Journal: Communications of the ACM

Volume 46, Issue 9

7 -- 0Diane Crawford. Editorial pointers
11 -- 12. News track
13 -- 15Diane Crawford. Forum
17 -- 20Meg McGinity. Power to the people
21 -- 25Seymour E. Goodman. The origins of digital computing in Europe
27 -- 31Phillip G. Armour. Closing the learning application gap
33 -- 35Yigal Arens, Paul S. Rosenbloom. Responding to the unexpected
36 -- 39Keith Devlin. Introduction
40 -- 44Kim B. Bruce, Robert L. Scot Drysdale, Charles Kelemen, Allen B. Tucker. Why math?
45 -- 50Peter B. Henderson. Mathematical reasoning in software engineering education
51 -- 55Vicki L. Almstrum. What is the attraction to computing?
56 -- 61Alfred W. Loo. The future of peer-to-peer computing
62 -- 67Michiel Ronsse, Koenraad De Bosschere, Mark Christiaens, Jacques Chassin de Kergommeaux, Dieter Kranzlmüller. Record/replay for nondeterministic program executions
69 -- 73Atreyi Kankanhalli, Fransiska Tanudidjaja, Juliana Sutanto, Bernard C. Y. Tan. The role of IT in successful knowledge management initiatives
74 -- 79Roberto Di Pietro, Luigi V. Mancini. Security and privacy issues of handheld and wearable wireless devices
83 -- 88Ali F. Farhoomand, Pauline S. P. Ng. Creating sustainable competitive advantage through internetworked communities
89 -- 95G. Premkumar. Alternate distribution strategies for digital music
96 -- 102Robert G. Fichman, Mary J. Cronin. Information-rich commerce at a crossroads: business and technology adoption requirements
103 -- 104Ziqi Liao, Michael Tow Cheung. Concurrent-convergent strategy in IT consulting
105 -- 107Stefan Baldi, Hauke Heier, Anett Mehler-Bicher. Open courseware and open source software
120 -- 0Peter G. Neumann. Risks in trusting untrustworthiness
121 -- 128Ari-Veikko Anttiroiko. Building strong e-democracy: the role of technology in developing democracy for the information age
129 -- 133Patrick Y. K. Chau, Simpson Poon. Octopus: an e-cash payment system success story
134 -- 140John Erickson, Keng Siau. ::::e::::-ducation
141 -- 146Kiran Jude Fernandes, Vinesh Raja, Julian Eyre. Cybersphere: the fully immersive spherical projection system
147 -- 151Lee A. Freeman. A refresher in data flow diagramming: an effective aid for analysts
152 -- 159Chittibabu Govindarajulu. End users: who are they?
160 -- 166Ernest Goss, Uma G. Gupta. Women and the Internet: is there an economic payoff?
167 -- 171Kathleen S. Hartzel. How self-efficacy and gender issues affect software adoption and use
172 -- 178Richard D. Holowczak, Nabil R. Adam, Francisco J. Artigas, Irfan Bora. Data warehousing in environmental digital libraries
179 -- 183Ned Kock, Camille Auspitz, Brad King. Web-supported course partnerships: bringing industry and academia together
184 -- 191Sarv Devaraj, Ming Fang, Rajiv Kohli. E-loyalty: elusive ideal or competitive edge?
192 -- 200James M. Laffey, Dale Musser, Herbert Remidez, Josh Gottdenker. Networked systems for schools that learn
201 -- 206William Lewis Jr., Richard T. Watson, Ann Pickren. An empirical assessment of IT disaster risk
207 -- 215Trevor T. Moores. The effect of national culture and economic wealth on global software piracy rates
216 -- 225Scott L. Schneberger, Ephraim R. McLean. The complexity cross: implications for practice
226 -- 232Jeff Hoi Yan Yeung, J. P. Shim, Andy Yin Kit Lai. Current progress of e-commerce adoption: small and medium enterprises in Hong Kong
233 -- 242Kunihiko Higa, Bongsik Shin. The telework experience in Japan
243 -- 247Nitin Singh. Emerging technologies to support supply chain management
248 -- 256Ritu Agarwal, Atish P. Sinha. Object-oriented modeling with UML: a study of developers perceptions
257 -- 263Jarke J. van Wijk, Frank van Ham, Huub van de Wetering. Rendering hierarchical data
264 -- 270Kevin Zhu, Bryan MacQuarrie. The economics of digital bundling: the impact of digitization and bundling on the music industry

Volume 46, Issue 8

9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Hal Berghel. The discipline of Internet forensics
21 -- 23Robert L. Glass. A mugwump s-eye view of Web work
25 -- 28William W. Agresti. Discovery informatics
29 -- 31David L. Dill, Bruce Schneier, Barbara Simons. Voting and technology: who gets to count your vote?
32 -- 34Bjorn De Sutter, Koenraad De Bosschere. Introduction
35 -- 40Frank Tip, Peter F. Sweeney, Chris Laffra. Extracting library-based Java applications
41 -- 46Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter. Post-pass compaction techniques
47 -- 52Arvind Krishnaswamy, Rajiv Gupta. Mixed-width instruction sets
54 -- 60Saumya K. Debray, William S. Evans. Cold code decompression at runtime
61 -- 66William S. Evans, Christopher W. Fraser. Grammar-based compression of interpreted code
67 -- 72Padmal Vitharana. Risks and challenges of component-based software development
74 -- 79Richard E. Potter. How CIOs manage their superiors expectations
80 -- 84Thomas W. Jackson, Ray Dawson, Darren Wilson. Understanding email interaction increases organizational productivity
85 -- 89Bruce Russell, Sangit Chatterjee. Relationship quality: the undervalued dimension of software quality
91 -- 95Michael E. Whitman. Enemy at the gate: threats to information security
96 -- 101Gert-Jan de Vreede, Robert M. Davison, Robert O. Briggs. How a silver bullet may lose its shine
103 -- 107Kenneth R. Walsh. Analyzing the application ASP concept: technologies, economies, and strategies
109 -- 114Thiagarajan Ravichandran, Marcus A. Rothenberger. Software reuse strategies and component markets
115 -- 119Zhiying Zhou. CMM in uncertain environments
120 -- 124Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis. Third generation and beyond wireless systems
136 -- 0Lauren Weinstein. Spam wars

Volume 46, Issue 7

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 17Michael A. Cusumano. Beware the lure of the horizontal
19 -- 23Peter J. Denning. Accomplishment
25 -- 27Rita R. Colwell. From terabytes to insights
28 -- 31Andrew Rosenbloom. Introduction
32 -- 39William R. Swartout, Michael van Lent. Making a game of system design
40 -- 47Mary C. Whitton. Making virtual environments compelling
48 -- 55Ramesh Jain. Experiential computing
56 -- 61Michael Tsang, George W. Fitzmaurice, Gordon Kurtenbach, Azam Khan. Game-like navigation and responsiveness in non-game applications
62 -- 69Joseph A. Paradiso. Tracking contact and free gesture across large interactive surfaces
70 -- 75Carlo Tomasi, Abbas Rafii, Ilhami Torunoglu. Full-size projection keyboard for handheld devices
76 -- 85Cynthia Breazeal, Andrew G. Brooks, Jesse Gray, Matthew D. Hancher, John McBean, Walter Dan Stiehl, Joshua Strickon. Interactive robot theatre
86 -- 93Paul Vickers, James L. Alty. Siren songs and swan songs debugging with music
94 -- 99Daniel May, Paul Taylor. Knowledge management with patterns
101 -- 106Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford. PFIRES: a policy framework for information security
107 -- 111Sudip Bhattacharjee, Ram D. Gopal, G. Lawrence Sanders. Digital music and online sharing: software piracy 2.0?
112 -- 118Alan H. Karp. E-speak e-xplained
119 -- 125Varun Grover, Khawaja Asjad Saeed. The telecommunication industry revisited: the changing pattern of partnerships
127 -- 132Timon C. Du, Eldon Y. Li, An-Pin Chang. Mobile agents in distributed network management
133 -- 136D. Scott Brandt, Lorna Uden. Insight into mental models of novice Internet searchers
137 -- 142Younghwa Lee, Zoonky Lee, Kai R. T. Larsen. Coping with Internet channel conflict
143 -- 144Zakaria Maamar, Paul Labbé. Moving vs. inviting software agents
152 -- 0Albert Levi. How secure is secure Web browsing?

Volume 46, Issue 6

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 18Rebecca Mercuri. Analyzing security costs
19 -- 23Pamela Samuelson. Trade secrets vs. free speech
24 -- 25Tom DeMarco. The McCarthy protocols
26 -- 28Thomas F. Stafford. Introduction
29 -- 34Heather Kreger. Fulfilling the Web services promise
31 -- 0Christopher Ferris, Joel A. Farrell. What are Web services?
36 -- 42Roland T. Rust, P. K. Kannan. E-service: a new paradigm for business in the electronic environment
43 -- 44Ruth N. Bolton. Marketing challenges of e-services
45 -- 46Hongjun Song. E-services at FedEx
47 -- 51M. Kathryn Brohman, Richard T. Watson, Gabriele Piccoli, A. Parasuraman. Data completeness: a key to effective net-based customer service systems
56 -- 57Neal G. Shaw, Christopher W. Craighead. Technology enablers to recover from failures in e-services
58 -- 63Joseph Williams. The Web services debate: J2EE vs. .NET
64 -- 67Gerry Miller. The Web services debate: .NET vs. J2EE
69 -- 73Walid Ben-Ameur, Hervé Kerivin. Networks new economical virtual private
75 -- 78Huaiqing Wang, Chen Wang. Taxonomy of security considerations and software quality
79 -- 84E. Vance Wilson. Asynchronous health care communication
85 -- 88Kevin C. Desouza. Facilitating tacit knowledge exchange
89 -- 91Fay Cobb Payton. Rethinking the digital divide
93 -- 97Peter E. Hart, Ziming Liu. Trust in the preservation of digital information
98 -- 100James Backhouse, Carol Hsu, Aidan McDonnell. Toward public-key infrastructure interoperability
112 -- 0Diomidis Spinellis. Reflections on trusting trust revisited

Volume 46, Issue 5

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
15 -- 19Phillip G. Armour. In the zone: the need for flexible roles
21 -- 23Robert L. Glass. One giant step backward
25 -- 27Dennis Tsichritzis. Life beyond the bubbles
28 -- 30Aviel D. Rubin. Introduction
31 -- 34Russell Housley, William A. Arbaugh. Security problems in 802.11-based networks
35 -- 39Nancy Cam-Winget, Russell Housley, David Wagner, Jesse Walker. Security flaws in 802.11 data link protocols
41 -- 46Simon Byers, David P. Kormann. 802.11b access point mapping
47 -- 52Terry Schmidt, Anthony M. Townsend. Why Wi-Fi wants to be free
53 -- 58Amir Herzberg. Payments and banking with mobile personal devices
59 -- 64Jae Kyu Lee, Mye M. Sohn. The eXtensible Rule Markup Language
65 -- 69Julie Smith David, William E. McCarthy, Brian S. Sommer. Agility: the key to survival of the fittest in the software market
70 -- 75Leah Graham, Panagiotis Takis Metaxas. Of course it s true; I saw it on the Internet! : ::::critical thinking in the Internet era::::
76 -- 80Amrit Tiwana. Affinity to infinity in peer-to-peer knowledge platforms
81 -- 83Ziqi Liao. Real-time taxi dispatching using Global Positioning Systems
84 -- 89Jae-Nam Lee, Minh Q. Huynh, Ron Chi-Wai Kwok, Shih-Ming Pi. IT outsourcing evolution: past, present, and future
90 -- 93George Marsaglia. Seeds for random number generators
104 -- 0Peter G. Neumann. E-epistemology and misinformation

Volume 46, Issue 4

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 14Diane Crawford. Forum
15 -- 20Hal Berghel, Kim Womack. Anonymizing the net
21 -- 22Jeff Grove. Legal and technological efforts to lock up content threaten innovation
23 -- 26Meg McGinity. Getting real
27 -- 29Ramesh Jain. Folk computing
30 -- 33Deirdre K. Mulligan. Introduction
34 -- 39John S. Erickson. Fair use, DRM, and trusted computing
41 -- 45Pamela Samuelson. DRM {and, or, vs.} the law
46 -- 49Julie E. Cohen. DRM and privacy
51 -- 55Séverine Dusollier. Fair use by design in the European copyright directive of 2001
56 -- 59Edward W. Felten. A skeptical view of DRM and fair use
61 -- 63Barbara Fox, Brian A. LaMacchia. Encouraging recognition of fair uses in DRM systems
64 -- 70Brian Fitzgerald, Nancy L. Russo, Tom O Kane. Software development method tailoring at Motorola
71 -- 75François Pachet. Content management for electronic music distribution
76 -- 80Susan A. Brown, Viswanath Venkatesh. Bringing non-adopters along: the challenge facing the PC industry
81 -- 83Julia Brande Earp, David L. Baumer. Innovative web use to learn about consumer behavior and online privacy
84 -- 89Ali F. Farhoomand, Pauline S. P. Ng, William Conley. Building a successful e-business: the FedEx story
91 -- 94Keng Siau, Zixing Shen. Building customer trust in mobile commerce
95 -- 99Shan Ling Pan, Jae-Nam Lee. Using e-CRM for a unified view of the customer
100 -- 102Peter Wegner, Dina Q. Goldin. Computation beyond turing machines
120 -- 0Andrew K. Wright. On Sapphire and type-safe languages

Volume 46, Issue 3

5 -- 8Diane Crawford. Editorial printers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
15 -- 17Michael A. Cusumano. Finding your balance in the products and services debate
19 -- 23Peter J. Denning, Robert Dunham. The missing customer
27 -- 29Bob Besaha. Bounty hunting in the patent base
30 -- 33Roel Vertegaal. Introduction
34 -- 39Shumin Zhai. What s in the eyes for attentive input
40 -- 46Jeffrey S. Shell, Ted Selker, Roel Vertegaal. Interacting with groups of computers
47 -- 51Paul P. Maglio, Christopher S. Campbell. Attentive agents
52 -- 59Eric Horvitz, Carl Myers Kadie, Tim Paek, David Hovel. Models of attention in computing and communication: from principles to applications
60 -- 66Patrick Baudisch, Douglas DeCarlo, Andrew T. Duchowski, Wilson S. Geisler. Focusing on the essential: considering attention in display design
67 -- 72D. Scott McCrickard, Christa M. Chewar. Attuning notification design to user goals and attention costs
74 -- 80José del R. Millán. Adaptive brain interfaces
81 -- 85Lawrence A. Gordon, Martin P. Loeb, Tashfeen Sohail. A framework for using insurance for cyber-risk management
86 -- 90Gustavo da Rocha Barreto Pinto, Sergio P. J. Medeiros, Jano Moreira de Souza, Julia Celia M. Strauch, Carlete Rosana Ferreira Marques. Spatial data integration in a collaborative design framework
91 -- 94Mark C. Anderson, Rajiv D. Banker, Sury Ravindran. The new productivity paradox
95 -- 98Roger Evernden, Elaine Evernden. Third-generation information architecture
99 -- 104David Chadwick. Deficiencies in LDAP when used to support PKI
105 -- 108Gary F. Templeton. Object-oriented programming of integrated circuits
120 -- 0Barbara Simons, Eugene H. Spafford. Risks of total surveillance

Volume 46, Issue 2

5 -- 0Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News track
11 -- 13Diane Crawford. Forum
15 -- 16Brock N. Meeks. Conspicuous in their silence
19 -- 22Phillip G. Armour. The reorg cycle
23 -- 25Jessica Brazelton, G. Anthony Gorry. Creating a knowledge-sharing community: if you build it, will they come?
26 -- 0Diane Crawford. ACM fellows
27 -- 29Detlef Schoder, Kai Fischbach. Peer-to-peer prospects
30 -- 32Richard A. Lethin. Introduction
33 -- 38John Kubiatowicz. Extracting guarantees from chaos
39 -- 42Philip E. Agre. P2P and the promise of internet equality
43 -- 48Hari Balakrishnan, M. Frans Kaashoek, David R. Karger, Robert Morris, Ion Stoica. Looking up data in P2P systems
49 -- 53Jintae Lee. An end-user perspective on file-sharing systems
54 -- 60Jinyoul Lee, Keng Siau, Soongoo Hong. Enterprise integration with ERP and EAI
61 -- 65Bay Arinze, Murugan Anandarajan. A framework for using OO mapping methods to rapidly configure ERP systems
66 -- 71Amitava Dutta, Rahul Roy. Anticipating internet diffusion
72 -- 76James J. Jiang, Gary Klein, Debbie B. Tesch, Houn-Gee Chen. Closing the user and provider service quality gap
77 -- 82Ravindra Krovi, Akhilesh Chandra, Balaji Rajagopalan. Information flow parameters for managing organizational processes
83 -- 87Xinping Shi, Philip C. Wright. E-commercializing business operations
89 -- 92Nayeem Islam, Mohamed E. Fayad. Toward ubiquitous acceptance of ubiquitous computing
120 -- 0Peter G. Neumann. Gambling on system accountability

Volume 46, Issue 12

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 19Hal Berghel. Malware month
21 -- 25Rebecca Mercuri. Standards insecurity
27 -- 29Alan H. Karp. Enforce POLA on processes to control viruses
30 -- 32Andrew Urbaczewski, Joseph S. Valacich, Leonard M. Jessup. Introduction
33 -- 34Thomas F. Stafford, Mark L. Gillenson. Mobile commerce: what it is and what it could be
35 -- 40Suprateek Sarker, John D. Wells. Understanding mobile handheld device use and adoption
41 -- 44Sirkka L. Jarvenpaa, Karl Reiner Lang, Yoko Takeda, Virpi Kristiina Tuunainen. Mobile commerce at crossroads
45 -- 47Jun Sun. Information requirement elicitation in mobile commerce
48 -- 52Young Eun Lee, Izak Benbasat. Interface design for mobile commerce
53 -- 56Viswanath Venkatesh, V. Ramesh, Anne P. Massey. Understanding usability in mobile commerce
57 -- 60Peter Tarasewich. Designing mobile commerce applications
61 -- 65Bharat Rao, Louis Minakakis. Evolution of mobile location-based services
66 -- 72William E. Spangler, Mordechai Gal-Or, Jerrold H. May. Using data mining to profile TV viewers
73 -- 78Jim Q. Chen, Ted E. Lee, Ruidong Zhang, Yue Jeff Zhang. Systems requirements for organizational learning
80 -- 85Xu Yan. Mobile data communications in China
86 -- 92Rajiv Kishore, H. Raghav Rao, Kichan Nam, S. Rajagopalan, Abhijit Chaudhury. A relationship perspective on IT outsourcing
93 -- 98Tim Chenoweth, David Schuff, Robert D. St. Louis. A method for developing dimensional data marts
99 -- 102Coskun Bayrak, Chad Davis. The relationship between distributed systems and open software development
144 -- 0Lauren Weinstein. The devil you know
145 -- 151Manju Ahuja, Babita Gupta, Pushkala Raman. An empirical investigation of online consumer purchasing behavior
152 -- 158Ravi Bapna. When snipers become predators: can mechanism design save online auctions?
159 -- 166Amit Basu, Steve Muylle. Authentication in e-commerce
167 -- 177Sidney A. Davis, Keng Siau, Kumar Dhenuvakonda. A fit-gap analysis of e-business curricula vs. industry needs
178 -- 185Pattarawan Prasarnphanich, Mark L. Gillenson. The hybrid clicks and bricks business model
186 -- 195Sanjay Gosain, Arvind Malhotra, Omar El Sawy, Fadi Chehade. The impact of common e-business interfaces
196 -- 205Stefano Grazioli, Sirkka L. Jarvenpaa. Deceived: under target online
206 -- 212Khawaja Asjad Saeed, Varun Grover, Yujong Hwang. Creating synergy with a clicks and mortar approach
213 -- 216Andrew Holmes, John Ryan. Viewpoint: the end of the long boom
217 -- 225Philip M. Johnson, Mette L. Moffett, Brian T. Pentland. Lessons learned from VCommerce
226 -- 232Pairin Katerattanakul, Keng Siau. Creating a virtual store image
233 -- 239Mohamed Khalifa, Moez Limayem. Drivers of Internet shopping
240 -- 247Minhee Chae, Jinwoo Kim. What s so different about the mobile Internet?
248 -- 250Ziqi Liao, Michael Tow Cheung. Challenges to Internet e-banking
251 -- 257Zakaria Maamar. Commerce, e-commerce, and m-commerce: what comes next?
258 -- 264David M. Martin Jr., Hailin Wu, Adil Alsaid. Hidden surveillance by Web sites: Web bugs in contemporary use
265 -- 271Trevor T. Moores, Gurpreet Dhillon. Do privacy seals in e-commerce really work?
272 -- 278Kyle B. Murray, Gerald Häubl. A human capital perspective of skill acquisition and interface loyalty
279 -- 288G. Premkumar. Perspectives of the e-marketplace by multiple stakeholders
289 -- 299Robert W. Proctor, Kim-Phuong L. Vu, Lawrence J. Najjar, Misha W. Vaughan, Gavriel Salvendy. Content preparation and management for e-commerce Web sites
300 -- 307Mani R. Subramani, Balaji Rajagopalan. Knowledge-sharing and influence in online social networks via viral marketing
308 -- 316C. Ranganathan, Vern Goode, Arkalgud Ramaprasad. Managing the transition to bricks and clicks
317 -- 324Dan Jong Kim, Manish Agrawal, Bharat Jayaraman, H. Raghav Rao. A comparison of B2B e-service solutions
325 -- 331Al Farooq Salam, H. Raghav Rao, C. C. Pegels. Consumer-perceived risk in e-commerce transactions
332 -- 336Xiaowen Fang, Gavriel Salvendy. Customer-centered rules for design of e-commerce Web sites
337 -- 344Fang-Fang Tang, Marcel G. Thom, Liang Toon Wang, Joai Ching Tan, Wai Yee Chow, Xiaoyun Tang. Using insurance to create trust on the Internet
345 -- 350Amrit Tiwana, Ephraim R. McLean. The tightrope to e-business project success
351 -- 353Anthony M. Townsend, James T. Bennett. Viewpoint: living and bidding in an auction economy
354 -- 361Ganesh Vaidyanathan, Sarv Devaraj. A five-factor framework for analyzing online risks in e-businesses

Volume 46, Issue 11

5 -- 0Diane Crawford. Editoral pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Peter J. Denning. Great principles of computing
21 -- 23Robert L. Glass. A sociopolitical look at open source
25 -- 28Geoffrey Sampson. The myth of diminishing firms
30 -- 33Maxine D. Brown. Introduction
34 -- 41Thomas A. DeFanti, Cees de Laat, Joe Mambretti, Kees Neggers, Bill St. Arnaud. TransLight: a global-scale LambdaGrid for e-science
42 -- 49Aaron Falk, Theodore Faber, Joseph A. Bannister, Andrew A. Chien, Robert L. Grossman, Jason Leigh. Transport protocols for high performance
50 -- 57Ian T. Foster, Robert L. Grossman. Data integration in a bandwidth-rich world
58 -- 67Larry Smarr, Andrew A. Chien, Thomas A. DeFanti, Jason Leigh, Philip M. Papadopoulos. The OptIPuter
68 -- 77Harvey Newman, Mark H. Ellisman, John A. Orcutt. Data-intensive e-science frontier research
78 -- 84Stuart J. Barnes, Sid L. Huff. Rising sun: iMode and the wireless Internet
85 -- 88Daniel P. Lorence. The perils of data misreporting
90 -- 96Robert F. Easley, John G. Michel, Sarv Devaraj. The MP3 open standard and the music industry s response to Internet piracy
97 -- 102Padmal Vitharana, Fatemeh Zahedi, Hemant K. Jain. Design, retrieval, and assembly in component-based software development
104 -- 109A. Graham Peace. Balancing free speech and censorship: academia s response to the Internet
111 -- 115Narasimhaiah Gorla. Features to consider in a data warehousing system
117 -- 120Jeffrey P. Landry, J. Harold Pardue, Herbert E. Longenecker Jr., David L. Feinstein. A common theme for IT degree programs
121 -- 125Donald Anselmo, Henry F. Ledgard. Measuring productivity in the software industry
127 -- 132David Nordfors, Michel Bajuk, Lena Norberg, Jochen Brinkmann, Dan Forbush. Introducing a country to Internet-enabled expert networks
160 -- 0Rebecca Mercuri, Peter G. Neumann. Security by obscurity

Volume 46, Issue 10

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 20Pamela Samuelson. Unsolicited communications as trespass?
21 -- 23Michael A. Cusumano. Company character and the software business
24 -- 28Mike P. Papazoglou, Dimitrios Georgakopoulos. Introduction
29 -- 34Francisco Curbera, Rania Khalaf, Nirmal Mukhi, Stefan Tai, Sanjiva Weerawarana. The next step in Web services
35 -- 40Jian Yang. Web service componentization
41 -- 47Greg Meredith, Steve Bjorg. Contracts and types
49 -- 54Mark C. Little. Transactions and Web services
55 -- 60Fabio Casati, Eric Shan, Umeshwar Dayal, Ming-Chien Shan. Business-oriented management of Web services
62 -- 65Dov Dori. Introduction
67 -- 72Nathan R. Soderborg, Edward F. Crawley, Dov Dori. System function and architecture: OPM-based definitions and operational templates
73 -- 78Brian Henderson-Sellers. Method engineering for OO systems development
79 -- 84Andrew Gemino, Yair Wand. Evaluating modeling techniques based on models of learning
85 -- 89Graeme G. Shanks, Elizabeth Tansley, Ron Weber. Using ontology to validate conceptual models
90 -- 97Hans P. Moravec. Robots, after all
98 -- 101Sai Ho Kwok. Watermark-based copyright protection system security
103 -- 109Willem-Jan van den Heuvel, Zakaria Maamar. Intelligent Web services moving toward a framework to compose
111 -- 114Pairin Katerattanakul, Bernard T. Han, Soongoo Hong. Objective quality ranking of computing journals
115 -- 117Cong-Cong Xing, Boumediene Belkhouche. On pseudo object-oriented programming considered harmful
136 -- 0Peter G. Neumann. Information system security redux

Volume 46, Issue 1

5 -- 8Diane Crawford. Editorial pointers
9 -- 10Robert Fox. News tracks
11 -- 12Diane Crawford. Forum
13 -- 15Meg McGinity. Hibernating during telecom winter
17 -- 20Rebecca Mercuri. On auditing trails
21 -- 22Alan H. Karp. Making money selling content that others are giving away
24 -- 27Gary Marchionini, Hanan Samet, Larry Brandt. Introduction
28 -- 34Hsinchun Chen, Daniel Dajun Zeng, Homa Atabakhsh, Wojciech Wyzga, Jennifer Schroeder. COPLINK: manging law enforcement data and knowledge
35 -- 37Steve Goddard, Sherri K. Harms, Stephen E. Reichenbach, Tsegaye Tadesse, William J. Waltman. Geospatial decision support for drought risk management
38 -- 39Lois M. L. Delcambre, Timothy Tolle. Harvesting information to sustain forests
40 -- 42Sharon S. Dawes, Lise Préfontaine. Understanding new models of collaboration for delivering governments services
43 -- 44Jane E. Fountain. Prospects for improving the regulatory process using e-rulemaking
45 -- 46Sarah Nusser, Leslie L. Miller, Keith C. Clarke, Michael F. Goodchild. Geospatial IT for mobile field data collection
47 -- 49Eduard H. Hovy. Using an ontology to simplify data access
50 -- 51Leana Golubchik, William C. Cheng, Cheng-Fu Chou, Samir Khuller, Hanan Samet, C. Justin Wan. Bistro: a scalable and secure data transfer service for digital government applications
52 -- 54Carol A. Hert, Elizabeth D. Liddy, Ben Shneiderman, Gary Marchionini. Supporting statistical electronic table usage by citizens
55 -- 0Cathryn S. Dippo. FedStats: the gateway to federal statistics
57 -- 58Alan F. Karr, Adrian Dobra, Ashish P. Sanil. Table servers protect confidentiality in tabular data releases
59 -- 60Alan M. MacEachren, Frank Hardisty, Xiping Dai, Linda Pickle. Supporting visual analysis of federal geospatial statistics
61 -- 64Hanan Samet, Houman Alborzi, Frantisek Brabec, Claudio Esperança, Gísli R. Hjaltason, Frank Morgan, Egemen Tanin. Use of the SAND spatial browser for digital government applications
65 -- 66Peggy Agouris, Anthony Stefanidis. Efficient summarization of spatiotemporal events
67 -- 68William L. Scherlis, Jon Eisenberg. IT research, innovation, and e-government
71 -- 77Diomidis Spinellis. The decay and failures of web references
78 -- 82David E. Avison, Guy Fitzgerald. Where now for development methodologies?
83 -- 88Ken Peffers, Charles E. Gengler. How to identify new high-payoff information systems for the organization
89 -- 93Mario Cannataro, Domenico Talia. The knowledge grid
95 -- 98Pak Chung Wong, Kwong-kwok Wong, Harlan Foote. Organic data memory using the DNA approach
99 -- 101Kevin C. Desouza. Barriers to effective use of knowledge management systems in software engineering
136 -- 0Michael Lesk. The mindset of dependability