Journal: Communications of the ACM

Volume 50, Issue 9

5 -- 0Diane Crawford. Editorial pointers
13 -- 14. Forum
15 -- 17Neil L. Waters. Why you can t cite Wikipedia in my class
19 -- 20Ronald F. Boisvert, Mary Jane Irwin, Holly E. Rushmeier. Evolving the ACM journal distribution program
21 -- 24Meg McGinity Shannon. Shaking hands, kissing babies, and ... blogging?
25 -- 28Phillip G. Armour. The conservation of uncertainty
30 -- 34Toshinori Munakata. Introduction
35 -- 39Warren Robinett, Gregory S. Snider, Philip Kuekes, R. Stanley Williams. Computing with a trillion crummy components
40 -- 42Jing Kong. Computation with carbon nanotube devices
43 -- 45Robert Stadler. Molecular, chemical, and organic computing
46 -- 53John H. Reif, Thomas H. LaBean. Autonomous programmable biomolecular devices using self-assembled DNA nanostructures
55 -- 59Dave Bacon, Debbie Leung. Toward a world with quantum computers
60 -- 62Hossin Abdeldayem, Donald O. Frazier. Optical computing: need and challenge
64 -- 68David W. M. Marr, Toshinori Munakata. Micro/nanofluidic computing
69 -- 72Masashi Aono, Masahiko Hara, Kazuyuki Aihara. Amoeba-based neurocomputing with chaotic dynamics
74 -- 78Ami Marowka. Parallel computing on any desktop
79 -- 83George Lepouras, Costas Vassilakis, Constantin Halatsis, Panagiotis Georgiadis. Domain expert user development: the smartgov approach
84 -- 90Joseph S. Valacich, D. Veena Parboteeah, John D. Wells. The online consumer s hierarchy of needs
91 -- 96Susan A. Brown, Norman L. Chervany, Bryan A. Reinicke. What matters when introducing new information technology
97 -- 102Ashley Braganza, Arnoud Franken. SOX, compliance, and power relationships
103 -- 108Irene Pollach. What s wrong with online privacy policies?
109 -- 112Thomas F. Stafford, Dennis Gonier. The online research bubble
120 -- 0Peter G. Neumann. E-migrating risks?

Volume 50, Issue 8

5 -- 0Diane Crawford. Editorial pointers
7 -- 8. News track
13 -- 14. Forum
14 -- 0. Call for nominations for ACM general election
15 -- 18Hal Berghel. Better-than-nothing security practices
19 -- 20Amy Bruckman. Software copyright and role models
21 -- 23Robert L. Glass. A deja-vu look at software engineering researchers who care about practice
24 -- 33Alfred Kobsa. Privacy-enhanced personalization
35 -- 39Ahmed Elfatatry. Dealing with change: components versus services
41 -- 45Matt E. Thatcher, David E. Pingry. Modeling the IT value paradox
46 -- 51John Erickson, Keng Siau. Theoretical and practical complexity of modeling methods
52 -- 58Jesper Simonsen. Involving top management in IT projects
59 -- 64Larry J. Leblanc, Michael R. Galbreth. Designing large-scale supply chain linear programs in spreadsheets
65 -- 71Yun Wan, Satya Menon, Arkalgud Ramaprasad. A classification of product comparison agents
72 -- 77Janice C. Sipior, Burke T. Ward. Unintended invitation: organizational wi-fi use by external roaming users
78 -- 85T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk. Testing object-oriented industrial software without precise oracles or results
87 -- 93Sagnika Sen, Haluk Demirkan, Michael Goul. Dynamic decision support through instantiation of UEML representations
94 -- 99W. Raghupathi. Corporate governance of IT: a framework for development
100 -- 0. Top 10 downloads from ACM s digital library
101 -- 103Sakgasit Ramingwong, A. S. M. Sajeev. Offshore outsourcing: the risk of keeping mum
112 -- 0David Lorge Parnas. Which is riskier: OS diversity or OS monopoly?

Volume 50, Issue 7

5 -- 0Diane Crawford. Editorial pointers
13 -- 18Peter J. Denning. Computing is a natural science
19 -- 22Michael A. Cusumano. The changing labyrinth of software pricing
23 -- 25Abbe Mowshowitz, Nanda Kumar. Public vs. private interest on the internet
26 -- 29Michael Zyda. Introduction
30 -- 35Merrilea J. Mayo. Games for science and engineering education
36 -- 43Ralph E. Chatham. Games for training
44 -- 49Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper. How to build serious games
50 -- 57Randy Pausch, Donald Marinelli. Carnegie Mellon s entertainment technology center: combining the left and right brain
58 -- 64Caitlin Kelleher, Randy Pausch. Using storytelling to motivate programming
66 -- 73Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin. Real-time sound synthesis and propagation for games
74 -- 80Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen. Evaluating the efficacy of a terrorism question/answer system
81 -- 85In Lee. An architecture for a next-generation holistic e-recruiting system
86 -- 91Harris Wu, Michael D. Gordon. Collaborative structuring: organizing document repositories effectively and efficiently
92 -- 101Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon. Examining RFID applications in supply chain management
103 -- 108Someswar Kesh, Pauline Ratnasingam. A knowledge architecture for IT security
109 -- 116Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu. A roadmap for comprehensive online privacy policy management
117 -- 122Waymond Rodgers, Solomon Negash. The effects of web-based technologies on knowledge transfer
123 -- 126Sabah S. Al-Fedaghi. Conferences under scrutiny
136 -- 0Charles Perrow. Disasters evermore?

Volume 50, Issue 6

5 -- 0Diane Crawford. Editorial pointers
13 -- 14. News track
15 -- 19Pamela Samuelson. Software patents and the metaphysics of Section 271(f)
21 -- 23Phillip G. Armour. Twenty percent
25 -- 27Ben Shneiderman. Web science: a provocative invitation to computer science
28 -- 37Eric van Heck, Peter Vervest. Smart business networks: how the network wins
38 -- 43Sasha Dekleva, J. P. Shim, Upkar Varshney, Geoffrey Knoerzer. Evolution and emerging issues in mobile wireless networks
44 -- 50Amy Friedlander, Allison Mankin, W. Douglas Maughan, Stephen D. Crocker. DNSSEC: a protocol toward securing the internet infrastructure
51 -- 55Ioanna D. Constantiou, Jan Damsgaard, Lars Andreas Knutsen. The four incremental steps toward advanced mobile service adoption
56 -- 61Mark J. Cotteleer, Christopher A. Cotteleer, Andrew Prochnow. Cutting checks: challenges and choices in B2B e-payments
62 -- 67Anand Jeyaraj, Vicki L. Sauter. An empirical investigation of the effectiveness of systems modeling and verification tools
69 -- 74David E. Avison, Terry Young. Time to rethink health care and ICT?
75 -- 79Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström. Design patterns for managing product life cycle information
81 -- 85Jie Ren, Richard N. Taylor. Automatic and versatile publications ranking for research institutions and scholars
86 -- 87. Top 10 downloads from ACM s digital library
89 -- 92Mihail Cocosila, Ofir Turel, Norman P. Archer, Yufei Yuan. Perceived health risks of 3G cell phones: do users care?
104 -- 0Peter A. Freeman. Risks are your responsibility

Volume 50, Issue 5

5 -- 6Diane Crawford. Editorial pointers
10 -- 0Stuart I. Feldman. ACM s past helps steer its future
13 -- 15Meg McGinity Shannon. The pearly gates of Internet TV
17 -- 20Stephen B. Jenkins. The rime of the ancyent programmer
21 -- 23Robert L. Glass. One man s quest for the state of software engineering s practice
24 -- 26David S. Wise. Introduction
27 -- 29Bernadette Longo. ACM established to develop communication about computing
30 -- 35Atsushi Akera. Edmund Berkeley and the origins of ACM
36 -- 41Thomas Haigh. Sources for ACM history: what, where, why
42 -- 45Charles Care. Not only digital: a review of ACM s early involvement with analog computing technology
46 -- 53David Hemmendinger. The ACM and IEEE-CS guidelines for undergraduate CS education
54 -- 61Judy Brown, Steve Cunningham. A history of ACM SIGGRAPH
63 -- 68Chris Edmondson-Yurkanan. SIGCOMM's archaeological journey into networking's past
69 -- 74Thomas J. Bergin. A history of the history of programming languages
75 -- 81Matthew R. McBride. The software architect
83 -- 88Zeljko Obrenovic, Julio Abascal, Dusan Starcevic. Universal accessibility as a multimodal design issue
89 -- 93Michael Harris, Kris Aebischer, Tim Klaus. The whitewater process: software product development in small IT businesses
94 -- 101Bin He, Mitesh Patel, Zhen Zhang, Kevin Chen-Chuan Chang. Accessing the deep web
103 -- 108Viviane Torres da Silva, Carlos José Pereira de Lucena. Modeling multi-agent systems
109 -- 112Alessandra Devito Da Cunha, David Greathead. Does personality matter?: an analysis of code-review ability
113 -- 117Geoffrey Goodell, Paul F. Syverson. The right place at the right time
124 -- 125. Top 10 downloads from ACM s digital library
128 -- 0Bruce Schneier. The psychology of security

Volume 50, Issue 4

5 -- 0Diane Crawford. Editorial pointers
7 -- 9Diane Crawford. Stop chasing the AI illusion
15 -- 20Hal Berghel. Hiding data, forensics, and anti-forensics
21 -- 25Peter J. Denning. Mastering the mess
28 -- 29. Call for nominations for advanced member grades in ACM
29 -- 0. Proposal to dissolve SIGAPL
31 -- 34Jenova Chen. Flow in games (and everything else)
36 -- 42Jeff Kramer. Is abstraction the key to computing?
43 -- 48Dorit Nevo, Michael R. Wade. How to avoid disappointment by design
49 -- 54Levent V. Orman. Consumer support systems
55 -- 61Stefano Ceri, Maristella Matera, Francesca Rizzo, Vera Demaldé. Designing data-intensive web applications for content accessibility using web marts
63 -- 68Ido Green, Tzvi Raz, Moshe Zviran. Analysis of active intrusion prevention data for predicting hostile activity in computer networks
69 -- 75Sachidanandam Sakthivel. Managing risk in offshore systems development
76 -- 79Jeffrey A. Stone, Elinor M. Madigan. Inconsistencies and disconnects
81 -- 85Dianne Hall, David B. Paradice. Investigating value-based decision bias and mediation: do you do as you think?
87 -- 92Michael Chau, Xiao Fang, Olivia R. Liu Sheng. What are people searching on government web sites?
101 -- 103E. Sonny Butler, Cheryl Aasheim, Susan Williams. Does telecommuting improve productivity?
104 -- 0Jim Horning. Risks of virtual professionalism

Volume 50, Issue 3

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
14 -- 0. ACM A.M. Turing Award nominations solicited
15 -- 18Phillip G. Armour. Mortality play
19 -- 24Earl Barr, Matt Bishop, Mark Gondree. Fixing federal e-voting standards
25 -- 0. SIGs announce candidates for election
26 -- 27. ACM fellows
29 -- 31Bartel Van de Walle, Murray Turoff. Introduction
33 -- 38Liz Carver, Murray Turoff. Human-computer interaction: the human and computer as a team in emergency management information systems
39 -- 40Simon French, Murray Turoff. Decision support systems
41 -- 42Frank Fiedrich, Paul Burghardt. Agent-based systems for disaster management
44 -- 49David Mendonça, Theresa Jefferson, John R. Harrald. Collaborative adhocracies and mix-and-match technologies in emergency management
51 -- 53B. S. Manoj, Alexandra Hubenko Baker. Communication challenges in emergency response
54 -- 58Leysia Palen, Starr Roxanne Hiltz, Sophia B. Liu. Online forums supporting grassroots participation in emergency preparedness and response
59 -- 60Art Botterell, Ronja Addams-Moring. Public warning in the networked age: open standards to the rescue?
61 -- 65Paul Currion, Chamindra de Silva, Bartel Van de Walle. Open source software for disaster management
66 -- 72Stephen J. Andriole. The 7 habits of highly effective technology leaders
73 -- 78Thomas A. Horan, Benjamin L. Schooley. Time-critical information services
79 -- 83Sridhar P. Nerur, Venugopal Balijepally. Theoretical reflections on agile development methodologies
84 -- 88Scott McCoy, Andrea Everard, Peter Polak, Dennis F. Galletta. The effects of online advertising
89 -- 94Ning Zhong, Jiming Liu, Yiyu Yao. Envisioning intelligent information technologies through the prism of web intelligence
95 -- 100James A. Hall, Stephen L. Liedtka. The Sarbanes-Oxley Act: implications for large-scale IT outsourcing
101 -- 102. Top 10 downloads from ACM s Digital Library
104 -- 106Nigel Ward. The (un)predictability of computer science graduate school admissions
120 -- 0Donn B. Parker. Risks of risk-based security

Volume 50, Issue 2

5 -- 0Diane Crawford. Editorial pointers
11 -- 13. Forum
14 -- 0. Student de-charter notice
15 -- 18Michael A. Cusumano. What road ahead for Microsoft the company?
19 -- 23Pamela Samuelson. Patent reform through the courts
24 -- 33Joshua Goodman, Gordon V. Cormack, David Heckerman. Spam and the ongoing battle for the inbox
34 -- 42Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan. Enabling the 21st century health care information technology revolution
43 -- 50Grant A. Jacoby, Luqi. Intranet model and metrics
51 -- 55Bonnie Glassberg, Jeffrey W. Merhout. : Electronic markets hypothesis redux: where are we now?
56 -- 62Galen A. Grimes. Compliance with the CAN-SPAM Act of 2003
63 -- 67Ranieri Baraglia, Fabrizio Silvestri. Dynamic personalization of web sites without user intervention
68 -- 73Joon Koh, Young-Gul Kim, Brian Butler, Gee-Woo Bock. Encouraging participation in virtual communities
75 -- 79Dongsong Zhang. Web content adaptation for mobile handheld devices
81 -- 87Rafae Bhatti, Elisa Bertino, Arif Ghafoor. An integrated approach to federated identity and privilege management in open systems
89 -- 94Benjamin B. M. Shao, Julie Smith David. The impact of offshore outsourcing on IT workers in developed countries
96 -- 98Rolf Oppliger. IT security: in search of the Holy Grail
112 -- 0Peter G. Neumann. Widespread network failures

Volume 50, Issue 12

5 -- 0Diane Crawford. Editorial pointers
7 -- 8. News track
9 -- 10Diane Crawford. Forum
11 -- 14Hal Berghel. Credit Card Forensics
20 -- 32Ben Shneiderman. Creativity support tools: accelerating discovery and innovation
33 -- 38Dongwon Lee, Jaewoo Kang, Prasenjit Mitra, C. Lee Giles, Byung-Won On. Are your citations clean?
40 -- 45Robert J. Aalberts, Percy Poon, Paul Thistle. Trespass, nuisance, and spam: 11th century common law meets the internet
46 -- 50Antonio M. Lopez Jr., Frederick G. Lopez, Robert W. Lent, Madonna G. Constantine. Multidisciplinary research on the datapath of the computing disciplines
51 -- 55Erica L. Wagner, Gabriele Piccoli. Moving beyond user participation to achieve successful IS design
57 -- 62Wai Fong Boh, Christina Soh, Steven Yeo. Standards development and diffusion: a case study of RosettaNet
63 -- 67Ilan Oshri, Sue Newell, Shan Ling Pan. Implementing component reuse strategy in complex products environments
68 -- 73Kannan Mohan, Balasubramaniam Ramesh. Tracing variations in software product families
74 -- 79Klaus Schild, Stefan Bussmann. Self-organization in manufacturing operations
80 -- 86Varun Grover, Raymond M. Henry, Jason Bennett Thatcher. Fix IT-business relationships through better decision rights
87 -- 91Gautam Ray, Waleed A. Muhanna, Jay B. Barney. Competing with IT: the role of shared IT-business understanding
93 -- 95Emmeline de Pillis, Kimberly A. Furumo. Counting the cost of virtual teams
97 -- 98Chuan-Hoo Tan, Hock-Hai Teo. Training future software developers to acquire agile development skills
128 -- 0Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann. Internal surveillance, external risks

Volume 50, Issue 11

5 -- 0Diane Crawford. Editorial pointers
9 -- 14Peter J. Denning. The choice uncertainty principle
15 -- 16Robert L. Glass. A research project with important practitioner-oriented findings
17 -- 18Stuart I. Feldman. The rewards of ACM s awards
19 -- 21David Lorge Parnas. Stop the numbers game
24 -- 26Dror G. Feitelson. Introduction
27 -- 31Catherine C. McGeoch. Experimental algorithmics
33 -- 37Victor R. Basili, Marvin V. Zelkowitz. Empirical studies to build a science of computer science
38 -- 44Larry L. Peterson, Vivek S. Pai. Experience-driven experimental systems research
45 -- 50Alan Jay Smith. Workloads (creation and use)
51 -- 54Ellen M. Voorhees. TREC: Continuing information retrieval s tradition of experimentation
55 -- 59Larry D. Jackel, Douglas Hackett, Eric Krotkov, Michael Perschbacher, James Pippine, Charles Sullivan. How DARPA structures its robotics programs to improve locomotion and navigation
60 -- 64Oded Nov. What motivates Wikipedians?
65 -- 69Paul P. Tallon, Richard Scannell. Information life cycle management
70 -- 77Neil Foshay, Avinandan Mukherjee, Andrew Taylor. Does data warehouse end-user metadata add value?
79 -- 84Chris Sauer, Andrew Gemino, Blaize Horner Reich. The impact of size and volatility on IT project performance
85 -- 90Dominic M. Thomas, Robert P. Bostrom, Marianne Gouge. Making knowledge work in virtual teams
91 -- 95Hee-Woong Kim, Yunjie Xu. Drivers of price Premium in e-markets
120 -- 0Matt Bishop, David Wagner. Risks of e-voting

Volume 50, Issue 10

5 -- 0Diane Crawford. Editorial pointers
7 -- 8. News track
13 -- 14. Forum
15 -- 18Michael A. Cusumano. Extreme programming compared with Microsoft-style iterative development
19 -- 23Pamela Samuelson. Does copyright law need to be reformed?
25 -- 28Katia Passerini, Karen Patten, Michael R. Bartolacci, Jerry Fjermestad. Reflections and trends in the expansion of cellular wireless services in the U.S. and China
29 -- 31Sebastian Thrun. Why we compete in DARPA s Urban Challenge autonomous robot race
33 -- 39Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu. Post-conflict communications: the case of Liberia
40 -- 46Erran Carmel, Pamela Abbott. Why nearshore means that distance matters
45 -- 0Erran Carmel, Pamela Abbott. Nearshore locations in three principal global clusters and their respective attributes
47 -- 52Matt E. Thatcher, David E. Pingry. [Software patents] The good, the bad, and the messy
53 -- 58Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios. Knowledge services on the semantic web
60 -- 66U. N. Umesh, Leonard M. Jessup, Minh Q. Huynh. [Getting ideas to market] Current issues faced by technology entrepreneurs
67 -- 71Asli Yagmur Akbulut, Clayton A. Looney. Inspiring students to pursue computing degrees
72 -- 78Prabhudev Konana, Gautam Ray. Physical product reengineering with embedded information technology
79 -- 85Mike P. Papazoglou, Willem-Jan van den Heuvel. Business process development life cycle methodology
86 -- 93William L. Kuechler Jr.. Business applications of unstructured text
94 -- 100Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer. Social phishing
101 -- 106Wade H. Baker, Loren Paul Rees, Peter S. Tippett. Necessary measures: metric-driven information security risk assessment and decision making
107 -- 111Richard J. Goeke, Robert H. Faley. Leveraging the flexibility of your data warehouse
113 -- 117John D Arcy, Anat Hovav. Deterring internal information systems misuse
118 -- 0. Top 10 downloads from ACM s digital library
128 -- 0Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman. Toward a safer and more secure cyberspace

Volume 50, Issue 1

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
13 -- 16Phillip G. Armour. Agile ... and offshore
17 -- 20Meg McGinity Shannon. Shannon s eleven
21 -- 24Russell Beale. Slanty design
25 -- 32. ACM Annual Report for FY06
36 -- 44Patricia S. Abril, Robert Plant. The patent holder s dilemma: buy, sell, or troll?
45 -- 50Huimin Zhao. Semantic matching across heterogeneous data sources
52 -- 58Markus Biehl. Success factors for implementing global information systems
59 -- 65Nitin Singh, Kee-hung Lai, T. C. Edwin Cheng. Intra-organizational perspectives on IT-enabled supply chains
66 -- 71Sharon McDonald, Helen M. Edwards. Who should test whom?
73 -- 78Sami Surakka. What subjects and skills are important for software developers?
79 -- 83Jaap-Henk Hoepman, Bart Jacobs. Increased security through open source
85 -- 94Peter Naur. Computing versus human thinking
128 -- 0Lauren Weinstein. Ma Bell s revenge: the battle for network neutrality