default search action
Communications of the ACM (CACM), Volume 47, 2004
Volume 47, Number 1, January 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Meg McGinity:
RFID: is this game of tag fair play? 15-18
- Phillip G. Armour:
When executives code. 19-22 - ACM annual report for FY03. 23-29
- Sharon L. Oviatt, Trevor Darrell, Myron Flickner:
Introduction. 30-33 - Anil K. Jain, Arun Ross:
Multibiometric systems. 34-40 - Philip R. Cohen, David McGee:
Tangible multimodal interfaces for safety-critical applications. 41-46 - Roberto Pieraccini, Krishna Dayanidhi, Jonathan Bloom, Jean-Gui Dahan, Michael Phillips, Bryan R. Goodman, K. Venkatesh Prasad:
Multimodal conversational systems for automobiles. 47-49 - Harriet J. Nock, Giridharan Iyengar, Chalapathy Neti:
Multimodal processing by finding common cause. 51-56 - Leah Reeves, Jennifer C. Lai, James A. Larson, Sharon L. Oviatt, T. S. Balaji, Stéphanie Buisine, Penny Collings, Philip R. Cohen, Ben Kraal, Jean-Claude Martin, Michael F. McTear, T. V. Raman, Kay M. Stanney, Hui Su, Qian Ying Wang:
Guidelines for multimodal user interface design. 57-59 - Matthew A. Turk:
Computer vision in the interface. 60-67 - Li Deng, Xuedong Huang:
Challenges in adopting speech recognition. 69-75
- Cynthia F. Cohen, Stanley J. Birkin, Monica J. Garfield, Harold W. Webb:
Managing conflict in software testing. 76-81 - Albert B. Schwarzkopf, Roberto J. Mejias, Jon Jasperson, Carol S. Saunders, Hermann Gruenwald:
Effective practices for IT skills staffing. 83-88 - B. Craig Cumberland, Joseph S. Valacich, Leonard M. Jessup:
Understanding meteor burst communications technologies. 89-92 - Robert J. Aiken, Javad Boroumand, Stephen S. Wolff:
Network and computing research infrastructure: back to the future. 93-98 - Ronald Dattero, Stuart Diaz Galup:
Programming languages and gender. 99-102 - Seungkyoon Shin, Ram D. Gopal, G. Lawrence Sanders, Andrew B. Whinston:
Global software piracy revisited. 103-107 - Wenhong Luo, Mohammad Najdawi:
Trust-building measures: a review of consumer health portals. 108-113
- Marcus J. Ranum:
Believing in myths. 144
Volume 47, Number 2, February 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Pamela Samuelson:
What's at stake in MGM v. Grokster? 15-20
- Gregory J. Pottie:
Privacy in the global e-village. 21-23
- Robert L. Glass:
A look at the economics of open source. 25-27
- Jakka Sairamesh, Alison Lee, Loretta Anania:
Introduction. 28-31 - Lee S. Sproull, John F. Patterson:
Making information cities livable. 33-37 - Elizabeth F. Churchill, Andreas Girgensohn, Les Nelson, Alison Lee:
Blending digital and physical spaces for ubiquitous community participation. 38-44 - Donald F. Ferguson, Jakka Sairamesh, Stuart I. Feldman:
Open frameworks for information cities. 45-49 - Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi:
What makes a Web site popular? 50-55
- Luis von Ahn, Manuel Blum, John Langford:
Telling humans and computers apart automatically. 56-60 - Yossi Lichtenstein:
Puzzles in software development contracting. 61-65 - Conan C. Albrecht:
How clean is the future of SOAP? 66-68 - Rajiv Kishore, Hong Zhang, Ram Ramesh:
A Helix-Spindle model for ontological engineering. 69-75 - Pearl Brereton:
The software customer/supplier relationship. 77-81 - Elizabeth M. Pierce:
Assessing data quality with control matrices. 82-86 - Patrick Y. K. Chau, Paul Jen-Hwa Hu:
Technology implementation for telemedicine programs. 87-92 - Csaba J. Egyhazy, Raj Mukherji:
Interoperability architecture using RM-ODP. 93-97
- Ruth Bolotin Schwartz, Michele C. Russo:
How to quickly find articles in the top IS journals. 98-101
- Lauren Weinstein:
Outsourced and out of control. 120
Volume 47, Number 3, March 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Rebecca Mercuri:
Superscaled security. 15-18 - ACM fellows. 19-20
- Phillip G. Armour:
Beware of counting LOC. 21-24
- Michael A. Cusumano:
Who is liable for bugs and security flaws in software? 25-27
- John G. Messerly:
How computer games affect CS (and other) students' school performance. 29-31
- John Yen:
Introduction to the special issue on emerging technologies for homeland security. 32-35 - Robert L. Popp, Thomas Armour, Ted E. Senator, Kristen Numrych:
Countering terrorism through information technology. 36-43 - Thayne Coffman, Seth Greenblatt, Sherry Marcus:
Graph-based technologies for intelligence analysis. 45-47 - Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar:
Proactive information gathering for homeland security teams. 48-50 - O. Sami Saydjari:
Cyber defense: art to science. 52-57 - Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. 58-61 - Steve Sawyer, Andrea H. Tapia, Leonard Pesheck, John Davenport:
Mobility and the first responder. 62-65 - Robin R. Murphy:
Rescue robotics for homeland security. 66-68
- Gang Wang, Hsinchun Chen, Homa Atabakhsh:
Automatically detecting deceptive criminal identities. 70-76 - Alberto Escudero-Pascual, Ian Hosein:
Questioning lawful access to traffic data. 77-82 - Nikunj P. Dalal, Manjunath Kamath, William J. Kolarik, Eswar Sivaraman:
Toward an integrated framework for modeling enterprise processes. 83-87 - Luigi Suardi:
How to manage your software product life cycle with MAUI. 89-94 - Eyong B. Kim, Marc J. Schniederjans:
The role of personality in Web-based distance education courses. 95-98 - Vikram Sethi, Ruth C. King, James Campbell Quick:
What causes stress in information system professionals? 99-102
- Mark Stamp:
Risks of monoculture. 120
Volume 47, Number 4, April 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- John White:
ACM's Professional Development Centre expands learning opportunities. 14
- Peter J. Denning:
The social life of innovation. 15-19
- Hal Berghel, Natasa Brajkovska:
Wading into alternate data streams. 21-27
- Eric M. Uslaner:
Trust online, trust offline. 28-29
- Christopher A. Miller:
Introduction. 30-34 - Clifford Nass:
Etiquette equality: exhibitions and expectations of computer politeness. 35-37 - Timothy W. Bickmore:
Unspoken rules of spoken interaction. 38-44 - Punya Mishra, Kathryn A. Hershey:
Etiquette and the design of educational technology. 45-49 - Raja Parasuraman, Christopher A. Miller:
Trust and etiquette in high-criticality automated systems. 51-55 - Jennifer Preece:
Etiquette online: from nice to necessary. 56-61
- Srinivas Krishna, Sundeep Sahay, Geoff Walsham:
Managing cross-cultural issues in global software outsourcing. 62-66 - Linda G. Wallace, Mark Keil:
Software project risks and their effect on outcomes. 68-73 - Blake Ives, Kenneth R. Walsh, Helmut Schneider:
The domino effect of password reuse. 75-78 - Anat Hovav, Paul Gray:
Managing academic e-journals. 79-82 - Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis:
The economics of wireless networks. 83-86 - Kevin C. Desouza, J. Roberto Evaristo:
Managing knowledge in distributed projects. 87-91 - Xiaotong Li:
Informational cascades in IT adoption. 93-97
- John Gerdes Jr.:
The viability of supporting anonymous employees. 98-100
- James J. Horning:
Coincidental risks. 112
Volume 47, Number 5, May 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Meg McGinity:
It's alive. 15-18
- Robert L. Glass:
Matching methodology to problem domain. 19-21
- Jeff Grove:
Wanted: public policies that foster creation of knowledge. 23-25
- Kuldeep Kumar, Jos van Hillegersberg:
Introduction. 26-30 - Krishnan Dandapani:
Success and failure in Web-based financial services. 31-33 - Ulrich Homann, Michael Rill, Andreas Wimmer:
Flexible value structures in banking. 34-36 - Alberto Pan, Ángel Viña:
An alternative architecture for financial data integration. 37-40 - Niina Mallat, Matti Rossi, Virpi Kristiina Tuunainen:
Mobile banking services. 42-46 - N. Chandrasekaran, Geert Ensing:
ODC: a global IT services delivery model. 47-49 - Jeroen Tas, Shyam Sunder:
Financial services business process outsourcing. 50-52 - John S. Zdanowicz:
Detecting money laundering and terrorist financing via data mining. 53-55 - Ton Slewe, Mark Hoogenboom:
Who will rob you on the digital highway? 56-60
- Sarv Devaraj, S. Ramesh Babu:
How to measure the relationship between training and job performance. 62-67 - Weidong Xia, Gwanhoo Lee:
Grasping the complexity of IS development projects. 68-74 - Dongsong Zhang, J. Leon Zhao, Lina Zhou, Jay F. Nunamaker Jr.:
Can e-learning replace classroom learning? 75-79 - I. Robert Chiang, Vijay S. Mookerjee:
Improving software team productivity. 89-93 - Rishi Toshniwal, Dharma P. Agrawal:
Tracing the roots of markup languages. 95-98
- Gerald Segal:
2004 ACM elections. 80-89
- Masanori Arita:
Comma-free design for DNA words. 99-100
- Peter J. Denning, Dorothy E. Denning:
Artificial stupidity. 112
Volume 47, Number 6, June 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Real work, necessary friction, optional chaos. 15-18
- Pamela Samuelson:
Why reform the U.S. patent system? 19-23
- Stephen Lau:
The Spinning Cube of Potential Doom. 25-26
- Allan Glaser, Snow Fu, Mark Tumelty:
Growing a participatory programming environment. 27-29
- David E. Culler, Wei Hong:
Wireless Sensor Networks - Introduction. 30-33 - Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan M. Mainwaring, Deborah Estrin:
Habitat monitoring with sensor networks. 34-40 - Jason L. Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy:
The platforms enabling wireless sensor networks. 41-46 - Alec Woo, Samuel Madden, Ramesh Govindan:
Networking support for query processing in sensor networks. 47-52 - Adrian Perrig, John A. Stankovic, David A. Wagner:
Security in wireless sensor networks. 53-57
- Janice C. Sipior, Burke T. Ward, P. Gregory Bonner:
Should spam be on the menu? 59-63 - Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria:
How to retain online customers. 64-70 - Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich:
Emerging business models for mobile brokerage services. 71-77 - Narasimhaiah Gorla, Yan Wah Lam:
Who should work with whom?: building effective software project teams. 79-82 - Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education. 83-88 - Robert L. Glass, Venkataraman Ramesh, Iris Vessey:
An analysis of research in computing disciplines. 89-94 - Weiling Ke, Kwok Kee Wei:
Successful e-government in Singapore. 95-99
- Hartmut Wedekind, Erich Ortner:
Toward universal literacy: from computer science upward. 101-104