Journal: Communications of the ACM

Volume 49, Issue 9

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 17Phillip G. Armour. Software: hard data
19 -- 21Meg McGinity Shannon. Home turf
23 -- 24Diane Crawford. Top 10 Downloads from ACM s Digital Library
25 -- 27Dennis Adams. Wireless laptops in the classroom (and the Sesame Street syndrome)
28 -- 31Günter Müller. Introduction
32 -- 38Stefan Sackmann, Jens Strüker, Rafael Accorsi. Personalization in privacy-aware highly dynamic systems
39 -- 44Alexander Pretschner, Manuel Hilty, David A. Basin. Distributed usage control
45 -- 49Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla. Externally verifiable code execution
50 -- 55Johannes Buchmann, Alexander May, Ulrich Vollmer. Perspectives for cryptographic long-term security
57 -- 62Brian Subirana, Malcolm Bain. Legal programming
63 -- 64Mark D. Hill, Jean-Luc Gaudiot, Mary W. Hall, Joe Marks, Paolo Prinetto, Donna Baglio. A Wiki for discussing and promoting best practices in research
65 -- 75Gio Wiederhold. What is your software worth?
76 -- 82Weiguo Fan, Linda Wallace, Stephanie Rich, Zhongju Zhang. Tapping the power of text mining
83 -- 88Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark Samuel Miller. Polaris: virus-safe computing for Windows XP
89 -- 94Se-Joon Hong, Kar Yan Tam, Jinwoo Kim. Mobile data service fuels the desire for uniqueness
95 -- 99Bongsug Chae, Roger McHaney. Asian trio s adoption of Linux-based open source development
112 -- 0Peter G. Neumann. The foresight saga

Volume 49, Issue 8

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 16Robert L. Glass. The Standish report: does it really describe a software crisis?
17 -- 21Hal Berghel, David Hoelzer. Disk wiping by any other name
23 -- 24Diane Crawford. Top 10 downloads from ACM s digital library
25 -- 27Dan B. Goldman. Blockbusters and blackboards
28 -- 31Bryan Pardo. Introduction
32 -- 37Daniel P. W. Ellis. Extracting information from music audio
38 -- 43Roger B. Dannenberg, Christopher Raphael. Music score alignment and computer accompaniment
44 -- 48Avery Wang. The Shazam music recognition service
49 -- 52William P. Birmingham, Roger B. Dannenberg, Bryan Pardo. Query by humming with the VocalSearch system
53 -- 58Jon W. Dunn, Donald Byrd, Mark Notess, Jenn Riley, Ryan Scherle. Variations2: retrieving and using music in an academic setting
60 -- 66Alexander P. Pons. Biometric marketing: targeting the online consumer
67 -- 70Václav Rajlich. Changing the paradigm of software engineering
72 -- 77G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord. E-monitoring in the workplace: privacy, legislation, and surveillance software
79 -- 83J. Drew Procaccino, June M. Verner, Steven J. Lorenzet. Defining and contributing to software development success
85 -- 89Eugenia Y. Huang. Tightening access policy: the hidden trade-off
90 -- 95Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald. Pair programming improves student retention, confidence, and program quality
97 -- 100Mikko T. Siponen. Information security standards focus on the existence of process, not its content
112 -- 0Deirdre K. Mulligan, Ari Schwartz, Indrani Mondal. Risks of online storage

Volume 49, Issue 7

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
13 -- 0Diane Crawford. ACM s 2006 general elections
15 -- 19Peter J. Denning. Infoglut
21 -- 23Michael A. Cusumano. What road ahead for Microsoft and Windows?
25 -- 26Diane Crawford. Top 10 downloads from ACM s digital library
27 -- 29Peter Wegner, Dina Q. Goldin. Principles of problem solving
30 -- 32Jim Spohrer, Doug Riecken. Introduction
35 -- 40Henry Chesbrough, Jim Spohrer. A research manifesto for services science
42 -- 47Jerry R. Sheehan. Understanding service sector innovation
48 -- 0John Zysman. The algorithmic revolution---the fourth service transformation
49 -- 54Roland T. Rust, Carol Miu. What academic research tells us about service
55 -- 61Amit P. Sheth, Kunal Verma, Karthik Gomadam. Semantics to energize the full services spectrum
62 -- 64Brenda Dietrich. Resource planning for business services
66 -- 72William B. Rouse, Marietta L. Baba. Enterprise transformation
73 -- 78Mary Jo Bitner, Stephen W. Brown. The evolution and discovery of services science in business schools
79 -- 0Walter Ganz. Germany: service engineering
79 -- 0Christof Weinhardt, Dirk Neumann, Carsten Holtmann. Germany: computer-aided market engineering
81 -- 85Paul P. Maglio, Savitha Srinivasan, Jeffrey T. Kreulen, Jim Spohrer. Service systems, service scientists, SSME, and innovation
86 -- 87Stuart I. Feldman, Krishna S. Nathan, Thomas Li, Kazuyoshi Hidaka, Corinna Schulze. The Clarion Call for modern services: China, Japan, Europe, and the U.S
88 -- 93David E. Avison, Shirley Gregor, David Wilson. Managerial IT unconsciousness
94 -- 101Lance J. Hoffman, Kim Lawson-Jenkins, Jeremy J. Blum. Trust beyond security: an expanded trust model
103 -- 107Ernst Bekkering, J. P. Shim. Trust in videoconferencing
108 -- 112Narasimha Bolloju, Felix S. K. Leung. Assisting novice analysts in developing quality conceptual models with UML
113 -- 116Fred Martin. Toy projects considered harmful
120 -- 0Peter G. Neumann. Risks relating to system compositions

Volume 49, Issue 6

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18David A. Patterson. Farewell address: the growing and graying of ACM
19 -- 22Phillip G. Armour. The learning edge
23 -- 24Ronald F. Boisvert, Mary Jane Irwin. Plagiarism on the rise
25 -- 26Diane Crawford. Top 10 downloads from ACM s digital library
27 -- 31Pamela Samuelson. Copyrighting standards
32 -- 36Gregory J. Conti. Introduction
37 -- 40Tom Cross. Academic freedom and the hacker ethic
41 -- 43Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green. Security through legality
44 -- 49Joe Grand. Research lessons from hardware hacking
50 -- 56Bruce Potter. Wireless hotspots: petri dish of wireless security
57 -- 61Felix F. X. Lindner. Software security is software reliability
62 -- 69Dan Kaminsky. Explorations in namespace: white-hat hacking across the domain name system
70 -- 76Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny. Global software piracy: can economic factors alone explain the trend?
77 -- 83Christopher L. Carr. Reciprocity: the golden rule of IS-user service relationship quality and cooperation
84 -- 90Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones. Piracy, computer crime, and IS misuse at the university
91 -- 96David Kang, Roger Chiang. A systematic approach in managing post-deployment system changes
97 -- 101Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers. The application of model checking for securing e-commerce transactions
102 -- 106Barry Shore. Enterprise integration across the globally disbursed service organization
107 -- 109Thomas W. Jackson, Anthony Burgess, Janet Edwards. A simple approach to improving email communication
120 -- 0Robert N. Charette. EHRs: Electronic Health Records or Exceptional Hidden Risks?

Volume 49, Issue 5

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 16Diane Crawford. Top 10 downloads from ACM s digital library
17 -- 21Rebecca T. Mercuri. Scoping identity theft
23 -- 26Meg McGinity Shannon. Private lives
27 -- 30David A. Patterson. Revisiting my campaign statement
44 -- 46Hans Weigand. Introduction
47 -- 52Peter J. Denning, Robert Dunham. Innovation as language action
53 -- 57Göran Goldkuhl. Action and media in interorganizational interaction
58 -- 64Jan L. G. Dietz. The deep structure of business processes
65 -- 70Dov Te eni. The language-action perspective as a basis for communication support systems
71 -- 74Terry Winograd. Designing a new foundation for design
75 -- 76Mareike Schoop, Aldo de Moor, Jan L. G. Dietz. The pragmatic web: a manifesto
78 -- 84Dawn G. Gregg, Steven Walczak. Adaptive web information extraction
85 -- 90Stephen J. Andriole. The collaborate/integrate business technology strategy
92 -- 99Brian Whitworth, Jerry Fjermestad, Edward Mahinda. The web of system performance
101 -- 107Hai Zhuge. Discovery of knowledge flow in science
109 -- 113Brian Dobing, Jeffrey Parsons. How UML is used
114 -- 118Pairin Katerattanakul, Bernard T. Han, Alan Rea. Is information systems a reference discipline?
119 -- 123William E. Spangler, Kathleen S. Hartzel, Mordechai Gal-Or. Exploring the privacy implications of addressable advertising and viewer profiling
124 -- 126Stephen B. Jenkins. Musings of an "old-school" programmer
136 -- 0Peter G. Neumann, Lauren Weinstein. Risks of RFID

Volume 49, Issue 4

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Peter J. Denning. Hastily formed networks
21 -- 25Hal Berghel. Phishing mongers and posers
26 -- 28. Statewide databases of registered voters
29 -- 30. Top 10 Downloads from ACM s Digital Library
31 -- 32David A. Patterson. Seven reasons to shave your head and three reasons not to: the bald truth
33 -- 35Shlomo Argamon, Mark Olsen. Toward meaningful computing
36 -- 39Ryen W. White, Bill Kules, Steven M. Drucker, Monica M. C. Schraefel. Introduction
41 -- 46Gary Marchionini. Exploratory search: from finding to understanding
47 -- 49Monica M. C. Schraefel, Max Wilson, Alistair Russell, Daniel A. Smith. mSpace: improving information access to multimedia domains with multimodal exploratory search
50 -- 51Edward Cutrell, Susan T. Dumais. Exploring personal information
52 -- 58Edward A. Fox, Fernando A. Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan. Exploring the computing literature with visualization and stepping stones & pathways
59 -- 61Marti A. Hearst. Clustering versus faceted categories for information exploration
63 -- 68John Gersh, Bessie Lewis, Jaime Montemayor, Christine D. Piatko, Russell Turner. Supporting insight-based information exploration in intelligence analysis
69 -- 71Ben Shneiderman, Benjamin B. Bederson, Steven M. Drucker. Find that photo!: interface strategies to annotate, browse, and share
72 -- 74Bernard J. Jansen. Using temporal patterns of interactions to design effective automated searching assistance
76 -- 82Jiexun Li, Rong Zheng, Hsinchun Chen. From fingerprint to writeprint
83 -- 88Nenad Jukic. Modeling strategies and alternatives for data warehousing projects
89 -- 93Andrea Ordanini. What drives market transactions in B2B exchanges?
94 -- 99Moshe Zviran, Dov Te eni, Yuval Gross. Does color in email make a difference?
100 -- 104Rosario Vidal, Elena Mulet. Thinking about computer systems to support design synthesis
105 -- 109Harvey G. Enns, Thomas W. Ferratt, Jayesh Prasad. Beyond stereotypes of IT professionals: implications for IT HR practices
111 -- 114Sang M. Lee, Choong Kwon Lee. IT managers requisite skills
120 -- 0Lauren Weinstein. Fake ID: batteries not included

Volume 49, Issue 3

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Phillip G. Armour. The operational executive sponsor
19 -- 20Robert L. Glass. Is the crouching tiger a threat?
21 -- 24Bertrand Meyer, Willy Zwaenepoel. Europe s computer scientists take fate into their own hands
27 -- 30David A. Patterson. Computer science education in the 21:::st::: century
31 -- 0David A. Patterson. Reviving your favorite CS books
33 -- 35Jeannette M. Wing. Computational thinking
36 -- 39Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs. Introduction
41 -- 47Paul Robertson, Brian Williams. Automatic recovery from software failure
48 -- 54George Porter, Randy H. Katz. Effective web service load balancing through statistical monitoring
55 -- 60Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju. Supporting application quality of service in shared resource pools
62 -- 67Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata. Biologically inspired self-adaptive multi-path routing in overlay networks
69 -- 73Atul Singh, Mads Haahr. Creating an adaptive network of hubs using Schelling s model
76 -- 81Martin Halvey, Mark T. Keane, Barry Smyth. Mobile web surfing is the same as web surfing
82 -- 86Vicki R. McKinney, Mary M. Whiteside. Maintaining distributed relationships
87 -- 91Zhiping D. Walter, George Scott. Management issues of internet/web systems
93 -- 98Aldo de Moor, Mark Aakhus. Argumentation support: from technologies to tools
99 -- 104Juan E. Gilbert. Applications quest: computing diversity
105 -- 109Robert C. Beatty, Craig D. Williams. ERP II: best practices for successfully implementing an ERP upgrade
111 -- 114Mazliza Othman, Rodziah Latih. Women in computer science: no shortage here!
115 -- 118Brian L. Dos Santos, Andrew L. Wright. Using bulletin boards in an educational setting
128 -- 0Marc Rotenberg. Real id, real trouble?

Volume 49, Issue 2

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Gary F. Templeton. Video image stabilization and registration technology
19 -- 24Siri Birgitte Uldal, Muhammad Aimal Marjan. Computing in post-war Afghanistan
25 -- 30Pamela Samuelson. Regulating technical design
31 -- 34Michael A. Cusumano. Where does Russia fit into the global software industry?
35 -- 37Nanda Kumar, Abbe Mowshowitz. Who should govern the internet?
39 -- 40Diane Crawford. Top 10 downloads from ACM s digital library
41 -- 42David A. Patterson. Offshoring: finally facts vs. folklore
44 -- 47Brajendra Panda, Joseph Giordano, Daniel Kalil. Introduction
48 -- 55Eoghan Casey. Investigating sophisticated security breaches
56 -- 61Brian D. Carrier. Risks of live digital forensic analysis
63 -- 66Frank Adelstein. Live forensics: diagnosing your system without killing it first
67 -- 68. The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage
69 -- 70Chet Hosmer. Digital evidence bag
71 -- 75Sheldon Teelink, Robert F. Erbacher. Improving the computer forensic analysis process through visualization
76 -- 80Golden G. Richard III, Vassil Roussev. Next-generation digital forensics
81 -- 83Rahul Bhaskar. State and local law enforcement is not ready for a cyber Katrina
85 -- 87Simson L. Garfinkel. AFF: a new format for storing hard drive images
88 -- 94Ganesan Shankaranarayanan, Adir Even. The metadata enigma
96 -- 103Pak-Lok Poon, Amy H. L. Lau. The present B2C implementation framework
104 -- 109Jan Damsgaard, Mihir A. Parikh, Bharat Rao. Wireless commons perils in the common good
110 -- 0. Student de-charter notice
111 -- 116Henry M. Gladney. Principles for digital preservation
117 -- 122Stephen Owen, Pearl Brereton, David Budgen. Protocol analysis: a neglected practice
123 -- 128Deborah J. Armstrong. The quarks of object-oriented development
129 -- 134Roli Varma. Making computer science minority-friendly
152 -- 0Peter G. Neumann. Trustworthy systems revisited

Volume 49, Issue 12

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 19Hal Berghel. Fungible credentials and next-generation fraud
20 -- 21. ACM honors distinguished members for contributions to computing
23 -- 24Diane Crawford. Top 10 downloads from ACM s digital library
25 -- 27Douglas S. Blank. Robots make computer science personal
28 -- 32Vijayan Sugumaran, Sooyong Park, Kyo Chul Kang. Introduction
33 -- 36Paul C. Clements, Lawrence G. Jones, John D. McGregor, Linda M. Northrop. Getting there from here: a roadmap for software product line adoption
37 -- 40Charles W. Krueger. New methods in software product line practice
41 -- 44Jan Bosch. The challenges of broadening the scope of software product families
45 -- 47Don S. Batory, David Benavides, Antonio Ruiz Cortés. Automated analysis of feature models: challenges ahead
49 -- 54Magnus Eriksson, Jürgen Börstler, Kjell Borg. Software product line modeling made practical
55 -- 59Jaejoon Lee, Dirk Muthig. Feature-oriented variability management in product line engineering
60 -- 65Krzysztof Czarnecki, Michał Antkiewicz, Chang Hwan Peter Kim. Multi-level customization in application engineering
66 -- 67Andreas Helferich, Klaus Schmid, Georg Herzwurm. Product management for software product lines: an unsolved problem?
68 -- 72Kannan Mohan, Balasubramaniam Ramesh. Change management patterns in software product lines
73 -- 77Tomoji Kishi, Natsuko Noda. Formal verification and software product lines
78 -- 81Klaus Pohl, Andreas Metzger. Software product line testing
82 -- 84Joaquín Peña, Michael G. Hinchey, Antonio Ruiz Cortés. Multi-agent system product lines: challenges and benefits
85 -- 88Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm. A quality-based cost estimation model for the product line life cycle
90 -- 96Ian Angell, Jan Kietzmann. RFID and the end of cash?
98 -- 103Zakaria Maamar, Djamal Benslimane, Nanjangud C. Narendra. What can context do for web services?
104 -- 108Martin Bichler, Jayant Kalagnanam. Software frameworks for advanced procurement auction markets
109 -- 112Ali R. Montazemi. How they manage IT: SMEs in Canada and the U.S
114 -- 116France Belanger, Weiguo Fan, L. Christian Schaupp, Anjala Krishen, Jeannine Everhart, David Poteet, Kent Nakamoto. Web site success metrics: addressing the duality of goals
144 -- 0Wilhelm Hasselbring, Matthias Rohr, Jürgen Taeger, Daniel Winteler. Liability risks in reusing third-party software

Volume 49, Issue 11

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 17Robert L. Glass. Looking into the challenges of complex IT projects
19 -- 23Peter J. Denning, Frederick Hayes-Roth. Decision making in very large networks
25 -- 26Diane Crawford. Top 10 downloads from ACM s Digital Library
27 -- 29Christof Teuscher. Biologically uninspired computer science
30 -- 33Cormac J. Sreenan, Jacobus E. van der Merwe. Introduction
34 -- 38Kuan-Ta Chen, Polly Huang, Chin-Laung Lei. How sensitive are online gamers to network quality?
40 -- 45Mark Claypool, Kajal T. Claypool. Latency and player actions in online games
46 -- 51Jeremy Brun, Farzad Safaei, Paul Boustead. Managing latency and fairness in networked games
52 -- 54Zefir Kurtisi, Xiaoyuan Gu, Lars C. Wolf. Enabling network-centric music performance in wide-area networks
55 -- 57Reza Rejaie. Anyone can broadcast video over the internet
58 -- 63Verena Kahmann, Jens Brandt, Lars C. Wolf. Collaborative streaming in heterogeneous and dynamic scenarios
64 -- 72Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi. New architecture for intra-domain network security issues
74 -- 79Hazel Taylor. Critical risks in outsourced IT projects: the intractable and the unforeseen
81 -- 84Dinah Payne, Brett J. L. Landry. A uniform code of ethics: business and IT professional ethics
85 -- 91Arun Sen, Peter A. Dacin, Christos Pattichis. Current trends in web data analysis
112 -- 0Rebecca T. Mercuri, Vincent J. Lipsio, Beth Feehan. COTS and other electronic voting backdoors

Volume 49, Issue 10

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 17Michael A. Cusumano. Envisioning the future of India s software services business
19 -- 20Diane Crawford. Top 10 downloads from ACM s digital library
21 -- 25Pamela Samuelson. IBM s pragmatic embrace of open source
26 -- 34Pär J. Ågerfalk, Brian Fitzgerald. Introduction
35 -- 40Gwanhoo Lee, William H. DeLone, J. Alberto Espinosa. Ambidextrous coping strategies in globally distributed software development projects
41 -- 46Balasubramaniam Ramesh, Lan Cao, Kannan Mohan, Peng Xu. Can distributed software development be agile?
48 -- 54One-Ki Daniel Lee, Probir Banerjee, Kai H. Lim, Kuldeep Kumar, Jos van Hillegersberg, Kwok Kee Wei. Aligning IT components to achieve agility in globally distributed system development
55 -- 56Patrick Wagstrom, James D. Herbsleb. Dependency forecasting in the distributed agile organization
57 -- 58Nick V. Flor. Globally distributed software development and pair programming
59 -- 64Jiming Liu, Kwok Ching Tsui. Toward nature-inspired computing
66 -- 71Ray Giguette. Building objects out of Plato: applying philosophy, symbolism, and analogy to software design
73 -- 75Casey G. Cegielski, Dianne Hall. What makes a good programmer?
76 -- 82Tamara Dinev. Why spoofing is serious internet fraud
83 -- 87Il-Horn Hann, Kai Lung Hui, Yee-Lin Lai, Sang-Yong Tom Lee, Ivan P. L. Png. Who gets spammed?
88 -- 93Pratyush Bharati, Abhijit Chaudhury. Studying the current status of technology adoption
104 -- 0Steven M. Bellovin. Virtual machines, virtual security?

Volume 49, Issue 1

5 -- 7Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 16Diane Crawford. Top 10 downloads from ACM s digital library
17 -- 20Phillip G. Armour. Counting boulders and measuring mountains
29 -- 32Meg McGinity Shannon. The network of life
33 -- 35David A. Patterson. New Directions for ::::CACM::::?
37 -- 39Scott Campbell. How to think about security failures
40 -- 43Jaime Teevan, William Jones, Benjamin B. Bederson. Introduction
44 -- 50Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci. Digital memories in an era of ubiquitous computing and abundant storage
51 -- 55Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels. Personal health information management
56 -- 57Clare-Marie Karat, Carolyn Brodie, John Karat. Usable privacy and security for personal information management
58 -- 64Edward Cutrell, Susan T. Dumais, Jaime Teevan. Searching to eliminate personal information management
66 -- 67Catherine C. Marshall, William Jones. Keeping encountered information
68 -- 73Steve Whittaker, Victoria Bellotti, Jacek Gwizdka. Email in personal information management
74 -- 75Thomas Erickson. From PIM to GIM: personal information management in group contexts
77 -- 82David R. Karger, William Jones. Data unification in personal information management
84 -- 86Diane Kelly. Evaluating personal information management behaviors and tools
88 -- 95Jim Gemmell, Gordon Bell, Roger Lueder. MyLifeBits: a personal database for everything
96 -- 100Kevin C. Desouza, Yukika Awazu, Amrit Tiwana. Four dynamics for bringing use back into software reuse
101 -- 106George Pallis, Athena Vakali. Insight and perspectives for content delivery networks
107 -- 113Grace J. Johnson, Paul J. Ambrose. Neo-tribes: the power and potential of online communities in health care
114 -- 119Tim Chenoweth, Karen Corral, Haluk Demirkan. Seven key interventions for data warehouse success
121 -- 125Lawrence A. Gordon, Martin P. Loeb. Budgeting process for information security expenditures
126 -- 130Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers. Ethnocomputing: ICT in cultural and social context
131 -- 134Christoph Meinel, Volker Klotz. The first 10 years of the ECCC digital library
160 -- 0John C. Knight, Nancy G. Leveson. Software and higher education