Journal: Communications of the ACM

Volume 47, Issue 9

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 18Meg McGinity. Weaving a wireless safety net
21 -- 26Hal Berghel. Wireless infidelity I: war driving
27 -- 29James A. Jacobs, Charles Humphrey. Preserving research data
31 -- 32Alistair G. Sutcliffe, Nikolay Mehandjiev. Introduction
33 -- 37Gerhard Fischer, Elisa Giaccardi, Yunwen Ye, Alistair G. Sutcliffe, Nikolay Mehandjiev. Meta-design: a manifesto for end-user development
39 -- 40Joerg Beringer. Reducing expertise tension
41 -- 42Volker Wulf, Matthias Jarke. The economics of end-user development
43 -- 46Alexander Repenning, Andri Ioannidou. Agent-based end-user development
47 -- 52Brad A. Myers, John F. Pane, Andy Ko. Natural programming languages and environments
53 -- 58Margaret M. Burnett, Curtis R. Cook, Gregg Rothermel. End-user software engineering
59 -- 62Anders I. Mørch, Gunnar Stevens, Markus Won, Markus Klann, Yvonne Dittrich, Volker Wulf. Component-based technologies for end-user development
63 -- 64Silvia Berti, Fabio Paternò, Carmen Santoro. Natural development of ubiquitous interfaces
65 -- 66Alan F. Blackwell. End-user developers at home
67 -- 71Paul Resnick, Derek L. Hansen, Caroline R. Richardson. Calculating error rates for filtering software
72 -- 77Ozgur Turetken, David Schuff, Ramesh Sharda, Terence T. Ow. Supporting systems analysis and design through fisheye views
78 -- 83Hai Zhuge, Xiaoqing Shi. Toward the eco-grid: a harmoniously evolved interconnection environment
85 -- 89Michael J. Hine, Mark Hill, David Ruth, Bob Carlson, Dave Banks, Jim Troxell. Empowering persons with disabilities with decision-support technology
91 -- 94Susan K. Lippert, Murugan Anandarajan. Academic vs. practitioner systems planning and analysis
95 -- 98Jason E. Bailes, Gary F. Templeton. Managing P2P security
112 -- 0Peter G. Neumann. The big picture

Volume 47, Issue 8

5 -- 0Diane Crawford. Editorial pointers
5 -- 8Diane Crawford. Editorial prints
11 -- 13Diane Crawford. Forum
15 -- 17Robert L. Glass. The mystery of formal methods disuse
19 -- 21Peter Freeman, David Hart. A science of design for software-intensive systems
23 -- 26Martin E. Bush. Computer science education in Japan
28 -- 31Andrew Rosenbloom. Introduction
32 -- 38Chris Scharver, Ray Evenhouse, Andrew E. Johnson, Jason Leigh. Designing cranial implants in a haptic augmented reality environment
40 -- 47Ming C. Lin, William V. Baxter III, Vincent Scheib, Jeremy D. Wendt. Physically based virtual painting
48 -- 53Benjamin Lok. Toward the merging of real and virtual spaces
54 -- 59Mike Houston, Christopher Niederauer, Maneesh Agrawala, Greg Humphreys. Visualizing dynamic architectural environments
60 -- 66Charles E. Jacobs, Wilmot Li, Evan Schrier, David Bargeron, David Salesin. Adaptive document layout
68 -- 74Mike Burmester, Yvo Desmedt. Is hierarchical public-key certification the next target for hackers?
75 -- 79Rolf Oppliger. Certified mail: the next challenge for secure messaging
81 -- 87John Gallaugher, Nigel Melville. Electronic frontiers in foreign exchange trading
93 -- 96Ralph D. Westfall. Does telecommuting really increase productivity?
97 -- 101David J. Paper, James A. Rodger, Steven J. Simon. Voice says it all in the Navy
103 -- 108Ahmed Elfatatry, Paul J. Layzell. Negotiating in service-oriented environments
120 -- 0Lauren Weinstein. Close exposures of the digital kind

Volume 47, Issue 7

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 20Peter J. Denning. The field of programmers myth
21 -- 24Victor Wacham A. Mbarika. Is telemedicine the panacea for Sub-Saharan Africa s medical nightmare?
25 -- 28Rebecca Mercuri. The HIPAA-potamus in health care data security
29 -- 31Michael A. Cusumano. More lawyers than programmers?
37 -- 42Donna L. Hoffman, Thomas P. Novak, Alladi Venkatesh. Has the Internet become indispensable?
43 -- 47Linda A. Jackson, Alexander von Eye, Gretchen Barbatsis, Frank Biocca, Hiram E. Fitzgerald, Yong Zhao. The impact of Internet use on the other side of the digital divide
49 -- 52Warren Harrison, George Heuston, Sarah Mocas, Mark Morrissey, John Richardson. High-tech forensics
53 -- 56George P. Schell. Universities marginalize online courses
59 -- 63Kaushal Chari, Saravanan Seshadri. Demystifying integration
65 -- 68Maris G. Martinsons. ERP in China: one package, two profiles
69 -- 72Huigang Liang, Yajiong Xue, William R. Boulton, Terry Anthony Byrd. Why Western vendors don t dominate China s ERP market
73 -- 76Troy J. Strader, Sridhar N. Ramaswami. Investor perceptions of traditional and online channels
77 -- 80Graeme G. Shanks, Elizabeth Tansley, Ron Weber. Representing composites in conceptual modeling
81 -- 86Narasimha Bolloju. Improving the quality of business object models using collaboration patterns
87 -- 92Huseyin Cavusoglu, Birendra Mishra, Srinivasan Raghunathan. A model for evaluating IT security investments
104 -- 0Paul C. Kocher, Bruce Schneier. Insider risks in elections

Volume 47, Issue 6

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Phillip G. Armour. Real work, necessary friction, optional chaos
19 -- 23Pamela Samuelson. Why reform the U.S. patent system?
25 -- 26Stephen Lau. The Spinning Cube of Potential Doom
27 -- 29Allan Glaser, Snow Fu, Mark Tumelty. Growing a participatory programming environment
30 -- 33David E. Culler, Wei Hong. Wireless Sensor Networks - Introduction
34 -- 40Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan M. Mainwaring, Deborah Estrin. Habitat monitoring with sensor networks
41 -- 46Jason L. Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy. The platforms enabling wireless sensor networks
47 -- 52Alec Woo, Samuel Madden, Ramesh Govindan. Networking support for query processing in sensor networks
53 -- 57Adrian Perrig, John A. Stankovic, David Wagner. Security in wireless sensor networks
59 -- 63Janice C. Sipior, Burke T. Ward, P. Gregory Bonner. Should spam be on the menu?
64 -- 70Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria. How to retain online customers
71 -- 77Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich. Emerging business models for mobile brokerage services
79 -- 82Narasimhaiah Gorla, Yan Wah Lam. Who should work with whom?: building effective software project teams
83 -- 88Hal Berghel, David L. Sallach. A paradigm shift in computing and IT education
89 -- 94Robert L. Glass, Venkataraman Ramesh, Iris Vessey. An analysis of research in computing disciplines
95 -- 99Weiling Ke, Kwok Kee Wei. Successful e-government in Singapore
101 -- 104Hartmut Wedekind, Erich Ortner. Toward universal literacy: from computer science upward
112 -- 0Peter G. Neumann. Optimistic optimization

Volume 47, Issue 5

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Meg McGinity. It s alive
19 -- 21Robert L. Glass. Matching methodology to problem domain
23 -- 25Jeff Grove. Wanted: public policies that foster creation of knowledge
26 -- 30Kuldeep Kumar, Jos van Hillegersberg. Introduction
34 -- 36Ulrich Homann, Michael Rill, Andreas Wimmer. Flexible value structures in banking
37 -- 40Alberto Pan, Ángel Viña. An alternative architecture for financial data integration
42 -- 46Niina Mallat, Matti Rossi, Virpi Kristiina Tuunainen. Mobile banking services
47 -- 49N. Chandrasekaran, Geert Ensing. ODC: a global IT services delivery model
50 -- 52Jeroen Tas, Shyam Sunder. Financial services business process outsourcing
53 -- 55John S. Zdanowicz. Detecting money laundering and terrorist financing via data mining
56 -- 60Ton Slewe, Mark Hoogenboom. Who will rob you on the digital highway?
62 -- 67Sarv Devaraj, S. Ramesh Babu. How to measure the relationship between training and job performance
68 -- 74Weidong Xia, Gwanhoo Lee. Grasping the complexity of IS development projects
75 -- 79Dongsong Zhang, J. Leon Zhao, Lina Zhou, Jay F. Nunamaker Jr.. Can e-learning replace classroom learning?
80 -- 89Gerald Segal. 2004 ACM elections
89 -- 93I. Robert Chiang, Vijay S. Mookerjee. Improving software team productivity
95 -- 98. Tracing the roots of markup languages
99 -- 100Masanori Arita. Comma-free design for DNA words
112 -- 0Peter J. Denning, Dorothy E. Denning. Artificial stupidity

Volume 47, Issue 4

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
14 -- 0John White. ACM s Professional Development Centre expands learning opportunities
15 -- 19Peter J. Denning. The social life of innovation
21 -- 27Hal Berghel, Natasa Brajkovska. Wading into alternate data streams
28 -- 29Eric M. Uslaner. Trust online, trust offline
30 -- 34Christopher A. Miller. Introduction
35 -- 37Clifford Nass. Etiquette equality: exhibitions and expectations of computer politeness
38 -- 44Timothy W. Bickmore. Unspoken rules of spoken interaction
45 -- 49Punya Mishra, Kathryn A. Hershey. Etiquette and the design of educational technology
51 -- 55Raja Parasuraman, Christopher A. Miller. Trust and etiquette in high-criticality automated systems
56 -- 61Jennifer Preece. Etiquette online: from nice to necessary
62 -- 66Srinivas Krishna, Sundeep Sahay, Geoff Walsham. Managing cross-cultural issues in global software outsourcing
68 -- 73Linda Wallace, Mark Keil. Software project risks and their effect on outcomes
75 -- 78Blake Ives, Kenneth R. Walsh, Helmut Schneider. The domino effect of password reuse
79 -- 82Anat Hovav, Paul Gray. Managing academic e-journals
83 -- 86Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis. The economics of wireless networks
87 -- 91Kevin C. Desouza, J. Roberto Evaristo. Managing knowledge in distributed projects
93 -- 97Xiaotong Li. Informational cascades in IT adoption
98 -- 100John Gerdes Jr.. The viability of supporting anonymous employees
112 -- 0James J. Horning. Coincidental risks

Volume 47, Issue 3

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Rebecca Mercuri. Superscaled security
21 -- 24Phillip G. Armour. Beware of counting LOC
25 -- 27Michael A. Cusumano. Who is liable for bugs and security flaws in software?
29 -- 31John G. Messerly. How computer games affect CS (and other) students' school performance
32 -- 35John Yen. Introduction to the special issue on emerging technologies for homeland security
36 -- 43Robert Popp, Thomas Armour, Ted Senator, Kristen Numrych. Countering terrorism through information technology
45 -- 47Thayne Coffman, Seth Greenblatt, Sherry Marcus. Graph-based technologies for intelligence analysis
48 -- 50Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar. Proactive information gathering for homeland security teams
52 -- 57O. Sami Saydjari. Cyber defense: art to science
58 -- 61Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu. Cyber defense technology networking and evaluation
62 -- 65Steve Sawyer, Andrea Tapia, Leonard Pesheck, John Davenport. Mobility and the first responder
66 -- 68Robin R. Murphy. Rescue robotics for homeland security
70 -- 76Gang Wang, Hsinchun Chen, Homa Atabakhsh. Automatically detecting deceptive criminal identities
77 -- 82Alberto Escudero-Pascual, Ian Hosein. Questioning lawful access to traffic data
83 -- 87Nikunj P. Dalal, Manjunath Kamath, William J. Kolarik, Eswar Sivaraman. Toward an integrated framework for modeling enterprise processes
89 -- 94Luigi Suardi. How to manage your software product life cycle with MAUI
95 -- 98Eyong B. Kim, Marc J. Schniederjans. The role of personality in Web-based distance education courses
99 -- 102Vikram Sethi, Ruth C. King, James Campbell Quick. What causes stress in information system professionals?
120 -- 0Mark Stamp. Risks of monoculture

Volume 47, Issue 2

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Pamela Samuelson. What s at stake in ::::MGM v. Grokster::::?
21 -- 23Gregory J. Pottie. Privacy in the global e-village
25 -- 27Robert L. Glass. A look at the economics of open source
28 -- 31Jakka Sairamesh, Alison Lee, Loretta Anania. Introduction
33 -- 37Lee S. Sproull, John F. Patterson. Making information cities livable
38 -- 44Elizabeth F. Churchill, Andreas Girgensohn, Les Nelson, Alison Lee. Blending digital and physical spaces for ubiquitous community participation
45 -- 49Donald F. Ferguson, Jakka Sairamesh, Stuart I. Feldman. Open frameworks for information cities
50 -- 55Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi. What makes a Web site popular?
56 -- 60Luis von Ahn, Manuel Blum, John Langford. Telling humans and computers apart automatically
61 -- 65Yossi Lichtenstein. Puzzles in software development contracting
66 -- 68Conan C. Albrecht. How clean is the future of SOAP?
69 -- 75Rajiv Kishore, Hong Zhang, Ram Ramesh. A Helix-Spindle model for ontological engineering
77 -- 81Pearl Brereton. The software customer/supplier relationship
82 -- 86Elizabeth M. Pierce. Assessing data quality with control matrices
87 -- 92Patrick Y. K. Chau, Paul Jen-Hwa Hu. Technology implementation for telemedicine programs
93 -- 97Csaba J. Egyhazy, Raj Mukherji. Interoperability architecture using RM-ODP
98 -- 101Ruth Bolotin Schwartz, Michele C. Russo. How to quickly find articles in the top IS journals
120 -- 0Lauren Weinstein. Outsourced and out of control

Volume 47, Issue 12

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 20Hal Berghel, Jacob Uecker. Wireless infidelity II: airjacking
21 -- 22Diane Crawford. Top 10 Downloads from ACM s Digital Library
23 -- 24David A. Patterson. The health of research conferences and the dearth of big idea papers
25 -- 29Rebecca T. Mercuri. The many colors of multimedia security
30 -- 33Andrew Rosenbloom. Introduction
35 -- 39Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins. Structure and evolution of blogspace
41 -- 46Bonnie A. Nardi, Diane J. Schiano, Michelle Gumbrecht, Luke Swartz. Why we blog
47 -- 52Steve Cayzer. Semantic blogging and decentralized knowledge management
53 -- 55Rebecca Blood. How blogging software reshapes the online community
57 -- 59Cass R. Sunstein. Democracy and filtering
60 -- 62Kenneth P. Birman. Like it or not, web services are distributed objects
71 -- 76Ahmed Seffah, Eduard Metzker. The obstacles and myths of usability and software engineering
77 -- 81Pratyush Bharati, Abhijit Chaudhury. Using choiceboards to create business value
82 -- 87Eleanor T. Loiacono. Cyberaccess: web accessibility and corporate America
88 -- 94Yogesh Malhotra, Dennis F. Galletta. Building systems that users want to use
95 -- 99Steve Sawyer. Software development teams
101 -- 105Hannes Werthner, Francesco Ricci. E-commerce and tourism
144 -- 0Steven M. Bellovin. Spamming, phishing, authentication, and privacy

Volume 47, Issue 11

5 -- 6Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Peter J. Denning. Network laws
21 -- 22Diane Crawford. Top 10 downloads from ACM s portal
23 -- 25Robert L. Glass. Is this a revolutionary idea, or not?
27 -- 29Norman Matloff. Globalization and the American IT worker
30 -- 33Craig A. Stewart. Introduction
34 -- 41David A. Bader. Computational biology and high-performance computing
42 -- 45Toshikazu Ebisuzaki, Robert S. Germain, Makoto Taiji. PetaFLOPS computing
46 -- 51Ross A. Overbeek, Terry Disz, Rick L. Stevens. The SEED: a peer-to-peer environment for genome annotation
52 -- 57Mark H. Ellisman, Michael Brady, David Hart, Fang-Pang Lin, Matthias S. Müller, Larry Smarr. The emerging role of biogrids
58 -- 63Homa Javahery, Ahmed Seffah, Thiruvengadam Radhakrishnan. Beyond power: making bioinformatics tools user-centered
64 -- 71Christopher R. Johnson, Robert S. MacLeod, Steven G. Parker, David M. Weinstein. Biomedical computing and visualization software environments
73 -- 77Amrit Tiwana, Mark Keil. The one-minute risk assessment tool
78 -- 83James Y. L. Thong, Weiyin Hong, Kar Yan Tam. What leads to acceptance of digital libraries?
85 -- 90Theresa Edgington, Beomjin Choi, Katherine Henson, T. S. Raghu, Ajay S. Vinze. Adopting ontology to facilitate knowledge sharing
92 -- 99Shobha Ganapathy, C. Ranganathan, Balaji Sankaranarayanan. Visualization strategies and tools for enhancing customer relationship management
100 -- 106Markus Biehl, Edmund Prater, John R. McIntyre. Remote repair, diagnostics, and maintenance
107 -- 112Thomas F. Stafford, Dennis Gonier. What Americans like about being online
144 -- 0Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung. Evaluation of voting systems

Volume 47, Issue 10

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Phillip G. Armour. Not-defect: the mature discipline of testing
19 -- 20David A. Patterson. Hot links
21 -- 24Fred von Lohmann. Voluntary collective licensing for music file sharing
25 -- 27Michael A. Cusumano. Reflections on free and open software
28 -- 30Peter G. Neumann. Introduction
34 -- 38Carolyn Coggins. Independent testing of voting systems
39 -- 42Brit J. Williams, Merle S. King. Implementing voting systems: the Georgia method
43 -- 45Anthony Di Franco, Andrew Petro, Emmett Shear, Vladimir Vladimirov. Small vote manipulations can swing elections
46 -- 50Douglas W. Jones. Auditing elections
52 -- 57Rebecca T. Mercuri, L. Jean Camp. The code of elections
59 -- 64David R. Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner. Analyzing internet voting security
65 -- 67Jason Kitcat. Source availability and e-voting: an advocate recants
69 -- 70Jeff Grove. ACM statement on voting systems
71 -- 75David A. Patterson. Latency lags bandwith
76 -- 82Huaiqing Wang, Shuozhong Wang. Cyber warfare: steganography vs. steganalysis
83 -- 87Ioannis Samoladas, Ioannis Stamelos, Lefteris Angelis, Apostolos Oikonomou. Open source software development should strive for even greater code maintainability
88 -- 92Nancy J. Lightner. Evaluating e-commerce functionality with a focus on customer service
93 -- 97Michael Alan Smith. Portals: toward an application framework for interoperability
99 -- 102Peter B. Southard, Keng Siau. A survey of online e-banking retail initiatives
103 -- 105Casey G. Cegielski. Who values technology certification?
120 -- 0Bruce Schneier. The nonsecurity of secrecy

Volume 47, Issue 1

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 18Meg McGinity. RFID: is this game of tag fair play?
19 -- 22Phillip G. Armour. When executives code
30 -- 33Sharon L. Oviatt, Trevor Darrell, Myron Flickner. Introduction
34 -- 40Anil K. Jain, Arun Ross. Multibiometric systems
41 -- 46Philip R. Cohen, David McGee. Tangible multimodal interfaces for safety-critical applications
47 -- 49Roberto Pieraccini, Krishna Dayanidhi, Jonathan Bloom, Jean-Gui Dahan, Michael Phillips, Bryan R. Goodman, K. Venkatesh Prasad. Multimodal conversational systems for automobiles
51 -- 56Harriet J. Nock, Giridharan Iyengar, Chalapathy Neti. Multimodal processing by finding common cause
57 -- 59Leah Reeves, Jennifer C. Lai, James A. Larson, Sharon L. Oviatt, T. S. Balaji, Stéphanie Buisine, Penny Collings, Philip R. Cohen, Ben Kraal, Jean-Claude Martin, Michael F. McTear, T. V. Raman, Kay M. Stanney, Hui Su, Qian Ying Wang. Guidelines for multimodal user interface design
60 -- 67Matthew Turk. Computer vision in the interface
69 -- 75Li Deng, Xuedong Huang. Challenges in adopting speech recognition
76 -- 81Cynthia F. Cohen, Stanley J. Birkin, Monica J. Garfield, Harold W. Webb. Managing conflict in software testing
83 -- 88Albert B. Schwarzkopf, Roberto J. Mejias, Jon Jasperson, Carol S. Saunders, Hermann Gruenwald. Effective practices for IT skills staffing
89 -- 92B. Craig Cumberland, Joseph S. Valacich, Leonard M. Jessup. Understanding meteor burst communications technologies
93 -- 98Robert J. Aiken, Javad Boroumand, Stephen S. Wolff. Network and computing research infrastructure: back to the future
99 -- 102Ronald Dattero, Stuart D. Galup. Programming languages and gender
103 -- 107Seungkyoon Shin, Ram D. Gopal, G. Lawrence Sanders, Andrew B. Whinston. Global software piracy revisited
108 -- 113Wenhong Luo, Mohammad Najdawi. Trust-building measures: a review of consumer health portals
144 -- 0Marcus J. Ranum. Believing in myths