researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ACM Queue
Home
Index
Info
Volume
Volume
3
, Issue
9
8
--
0
Charlene O Hanlon
.
Socially acceptable behavior
10
--
0
John Stanik
.
News 2.0
12
--
0
Charlene O Hanlon
.
What s on your hard drive?
14
--
16
George Neville-Neil
.
Kode Vicious unscripted
18
--
26
Charlene O Hanlon
.
A conversation with Ray Ozzie
28
--
35
David R. Millen
,
Jonathan Feinberg
,
Bernard Kerr
.
Social bookmarking in the enterprise
34
--
41
Andreas Gustafsson
.
Threads without the pain
36
--
41
Vipul Ved Prakash
,
Adam J. O Donnell
.
Fighting spam with reputation systems
48
--
57
Andrew McCallum
.
Information extraction: distilling structured data from unstructured text
58
--
0
Fernando Berzal Galiano
.
Review of Working effectively with legacy code by Michael Feathers
58
--
0
G. K. Jenkins
.
Review of The Linux enterprise cluster by Karl Kopper , No Starch Press, 2005, Isbn 1593270364
60
--
0
Charlene O Hanlon
.
Calendar
64
--
0
David A. Patterson
.
Stop whining about outsourcing!
Volume
3
, Issue
8
8
--
0
Charlene O Hanlon
.
Unstructured, but not really
10
--
0
John Stanik
.
News 2.0
12
--
0
Charlene O Hanlon
.
What s on your hard drive?
14
--
16
George Neville-Neil
.
Kode Vicious unscripted
18
--
24
Daniela Florescu
.
Managing semi-structured data
26
--
32
Adam Bosworth
.
Learning from the web
34
--
41
C. M. Sperberg-McQueen
.
XML <and semi-structured data>
42
--
49
Natalya Fridman Noy
.
Order from chaos
50
--
58
Alon Y. Halevy
.
Why your data won t mix
60
--
0
J. S. Edwards
.
Review of Slamming Spam: A Guide for System Adminstrators by Robert Haskins and Dale Nielsen
61
--
0
Charlene O Hanlon
.
Calendar
64
--
0
Chris Suver
.
The cost of data
Volume
3
, Issue
7
8
--
0
Jim Maurer
.
News 2.0
10
--
0
Jim Maurer
.
What s on your hard drive?
12
--
14
George Neville-Neil
.
Kode vicious
16
--
25
Jim Maurer
.
A conversation with Roger Sessions and Terry Coatta
26
--
29
Kunle Olukotun
,
Lance Hammond
.
The future of microprocessors
36
--
46
Richard McDougall
.
Extreme software scaling
48
--
53
Luiz André Barroso
.
The price of performance
54
--
62
Herb Sutter
,
James R. Larus
.
Software and the concurrency revolution
64
--
0
Mache Creeger
.
Multicore CPUs for the masses
Volume
3
, Issue
6
8
--
0
Stuart I. Feldman
.
Distributed computing in the modern enterprise
10
--
0
John Stanik
.
News 2.0
12
--
0
Jim Maurer
.
What s on your hard drive?
14
--
16
George Neville-Neil
.
Kode vicious
18
--
25
Jim Maurer
.
A conversation with David Anderson
26
--
29
Ian T. Foster
,
Steven Tuecke
.
Describing the elephant: the different faces of IT as service
36
--
42
Dean Jacobs
.
Enterprise software as service
44
--
49
Pankaj Kumar
.
Web services and IT management
50
--
59
Paul Strong
.
Enterprise grid computing
60
--
0
Radu State
.
Review of Gray Hat Hacking: The Ethical Hacker s Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester
60
--
0
Sajjad Khan
.
Review of "Struts Recipes by George Franciscus and Danilo Gurovich"
61
--
0
Jim Maurer
.
Calendar
Volume
3
, Issue
5
8
--
0
Randy Harr
.
On feeling secure in an unsafe world
12
--
0
Jim Maurer
.
Letters
14
--
0
John Stanik
.
News 2.0
16
--
0
Jim Maurer
.
What s on your hard drive?
18
--
20
George Neville-Neil
.
Kode vicious gets dirty
22
--
32
Jim Maurer
.
A conversation with Peter Tippett and Steven Hofmeyr
34
--
39
Thomas Wadlow
.
The answer is 42 of course
40
--
50
John Viega
.
Security---problem solved?
52
--
53
Bruce Schneier
.
Attack trends: 2004 and 2005
54
--
59
Ken Arnold
.
Programmers are people, too
60
--
0
André Mariën
.
Review of IPv6 Network Programming by Jun-ichiro itojun Hagino
61
--
0
Jim Maurer
.
Calendar
64
--
0
Rodney Bates
.
Syntactic heroin
Volume
3
, Issue
4
8
--
0
John Stanik
.
Mobile applications get real
10
--
0
Edward Grossman
.
Letters
14
--
0
John Stanik
.
News 2.0
15
--
0
Edward Grossman
.
What s on your hard drive
16
--
18
George Neville-Neil
.
Kode vicious vs. Mothra
20
--
28
Marshall K. McKusick
.
A conversation with Tim Marsland
30
--
37
Bruce Zenel
.
Enterprise-grade wireless
38
--
47
Frederick L. Kitson
.
Mobile media: making it a reality
48
--
53
.
Streams and standards: delivering mobile video
54
--
59
Kevin R. Fall
,
Steven McCanne
.
You don t know jack about network performance
60
--
0
.
Review of Building Clustered Linux Systems by Robert W. Lucke
60
--
0
.
Review of Expert .NET Programming by Simon Robinson
61
--
0
Edward Grossman
.
Calendar
64
--
0
Phillip A. Laplante
.
Mal managerium: a field guide
Volume
3
, Issue
3
8
--
0
Edward Grossman
.
I am an abstraction layer
10
--
0
Edward Grossman
.
Letters
11
--
0
John Stanik
.
News 2.0
14
--
0
Edward Grossman
.
What s on your hard drive
15
--
17
George Neville-Neil
.
Kode vicious battles on
18
--
28
James R. Hamilton
.
A conversation with Pat Selinger
30
--
38
Jim Gray 0001
,
Mark Compton
.
A call to arms
40
--
48
James Ostell
.
Databases of discovery
50
--
58
Margo I. Seltzer
.
Beyond relational databases
60
--
0
André Mariën
.
Review of Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw
61
--
0
Carlos F. Enguix
.
Review of Explorer s Guide to the Semantic Web by Thomas B. Passin
62
--
0
Edward Grossman
.
Calendar
64
--
0
Stan Kelly-Bootle
.
File under unknowable!
Volume
3
, Issue
2
10
--
11
David J. Brown
.
An update on software updates
12
--
14
Edward Grossman
.
Letters
16
--
0
John Stanik
.
News 2.0
18
--
0
Edward Grossman
.
What s on your hard drive?
20
--
0
George Neville-Neil
.
Kode vicious reloaded
24
--
30
Joseph Dadzie
.
Understanding software patching
40
--
46
Dorian Birsan
.
On plug-ins and extensible architectures
48
--
56
Alex E. Bell
.
UML fever: diagnosis and recovery
58
--
0
David Bellin
.
Review of PHP5 and MySQL Bible by Tim Converse and Joyce Park
58
--
0
R.-S. Chang
.
Review of Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk
60
--
0
Edward Grossman
.
Calendar
64
--
0
Jef Raskin
.
Comments are more important than code
Volume
3
, Issue
10
8
--
0
Charlene O Hanlon
.
In with the new
10
--
0
John Stanik
.
News 2.0
11
--
0
Charlene O Hanlon
.
What s on your hard drive?
12
--
15
George Neville-Neil
.
Vicious XSS
16
--
24
Charlene O Hanlon
.
A conversation with Phil Smoot
26
--
32
Daniel Rogers
.
Lessons from the floor
34
--
43
Bill Hoffman
.
Monitoring, at your service
44
--
51
Friedrich Steimann
,
Thomas Kühne
.
Coding for the code
52
--
0
Andreas Tomek
.
Review of Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin
56
--
0
Stan Kelly-Bootle
.
Anything Su Doku, I can do better
Volume
3
, Issue
1
8
--
0
Edward Grossman
.
Puttin the Queue in QA
10
--
0
Edward Grossman
.
Letters
11
--
0
Edward Grossman
.
What s on your hard drive?
12
--
13
George Neville-Neil
.
Kode vicious: the return
20
--
25
Jim Gray
.
A conversation with Tim Bray
26
--
29
Stuart I. Feldman
.
Quality assurance: much more than testing
30
--
37
Keith Stobie
.
Too darned big to test
38
--
44
William W. White
.
Sifting through the software sandbox: SCM meets QA
46
--
53
Michael Donat
.
Orchestrating an automated test lab
54
--
60
Mark Kobayashi-Hillary
.
A passage to India
61
--
0
Radu State
.
Review of Network Security Architectures by Sean Convery
61
--
0
Arun Ektare
.
Review of Designing Software for the Mobile Context: A Practitioner s Guide (Computer Communications and Networks) by Roman Longoria (Ed.)
62
--
0
Edward Grossman
.
Calendar
64
--
0
Terry Coatta
.
Traipsing through the QA tools desert