

5 -- 8Diane Crawford. Editorial printers
9 -- 10Robert Fox. News track
11 -- 14Diane Crawford. Forum
15 -- 18Phillip G. Armour. Ten unmyths of project estimation
19 -- 21Robert L. Glass. Sorting out software complexity
23 -- 24Boaz Gelbord, Gert Roelofsen. New surveillance techniques raise privacy concerns
25 -- 26Zakaria Maamar, Weiming Shen. Introduction
27 -- 31Mark Klein, Hiroki Sayama, Peyman Faratin, Yaneer Bar-Yam. A complex systems perspective on computer-supported collaborative design technology
33 -- 37Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough. On-the-fly web content integrity check boosts users s confidence
39 -- 44Federico Bergenti, Agostino Poggi, Matteo Somacher. A collaborative platform for fixed and mobile networks
45 -- 49Lihui Wang, Brian Wong, Weiming Shen, Sherman Y. T. Lang. A Java 3d-enabled cyber workspace
50 -- 55Jim Gray, Alexander S. Szalay. The world-wide telescope
56 -- 61David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, Dan Werthimer. SETI@home: an experiment in public-resource computing
62 -- 66Jon D. Genetti. Volume-rendered galactic animations
67 -- 69Joaquin Miller. Introduction
70 -- 72Bran Selic, Guus J. Ramackers, Cris Kobryn. Evolution, not revolution
73 -- 75Keith Duddy. UML2 must enable a family of languages
76 -- 78Stephen J. Mellor. Make models be assets
79 -- 81William Frank, Kevin P. Tyson. Be clear, clean, concise
82 -- 85Dov Dori. Why significant UML change is unlikely
87 -- 90John C. Knight, Nancy G. Leveson. Should software engineers be licensed?
91 -- 0John White, Barbara Simons. ACM s position on the licensing of software engineers
92 -- 94Donald J. Bagert. Texas licensing of software engineers: all s quiet, for now
94 -- 95Ken Kennedy, Moshe Y. Vardi. A Rice University perspective on software engineering licensing
96 -- 98David Lorge Parnas. Licensing software engineers in Canada
98 -- 101Gordon I. McCalla. Software engineering requires individual professionalism
102 -- 104Dennis de Champeaux. Software engineering considered harmful
136 -- 0Rebecca Mercuri. Florida 2002: sluggish systems, vanishing votes

Volume 45, Issue 10

5 -- 8Diane Crawford. Editorial printers
9 -- 10Robert Fox. News track
11 -- 14Rebecca Mercuri. Computer security: quality rather than quantity
15 -- 20Pamela Samuelson. Reverse engineering under siege
21 -- 22Robert S. Boyer, W. H. J. Feijen, David Gries, C. A. R. Hoare, Jayadev Misra, J. Moore, H. Richards. In memoriam: Edsger W. Dijkstra 1930-2002
23 -- 25Rafael Palacios. Remote automatic doorman via the internet
27 -- 29Alan Howard. Rapid Application Development: rough and dirty or value-for-money engineering?
30 -- 34Ali Arsanjani. Introduction
35 -- 40Ivica Crnkovic, Brahim Hnich, Torsten Jonsson, Zeynep Kiziltan. Specification, implementation, and deployment of components
41 -- 44Erik Meijer, Clemens A. Szyperski. Overcoming independent extensibility challenges
45 -- 52Keith Levi, Ali Arsanjani. A goal-driven approach to enterprise component identification and specification
53 -- 57Ricardo Jardim-Gonçalves, Adolfo Steiger-Garção. Implicit multilevel modeling in flexible busines environments
59 -- 64Jeff Sutherland, Willem-Jan van den Heuvel. Enterprise application integration and complex adaptive systems
65 -- 70Aniruddha S. Gokhale, Douglas C. Schmidt, Balachandran Natarajan, Nanbor Wang. Applying model-integrated computing to component middleware and enterprise applications
71 -- 76Michael Stal. Web services: beyond component-based computing
77 -- 82Paul Fremantle, Sanjiva Weerawarana, Rania Khalaf. Enterprise services
83 -- 87Soo Dong Kim. Lessons learned from a nationwide CBD promotion project
88 -- 90Winslow Burleson, Ted Selker. Introduction
91 -- 95Ernest A. Edmonds, Linda Candy. Creativity, art practice, and knowledge
96 -- 99Lena Mamykina, Linda Candy, Ernest A. Edmonds. Collaborative creativity
100 -- 104Sharon L. Greene. Characteristics of applications that support creativity
106 -- 108Michael A. Terry, Elizabeth D. Mynatt. Supporting experimentation with Side-Views
109 -- 111Chris Roast, Innes Ritchie, Stephanie Thomas. Re-creating the reader: supporting active reading in literary research
112 -- 115John C. Thomas, Alison Lee, Catalina Danis. Enhancing creative design via software tools
116 -- 120Ben Shneiderman. Creativity support tools
121 -- 126E. Vance Wilson. Email winners and losers
127 -- 131Ali F. Farhoomand, Donald H. Drury. Managerial information overload
132 -- 137H. James Nelson, Deborah J. Armstrong, Mehdi Ghods. Old dogs and new tricks
138 -- 143Patrick Y. K. Chau, Melissa Cole, Anne P. Massey, Mitzi M. Montoya-Weiss, Robert M. O Keefe. Cultural differences in the online behavior of consumers
144 -- 146Rajeswari Malladi, Dharma P. Agrawal. Current and future applications of mobile and wireless networks
160 -- 0Fred B. Schneider. Secure systems conundrum

Volume 45, Issue 1

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 14Phillip G. Armour. The spiritual life of projects
15 -- 17Neil Munro. Too much of a good thing
19 -- 21Lloyd W. Bartholome, David H. Olsen. A practical approach for implementing e-commerce programs in business schools
23 -- 26Anthony M. Townsend, Anthony R. Hendrickson, Samuel M. DeMarie. Meeting the virtual work imperative
27 -- 31Michael Lewis, Jeffrey Jacobson. Game engines in scientific research - Introduction
30 -- 31Michael Lewis. The new cards
32 -- 35John E. Laird. Research in human-level AI using computer games
36 -- 38Wayne Piekarski, Bruce H. Thomas. ARQuake: the outdoor augmented reality gaming system
39 -- 42Jeffrey Jacobson, Zimmy Hwang. Unreal tournament for immersive interactive theater
43 -- 45Gal A. Kaminka, Manuela M. Veloso, Steve Schaffer, Chris Sollitto, Rogelio Adobbati, Andrew N. Marshall, Andrew Scholer, Sheila Tejada. GameBots: a flexible test bed for multiagent team research
46 -- 48Markus Bylund, Fredrik Espinoza. Testing and demonstrating context-aware services with Quake III Arena
49 -- 52. The ACM annual report FY01
53 -- 54Murugan Anandarajan. Internet abuse in the workplace - Introduction
55 -- 59Jeffrey M. Stanton. Company profile of the frequent internet user
60 -- 63Jo Ann Oravec. Constructive approaches to internet recreation in the workplace
64 -- 65France Belanger, Craig Van Slyke. Abuse or learning?
66 -- 70Vivien K. G. Lim, Thompson S. H. Teo, Geok Leng Loo. How do I loaf here? let me count the ways
71 -- 74Claire A. Simmers. Aligning internet usage with business priorities
75 -- 79Keng Siau, Fiona Fui-Hoon Nah, Limei Teng. Acceptable internet use policy
80 -- 83Andrew Urbaczewski, Leonard M. Jessup. Does electronic monitoring of employee internet usage work?
84 -- 87Raymond R. Panko, Hazel Glenn Beh. Monitoring for pornography and sexual harassment
89 -- 96Upkar Varshney, Andrew P. Snow, Matt McGivern, Christi Howard. Voice over IP
97 -- 100Chittibabu Govindarajulu. The status of helpdesk support
101 -- 106Julie Smith David, David Schuff, Robert D. St. Louis. Managing your total IT cost of ownership
107 -- 110Cris Kobryn. Will UML 2.0 be agile or awkward?
111 -- 115Mohamed E. Fayad. Accomplishing software stability
116 -- 122Robert E. Filman, Stuart Barrett, Diana D. Lee, Ted Linden. Inserting ilities by controlling communications
172 -- 0Rebecca Mercuri. Uncommon criteria