Last update:
Thu Apr 24 11:23:27 MDT 2025
Robert S. Boyer and
J. Strother Moore A Fast String Searching Algorithm . . . 762--772
Thomas E. Gerasch An insertion algorithm for a minimal
internal path length binary search tree 579--585
Edsger W. Dijkstra On the Cruelty of Really Teaching
Computer Science . . . . . . . . . . . . 1398--1404
Forouzan Golshani and
Thaddeus Regulinski Prologue: On the Synergism of Computers
and Communication . . . . . . . . . . . 8--10
Michael W. Marcellin and
Thomas R. Fischer Generalized predictive TCQ of speech . . 11--19
S. S. Gaitonde and
Doug W. Jacobson and
A. V. Pohm Bounding Delay on a Multifarious Token
Ring Network . . . . . . . . . . . . . . 20--28
Philip K. McKinley and
Jane W. S. Liu Multicast tree construction in bus-based
networks . . . . . . . . . . . . . . . . 29--42
Krishnan Padmanabhan Cube structures for multiprocessors . . 43--52
Bjorn N. Freeman-Benson and
John Maloney and
Alan Borning An incremental constraint solver . . . . 54--63
Edgar H. Sibley Editorial: New and Improved Computing
Practices . . . . . . . . . . . . . . . 66--69
Chin-Wan Chung DATAPLEX: an access to heterogeneous
distributed databases . . . . . . . . . 70--80
Jason Gait Phoenix: a Safe In-Memory File System 81--86
David G. Carta Two Fast Implementations of the
``Minimal Standard'' Random Number
Generator . . . . . . . . . . . . . . . 87--88
Larry Press Wings for the Mind: The 1989 SIGCHI
National Conference . . . . . . . . . . 115--119
Ellen Hoadley Investigating the Effects of Color . . . 120--125
Dinesh Batra and
Jeffrey A. Hoffler and
Robert P. Bostrom Comparing Representations with
Relational and EER Models . . . . . . . 126--139
David K. Gifford Polychannel systems for mass digital
communications . . . . . . . . . . . . . 141--151
Anders Kierulf and
Ken Chen and
Jurg Nievergelt Smart Game Board and Go Explorer: a
study in software and knowledge
engineering . . . . . . . . . . . . . . 152--166
Rick Joyce and
Gopal Gupta Identity authentication based on
keystroke latencies . . . . . . . . . . 168--176
Bezalel Gavish and
Olivia R. Liu Sheng Dynamic file migration in distributed
computer systems . . . . . . . . . . . . 177--189
J. Rosenberg and
A. L. Ananda and
B. Srinivasan Self-Assessment Procedure XX . . . . . . 190--201
Kuldeep Kumar Post implementation evaluation of
computer-based information systems:
current practices . . . . . . . . . . . 203--212
Matthew A. Tillman and
David Chi-Chung Yen SNA and OSI: Three Strategies for
Interconnection . . . . . . . . . . . . 214--224
Johnny Martin and
W. T. Tsai $ {N}$-Fold Inspection: a Requirements
Analysis Technique . . . . . . . . . . . 225--232
Danielle R. Bernstein and
Joshua Stern and
William Ehrich and
Michael R. Dunlavey and
Leonard Zettel and
Bruce B. Herbert and
Mark Nelson and
W. F. Smyth and
Bruce W. Walker and
Robert M. Gordon and
Stephen N. Cole and
David B. Lightstone ACM Forum: Debatable . . . . . . . . . . 264--271
Larry Press SIGGRAPH '89 --- Tomorrows's PC Today 274--279
Computer Science and
Technology Board Scaling Up: a Research Agenda for
Software Engineering . . . . . . . . . . 281--293
Jakob Nielsen The art of navigating through hypertext 296--310
David A. Carlson and
Sudha Ram HyperIntelligence: The Next Frontier . . 311--321
Vasant Dhar and
Nicky Ranganathan Integer programming vs. expert systems:
an experimental comparison . . . . . . . 323--336
Rolf Molich and
Jakob Nielsen Improving a Human-Computer Dialogue . . 338--348
Farahangiz Arefi and
Charles E. Hughs and
David A. Workman Automatically Generating Visual
Syntax-Directed Editors . . . . . . . . 349--360
Christopher J. Van Wyk Literate Programming\emdashAn Assessment 361, 365
Martin Wielgus and
Marvin L. Watkins and
Edward Sacharuk and
Srinivasarao Damerla ACM Forum: More Debatable . . . . . . . 396--397
Maurice V. Wilkes Computer Security in the Business World 399--401
Karen A. Frenkel The European community and information
technology . . . . . . . . . . . . . . . 404--410
Gerrit Jeelof Europe 1992: Fraternity or Fortress? . . 412--416
Roger A. Chiarodo and
Judee M. Mussehl The semiconductor market in the European
community . . . . . . . . . . . . . . . 417--423
Eiichi Ono Japan's view of EC '92 . . . . . . . . . 424--425
Anonymous EC commission communication on
establishing an information services
market . . . . . . . . . . . . . . . . . 426--432
Anonymous Council decision of July 26, 1988 . . . 434--438
Kurt Geihs and
Ulf Hollberg A Retrospective on DACNOS . . . . . . . 439--448
Daniel S. Hirschberg and
Debra A. Lelewer Efficient decoding of prefix codes . . . 449--459
Pamela Samuelson and
Robert J. Glushko Survey on the Look and Feel Lawsuits . . 483--487
Edgar H. Sibley Special Section on Alphabets and
Language: Introduction . . . . . . . . . 488--490
Jinan Qiao and
Yizheng Qiao and
Sanzheng Qiao Six-digit coding method . . . . . . . . 491--494
Murat Tayli and
Abdulla I. Al-Salamah Building Bilingual Microcomputer Systems 495--504
Paul W. Oman and
Curtis R. Cook Typographic Style is More than Cosmetic 506--520
Subramanian Raman and
Narayanan Alwar An AI-based approach to machine
translation in Indian languages . . . . 521--527
Kuldeep Kumar and
Niels Bjorn-Andersen A Cross-Cultural Comparison of IS
Designer Values . . . . . . . . . . . . 528--538
Alan H. Karp and
Horace P. Flatt Measuring parallel processor performance 539--543
Jason L. Frand and
Julia A. Britt Sixth annual UCLA survey of business
school computer usage . . . . . . . . . 544--562
Brain A. Rudolph Self-assessment procedure XXI: a
self-assessment procedure on concurrency 563--576
M. M. Lehman Technical Correspondence: Uncertainty in
Computer Application . . . . . . . . . . 584--586
Peter J. Denning Alan J. Perlis: 1922--1990: a founding
father of computer science as a separate
discipline . . . . . . . . . . . . . . . 604--605
Bryan Kocher President's Letter: Eschew Obfuscation 625--625
H. M. Gladney and
M. L. Rinehart and
F. Wagner and
David H. Thornley and
Justin H. Coven Letters to the Editor: More on the
Cruelty . . . . . . . . . . . . . . . . 628--630, 633
Maurice Wilkes Networks, Email and Fax . . . . . . . . 631--633
David L. Parnas and
A. John van Schouwen and
Shu Po Kwan Evaluation of safety-critical software 636--648
Renate Rohde and
Jim Haskett Disaster recovery planning for academic
computing centers . . . . . . . . . . . 652--657
E. Burton Swanson and
Cynthia Mathis Beath Departmentalization in software
development and maintenance . . . . . . 658--667
William Pugh Skip Lists: a Probabilistic Alternative
to Balanced Trees . . . . . . . . . . . 668--676
Peter K. Pearson Fast hashing of variable-length text
strings . . . . . . . . . . . . . . . . 677--680
Vijay Kumar Concurrent operations on extendible
hashing and its performance . . . . . . 681--694
Larry Press Personal Computing: Simple Complexity
and COMDEX . . . . . . . . . . . . . . . 21--26
Diane Crawford From Washington -- Budget FY 1991: The
Numbers Tell the R&D Story . . . . . . . 27--29
Thomas E. Linehan Digital Image: Digital Cinema . . . . . 30--37
Karen A. Frenkel The Politics of Standards and the EC . . 40--51
Jacques Cohen Constraint logic programming languages 52--68
Alain Colmerauer An introduction to Prolog III . . . . . 69--90
Monty Newborn and
Danny Kopec The 20th Annual ACM North American
Computer Chess Championship . . . . . . 92--104
S. Jerrold Kaplan and
Mitchell D. Kapor and
Edward J. Belove and
Richard A. Landsman and
Todd R. Drake AGENDA: a Personal Information Manager 105--116
Chenho Kung Object Subclass Hierarchy in SQL: a
Simple Approach . . . . . . . . . . . . 117--125
Peter G. Neumann Inside RISKS: Some reflections on a
telephone switching problem . . . . . . 154--154
Maurice V. Wilkes The bandwidth famine . . . . . . . . . . 19--21
Pamela Samuelson Legally speaking: Should Program
Algorithms be Patented? . . . . . . . . 23--27
Douglas B. Lenat and
Ramanathan V. Guha and
Karen Pittman and
Dexter Pratt and
Mary Shepherd Cyc: Toward Programs With Common Sense 30--49
Jim Barnett and
Kevin Knight and
Inderjeet Mani and
Elaine Rich Knowledge and natural language
processing . . . . . . . . . . . . . . . 50--71
George M. White Natural language understanding and
speech recognition . . . . . . . . . . . 72--82
Karen A. Frenkel Highlights from The Second Annual
Computer Bowl . . . . . . . . . . . . . 84--95
Mark D. Hill and
James R. Larus Cache considerations for multiprocessor
programmers . . . . . . . . . . . . . . 97--102
Leslie G. Valiant A bridging model for parallel
computation . . . . . . . . . . . . . . 103--111
Theodor D. Sterling and
James J. Weinkam Sharing scientific data . . . . . . . . 112--119
Mark L. Gillenson Physical design equivalencies in
database conversion . . . . . . . . . . 120--131
Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142
Peter G. Neumann Insecurity about security? . . . . . . . 170--170
J. R. White President's Letter: Reflections on
Snowbird . . . . . . . . . . . . . . . . 19--20
Diane Crawford EC directives aim for market harmony . . 21--24
Larry Press Compuvision or Teleputer? . . . . . . . 29--36
John D. McGregor and
Tim Korson Introduction to the Special Issue on
Object-Oriented Design . . . . . . . . . 38--39
Tim Korson and
John D. McGregor Understanding Object-Oriented: a
Unifying Paradigm . . . . . . . . . . . 40--60
David Jordan Implementation benefits of C++ language
mechanisms . . . . . . . . . . . . . . . 61--64
Michael F. Kilian Trellis: turning designs into programs 65--67
Bertrand Meyer Lessons from the design of the Eiffel
libraries . . . . . . . . . . . . . . . 68--88
Simon Gibbs and
Dennis Tsichritzis and
Eduardo Casais and
Oscar Nierstrasz and
Xavier Pintado Class management for software
communities . . . . . . . . . . . . . . 90--103
Rebecca J. Wirfs-Brock and
Ralph E. Johnson Surveying current research in
object-oriented design . . . . . . . . . 104--124
Gul Agha Concurrent object-oriented programming 125--141
Brian Henderson-Sellers and
Julian M. Edwards The object-oriented systems life cycle 142--159
David Gries and
Dorothy Marsh The 1988--89 Taulbee survey report . . . 160--169
Peter G. Neumann A few old coincidences . . . . . . . . . 202--202
Maurice V. Wilkes Computing Perspectives: It's All
Software, Now . . . . . . . . . . . . . 19--21
Marc Rettig Practical Programmer: Software Teams . . 23--27
Philip Heidelberger Introduction: discrete event simulation 28--29
Richard M. Fujimoto Parallel discrete event simulation . . . 30--53
Sanjay Jain and
Karon Barber and
David Osterfeld Expert simulation for on-line scheduling 54--60
Alexander Dupuy and
Jed Schwartz and
Yechiam Yemini and
David Bacon NEST: a Network Simulation and
Prototyping Testbed . . . . . . . . . . 63--74
Peter W. Glynn Likelihood ratio gradient estimation for
stochastic systems . . . . . . . . . . . 75--84
Pierre L'Ecuyer Random Numbers for Simulation . . . . . 85--97
David J. Miller Simulation of a semiconductor
manufacturing line . . . . . . . . . . . 98--108
Jakob Nielsen Traditional Dialogue Design Applied to
Modern User Interfaces . . . . . . . . . 109--118
Brian D. Lynch and
H. Rarghav Rao and
Winston T. Lin Economic Analysis of Microcomputer
Hardware . . . . . . . . . . . . . . . . 119--129
Peter G. Neumann Inside RISKS: Ghosts, Mysteries, and
Uncertainty . . . . . . . . . . . . . . 170--170
Larry Press Personal computing: Windows, DOS and the
MAC . . . . . . . . . . . . . . . . . . 19--26
Pamela Samuelson Legally speaking: how to interpret the
Lotus decision (and how not to) . . . . 27--33
Karen A. Frenkel Women and computing . . . . . . . . . . 34--46
Amy Pearl and
Martha E. Pollack and
Eve Riskin and
Becky Thomas and
Elizabeth Wolf and
Alice Wu Becoming a Computer Scientist . . . . . 47--57
Kevin Knight Connectionist Ideas and Algorithms . . . 58--74
Philip A. Bernstein Transaction processing monitors . . . . 75--86
Paul S. Jacobs and
Lisa F. Rau SCISOR: Extracting Information from
On-line News . . . . . . . . . . . . . . 88--97
William J. Premerlani and
Michael R. Blaha and
James E. Rumbaugh and
Thomas A. Varwig An Object-Oriented Relational Database 99--109
Eric A. Weiss The XXII Self-Assessment: The Ethics of
Computing . . . . . . . . . . . . . . . 110--132
Gio Wiederhold and
John McCarthy and
Ed Feigenbaum Obituary: Arthur Samuel (1901--1990).
Pioneer in machine learning . . . . . . 137--138
Peter G. Neumann Inside RISKS: Risks in Computerized
Elections . . . . . . . . . . . . . . . 170--170
Maurice V. Wilkes Computing perspectives: the rise of the
VLSI processor . . . . . . . . . . . . . 16--17, 44
John F. Muratore and
Troy A. Heindel and
Terri B. Murphy and
Arthur Rasmussen and
Robert Z. McFarland Real-time data acquisition at mission
control . . . . . . . . . . . . . . . . 18--31
Barton P. Miller and
Lars Fredriksen and
Bryan So An empirical study of the reliability of
UNIX utilities . . . . . . . . . . . . . 32--44
Andrew S. Tanenbaum and
Robbert van Renesse and
Hans van Staveren and
Gregory J. Sharp and
Sape J. Mullender and
Jack Jansen and
Guido van Rossum Experiences with the Amoeba distributed
operating system . . . . . . . . . . . . 46--63
Vijay Gurbaxani Diffusion in computing networks: the
case of BITNET . . . . . . . . . . . . . 65--75
Jonathan Jacky Inside RISKS: risks in medical
electronics . . . . . . . . . . . . . . 138--138
Seymour E. Goodman International Perspectives: The
Globalization of Computing: Perspectives
on a Changing World . . . . . . . . . . 19--21
Eric K. Clemons Evaluation of strategic investments in
information technology . . . . . . . . . 22--36
C. A. Ellis and
S. J. Gibbs and
G. L. Rein Groupware: Some Issues and Experiences 38--58
Vijay Gurbaxani and
Seungjin Whang The impact of information systems on
organizations and markets . . . . . . . 59--73
John D. Gould and
Stephen J. Boies and
Clayton Lewis Making usable, useful,
productivity-enhancing computer
applications . . . . . . . . . . . . . . 74--85
Sirkka L. Jarvenpaa and
Blake Ives and
Gordon B. Davis Supply/Demand of IS Doctorates in the
1990s . . . . . . . . . . . . . . . . . 86--99
Gary L. Eerkes Profiling Computer Science Master's
Programs . . . . . . . . . . . . . . . . 100--109
Leslie Lamport The Mutual Exclusion Problem has been
Solved (letter) . . . . . . . . . . . . 110--113
Peter G. Neumann Inside RISKS: The Clock Grows at
Midnight . . . . . . . . . . . . . . . . 170--170
Steve Steinberg Viewpoint: a Student's View of
Cryptography in Computer Science . . . . 15--17
John R. Rice And the First Computer Science
Department Was? . . . . . . . . . . . . 19--19
Larry Press Personal computing: personal computers
and the world software market . . . . . 23--28
Elliot Soloway Log on education: Quick, where do the
computers go? . . . . . . . . . . . . . 29--33
Nancy G. Leveson Software safety: in embedded computer
systems . . . . . . . . . . . . . . . . 34--46
K. W. Yu and
Tong Lai Yu Superimposing Encrypted Data . . . . . . 48--54
Flaviu Cristian Understanding fault-tolerant distributed
systems . . . . . . . . . . . . . . . . 56--78
Isabelle Richard On Gerasch's Insertion Algorithm . . . . 79--80
Peter G. Neumann Inside RISKS: Certifying Professionals 130--130
Pamela Samuelson Legally speaking: is information
property? . . . . . . . . . . . . . . . 15--18
John P. Barlow Electronic frontier: coming into the
country . . . . . . . . . . . . . . . . 19--21
Dorothy E. Denning and
Donn B. Parker and
Steven Levy and
Eugene Spafford and
Paula Hawthorn and
Marc Rotenberg and
J. J. Buck BloomBecker and
Richard Stallman The United States vs. Craig Neidorf: a
debate on electronic publishing,
Constitutional rights and hacking . . . 22--43
Donn D. Parker and
Stephen Levy and
Eugene Spafford and
Paula Hawthorn and
Marc Rotenberg and
J. J. Buck BloomBecker and
Richard Stallman Colleagues Debate Denning's Comments . . 33--41
Dorothy E. Denning Denning's Rebuttal . . . . . . . . . . . 42--43
David Gries Teaching Calculation and Discrimination:
a More Effective Curriculum . . . . . . 44--55
Daniel Nussbaum and
Anant Agarwal Scalability of Parallel Machines . . . . 56--61
Jukka Teuhola and
Lutz Wegner Minimal Space, Average Linear Time
Duplicate Deletion . . . . . . . . . . . 62--73
Deborah Hix and
Robert S. Schulman Human-Computer Interface Development
Tools: a Methodology for Their
Evaluation . . . . . . . . . . . . . . . 74--87
Dorothea Blostein and
Lippold Haken Justification of printed music . . . . . 88--99
Peter G. Neumann Inside RISKS: putting on your best
interface . . . . . . . . . . . . . . . 138--138
Larry Press Personal Computing: Personal Computers
as Research Tools: SIG CHI and CSCW'90 19--25
Edward A. Fox Guest Editor's Introduction: Standards
and the Emergence of Digital Multimedia
Systems . . . . . . . . . . . . . . . . 26--29
Gregory K. Wallace The JPEG still picture compression
standard . . . . . . . . . . . . . . . . 30--44
Greg Cockroft and
Leo Hourvitz NeXTstep: Putting JPEG to Multiple Uses 45, 116
Didier Le Gall MPEG: a video compression standard for
multimedia applications . . . . . . . . 46--58
Ming Liou Overview of the $ p \times 64 $ kbit/s
Video Coding Standard . . . . . . . . . 59--63
Kevin Harney and
Mike Keith and
Gary Lavelle and
Lawrence D. Ryan and
Daniel J. Stark The i750 Video Processor: a Total
Multimedia Solution . . . . . . . . . . 64--78
Frans Sijstermans and
Jan van der Meer CD-I full-motion video encoding on a
parallel computer . . . . . . . . . . . 81--91
Andrew Lippman Feature sets for interactive images . . 92--102
Michael Liebhold and
Eric M. Hoffert Toward an open environment for digital
video . . . . . . . . . . . . . . . . . 103--112
Eric M. Hoffert and
Greg Gretsch The Digital News System at EDUCOM: a
Convergence of Interactive Computing,
Newspapers, Television and High-Speed
Networks . . . . . . . . . . . . . . . . 113--116
Nathaniel S. Borenstein Multimedia electronic mail: will the
dream become a reality? . . . . . . . . 117--119
Peter G. Neumann Inside Risks: interpreting
(MIS)information . . . . . . . . . . . . 144--144
Peter J. Denning Short Citedness (editorial) . . . . . . 17--19
Maurice V. Wilkes Computing perspectives: software and the
programmer . . . . . . . . . . . . . . . 23--24
Marc Rettig Practical programmer: testing made
palatable . . . . . . . . . . . . . . . 25--29
Peter A. Freeman and
Marie-Claude Gaudel Building a foundation for the future of
software engineering . . . . . . . . . . 30--33
Premkumar Devanbu and
Ronald J. Brachman and
Peter G. Selfridge and
Bruce W. Ballard LaSSIE: a knowledge-based software
information system . . . . . . . . . . . 34--49
Armen Gabrielian and
Matthew K. Franklin Multilevel specification of real time
systems . . . . . . . . . . . . . . . . 50--60
Christine Lafontaine and
Yves Ledru and
Pierre-Yves Schobbens An experiment in formal software
development: using the B theorem prover
on a VDM case study . . . . . . . . . . 62--71, 87
Jack C. Wileden and
Alexander L. Wolf and
William R. Rosenblatt and
Peri L. Tarr Specification-level interoperability . . 72--87
Rubén Prieto-Díaz Implementing faceted classification for
software reuse . . . . . . . . . . . . . 88--97
Peter G. Neumann Inside RISKS: Expecting the Unexpected
Mayday . . . . . . . . . . . . . . . . . 128--128
Diane Crawford From Washington: CEOs unite to influence
U.S. technology policy . . . . . . . . . 15--18
Pamela Samuelson Legally speaking: First Amendment rights
for information providers? . . . . . . . 19--23
S. E. Goodman and
W. K. McHenry International Perspectives: The Soviet
Computer Industry: a Tale of Two Sectors 25--28
Vadim E. Kotov Project START . . . . . . . . . . . . . 30--31
Vadim E. Kotov Concurrency + modularity +
programmability = MARS . . . . . . . . . 32--45
Enn Tyugu Three New-Generation Software
Environments . . . . . . . . . . . . . . 46--59
Alexander S. Narin'yani Intelligent software technology for the
new decade . . . . . . . . . . . . . . . 60--67
Allen B. Tucker and
Bruce H. Barnes and
Robert M. Aiken and
Keith Barker and
Kim B. Bruce and
J. Thomas Cain and
Susan E. Conry and
Gerald L. Engel and
Richard G. Epstein and
Doris K. Lidtke and
Michael C. Mulder and
Jean B. Rogers and
Eugene H. Spafford and
A. Joe Turner A Summary of the ACM/IEEE-CS Joint
Curriculum Task Force Report: Computing
Curricula 1991 . . . . . . . . . . . . . 68--84
Robert N. Charette Inside RISKS: Risks with Risk Analysis 106--106
Marc Rettig Practical Programmer: Nobody Reads
Documentation . . . . . . . . . . . . . 19--24
Larry Press Personal Computing: Notes from COMDEX 25--29
Isaac V. Kerlow Art + design + computer graphics
technology . . . . . . . . . . . . . . . 30--39
J. F. Nunamaker and
Alan R. Dennis and
Joseph S. Valacich and
Douglas R. Vogel and
Joey F. George Electronic Meeting Systems to Support
Group Work . . . . . . . . . . . . . . . 40--61
Joey F. George and
John L. King Examining the computing and
centralization debate . . . . . . . . . 62--72
Richard L. Phillips MediaView: a General Multimedia Digital
Publication System . . . . . . . . . . . 74--83
Peter G. Neumann Inside RISKS: Computers, Ethics and
Values . . . . . . . . . . . . . . . . . 106--106
Maurice V. Wilkes Computing Perspectives: Revisiting
Computer Security in the Business World 19--22
John Perry Barlow Electronic Frontier: Private Life in
Cyberspace . . . . . . . . . . . . . . . 23--25
Marcel Schoppers Real-time knowledge-based control
systems . . . . . . . . . . . . . . . . 26--30
B. Chandrasekaran and
R. Bhatnagar and
D. D. Sharma Real-time disturbance control . . . . . 32--47
David W. Payton and
Thomas E. Bihari Intelligent real-time control of robotic
vehicles . . . . . . . . . . . . . . . . 48--63
Wolf Kohn Declarative control architecture . . . . 64--79
C. J. Paul and
Anurag Acharya and
Bryan Black and
Jay K. Strosnider Reducing problem-solving variance to
improve predictability . . . . . . . . . 80--93
Jeffrey E. Kottemann and
Michael D. Gordon and
Jack W. Stott A storage and access manager for
ill-structured data . . . . . . . . . . 94--103
Edward H. Bersoff and
Alan M. Davis Impacts of Life Cycle Models on Software
Configuration Management . . . . . . . . 104--118
Ronni Rosenberg Inside RISKS: Mixed Signals about Social
Responsibility . . . . . . . . . . . . . 146--146
Seymour E. Goodman International Perspectives: From Under
the Rubble: Computing and the
Resuscitation of Romania . . . . . . . . 19--22
Elliot Soloway Log on Education: How the Nintendo
Generation Learns . . . . . . . . . . . 23--26, 95
John Foderaro LISP: introduction . . . . . . . . . . . 27--27
Richard P. Gabriel and
Jon L. White and
Daniel G. Bobrow CLOS: integrating object-oriented and
functional programming . . . . . . . . . 28--38
Kenneth H. Sinclair and
David A. Moon The philosophy of Lisp . . . . . . . . . 40--47
Oliver Gajek The Metal system . . . . . . . . . . . . 46--47
D. Kevin Layer and
Chris Richardson Lisp Systems in the 1990s . . . . . . . 48--57
Scott McKay CLIM: the Common Lisp interface manager 58--59
Hans Muller LispView: leverage through integration 59--61
Richard Barber and
George Imlah Delivering the goods with Lisp . . . . . 61--63
James R. Allard and
Lowell B. Hawkinson Real-time programming in Common Lisp . . 64--69
Rocky L. Stewart Biosphere 2 nerve system . . . . . . . . 69--71
Fernando J. Corbató On building systems that will fail . . . 72--81
Karen A. Frenkel An Interview with Fernando José Corbató 82--90
Peter G. Neumann Inside RISKS: The Not-So-Accidental
Holist . . . . . . . . . . . . . . . . . 122--122
Maurice V. Wilkes Computing Perspectives: Could it Have
Been Predicted? . . . . . . . . . . . . 19--21
Pamela Samuelson Legally Speaking: Digital Media and the
Law . . . . . . . . . . . . . . . . . . 23--28
R. G. G. Cattell Next-generation database systems . . . . 30--33
O. Deux and
others The $ {O}_2 $ system . . . . . . . . . . 34--48
Charles Lamb and
Gordon Landis and
Jack Orenstein and
Dan Weinreb The ObjectStore database system . . . . 50--63
Paul Butterworth and
Allen Otis and
Jacob Stein The GemStone Object Database Management
System . . . . . . . . . . . . . . . . . 64--77
Michael Stonebraker and
Greg Kemnitz The POSTGRES Next-Generation Database
Management System . . . . . . . . . . . 78--92
Guy M. Lohman and
Bruce Lindsay and
Hamid Pirahesh and
K. Bernhard Schiefer Extensions to Starburst: objects, types,
functions, and rules . . . . . . . . . . 94--109
Avi Silberschatz and
Michael Stonebraker and
Jeff Ullman Database systems: achievements and
opportunities . . . . . . . . . . . . . 110--120
Barbara Simons and
Dennis J. Frailey and
A. Joe Turner and
Stuart H. Zweben and
Peter J. Denning Report: An ACM Response: The Scope and
Directions for Computer Science . . . . 121--131
Clark Weissman Inside RISKS: a National Debate on
Encryption Exportability . . . . . . . . 162--162
John R. White President's Letter: Maintaining Free
Access to Scientific and Professional
Activities . . . . . . . . . . . . . . . 13--14, 16
Senator Albert Gore, Jr. Viewpoint: HPCC Policy Champion Forsees
Networked Nation . . . . . . . . . . . . 15--16
Diane Crawford From Washington: Supercomputing Policy
Links Science and the `C' Word . . . . . 25--28
Eric S. Lander and
Robert Langridge and
Damian M. Saccocio A Report on Computing in Molecular
Biology: Mapping and Interpreting
Biological Information . . . . . . . . . 32--39
Karen A. Frenkel A Monumental Science Adventure: The
Human Genome Project and Informatics . . 40--51
Cherri M. Pancake Software Support for Parallel Computing:
Where Are We Headed? . . . . . . . . . . 52--64
Steven R. Newcomb and
Neill A. Kipp and
Victoria T. Newcomb The ``HyTime'': hypermedia/time-based
document structuring language . . . . . 67--83
Monty Newborn and
Danny Kopec The 21st ACM North American computer
chess championship . . . . . . . . . . . 84--92
Robert D. Silverman Massively Distributed Computing and
Factoring Large Integers: a Pracnique 94--103
James E. Lumpp, Jr. and
Samuel A. Fineberg and
Wayne G. Nation and
Thomas L. Casavant and
Edward C. Bronson and
Howard Jay Siegel and
Pierre H. Pero and
Thomas Schwederski and
Dan C. Marinescu CAPS: a Coding Aid for PASM . . . . . . 104--117
I. Dittmer Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 118--118
Jacques Savoy Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 118--119
James Litsios Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 119--120
Peter Pearson Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 120--120
Peter G. Neumann Inside RISKS: The Human Element . . . . 150--150
Larry Press Personal Computing: Wide-Area
Collaboration . . . . . . . . . . . . . 21--24
Seymour E. Goodman International Perspectives: Computing in
a Less-Developed Country . . . . . . . . 25--29
Jonathan Grudin CSCW Introduction . . . . . . . . . . . 30--34
Hiroshi Ishii and
Naomi Miyake Toward an open shared workspace:
computer and video fusion approach of
TeamWorkStation . . . . . . . . . . . . 37--50
Ellen Francik and
Susan Ehrlich Rudman and
Donna Cooper and
Stephen Levine Putting innovation to work: adoption
strategies for multimedia communication
systems . . . . . . . . . . . . . . . . 52--63
Morten Kyng Designing for cooperation: cooperating
in design . . . . . . . . . . . . . . . 65--73
Constance Perin Electronic social fields in
bureaucracies . . . . . . . . . . . . . 74--82
Laurence C. Rosenberg Update on National Science Foundation
funding of the ``Collaboratory'' . . . . 83--83
Rob Kling Cooperation, coordination and control in
computer-supported work . . . . . . . . 83--88
Donald A. Norman Collaborative computing: collaboration
first, computing second . . . . . . . . 88--90
Patrick M. LaMalva and
David R. Reyes-Guerra Accredited Programs in Computing,
Followed by Year of Initial
Accreditation . . . . . . . . . . . . . 91--96
W. Wesley Peterson More Error-Detecting Decimal Digits . . 110--113
Peter G. Neumann Inside RISKS: Collaborative Efforts . . 162--162
Frailey and
Turner and
Zweben Adequacy and Health of Academic-Industry
Coupling . . . . . . . . . . . . . . . . ??
Simons Building a Research Agenda . . . . . . . ??
R. Stallman and
S. Garfinkel Against Software Patents . . . . . . . . 17
John Perry Barlow Electronic Frontier: The Great Work . . 25--28
Marc Rettig Practical Programmer: Interface Design
When You Don't Know How . . . . . . . . 29--34
Bernard J. Haan and
Paul Kahn and
Victor A. Riley and
James H. Coombs and
Norman K. Meyrowitz IRIS hypermedia services . . . . . . . . 36--51
James L. Green The evolution of DVI system software . . 52--67
Jeffrey S. Doerschler and
Herbert Freeman A rule-based system for dense-map name
placement . . . . . . . . . . . . . . . 68--79
Guy Lapalme and
Jean-Marc Rousseau and
Suzanne Chapleau and
Michel Cormier and
Pierre Cossette and
Serge Roy GeoRoute: a Geographic Information
System for Transportation Applications 80--88
Girish H. Subramanian and
John Nosek and
Sankaran P. Raghunathan and
Santosh S. Kanitkar A comparison of the decision table and
tree . . . . . . . . . . . . . . . . . . 89--94
Suzanne Bunton and
Gaetano Borriello Practical dictionary management for
hardware data compression . . . . . . . 95--104
Edward A. Fox and
Lenwood S. Heath and
Qi Fan Chen and
Amjad M. Daoud Practical minimal perfect hash functions
for large databases . . . . . . . . . . 105--121
Jason L. Frand and
Julia A. Britt Seventh Annual UCLA Survey of Business
School Computer Usage . . . . . . . . . 123--131
D. Gries and
D. Marsh The 1989-1990 Taulbee Report . . . . . . 132
David Gries and
Dorothy Marsh The 1989--90 Taulbee Survey . . . . . . 133--143
Peter G. Neumann Inside Risks: What's in a Name? . . . . 186--186
R. Gary Marquart and
Anthony Fedanzo and
Robert V. Binder and
C. J. Paul and
David Ibbetson ACM Forum: Readers Take Exception to
Rejoinder: And the Surgeon General Warns
\ldots . . . . . . . . . . . . . . . . . 22, 26
Carol Wolinsky and
James Sylvester From Washington: Privacy in the
Telecommunications Age . . . . . . . . . 23--25
Pamela Samuelson Legally Speaking: Copyright Law and
Electronic Compilations of Data . . . . 27--32
Magid Igbaria and
Jeffrey H. Greenhaus Determinants of MIS Employees' Turnover
Intentions: A Structural Equation Model 34--49
Albert L. Lederer and
Jayesh Prasad Nine management guidelines for better
cost estimating . . . . . . . . . . . . 51--59
Thomas D. Clark, Jr. Corporate systems management: an
overview and research perspective . . . 61--75
Jeffrey K. Liker and
Mitchell Fleischer and
Mitsuo Nagamachi and
Michael S. Zonnevylle Designers and Their Machines: CAD Use
and Support in the U.S. and Japan . . . 77--95
David Gelernter and
Nicholas Carriero Coordination languages and their
significance . . . . . . . . . . . . . . 97--107
Joobin Choobineh and
Michael V. Mannino and
Veronica P. Tseng A form-based approach for database
analysis and design . . . . . . . . . . 108--120
Robert W. Gray and
Vincent P. Heuring and
Steven P. Levi and
Anthony M. Sloane and
William M. Waite Eli: a Complete, Flexible Compiler
Construction System . . . . . . . . . . 121--130
Seymour E. Goodman Political activity and international
computer networks . . . . . . . . . . . 174--174
Antonio R. Quesada and
Paul Pritchard and
Richard E. James, III Additional notes on a practical sieve
algorithm . . . . . . . . . . . . . . . 11--14
Maurice V. Wilkes Computing Perspectives: Charles Babbage:
The Great Uncle of Computing? . . . . . 15--16, 21
Larry Press Personal Computing: Dynabook Revisited:
Portable Computers Past, Present and
Future . . . . . . . . . . . . . . . . . 25--32
Jacques Cohen First specialize, then generalize:
introduction . . . . . . . . . . . . . . 34--39
J. A. Robinson Logic and Logic Programming . . . . . . 40--65
John Grant and
Jack Minker The Impact of Logic Programming on
Databases . . . . . . . . . . . . . . . 66--81
Koichi Furukawa Logic programming as the integrator of
the Fifth Generation Computer Systems
project . . . . . . . . . . . . . . . . 82--92
David S. Warren Memoing for logic programs . . . . . . . 93--111
Toshinori Munakata Notes on implementing sets in Prolog . . 112--120
Marcia C. Linn and
Michael J. Clancy The case for case studies of programming
problems . . . . . . . . . . . . . . . . 121--132
Peter G. Neumann Inside RISKS: inside ``RISKS of RISKS'' 160--160
Renata L. La Rovere and
S. E. Goodman International Perspectives: Computing in
the Brazilian Amazon . . . . . . . . . . 21--24
Ronald J. Norman and
Gene Forte Automating the software development
process: CASE in the 90's . . . . . . . 27--27
Gene Forte and
Ronald J. Norman A self-assessment by the software
engineering community . . . . . . . . . 28--32
Terry Shepard and
Steve Sibbald and
Colin Wortley A visual software process language . . . 37--44
Clifford C. Huff Elements of a realistic CASE tool
adoption budget . . . . . . . . . . . . 45--54
Neil A. Maiden and
Alistair G. Sutcliffe Exploiting reusable specifications
through analogy . . . . . . . . . . . . 55--64
Graham Tate and
June Verner and
Ross Jeffery CASE: a Testbed for Modeling,
Measurement and Management . . . . . . . 65--72
Ira D. Baxter Design maintenance systems . . . . . . . 73--89
Iris Vessey and
Sirkka L. Jarvenpaa and
Noam Tractinsky Evaluation of vendor products: CASE
tools as methodology companions . . . . 90--105
Barry G. Silverman Survey of expert critiquing systems:
practical and theoretical frontiers . . 106--127
Jean Sammet Farewell to Grace Hopper: end of an era! 128--131
Ricardo Baeza-Yates and
Fred T. Krogh and
Bernard Ziegler and
Peter R. Sibbald and
Daniel M. Sunday Technical Correspondence: Notes on a
Very Fast Substring Search Algorithm . . 132--137
Marc Rotenberg Inside RISKS: Protecting privacy . . . . 164--164
Marc Rettig A succotash of projections and insights 25--30
Ephraim P. Glinert and
Bryant W. York Computers and people with disabilities 32--35
Carl Brown Assistive technology computers and
persons with disabilities . . . . . . . 36--45
Norman Alm and
John L. Arnott and
Alan F. Newell Prediction and conversational momentum
in an augmentative communication system 46--57
Norman Alm and
John L. Arnott and
Alan F. Newell Input acceleration techniques for
severely physically disabled nonspeakers
using a communication system . . . . . . 54--55
Randy Pausch and
Ronald D. Williams Giving CANDY to children: user-tailored
gesture input driving an
articulator-based speech synthesizer . . 58--66
Patrick W. Demasco and
Kathleen F. McCoy Generating text from compressed input:
an intelligent interface for people with
severe motor impairments . . . . . . . . 68--78
Karen Kukich Spelling correction for the
telecommunications network for the deaf 80--90
Randy Dipner ADA and the ACM . . . . . . . . . . . . 90--90
Daniel K. Davies and
Randy W. Dipner ACM membership survey of disability and
disability issues . . . . . . . . . . . 91--93
Ronald E. Anderson ACM code of ethics and professional
conduct . . . . . . . . . . . . . . . . 94--99
Peter G. Neumann Survivable systems . . . . . . . . . . . 130--130
Walter F. Tichy and
Michael Philippsen and
Phil Hatcher and
James L. Frankel Technical Correspondence: a Critique of
the Programming Language C* . . . . . . 21--24
Colin Boyd and
Tong Lai Yu Remarks on a Data Encryption Scheme of
Yu and Yu (letters) . . . . . . . . . . 24--25
Larry Press Collective dynabases . . . . . . . . . . 26--32
Pamela Samuelson and
Michel Denber and
Robert J. Glushko Developments on the intellectual
property front . . . . . . . . . . . . . 33--39
John C. Hart Visualization in networked environments 42--43
Larry Smarr and
Charles E. Catlett Metacomputing . . . . . . . . . . . . . 44--52
Philip J. Mercurio and
T. T. Elvins and
Stephen J. Young and
Philip S. Cohen and
Kevin R. Fall and
Mark H. Ellisman The Distributed Laboratory: An
Interactive Visualization Environment
for Electron Microscopy and 3D Imaging 54--63
Carolina Cruz-Neira and
Daniel J. Sandin and
Thomas A. DeFanti and
Robert V. Kenyon and
John C. Hart The CAVE: audio visual experience
automatic virtual environment . . . . . 64--72
Ingrid Carlbom and
William M. Hsu and
Gudrun Klinker and
Richard Szeliski and
Keith Waters and
Michael Doyle and
Jim Gettys and
Kristen M. Harris and
Thomas M. Levergood and
Ricky Palmer and
Larry Palmer and
Marc Picart and
Demetri Terzopoulos and
David Tonnesen and
Michael Vannier and
Greg Wallace Modeling and analysis of empirical data
in collaborative environments . . . . . 74--84
David DeWitt and
Jim Gray Parallel database systems: the future of
high performance database systems . . . 85--98
Kunihiko Higa and
Mike Morrison and
Joline Morrison and
Olivia R. Liu Sheng An Object-Oriented Methodology for
Knowledge Base/Database Coupling . . . . 99--113
David E. Ferguson Bit-Tree: a data structure for fast file
processing . . . . . . . . . . . . . . . 114--120
Paul Heckel Debunking the software patent myths . . 121--140
Peter G. Neumann Leap-year problems . . . . . . . . . . . 162--162
Elliot Soloway Buying Computers for Your School: a
Guide for the Perplexed . . . . . . . . 21--24
John Perry Barlow Decrypting the puzzle palace . . . . . . 25--31
Anonymous Debating encryption standards . . . . . 32--34
National Institute of Standards and
Technology (NIST) The Digital Signature Standard, Proposed
by NIST . . . . . . . . . . . . . . . . 36--40
Ronald L. Rivest and
Martin E. Hellman and
John C. Anderson and
John W. Lyons Responses to NIST's proposal . . . . . . 41--54
Bala R. Vatti A generic solution to polygon clipping 56--63
Santosh Chokhani Trusted products evaluation . . . . . . 64--76
Alok Sinha Client-Server Computing: Current
Technology Review . . . . . . . . . . . 77--98
Wim Hesselink and
Jan Jongejan and
Jukka Teuhola and
Lutz Wegner Technical Correspondence: Duplicate
Deletion Derived . . . . . . . . . . . . 99--107
Peter G. Neumann Aggravation by computer: life, death,
and taxes . . . . . . . . . . . . . . . 122--122
Maurice V. Wilkes Computing Perspectives: Artificial
Intelligence as the Year 2000 Approaches 17--23
S. E. Goodman and
J. D. Green Computing in the Middle East . . . . . . 21--24
C. Gordon Bell Ultracomputers: a Teraflop Before Its
Time . . . . . . . . . . . . . . . . . . 26--47
Robert H. Creecy and
Brij M. Masand and
Stephen J. Smith and
David L. Waltz Trading MIPS and memory for knowledge
engineering . . . . . . . . . . . . . . 48--64
Ken Kennedy Guest Editor's Introduction to the
Special Section on Supercomputing . . . 65--65
Seema Hiranandani and
Ken Kennedy and
Chau-Wen Tseng Compiling Fortran D for MIMD
distributed-memory machines . . . . . . 66--80
David Cann Retire Fortran? A Debate Rekindled . . . 81--89
Susan Flynn Hummel and
Edith Schonberg and
Lawrence E. Flynn Factoring: a Method for Scheduling
Parallel Loops . . . . . . . . . . . . . 90--101
William Pugh A practical algorithm for exact array
dependence analysis . . . . . . . . . . 102--114
Margaret L. Simmons and
Harvey J. Wasserman and
Olaf M. Lubeck and
Christopher Eoyang and
Raul Mendez and
Hiroo Harada and
Misako Ishiguro A performance comparison of four
supercomputers . . . . . . . . . . . . . 116--124
Peter G. Neumann Inside RISKS: Fraud by Computer . . . . 154--154
Pamela Samuelson Updating the copyright look and feel
lawsuits . . . . . . . . . . . . . . . . 25--31
Timothy D. Korson and
Vijay K. Vaishnavi Analysis and modeling in software
development . . . . . . . . . . . . . . 32--34
David E. Monarchi and
Gretchen I. Puhr A Research Typology for Object-Oriented
Analysis and Design . . . . . . . . . . 35--47
Kenneth S. Rubin and
Adele Goldberg Object behavior analysis . . . . . . . . 48--62
Jean-Marc Nerson Applying object-oriented analysis and
design . . . . . . . . . . . . . . . . . 63--74
Bill Curtis and
Marc I. Kellner and
Jim Over Process modeling . . . . . . . . . . . . 75--90
Herb Krasner and
Jim Terrel and
Adam Linehan and
Paul Arnold and
William H. Ett Lessons learned from a software process
modeling system . . . . . . . . . . . . 91--100
Timothy D. Korson and
Vijay K. Vaishnavi Managing Emerging Software Technologies:
a Technology Transfer Framework . . . . 101--111
Shamkant B. Navathe Evolution of data modeling for databases 112--123
B. Chandrasekaran and
Todd R. Johnson and
Jack W. Smith Task-structure analysis for knowledge
modeling . . . . . . . . . . . . . . . . 124--137
Ramayya Krishnan and
Xiaoping Li and
David Steier A knowledge-based mathematical model
formulation system . . . . . . . . . . . 138--146
Meilir Page-Jones Comparing techniques by means of
encapsulation and connascence . . . . . 147--151
Peter Coad Object-Oriented Patterns . . . . . . . . 152--159
Oscar Nierstrasz and
Simon Gibbs and
Dennis Tsichritzis Component-Oriented Software Development 160--165
August-Wilhelm Scheer and
Alexander Hars Extending data modeling to cover the
whole enterprise . . . . . . . . . . . . 166--172
Peter G. Neumann Inside RISKS: Accidental Financial
Losses . . . . . . . . . . . . . . . . . 194--194
Marc Rettig Practical Programmer: Hat Racks for
Understanding . . . . . . . . . . . . . 21--24
John Perry Barlow Electronic Frontier: Will Japan Jack In? 27--29
Anthony C. Stylianou and
Gregory R. Madey and
Robert D. Smith Selection Criteria for Expert System
Shells: a Socio-Technical Framework . . 30--48
David S. Touretzky and
Peter Lee Visualizing evaluation in applicative
languages . . . . . . . . . . . . . . . 49--59
Yosee Feldman and
Ehud Shapiro Spatial Machines: a More Realistic
Approach to Parallel Computation . . . . 60--73
Ricardo Baeza-Yates and
Gaston H. Gonnet A new approach to text searching . . . . 74--82
Sun Wu and
Udi Manber Fast text searching allowing errors . . 83--91
Dov Dori Dimensioning analysis: toward automatic
understanding of engineering drawings 92--103
Shailendra C. Palvia and
Steven R. Gordon Tables, trees and formulas in decision
analysis . . . . . . . . . . . . . . . . 104--113
Peter G. Neumann Inside RISKS: Where to Place Trust . . . 138--138
Stuart Zweben President's Letter: We Overplanting Our
Seed Corn? . . . . . . . . . . . . . . . 15--16
Peter Likins Viewpoint: a Breach of the Social
Contract . . . . . . . . . . . . . . . . 17--18, 111
Brad Knowles and
Roger Schlafly and
Grant D. Schultz and
Lynn Zelvin and
Paul Heckel and
E. Robert Yoches ACM Forum: Comments on Cryptography . . 19--24, 112
Maurice V. Wilkes Computing Perspectives. The Long-Term
Future of Operating Systems . . . . . . 23--24, 112
G. M. Mesher and
R. O. Briggs and
S. E. Goodman and
L. I. Press and
J. M. Snyder International Perspectives: Cuba,
Communism, and Computing . . . . . . . . 27--29, 112
Juris Hartmanis Computing the future: committee to
assess the scope and direction of
computer science and technology for the
National Research Council . . . . . . . 30--40
Benjamin M. Brosgol Ada . . . . . . . . . . . . . . . . . . 41--42
Edmond Schonberg and
Mark Gerhardt and
Charlene Hayden A technical tour of Ada . . . . . . . . 43--52
Michael B. Feldman Ada Experience in the Undergraduate
Curriculum . . . . . . . . . . . . . . . 53--67
John W. McCormick A model railroad for Ada and software
engineering . . . . . . . . . . . . . . 68--70
J. P. Rosen What orientation should Ada objects
take? . . . . . . . . . . . . . . . . . 71--76
S. Tucker Taft Ada 9X: a Technical Summary . . . . . . 77--82
Chris Anderson Ada 9X Project Management . . . . . . . 83--84
Erhard Ploedereder Building consensus for Ada 9X . . . . . 85--88
Gio Wiederhold and
Peter Wegner and
Stefano Ceri Toward megaprogramming . . . . . . . . . 89--99
Danny Kopec and
Monty Newborn and
Mike Valvo The 22nd Annual ACM International
Computer Chess Championship . . . . . . 100--110
Rebecca Mercuri Inside RISKS: Voting Machine Risks . . . 138--138
Judith L. Gersting Viewpoint: Intangibles for Success . . . 11--12
Patrick J. Hayes and
Gordon S. Novak, Jr. and
Wendy G. Lehnert ACM Forum: In Defense of Artificial
Intelligence . . . . . . . . . . . . . . 13--16
Joseph F. Traub A tribute to Allen Newell: 1927--1992 20--20
Larry Press Personal Computing: The Net: Progress
and Opportunity . . . . . . . . . . . . 21--25
Shoshana Loeb and
Douglas Terry Information filtering . . . . . . . . . 26--28
Nicholas J. Belkin and
W. Bruce Croft Information filtering and information
retrieval: two sides of the same coin? 29--38
Shoshana Loeb Architecting personalized delivery of
multimedia information . . . . . . . . . 39--47
Curt Stevens Automating the creation of information
filters . . . . . . . . . . . . . . . . 48--48
Irene Stadnyk and
Robert Kass Modeling users' interests in information
filters . . . . . . . . . . . . . . . . 49--50
Paul E. Baclace Competitive agents for information
filtering . . . . . . . . . . . . . . . 50--50
Peter W. Foltz and
Susan T. Dumais Personalized Information Delivery: An
Analysis of Information-Filtering
Methods . . . . . . . . . . . . . . . . 51--60
David Goldberg and
David Nichols and
Brian M. Oki and
Douglas Terry Using collaborative filtering to weave
an information tapestry . . . . . . . . 61--70
T. F. Bowen and
G. Gopal and
G. Herman and
T. Hickey and
K. C. Lee and
W. H. Mansfield and
J. Raitz and
A. Weinrib The Datacycle architecture . . . . . . . 71--81
Ashwin Ram Natural language understanding for
information-filtering systems . . . . . 80--81
Peter J. Denning Educating a new engineer . . . . . . . . 82--97
Patrick M. LaMalva and
David R. Reyes-Guerra Accredited Programs in Computing . . . . 98--101
Peter G. Neumann Inside RISKS: Avoiding Weak Links . . . 146--146
Pamela Samuelson Legally Speaking: Liability for
Defective Electronic Information . . . . 21--26
Sara A. Bly and
Steve R. Harrison and
Susan Irwin Multimedia In The Workplace: Media
Spaces: Bringing People Together in a
Video, Audio, and Computing Environment 28--47
Bryan Lyles Media spaces and broadband ISDN . . . . 46--47
Robert S. Fish and
Robert E. Kraut and
Robert W. Root and
Ronald E. Rice Video as a technology for informal
communication . . . . . . . . . . . . . 48--61
Ralph D. Hill and
Tom Brinck and
John F. Patterson and
Steven L. Rohall and
Wayne T. Wilner The Rendezvous Language and Architecture 62--67
M. Arango and
L. Bahler and
P. Bates and
M. Cochinwala and
D. Cohrs and
R. Fish and
G. Gopal and
N. Griffeth and
G. E. Herman and
T. Hickey and
K. C. Lee and
W. E. Leland and
C. Lowery and
V. Mak and
J. Patterson and
L. Ruston and
M. Segal and
R. C. Sekar and
M. P. Vecchi and
A. Weinrib and
S.-Y. Wuu Touring Machine System . . . . . . . . . 68--77
Robin Milner Elements of interaction: Turing Award
Lecture . . . . . . . . . . . . . . . . 78--89
Karen A. Frenkel An interview with Robin Milner . . . . . 90--97
Jean-Pierre Banâtre and
Daniel Le Métayer Programming by multiset transformation 98--111
Peter G. Neumann Inside RISKS: Risks Considered
Global(ly) . . . . . . . . . . . . . . . 154--154
Rob Kling and
Peter Wegner and
John R. Rice and
Eric A. Weiss Technical Correspondence: Broadening
Computer Science . . . . . . . . . . . . 15--20
Maurice V. Wilkes Computing Perspectives: Light Amplifiers
and Solitons . . . . . . . . . . . . . . 21--23
M. Odedra and
M. Bennett and
S. Goodman and
M. Lawrie International Perspectives: Sub-Saharan
Africa: a Technological Desert . . . . . 25--29
Robert M. Supnik Introduction to Special Issue on
Digital's Alpha Chip Project . . . . . . 30--32
Richard L. Sites Alpha AXP Architecture . . . . . . . . . 33--44
Nancy Kronenberg and
Thomas R. Benson and
Wayne M. Cardoza and
Ravindran Jagannathan and
Benjamin J. Thomas Porting OpenVMS from VAX to Alpha AXP 45--53
Charles P. Thacker and
David G. Conroy and
Lawrence C. Stewart The Alpha Demonstration Unit: a
High-Performance Multiprocessor . . . . 55--67
Ralph Katz Tales from the Front . . . . . . . . . . 67--67
Richard L. Sites and
Anton Chernoff and
Matthew B. Kirk and
Maurice P. Marks and
Scott G. Robinson Binary translation . . . . . . . . . . . 69--81
Daniel Dobberpuhl and
Kevin Fielding Design of EV-4 . . . . . . . . . . . . . 82--82
Richard Hollingsworth Advanced semiconductor technology . . . 83--83
Chris F. Kemerer Reliability of Function Points
Measurement: a Field Experiment . . . . 85--97
Ronald E. Anderson and
Deborah G. Johnson and
Donald Gotterbarn and
Judith Perrolle Using the new ACM code of ethics in
decision making . . . . . . . . . . . . 98--107
Peter G. Neumann Inside RISKS: Are Dependable Systems
Feasible? . . . . . . . . . . . . . . . 146--146
Varun Grover and
Martin Goslar Information technologies for the 1990s:
the executives' view . . . . . . . . . . 17--19
John Perry Barlow Electronic Frontier: Bill O' Rights . . 21--23
Dorothy E. Denning To tap or not to tap . . . . . . . . . . 24--33
Mike Godwin and
William A. Bayse and
Marc Rotenberg and
Lewis M. Branscomb and
Anne M. Branscomb and
Ronald L. Rivest and
Andrew Grosso and
Gary T. Marx Commentators . . . . . . . . . . . . . . 34--41
Dorothy E. Denning Final thoughts . . . . . . . . . . . . . 42--44
Ehud Shapiro and
David H. D. Warren The Fifth Generation Project: Personal
Perspectives: Introduction . . . . . . . 46--49
Kazuhiro Fuchi and
Robert Kowalski and
Koichi Furukawa and
Kazunori Ueda and
Ken Kahn and
Takashi Chikayama and
Evan Tick Launching the new era . . . . . . . . . 49--100
Ehud Shapiro and
David H. D. Warren Epilogue . . . . . . . . . . . . . . . . 100--101
Peter G. Neumann Inside Risks: Risks of Technology . . . 130--130
David Billington Using the context-free pumping lemma . . 21, 81
Marc Rettig Practical Programmer: Cooperative
Software . . . . . . . . . . . . . . . . 23--28
Pamela Samuelson Legally Speaking: The Ups and Downs of
Look and Feel . . . . . . . . . . . . . 29--35
David Mandelkern Graphical User Interfaces: The Next
Generation: Introduction . . . . . . . . 36--39
Jeff A. Johnson and
Bonnie A. Nardi and
Craig L. Zarmer and
James R. Miller ACE: Building Interactive Graphical
Interactions . . . . . . . . . . . . . . 40--55
George G. Robertson and
Stuart K. Card and
Jock D. Mackinlay Information Visualization Using 3D
Interactive Animation . . . . . . . . . 56--71
Alan Morse and
George Reynolds Overcoming current growth limits in UI
development . . . . . . . . . . . . . . 72--81
Jakob Nielsen Noncommand user interfaces . . . . . . . 82--99
Aaron Marcus Human communications issues in advanced
UIs . . . . . . . . . . . . . . . . . . 101--109
Jonathan Grudin Interface: an evolving concept . . . . . 110--119
C. Dianne Martin The myth of the awesome thinking machine 120--133
Donald A. Norman Inside RISKS: Using Names As Identifiers 154--154
Gary Beach Building a foundation . . . . . . . . . 13--14
Herb Grosch Forum: In Defense of Maurice Wilkes
(letter) . . . . . . . . . . . . . . . . 16--16
Larry Press Personal Computing: Technetronic
Education: Answers on the cultural
Horizon . . . . . . . . . . . . . . . . 17--22
Elliot Soloway Log on Education: Reading and Writing in
the 21st Century . . . . . . . . . . . . 23--27
Elliot Soloway Introduction to the Issue on Technology
in Education . . . . . . . . . . . . . . 28--30
Jan Hawkins Technology and the organization of
schooling . . . . . . . . . . . . . . . 30--35
Dick Ruopp and
Shahaf Gal The LabNetwork . . . . . . . . . . . . . 35--36
Marlene Scardamalia and
Carl Bereiter Technologies for knowledge-building
discourse . . . . . . . . . . . . . . . 37--41
Beverly Hunter Internetworking: coordinating technology
for systemic reform . . . . . . . . . . 42--46
Robert Pearlman Designing the new American schools . . . 46--49
Denis Newman School networks: delivery or access . . 49--51
Brigid Barron and
Ronald J. Kantor Tools to enhance math education: the
Jasper series . . . . . . . . . . . . . 52--54
Roger C. Schank Learning via multimedia computers . . . 54--56
Wayne C. Grant Wireless Coyote: a computer-supported
field trip . . . . . . . . . . . . . . . 57--59
Roy D. Pea The collaborative visualization project 60--63
Andee Rubin Video laboratories: tools for scientific
investigation . . . . . . . . . . . . . 64--65
Ludwig Braun Help for all the students . . . . . . . 66--69
Henry Jay Becker Teaching with and about computers in
secondary schools . . . . . . . . . . . 69--72
Ronald E. Anderson The technology infrastructure of U.S.
schools . . . . . . . . . . . . . . . . 72--73
Jan Hawkins and
John Frederiksen and
Allan Collins and
Dorothy Bennett and
Elizabeth Collins Assessment and technology . . . . . . . 74--76
Carol Edwards Life-long learning . . . . . . . . . . . 76--78
Yolanda S. George and
Shirley M. Malcolm and
Laura Jeffers Computer equity for the future . . . . . 78--81
Coco Conn SIGKids at SIGGRAPH . . . . . . . . . . 81--82
Teri Perl ACM task force on K-12 education and
technology . . . . . . . . . . . . . . . 82--83
Doris K. Lidtke and
David Moursund Computers in schools: past, present, and
how we can change the future . . . . . . 84--87
Susan M. Merritt and
Charles J. Buen and
Philip East and
Darlene Grantham and
Charles Rice and
Viera K. Proulx and
Gerry Segal and
Carol Wolf ACM Model High School Computer Science
Curriculum . . . . . . . . . . . . . . . 87--90
Peter G. Neumann Inside RISKS: The Role of Software
Engineering . . . . . . . . . . . . . . 114--114
S. R. Nidumolu and
S. E. Goodman International Perspectives: Computing in
India: An Asian Elephant Learning to
Dance . . . . . . . . . . . . . . . . . 15--22
Sarah Kuhn and
Michael J. Muller Introduction with taxonomy of PD
practices: a brief practitioner's guide 24--28
Michael J. Muller and
Daniel M. Wildman and
Ellen A. White Taxonomy of PD Practices: a Brief
Practitioner's Guide . . . . . . . . . . 26--27
Andrew Clement and
Peter Van den Besselaar A retrospective look at PD projects . . 29--37
Steven E. Miller From system design to democracy . . . . 38--39
Gro Bjerknes Some PD advice . . . . . . . . . . . . . 39--39
Erran Carmel and
Randall D. Whitaker and
Joey F. George PD and Joint Application Design: A
Transatlantic Comparison . . . . . . . . 40--48
Joan Greenbaum PD a personal statement . . . . . . . . 47--47
William L. Anderson and
William T. Crocca Engineering practice and codevelopment
of product prototypes . . . . . . . . . 49--56
Jim Euchner and
Patricia Sachs The benefits of intentional tension . . 53--53
Kim Halskov Madsen and
Peter H. Aiken Experiences using cooperative
interactive storyboard prototyping . . . 57--64
Darlene Crane Graphic facilitation . . . . . . . . . . 64--65
Michael J. Muller and
Daniel M. Wildman and
Ellen A. White ``Equal opportunity'' PD using PICTIVE 64--66
Kaj Grònbæk and
Morten Kyng and
Preben Mogensen CSCW challenges: cooperative design in
engineering projects . . . . . . . . . . 67--77
Susan Harker User participation in prototyping . . . 77--81
Finn Kensing and
Andreas Munk-Madsen PD: structure in the toolbox . . . . . . 78--85
Enid Mumford The ETHICS approach . . . . . . . . . . 82--82
Christiane Floyd STEPS: a methodical approach to PD . . . 83--83
Barbara Katzenberg and
Peter Piela Work language analysis and the naming
problem . . . . . . . . . . . . . . . . 86--92
Jeanette Blomberg and
Denise McLaughlin and
Lucy Suchman Work-oriented design at Xerox . . . . . 91--91
David Novick and
Eleanor Wynn Participatory conversation in PD . . . . 93--93
Ina Wagner A web of fuzzy problems: confronting the
ethical issues . . . . . . . . . . . . . 94--101
Marian G. Williams and
Vivienne Begg Translation between software designers
and users . . . . . . . . . . . . . . . 102--103
Peter G. Neumann Inside RISKS: Modeling and Simulation 124--124
Judith R. Brown Looking toward the year 2000 . . . . . . 13--14
Ian O. Angell Intelligence: logical or biological . . 15--16, 119
Guy L. Steele, Jr. and
Danny Hillis and
Richard Stallman and
Gerald J. Sussman and
Marvin Minsky and
John McCarthy and
John Backus and
Fernando Corbató and
Ronald E. Anderson Forum: Code of Ethics Reconsidered . . . 17--20
Maurice V. Wilkes Computing Perspectives: From Fortran and
Algol to Object-Oriented Languages . . . 21--23
Pierre Wellner and
Wendy Mackay and
Rich Gold Guest Editors' Introduction to the
Special Issue on Computer-Augmented
Environments: Back to the Real World . . 24--27
Michael Spreitzer and
Marvin Theimer Scalable, secure, mobile computing with
location information . . . . . . . . . . 27--27
Thomas Baudel and
Michel Beaudouin-Lafon Charade: Remote Control of Objects using
Free-Hand Gestures . . . . . . . . . . . 28--35
Myron W. Krueger Environmental technology: making the
real world virtual . . . . . . . . . . . 36--37
George W. Fitzmaurice Situated Information Spaces and
Spatially Aware Palmtop Computers . . . 38--49
Ronald Azuma Tracking requirements for augmented
reality . . . . . . . . . . . . . . . . 50--51
Steven Feiner and
Blair Macintyre and
Dorée Seligmann Knowledge-based augmented reality . . . 53--62
Mitchel Resnick Behavior construction kits . . . . . . . 64--71
Rich Gold This is not a pipe . . . . . . . . . . . 72--72
Mark Weiser Some Computer Science Issues in
Ubiquitous Computing . . . . . . . . . . 74--84
Scott Elrod and
Gene Hall and
Rick Costanza and
Michael Dixon and
Jim Des Rivi\`eres Responsive office environments . . . . . 84--85
Pierre Wellner Interacting with Paper on the
DigitalDesk . . . . . . . . . . . . . . 86--96
Wendy Mackay and
Gilles Velay and
Kathy Carter and
Chaoying Ma and
Daniele Pagani Augmenting reality: adding computational
dimensions to paper . . . . . . . . . . 96--97
Peter J. Denning Designing New Principles to Sustain
Research in our Universities . . . . . . 99--104
George Marsaglia Technical Correspondence: Remarks on
Choosing and Implementing Random Number
Generators . . . . . . . . . . . . . . . 105--108
Stephen J. Sullivan Another Test for Randomness . . . . . . 108--108
Stephen K. Park and
Keith W. Miller and
Paul K. Stockmeyer Another Test for Randomness: Response 108--110
Peter G. Neumann Inside RISKS: RISKS on the Rails . . . . 130--130
Jean-François Colonna Technical Correspondence: The
subjectivity of computers . . . . . . . 15--18
Marc Rettig and
Gary Simons and
John Thomson Practical Programmer: Extended Objects 19--24
Fred W. Weingarten From Washington: Happenings on the Hill 25--27
Haruhisa Ishida and
Lawrence H. Landweber Introduction to the Special Issue on
Internetworking . . . . . . . . . . . . 28--30
Randy Bush FidoNet: technology, tools, and history 31--35
Janet Murray K12 network: global education through
telecommunications . . . . . . . . . . . 36--41
George Sadowsky Network connectivity for developing
countries . . . . . . . . . . . . . . . 42--47
Stephen T. Kent Internet Privacy Enhanced Mail . . . . . 48--60
Marc Rotenberg Communications privacy: implications for
network design . . . . . . . . . . . . . 61--68
Frank M. Tuerkheimer The underpinnings of privacy protection 69--73
Tsuyoshi Hiramatsu Protecting telecommunications privacy in
Japan . . . . . . . . . . . . . . . . . 74--77
Michael F. Schwartz and
David C. M. Wood Discovering shared interests using graph
analysis . . . . . . . . . . . . . . . . 78--89
Bradford W. Hesse and
Lee S. Sproull and
Sara B. Kiesler and
John P. Walsh Returns to science: computer networks in
oceanography . . . . . . . . . . . . . . 90--101
Peter G. Neumann Inside Risks: Risks of Surveillance . . 122--122
Lance J. Hoffman Clipping Clipper . . . . . . . . . . . . 15--17
Pamela Samuelson Legally Speaking: Computer Programs and
Copyright's Fair Use Doctrine . . . . . 19--25
Larry Press Personal Computing: Before the Altair:
The History of Personal Computing . . . 27--33
Anonymous Introduction to the Special Issue on
Concurrent Object-Oriented Programming 34
Jacques Cohen Concurrent object-oriented programming 35--36
Rodger Lea and
Christian Jacquemot and
Eric Pillevesse COOL: system support for distributed
programming . . . . . . . . . . . . . . 37--46
Bruno Achauer The DOWL distributed object-oriented
language . . . . . . . . . . . . . . . . 48--55
Bertrand Meyer Systematic concurrent object-oriented
programming . . . . . . . . . . . . . . 56--80
Klaus-Peter Löhr Concurrency annotations for reusable
software . . . . . . . . . . . . . . . . 81--89
Denis Caromel Toward a method of object-oriented
concurrent programming . . . . . . . . . 90--102
Murat Karaorman and
John Bruno Introducing concurrency to a sequential
language . . . . . . . . . . . . . . . . 103--115
Roy H. Campbell and
Nayeem Islam and
David Raila and
Peter Madany Designing and implementing \em Choices:
an object-oriented system in C++ . . . . 117--126
Max Mühlhäuser and
Wolfgang Gerteis and
Lutz Heuser DOCASE: a methodic approach to
distributed programming . . . . . . . . 127--138
Peter G. Neumann Inside Risks: Animal Crackers . . . . . 162--162
Sasa Dekleva and
Stanley Martens Technical Correspondence: First Normal
Form Reconsidered . . . . . . . . . . . 19--20
Elliot Soloway Log on Education: Should We Teach
Students to Program? . . . . . . . . . . 21--24
P. Wolcott and
S. E. Goodman International Perspectives: Under the
Stress of Reform: High-Performance
Computing in the Former Soviet Union . . 25--29
Larry L. Constantine and
Lucy A. D. Lockwood Introduction to the Special Section on
Project Organization and Management . . 30--32
Larry L. Constantine and
Lucy A. D. Lockwood Orchestrating project organization and
management . . . . . . . . . . . . . . . 31--32
Larry L. Constantine Work organization: paradigms for project
management and organization . . . . . . 35--43
Marc Rettig and
Gary Simons A project planning and development
process for small teams . . . . . . . . 45--55
Risa B. Hyman Creative chaos in high-performance
teams: an experience report . . . . . . 57--60
Diane B. Walz and
Joyce J. Elam and
Bill Curtis Inside a software design team: knowledge
acquisition, sharing, and integration 63--77
Richard E. Zultner TQM for technical teams . . . . . . . . 79--91
Karen Holtzblatt and
Hugh Beyer Making customer-centered design work for
teams . . . . . . . . . . . . . . . . . 92--103
Tony Hutchings and
Michael G. Hyde and
David Marca and
Lou Cohen Process improvement that lasts: an
integrated training and consulting
method . . . . . . . . . . . . . . . . . 104--113
Richard A. Zahniser Design by walking around . . . . . . . . 114--123
Peter G. Neumann Inside Risks: System Development Woes 146--146
John Perry Barlow The Electronic Frontier: a Plain Text on
Crypto Policy . . . . . . . . . . . . . 21--26
Fred W. Weingarten From Washington: HPCC Research
Questioned . . . . . . . . . . . . . . . 27--29
W. Daniel Hillis and
Lewis W. Tucker The CM-5 Connection Machine: a Scalable
Supercomputer . . . . . . . . . . . . . 31--40
Clark D. Thomborson Does your workstation computation belong
on a vector supercomputer? . . . . . . . 41--49
John C. Knight and
E. Ann Myers An improved inspection technique . . . . 51--61
Robert B. Grady Practical results from measuring
software quality . . . . . . . . . . . . 62--68
Bev Littlewood and
Lorenzo Strigini Validation of ultrahigh dependability
for software-based systems . . . . . . . 69--80
Rajiv D. Banker and
Srikant M. Datar and
Chris F. Kemerer and
Dani Zweig Software complexity and maintenance
costs . . . . . . . . . . . . . . . . . 81--94
Rebecca Mercuri Inside Risks: Corrupted Polling . . . . 122, 94
Roy Rada Sharing Standards: Standards: The
Language for Success . . . . . . . . . . 17--23
Larry Press Personal Computing: The Internet and
Interactive Television . . . . . . . . . 19--23
Henry C. Lucas, Jr. Market expert surveillance system . . . 27--34
Kenneth P. Birman The process group approach to reliable
distributed computing . . . . . . . . . 37--53
M. K. El-Najdawi and
Anthony C. Stylianou Expert support systems: integrating AI
technologies . . . . . . . . . . . . . . 55--65
Erik Brynjolfsson The productivity paradox of information
technology . . . . . . . . . . . . . . . 66--77
Leon A. Kappelman and
John P. Thompson and
Ephraim R. McLean Converging end-user and corporate
computing . . . . . . . . . . . . . . . 79--92
H. Raghav Rao and
Brian D. Lynch Hedonic price analysis of workstation
attributes . . . . . . . . . . . . . . . 95--102
H. Jeff Smith Privacy policies and practices: inside
the organizational maze . . . . . . . . 104--122
Peter J. Denning Inside Risks: a World Lit by Flame . . . 170--170
Edward A. Feigenbaum and
Peter E. Friedland and
Bruce B. Johnson and
H. Penny Nii and
Herbert Schnorr and
Howard E. Shrobe and
Robert S. Engelmore Knowledge-Based Systems in Japan (Report
of the JTEC Panel) . . . . . . . . . . . 17--20
Pamela Samuelson Legally Speaking: Copyright's Fair Use
Doctrine and Digital Data . . . . . . . 21--27
Doug Schuler Social computing . . . . . . . . . . . . 28--29
Gary Chapman The National Forum on Science and
Technology Goals: building a democratic,
post-Cold War science and technology
policy . . . . . . . . . . . . . . . . . 30--37
Doug Schuler Community networks: building a new
participatory medium . . . . . . . . . . 38--51
Andrew Clement Computing at work: empowering action by
``low-level users'' . . . . . . . . . . 52--63
Batya Friedman and
Peter H. Kahn, Jr. Educating computer scientists: linking
the social and the technical . . . . . . 64--70
Helen Nissenbaum Computing and accountability . . . . . . 72--80
W. Robert Collins and
Keith W. Miller and
Bethany J. Spielman and
Phillip Wherry How good is good enough?: an ethical
analysis of software construction and
use . . . . . . . . . . . . . . . . . . 81--91
Jonathan Grudin Groupware and social dynamics: eight
challenges for developers . . . . . . . 92--105
Anonymous Renewing the commitment to a public
interest telecommunications policy . . . 106--108
Robert D. Dorsett Inside RISKS: Risks In Aviation (part 1
of 2) . . . . . . . . . . . . . . . . . 154--154
Elliot Soloway Log on Education: Ways of Seeing . . . . 15--20
S. E. Goodman International Perspectives: Computing in
South Africa: An End to ``Apartness''? 21--25
Kaj Grònbæk and
Randall H. Trigg Hypermedia system design applying the
Dexter model . . . . . . . . . . . . . . 26--29
Frank Halasz and
Mayer Schwartz The Dexter hypertext reference model . . 30--39
Kaj Grònbæk and
Randall H. Trigg Design issues for a Dexter-based
hypermedia system . . . . . . . . . . . 40--49
Lynda Hardman and
Dick C. A. Bulterman and
Guido van Rossum The Amsterdam hypermedia model: adding
time and context to the Dexter model . . 50--62
Kaj Grònbæk and
Jens A. Hem and
Ole L. Madsen and
Lennert Sloth Cooperative hypermedia systems: a
Dexter-based architecture . . . . . . . 64--74
John J. Leggett and
John L. Schnase Viewing Dexter with open eyes . . . . . 76--86
Ehud Rivlin and
Rodrigo Botafogo and
Ben Shneiderman Navigating in hyperspace: designing a
structure-based toolbox . . . . . . . . 87--96
Gerard Salton and
James Allan and
Chris Buckley Automatic structuring and retrieval of
large text files . . . . . . . . . . . . 97--108
Jan Vanthienen and
Girish Subramanian and
John Nosek Technical Correspondence: a More General
Comparison of the Decision Table and
Tree . . . . . . . . . . . . . . . . . . 109--113
Robert D. Dorsett Inside Risks: Safety in the Air . . . . 146--146
Larry Press Personal Computing: Emerging Dynabase
Tools . . . . . . . . . . . . . . . . . 11--16
Fred W. Weingarten From Washington: Public interest and the
NII . . . . . . . . . . . . . . . . . . 17--19
Toshinori Munakata Commercial and industrial AI . . . . . . 23--26
Frederick Hayes-Roth and
Neil Jacobstein The State of Knowledge-Based Systems . . 26--39
Bradley P. Allen Case-based reasoning: business
applications . . . . . . . . . . . . . . 40--42
W. E. L. Grimson and
J. L. Mundy Computer vision applications . . . . . . 44--51
Alexander I. Rudnicky and
Alexander G. Hauptmann and
Kai-Fu Lee Survey of current speech technology . . 52--57
Takeo Kanade and
Michael L. Reed and
Lee E. Weiss New technologies and applications in
robotics . . . . . . . . . . . . . . . . 58--67
Toshinori Munakata and
Yashvant Jani Fuzzy systems: an overview . . . . . . . 68--76
Lotfi A. Zadeh Fuzzy logic, neural networks, and soft
computing . . . . . . . . . . . . . . . 77--84
David E. Rumelhart and
Bernard Widrow and
Michael A. Lehr The basic ideas in neural networks . . . 87--92
Bernard Widrow and
David E. Rumelhart and
Michael A. Lehr Neural Networks: Applications in
Industry, Business, and Science . . . . 93--105
Kazuo Asakawa and
Hideyuki Takagi Neural networks in Japan . . . . . . . . 106--112
David E. Goldberg Genetic and evolutionary algorithms come
of age . . . . . . . . . . . . . . . . . 113--119
Peter G. Neumann Inside Risks: Technology, Laws, and
Society . . . . . . . . . . . . . . . . 138--138
Roy Rada and
George S. Carson and
Christopher Haynes Sharing Standards: The Role of Consensus 15--16
Marc Rettig Practical Programmer: Prototyping for
Tiny Fingers . . . . . . . . . . . . . . 21--27
Adrian M. Tentner High performance computing grand
challenges in simulation . . . . . . . . 28--29
W. J. Camp and
S. J. Plimpton and
B. A. Hendrickson and
R. W. Leland Massively parallel methods for
engineering and science problems . . . . 30--41
Allan S. Jacobson and
Andrew L. Berkin and
Martin N. Orton LinkWinds: interactive scientific data
analysis and visualization . . . . . . . 42--52
A. M. Tentner and
R. N. Blomquist and
P. L. Garner and
E. M. Gelbard and
K. C. Gross and
M. Minkoff and
R. A. Valentin and
T. R. Canfield Advances in parallel computing for
reactor analysis and safety . . . . . . 54--64
Jakob Nielsen and
Jonathan Levy Measuring usability: preference vs.
performance . . . . . . . . . . . . . . 66--75
Richard A. Coll and
Joan H. Coll and
Ganesh Thakur Graphs and Tables: a Four-Factor
Experiment . . . . . . . . . . . . . . . 76--86
Computer Science and
Telecommunications Board Academic Careers for Experimental
Computer Scientists and Engineers . . . 87--90
Peter G. Neumann Inside RISKS: Risks of Passwords . . . . 126--126
John Perry Barlow Electronic Frontier: Dad's Invisible
Guard-All Shield . . . . . . . . . . . . 15--17
Roger C. Schank Log on Education: Tractor Factories and
Research in Software Design . . . . . . 19--21
Richard G. Waters and
Elliot Chikofsky Reverse engineering: progress along many
dimensions . . . . . . . . . . . . . . . 22--25
Peter Aiken and
Alice Muntz and
Russ Richards DoD legacy systems: reverse engineering
data requirements . . . . . . . . . . . 26--41
William J. Premerlani and
Michael R. Blaha An approach for reverse engineering of
relational databases . . . . . . . . . . 42--49
Jim Q. Ning and
Andre Engberts and
W. Voytek Kozaczynski Automated support for legacy code
understanding . . . . . . . . . . . . . 50--57
Lawrence Markosian and
Philip Newcomb and
Russell Brand and
Scott Burson and
Ted Kitzmiller Using an enabling technology to
reengineer legacy systems . . . . . . . 58--70
Ted J. Biggerstaff and
Bharat G. Mitbander and
Dallas E. Webster Program understanding and the concept
assignment problem . . . . . . . . . . . 72--82
Alex Quilici A memory-based approach to recognizing
programming plans . . . . . . . . . . . 84--93
Karl J. Lieberherr and
Ignacio Silva-Lepe and
Cun Xiao Adaptive object-oriented programming
using graph-based customization . . . . 94--101
Iris Vessey and
Sue A. Conger Requirements specification: learning
object, process, and data methodologies 102--113
Peter G. Neumann Inside RISKS: Alternative Passwords . . 146--146
Fred W. Weingarten From Washington: The Politicizing of
Science Policy . . . . . . . . . . . . . 13--15
G. Ariav and
S. E. Goodman International Perspectives: Israel: Of
Swords and Software Plowshares . . . . . 17--21
Nasr Ullah and
Philip K. Brownfield The making of the PowerPC: introduction 22--22
Charles R. Moore and
Russell C. Stanphill The PowerPC alliance . . . . . . . . . . 25--27
Keith Diefendorff History of the PowerPC architecture . . 28--33
Brad Burgess and
Nasr Ullah and
Peter Van Overen and
Deene Ogden The PowerPC 603 microprocessor . . . . . 34--42
Brad W. Suessmith and
George Paap, III PowerPC 603 microprocessor power
management . . . . . . . . . . . . . . . 43--46
Ali Poursepanj The PowerPC performance modeling
methodology . . . . . . . . . . . . . . 47--55
Julie Shipnes and
Mike Phillip A modular approach to Motorola PowerPC
compilers . . . . . . . . . . . . . . . 56--63
William Anderson An overview of Motorola's PowerPC
simulator family . . . . . . . . . . . . 64--69
Stuart M. Shieber Lessons from a Restricted Turing Test 70--78
Hugh Gene Loebner In response . . . . . . . . . . . . . . 79--82
Stuart M. Shieber On Loebner's lessons . . . . . . . . . . 83--84
Patrick M. LaMalva and
George D. Peterson Accredited Programs in Computing . . . . 85--88
Peter G. Neumann Inside RISKS: Risks on the Information
Superhighway . . . . . . . . . . . . . . 114--114
Larry Press Personal Computing: Tomorrow's campus 13--17
Doug Riecken Intelligent agents . . . . . . . . . . . 18--21
Marvin Minsky and
Doug Riecken A conversation with Marvin Minsky about
agents . . . . . . . . . . . . . . . . . 22--29
Pattie Maes Agents that reduce work and information
overload . . . . . . . . . . . . . . . . 30--40
Ernest A. Edmonds and
Linda Candy and
Rachel Jones and
Bassel Soufi Support for collaborative design: agents
and emergence . . . . . . . . . . . . . 41--47
Michael R. Genesereth and
Steven P. Ketchpel Software agents . . . . . . . . . . . . 48--53
David Canfield Smith and
Allen Cypher and
Jim Spohrer KidSim: programming agents without a
programming language . . . . . . . . . . 54--67
Donald A. Norman How might people interact with agents 68--71
Oren Etzioni and
Daniel Weld A softbot-based interface to the
Internet . . . . . . . . . . . . . . . . 72--76
Tom M. Mitchell and
Rich Caruana and
Dayne Freitag and
John McDermott and
David Zabowski Experience with a learning personal
assistant . . . . . . . . . . . . . . . 80--91
Ted Selker COACH: a Teaching Agent that Learns . . 92--99
Irene Greif Desktop agents in group-enabled products 100--105
Doug Riecken M: an architecture of integrated agents 106--116
Margaret A. Boden Agents and creativity . . . . . . . . . 117--121
Joseph Bates The role of emotion in believable agents 122--125
R. V. Guha and
Douglas B. Lenat Enabling agents to work together . . . . 126--142
Henry A. Kautz and
Bart Selman and
Michael Coen Bottom-up design of software agents . . 143--146
Barbara Simons Inside RISKS: Questions about the NII 170, 146
Robert E. Kahn Viewpoint: The Role of Government in the
Evolution of the Internet . . . . . . . 15--19
Pamela Samuelson Legally Speaking: Self-Plagiarism or
Fair Use? . . . . . . . . . . . . . . . 21--25
S. E. Goodman and
L. I. Press and
S. R. Ruth and
A. M. Rutkowski International Perspectives: The Global
Diffusion of the Internet: Patterns and
Problems . . . . . . . . . . . . . . . . 27--31
Barry M. Leiner Internet Technology . . . . . . . . . . 32--33
Kimberly C. Claffy and
Hans-Werner Braun and
George C. Polyzos Tracking Long-Term Growth of the NSFNET 34--45
Håvard Eidnes Practical considerations for network
addressing using CIDR . . . . . . . . . 46--53
Hans Eriksson MBONE: the multicast backbone . . . . . 54--60
John Moy Multicast routing extensions for OSPF 61--66
Fumio Teraoka and
Keisuke Uehara and
Hideki Sunahara and
Jun Murai VIP: a Protocol Providing Host Mobility 67--75
Tim Berners-Lee and
Robert Cailliau and
Ari Luotonen and
Henrik Frystyk Nielsen and
Arthur Secret The World-Wide Web . . . . . . . . . . . 76--82
Hiroshi Ishii and
Minoru Kobayashi and
Kazuho Arita Iterative design of seamless
collaboration media . . . . . . . . . . 83--97
C. Mic Bowman and
Peter B. Danzig and
Udi Manber and
Michael F. Schwartz Scalable Internet resource discovery:
research problems and approaches . . . . 98--107
Katherine Fithen and
Barbara Fraser CERT Incident Response and the Internet 108--114
Susan Landau and
Stephen Kent and
Clinton C. Brooks and
Scott Charney and
Dorothy E. Denning and
Whitfield Diffie and
Anthony Lauck and
Douglas Miller and
Peter G. Neumann and
David L. Sobel Crypto policy perspectives . . . . . . . 115--121
Peter G. Neumann Inside RISKS: Friendly Fire . . . . . . 138--138
Yasmin Kafai and
Elliot Soloway Log on Education: Computational Gifts
for the Barney Generation . . . . . . . 19--22
Roy Rada and
George S. Carson Sharing Standards: The New Media . . . . 23--25
Robert V. Binder Object-Oriented Software Testing . . . . 28--29
Paul C. Jorgensen and
Carl Erickson Object-Oriented Integration Testing . . 30--38
Gail C. Murphy and
Paul Townsend and
Pok Sze Wong Experiences with cluster and class
testing . . . . . . . . . . . . . . . . 39--47
Robert M. Poston Automated testing from object models . . 48--58
John D. McGregor and
Timothy D. Korson Integrated Object-Oriented Testing and
Development Processes . . . . . . . . . 59--77
Thomas R. Arnold and
William A. Fuson Testing ``In A Perfect World'' . . . . . 78--86
Robert V. Binder Design for testability in
object-oriented systems . . . . . . . . 87--101
George W. Hart To decode short cryptograms . . . . . . 102--108
Lance J. Hoffman and
Faraz A. Ali and
Steven L. Heckler and
Ann Huybrechts Cryptography policy . . . . . . . . . . 109--117
Kenneth Baclawski and
Bipin Indurkhya Technical Correspondence: The Notion of
Inheritance in Object-Oriented
Programming . . . . . . . . . . . . . . 118--119
Peter G. Neumann Inside RISKS: Expectations of Security
and Privacy . . . . . . . . . . . . . . 138--138
Fred W. Weingarten From Washington: University Research in
a Squeeze . . . . . . . . . . . . . . . 15--17
Tomasz Imieli\'nski and
B. R. Badrinath Mobile wireless computing: challenges in
data management . . . . . . . . . . . . 18--28
Effy Oz When Professional Standards are Lax: The
CONFIRM Failure and its Lessons . . . . 29--36
Juris Hartmanis Turing Award Lecture: On Computational
Complexity and the Nature of Computer
Science . . . . . . . . . . . . . . . . 37--43
Richard T. Watson and
Teck Hua Ho and
K. S. Raman Culture: a Fourth Dimension of Group
Support Systems . . . . . . . . . . . . 44--55
H. Chen and
P. Hsu and
R. Orwig and
L. Hoopes and
J. F. Nunamaker Automatic concept classification of text
from electronic meetings . . . . . . . . 56--73
Martin D. Fraser and
Kuldeep Kumar and
Vijay K. Vaishnavi Strategies for incorporating formal
specifications in software development 74--86
Rosemary H. Wild and
Joseph J. Pignatiello, Jr. Finding Stable System Designs: a Reverse
Simulation Technique . . . . . . . . . . 87--98
Benjamin Wright Inside RISKS: The Verdict on Plaintext
Signatures: They're Legal . . . . . . . 122--122
Jay J. Buck BloomBecker Viewpoint: My Three Computer
Criminological Sins . . . . . . . . . . 15--16
Larry Press Commercialization of the Internet . . . 17--21
Brian A. Nejmeh Internet: a Strategic Tool for the
Software Enterprise . . . . . . . . . . 23--27
Ravi Ganesan and
Ravi Sandhu Securing cyberspace . . . . . . . . . . 28--31
Ross J. Anderson Why cryptosystems fail . . . . . . . . . 32--40
Roger M. Needham Denial of service: an example . . . . . 42--46
Ralf C. Hauser Does Licensing Require New Access
Control Technologies? . . . . . . . . . 48--55
Gustavus J. Simmons Cryptanalysis and protocol failures . . 56--65
Paul C. Clark and
Lance J. Hoffman BITS: A Smartcard Protected Operating
System . . . . . . . . . . . . . . . . . 66--70
Shekhar H. Kirani and
Imran A. Zualkernan and
Wei-Tek Tsai Evaluation of expert system testing
methods . . . . . . . . . . . . . . . . 71--81
Bruce I. Blum A taxonomy of software development
methods . . . . . . . . . . . . . . . . 82--94
Richard Edwin Stearns Turing Award Lecture: It's Time to
Reconsider Time . . . . . . . . . . . . 95--99
Herb Grosch Dehumanizing the workplace . . . . . . . 122--122
Robin Hanson Viewpoint: Can Wiretaps Remain
Cost-Effective? . . . . . . . . . . . . 13--15
Karen Frenkel In memory: Gordon Smith 1919--1994 . . . 16--16
James W. Moore and
David Emery and
Roy Rada Sharing Standards: Language-Independent
Standards . . . . . . . . . . . . . . . 17--20
Pamela Samuelson Legally Speaking: The NII Intellectual
Property Report . . . . . . . . . . . . 21--27
John M. Carroll Making \em Use a Design Representation 28--35
Gerald L. Lohse and
Kevin Biolsi and
Neff Walker and
Henry H. Rueter A classification of visual
representations . . . . . . . . . . . . 36--49
Stephen G. Eick and
Michael C. Nelson and
Jeffery D. Schmidt Graphical analysis of computer log files 50--56
Kim Halskov Madsen A guide to metaphorical design . . . . . 57--62
Steven C. Bagley and
Gary E. Kopec Editing images of text . . . . . . . . . 63--72
Manojit Sarkar and
Marc H. Brown Graphical Fisheye Views . . . . . . . . 73--84
D. E. Stevenson Science, computational science, and
computer science: at a crossroads . . . 85--96
Gerald J. Johnson Of metaphor and the difficulty of
computer discourse . . . . . . . . . . . 97--102
Peter G. Neumann Inside RISKS: Inside ``Inside RISKS.'' 154--154
S. E. Goodman and
L. I. Press International Perspectives: Computing in
Vietnam: An Asian Tiger in the Rough . . 11--16
Elliot Soloway Log on Education: Beware, Techies
Bearing Gifts . . . . . . . . . . . . . 17--24
Amy Pearl Women in Computing: Introduction . . . . 26--28
Maria Klawe and
Nancy Leveson Women in computing: where are we now? 29--35
Pavani Diwanji Corporate Supported Women's Groups . . . 36--36
Sandra Johnson Baylor Graduate Fellowship Programs . . . . . . 37--42
Alison Adam Women and Computing in the UK . . . . . 43--43
Laura L. Downey Announcing a New Resource: The WCAR List 43--44
Elisabeth Freeman and
Susanne Hupfer TAP: Tapping Internet Resources for
Women in Computer Science . . . . . . . 44--44
Denise W. Gürer Pioneering women in computer science . . 45--54
Anita Borg and
Telle Whitney The Grace Hopper Celebration . . . . . . 50--51
Kathleen Hemenway Human nature and the glass ceiling in
industry . . . . . . . . . . . . . . . . 55--62
Ellen Isaacs Gender Discrimination in the Workplace:
a Literature Review . . . . . . . . . . 58--59
Tracy Camp Diversity Recruiting . . . . . . . . . . 61--61
Shari Lawrence Pfleeger and
Norma Mertz Executive mentoring: what makes it work? 63--73
Amita Goyal Mentoring Resources and Programs for
Women . . . . . . . . . . . . . . . . . 66--67
Veronika Oechtering and
Roswitha Behnke Situations and advancement measures in
Germany . . . . . . . . . . . . . . . . 75--82
Iris Vessey and
Ajay Paul Sravanapudi CASE tools as collaborative support
technologies . . . . . . . . . . . . . . 83--95
Kurt Mehlhorn and
Stefan Näher LEDA: a Platform for Combinatorial and
Geometric Computing . . . . . . . . . . 96--102
Jeffrey G. Long and
Dorothy E. Denning Ultra-Structure: a Design Theory for
Complex Systems and Processes . . . . . 103--120
Charles Herring and
Julian I. Palmore Technical Correspondence: Random Number
Generators are Chaotic . . . . . . . . . 121--122
D. E. Ross Technical Correspondence: Pseudo-Random
Number Generators for a Calculator . . . 122--124
Ben Shneiderman Inside Risks: The Info Superhighway: For
the People . . . . . . . . . . . . . . . 162--162
Stuart Zweben President's letter: ACM Computing Week
'95 . . . . . . . . . . . . . . . . . . 13--14
Fred W. Weingarten From Washington: Reforming
Telecommunications Law . . . . . . . . . 19--22
Roy Rada and
John Berg Sharing Standards: Standards: Free or
Sold? . . . . . . . . . . . . . . . . . 23--27
Ronald J. Vetter and
David H. C. Du Issues and challenges in ATM networks 28--29
Ronald J. Vetter ATM concepts, architectures, and
protocols . . . . . . . . . . . . . . . 30--38
B. G. Kim and
P. Wang ATM network: goals and challenges . . . 39--44
Daniel Stevenson and
Nathan Hillery and
Greg Byrd Secure communications in ATM networks 45--52
James A. Schnepf and
David H. C. Du and
E. Russell Ritenour and
Aaron J. Fahrmann Building future medical education
environments over ATM networks . . . . . 54--69
A. Iwata and
N. Mori and
C. Ikeda and
H. Suzuki and
M. Ott ATM Connection and Traffic Management
Schemes for Multimedia Internetworking 72--89
Michael Perloff and
Kurt Reiss Improvements to TCP Performance in
High-Speed ATM Networks . . . . . . . . 90--100
Shivi Fotedar and
Mario Gerla and
Paola Crocetti and
Luigi Fratta ATM virtual private networks . . . . . . 101--109
Patrick M. LaMalva and
George D. Peterson Accredited Programs in Computing . . . . 110--114
Xavier A. Debest Technical Correspondence: Remark About
Self-Stabilizing Systems . . . . . . . . 115--117
Peter A. Buhr Technical Correspondence: Are Safe
Concurrency Libraries Possible . . . . . 117--120
C. C. Demchak and
S. E. Goodman Inside Risks: Computers as Substitute
Soldiers . . . . . . . . . . . . . . . . 154--154
Larry Press Personal Computing: The Internet is Not
TV: Web Publishing . . . . . . . . . . . 17--23
David Heckerman and
Abe Mamdani and
Michael P. Wellman Real-World Applications of Bayesian
Networks: Introduction . . . . . . . . . 24--26
David Heckerman and
Michael P. Wellman Bayesian networks . . . . . . . . . . . 27--30
Lisa Burnell and
Eric Horvitz Structure and chance: melding logic and
probability for software debugging . . . 31--41, 57
Robert Fung and
Brendan Del Favero Applying Bayesian networks to
information retrieval . . . . . . . . . 42--48
David Heckerman and
John S. Breese and
Koos Rommelse Decision-Theoretic Troubleshooting . . . 49--57
Gerald Tesauro Temporal Difference Learning and
TD-Gammon . . . . . . . . . . . . . . . 58--68
Robert E. Kraut and
Lynn A. Streeter Coordination in software development . . 69--81
Magid Igbaria and
Wayne M. Wormley Race differences in job performance and
career success . . . . . . . . . . . . . 82--92
Kent A. Walstrom and
Bill C. Hardgrave and
Rick L. Wilson Forums for management information
systems scholars . . . . . . . . . . . . 93--107
Andrew Arensburger and
Azriel Rosenfeld Technical Opinion: To Take Arms Against
a Sea of Email . . . . . . . . . . . . . 108--109
Peter G. Neumann Reassessing the crypto debate . . . . . 138--138
Pamela Samuelson Legally Speaking: Copyright and Digital
Libraries . . . . . . . . . . . . . . . 15--21, 110
Edward A. Fox and
Robert M. Akscyn and
Richard K. Furuta and
John J. Leggett Digital Libraries: Introduction . . . . 22--28
Ramana Rao and
Jan O. Pedersen and
Marti A. Hearst and
Jock D. Mackinlay and
Stuart K. Card and
Larry Masinter and
Per-Kristian Halvorsen and
George G. Robertson Rich Interaction in the Digital Library 29--39
Timothy C. Bell and
Alistair Moffat and
Ian H. Witten and
Justin Zobel The MG retrieval system: compressing for
space and speed . . . . . . . . . . . . 41--42
W. Bruce Croft NSF Center for Intelligent Information
Retrieval . . . . . . . . . . . . . . . 42--43
Edward A. Fox World-Wide Web and Computer Science
Reports . . . . . . . . . . . . . . . . 43--44
James C. French and
Edward A. Fox and
Kurt Maly and
Alan L. Selman Wide Area Technical Report Service:
Technical Reports Online . . . . . . . . 45--45
Charles Kacmar and
Dean Jue The information zone system . . . . . . 46--47
Carl Lagoze and
James R. Davis Dienst: An Architecture for Distributed
Document Libraries . . . . . . . . . . . 47--47
Christoph Hüser and
Klaus Reichenberger and
Lothar Rostek and
Norbert A. Streitz Knowledge-based editing and
visualization for hypermedia
encyclopedias . . . . . . . . . . . . . 49--51
Deane Merrill and
Nathan Parker and
Fredric Gey and
Chris Stuber The University of California CD-ROM
Information System . . . . . . . . . . . 51--52
Lenwood S. Heath and
Deborah Hix and
Lucy T. Nowell and
William C. Wake and
Guillermo A. Averboch and
Eric Labow and
Scott A. Guyer and
Dennis J. Brueni and
Robert K. France and
Kaushal Dalal and
Edward A. Fox Envision: a User-Centered Database for
Computer Science Literature . . . . . . 52--53
Richard Entlich and
Lorrin Garson and
Michael Lesk and
Lorraine Normore and
Jan Olsen and
Stuart Weibel Making a digital library: the chemistry
online retrieval experiment . . . . . . 54--54
Gary M. Olson An appreciation of Laurence Rosenberg 55--55
M. Christel and
T. Kanade and
M. Mauldin and
R. Reddy and
M. Sirbu and
S. Stevens and
H. Wactlar Informedia Digital Video Library . . . . 57--58
The Stanford Digital Libraries Group The Stanford Digital Library Project . . 59--60
Robert Wilensky UC Berkeley's Digital Library project 60--60
Terence R. Smith and
James Frew Alexandria Digital Library . . . . . . . 61--62
Bruce Schatz Building the Interspace: The Illinois
Digital Library Project . . . . . . . . 62--63
Laurie Crum University of Michigan Digital Library
Project . . . . . . . . . . . . . . . . 63--64
Jonathan Purday The British Library's initiatives for
access projects . . . . . . . . . . . . 65--66
Herbert S. Becker Library of Congress Digital Library
Effort . . . . . . . . . . . . . . . . . 66--66
Gary Marchionini and
Hermann Maurer The roles of digital libraries in
teaching and learning . . . . . . . . . 67--75
David M. Levy and
Catherine C. Marshall Going Digital: a Look at Assumptions
Underlying Digital Libraries . . . . . . 77--84
Gio Wiederhold Digital libraries, value, and
productivity . . . . . . . . . . . . . . 85--96
Peter J. Denning and
Bernard Rous The ACM electronic publishing plan . . . 97--109
Peter J. Denning Inside Risks: Information Superhighway
2015 . . . . . . . . . . . . . . . . . . 138--138
Stuart Robbins Viewpoint: Turbulent Times for
Information Technology . . . . . . . . . 15--16
John Perry Barlow Electronic Frontier: Death From Above 17--20
J. L. Dedrick and
S. E. Goodman and
K. L. Kraemer International Perspectives: Little
Engines that Could: Computing in Small
Energetic Countries . . . . . . . . . . 21--26
Karen Holtzblatt and
Hugh R. Beyer Requirements Gathering: The Human
Factor: Introduction . . . . . . . . . . 30--32
Mark Keil and
Erran Carmel Customer-Developer Links in Software
Development . . . . . . . . . . . . . . 33--44
Hugh R. Beyer and
Karen Holtzblatt Apprenticing with the customer . . . . . 45--52
Arne Kjær and
Kim Halskov Madsen Participatory analysis of flexibility 53--60
Françoise Brun-Cottan and
Patricia Wall Using Video to Re-Present the User . . . 61--71
Anthony F. Hutchings and
Steve T. Knox Creating products customers demand . . . 72--80
C. Dennis Allen Succeeding as a clandestine change agent 81--86
Mitchell H. Clifton Self-Assessment Procedure XXIII:
Programming Languages . . . . . . . . . 89--97
L. F. Johnson Technical Opinion: C in the First Course
Considered Harmful . . . . . . . . . . . 99--101
Robert N. Charette Inside Risks: How to Create a Successful
Failure . . . . . . . . . . . . . . . . 122--122
David G. Moursund Viewpoint: Site-Based Management Saving
Our Schools . . . . . . . . . . . . . . 13--15
David G. Moursund Site-based management: saving our
schools . . . . . . . . . . . . . . . . 15--17
Brian A. Nejmeh Enterprising Innovations: Process Cost
and Value Analysis . . . . . . . . . . . 19--24
Saul Rockman Log on Education: In School or Out:
Technology, Equity, and the Future of
our Kids . . . . . . . . . . . . . . . . 25--29
Webb Stacy Cognition and software development . . . 31--31
Marian Petre Why looking isn't always seeing:
readership skills and graphical
programming . . . . . . . . . . . . . . 33--44
Joseph Dumas and
Paige Parsons Discovering the way programmers think
about new programming environments . . . 45--56
Webb Stacy and
Jean MacMillian Cognitive bias in software engineering 57--63
Terry Winograd From programming environments to
environments for designing . . . . . . . 65--74
William B. Frakes and
Christopher J. Fox Sixteen questions about software reuse 75--87, 112
Ross A. Gagliano and
Martin D. Fraser and
Mark E. Schaefer Auction allocation of computing
resources . . . . . . . . . . . . . . . 88--102
Young-Gul Kim and
Salvatore T. March Comparing data modeling formalisms . . . 103--115
Hal Abelson and
Kim Bruce and
Andy van Dam and
Brian Harvey and
Allen Tucker and
Peter Wegner The first-course conundrum . . . . . . . 116--117
Susan Horwitz and
Kenneth Appel and
Theresa Cuprak and
David Kay and
Christopher Nevison and
Leon Schram and
Mark Stehlik and
Owen Astrachan The first-course conundrum, why change? 117--118
Peter G. Neumann Computer vulnerabilities: exploitation
or avoidance . . . . . . . . . . . . . . 138--138
John Nosek and
Garth Shephard Viewpoint: Making Groupware Payoff: The
British Model . . . . . . . . . . . . . 11--13
Larry Press Personal Computing: McLuhan Meets the
Net . . . . . . . . . . . . . . . . . . 15--20
Fred Weingarten From Washington: The HPCC: Still a
Percheron Horse . . . . . . . . . . . . 21--23
Deborah Compeau and
Lorne Olfman and
Maung Sei and
Jane Webster End-User Training and Learning . . . . . 24--26
R. Ryan Nelson and
Ellen M. Whitener and
Henry H. Philcox The Assessment of End-User Training
Needs . . . . . . . . . . . . . . . . . 27--39
John M. Carroll and
Mary Beth Rosson Managing evaluation goals for training 40--48
Edmond P. Fitzgerald and
Aileen Cater-Steel Champagne training on a beer budget . . 49--60
Judy Kay and
Richard C. Thomas Studying Long-Term System Use . . . . . 61--69
Dennis F. Galletta and
Manju Ahuja and
Amir Hartman and
Thompson Teo and
A. Graham Peace Social influence and end-user training 70--79
Joline Morrison and
Joey F. George Exploring the software engineering
component in MIS research . . . . . . . 80--91
Gary Newman Organizing arrays for paged memory
systems . . . . . . . . . . . . . . . . 93--103, 108--110
Philip E. Agre Inside Risks: My Top 10 Email Hassles 122--122
Pamela Samuelson Legally Speaking: Software Compatibility
and the Law . . . . . . . . . . . . . . 15--22
Brock N. Meeks Electronic Frontier: Target: Internet 23--25
Michael Bieber and
Tomás Isakowitz Designing hypermedia applications . . . 26--29
Douglas C. Engelbart Toward Augmenting the Human Intellect
and Boosting our Collective IQ . . . . . 30, 32--33
Theodor Holm Nelson The heart of connection: hypermedia
unified by transclusion . . . . . . . . 31--33
Tomás Isakowitz and
Edward A. Stohr and
P. Balasubramanian RMM: a Methodology for Structured
Hypermedia Design . . . . . . . . . . . 34--44
Daniel Schwabe and
Gustavo Rossi The Object-Oriented Hypermedia Design
Model . . . . . . . . . . . . . . . . . 45--46
V. Balasubramanian and
Bang Min Ma and
Joonhee Yoo A systematic approach to designing a WWW
application . . . . . . . . . . . . . . 47--48
Jocelyne Nanard and
Marc Nanard Hypertext design environments and the
hypertext design process . . . . . . . . 49--56
Manfred Thüring and
Jörg Hannemann and
Jörg M. Haake Hypermedia and cognition: designing for
comprehension . . . . . . . . . . . . . 57--66
Paul Kahn Visual cues for local and global
coherence in the WWW . . . . . . . . . . 67--69
Norbert A. Streitz Designing Hypermedia: a Collaborative
Activity . . . . . . . . . . . . . . . . 70--71
John L. Schnase and
Edward L. Cunnius and
S. Bruce Dowton The StudySpace Project: Collaborative
Hypermedia in Nomadic Computing
Environments . . . . . . . . . . . . . . 72--73
Franca Garzotto and
Luca Mainetti and
Paolo Paolini Hypermedia design, analysis, and
evaluation issues . . . . . . . . . . . 74--86
Scott Johnson Control for hypertext construction . . . 87--87
Catherine C. Marshall and
Frank M. Shipman, III Spatial hypertext: designing for change 88--97
Andreas Dieberger and
Jay D. Bolter On the Design of Hyper ``Spaces'' . . . 98--98
Michael Bieber and
Charles Kacmar Designing hypertext support for
computational applications . . . . . . . 99--107
Hugh Davis To Embed or Not to Embed \ldots . . . . 108--109
Uffe K. Wiil Hyperform: Rapid Prototyping of
Hypermedia Services . . . . . . . . . . 109--111
Richard Furuta and
David Stotts Dynamic hyperdocuments: authoring
replaces programming . . . . . . . . . . 111--112
Joel M. Snyder Inside Risks: Research on the Internet 130--130
William E. Snizek Virtual offices: some neglected
considerations . . . . . . . . . . . . . 15--17
Maurice V. Wilkes A tribute to Presper Eckert . . . . . . 20--22
R. A. Baeza-Yates and
D. A. Fuller and
J. A. Pino and
S. E. Goodman International Perspectives: Computing in
Chile: The Jaguar of the Pacific Rim? 23--28
Fred W. Weingarten From Washington: Obituary for an Agency 29--32
Lucy Suchman Representations of work . . . . . . . . 33--35
Patricia Sachs Transforming Work: Collaboration,
Learning, and Design . . . . . . . . . . 36--44
Susan Leigh Star and
Geoffrey C. Bowker Work and Infrastructure . . . . . . . . 41--41
Brigitte Jordan and
Ron Goldman and
Patricia Sachs Tools for the Workplace . . . . . . . . 42--42
Helga Wild and
Chris Darrouzet and
Ted Kahn and
Susan U. Stucky Rhythms of Collaboration . . . . . . . . 45--45
Morten Kyng Making Representations Work . . . . . . 46--55
Lucy Suchman Making Work Visible . . . . . . . . . . 56--64
Rogers Hall Exploring design oriented mathematical
practices in school and work settings 62--64
Michael J. Muller Ethnocritical Questions for Working with
Translations, Interpretation and the
Stakeholders . . . . . . . . . . . . . . 64--65
Liam J. Bannon The politics of design: representing
work . . . . . . . . . . . . . . . . . . 66--68
Robert Klepper and
Douglas Bock Third and Fourth Generation Language
Productivity Differences . . . . . . . . 69--79
M. P. Papazoglou Unraveling the Semantics of Conceptual
Schemas . . . . . . . . . . . . . . . . 80--94
Sudha Ram Deriving functional dependencies from
the entity-relationship model . . . . . 95--107
Peter G. Neumann Inside Risks: Risks of Easy Answers . . 130--130
Stuart Zweben President's Letter: Widening
International Boundaries . . . . . . . . 15--16
Roy Rada Sharing Standards: Consensus Versus
Speed . . . . . . . . . . . . . . . . . 21--23
Larry Press Personal Computing: Net.Speech: Audio
Comes to the Net . . . . . . . . . . . . 25--31
Cherri M. Pancake The Promise and the Cost of Object
Technology: a Five-Year Forecast . . . . 33--49
Mohamed E. Fayad and
Wei-Tek Tsai Object-Oriented Experiences . . . . . . 50--53
William Berg and
Marshall Cline and
Mike Girou Lessons Learned from the OS/400 OO
Project . . . . . . . . . . . . . . . . 54--64
Douglas C. Schmidt Using Design Patterns to Develop
Reusable Object-Oriented Communication
Software . . . . . . . . . . . . . . . . 65--74
David Kung and
Jerry Gao and
Pei Hsia and
Yasufumi Toyoshima and
Chris Chen and
Young-Si Kim and
Young-Kee Song Developing an Object-Oriented Software
Testing and Maintenance Environment . . 75--87
Charles D. Norton and
Boleslaw K. Szymanski and
Viktor K. Decyk Object-Oriented Parallel Computation for
Plasma Simulation . . . . . . . . . . . 88--100
Yen-Ping Shan Introduction: Smalltalk on the Rise . . 102--104
Adele Goldberg Why Smalltalk? . . . . . . . . . . . . . 105--107
Jim Adamczyk Smalltalk Reaches Crossroads in the
Insurance Industry . . . . . . . . . . . 107--109
Jerrold M. Grochow Smalltalk in the Telecommunications
Industry . . . . . . . . . . . . . . . . 110--111
Dave Thomas Ubiquitous Applications: Embedded
Systems to Mainframe . . . . . . . . . . 112--114
Ken Auer Smalltalk Training: As Innovative as the
Environment . . . . . . . . . . . . . . 115--117
Simson L. Garfinkel Inside Risks: Risks of Social Security
Numbers . . . . . . . . . . . . . . . . 146--146
Robert D. Rachlin Viewpoint: Learning from Litigation:
Trade Secret Misappropriation . . . . . 15--17
Ben Shneiderman and
Maryann Alavi and
Kent Norman and
Ellen Yu Borkowski Log On Education: Windows of Opportunity
in Electronic Classrooms . . . . . . . . 19--24
Hal Berghel Digital Village: Maiden Voyage . . . . . 25--27
Toshinori Munakata Introduction: New Horizons in Commercial
and Industrial AI . . . . . . . . . . . 28--31
Douglas B. Lenat CYC: a Large-Scale Investment in
Knowledge Infrastructure . . . . . . . . 33--38
George A. Miller WordNet: a Lexical Database for English 39--41
Toshio Yokoi The EDR Electronic Dictionary . . . . . 42--44
Douglas B. Lenat and
George A. Miller and
Toshio Yokoi CYC, WordNet, and EDR: Critiques and
Responses . . . . . . . . . . . . . . . 45--48
B. Chaib-draa Industrial Applications of Distributed
AI . . . . . . . . . . . . . . . . . . . 49--53
Pat Langley and
Herbert A. Simon Applications of machine learning and
rule induction . . . . . . . . . . . . . 54--64
Ivan Bratko and
Stephen Muggleton Applications of Inductive Logic
Programming . . . . . . . . . . . . . . 65--70
Kenneth W. Church and
Lisa F. Rau Commercial Applications of Natural
Language Processing . . . . . . . . . . 71--79
Paul Harmon Object-Oriented AI: a Commercial
Perspective . . . . . . . . . . . . . . 80--86
Zdzislaw Pawlak and
Jerzy Grzymala-Busse and
Roman Slowinski and
Wojciech Ziarko Rough sets . . . . . . . . . . . . . . . 88--95
William Ditto and
Toshinori Munakata Principles and Applications of Chaotic
Systems . . . . . . . . . . . . . . . . 96--102
Kazuyuki Aihara and
Ryu Katayama Chaos Engineering in Japan . . . . . . . 103--107
Pattie Maes Artificial Life Meets Enfertainment:
Lifelike Autonomous Agents . . . . . . . 108--114
R. A. Coldwell Australian attitudes toward legal
intervention into hacking . . . . . . . 115--117
Nancy G. Leveson Inside Risks: Safety as a System
Property . . . . . . . . . . . . . . . . 146--146
Dan Lynch and
Bert Herzog Guest President's Letter: a time for
celebration . . . . . . . . . . . . . . 11--12
Lisa M. Zurk and
Barbara Simons and
Rebecca Parsons and
Dawn Cohen Viewpoint: When an Advantage is Not an
Advantage . . . . . . . . . . . . . . . 17--18
John Perry Barlow Electronic Frontier: Property and
Speech: Who Owns What You Say in
Cyberspace? . . . . . . . . . . . . . . 19--22
A. K. Danowitz and
Y. Nassef and
S. E. Goodman International Perspectives: Cyberspace
Across the Sahara: Computing in North
Africa . . . . . . . . . . . . . . . . . 23--28
Peter J. Denning Editorial: Plagiarism in the Web . . . . 29--29
Sue Conger and
Karen D. Loch Ethics and Computer Use . . . . . . . . 30--32
Kenneth C. Laudon Ethical Concepts and Information
Technology . . . . . . . . . . . . . . . 33--39
Suzanne P. Weisband and
Bruce A. Reinig Managing User Perceptions of Email
Privacy . . . . . . . . . . . . . . . . 40--47
Janice C. Sipior and
Burke T. Ward The Ethical and Legal Quandary of Email
Privacy . . . . . . . . . . . . . . . . 48--54
Richard O. Mason Applying Ethics to Information
Technology Issues . . . . . . . . . . . 55--57
Deborah G. Johnson and
John M. Mulvey Accountability and Computer Decision
Systems . . . . . . . . . . . . . . . . 58--64
Sandra J. Milberg and
Sandra J. Burke and
H. Jeff Smith and
Ernest A. Kallman Values, Personal Information Privacy,
and Regulatory Approaches . . . . . . . 65--74
Chuck Huff and
C. Dianne Martin Computing Consequences: a Framework for
Teaching Ethical Computing . . . . . . . 75--84
Anonymous Communications of the ACM 1995 subject
index . . . . . . . . . . . . . . . . . 85--90
Anonymous Communications of the ACM 1995 author
index . . . . . . . . . . . . . . . . . 91--99
Peter G. Neumann Inside Risks: Reviewing the Risks
Archives . . . . . . . . . . . . . . . . 138--138
Robert Fox Newstrack . . . . . . . . . . . . . . . 9--10
Stuart Zweben President's Letter: Computing Week '96 11--12
Thomas Erickson Viewpoint: The World-Wide Web as Social
Hypertext . . . . . . . . . . . . . . . 15--17
Roy Rada Sharing Standards: Who Will Test
Conformance? . . . . . . . . . . . . . . 19--22
Pamela Samuelson Legally Speaking: Intellectual Property
Rights and the Global Information
Economy . . . . . . . . . . . . . . . . 23--28
Hal Berghel The client's side of the World-Wide Web 30--40
Stephen Haag and
M. K. Raja and
L. L. Schkade Qaulity Function Deployment: Usage in
Software Development . . . . . . . . . . 41--49
Matthew Cheyney and
Peter Gloor and
Donald B. Johnson and
Fillia Makedon and
James Matthews and
Panagiotis Takis Metaxas Toward Multimedia Conference Proceedings 50--59
Yorick Wilks Natural Language Processing . . . . . . 60--62
Louise Guthrie and
James Pustejovsky and
Yorick Wilks and
Brian M. Slator The role of Lexicons in natural language
processing . . . . . . . . . . . . . . . 63--72
Margaret King Evaluating Natural Language Processing
Systems . . . . . . . . . . . . . . . . 73--79
Jim Cowie and
Wendy Lehnert Information Extraction . . . . . . . . . 80--91
David D. Lewis and
Karen Sparck Jones Natural Language Processing for
Information Retrieval . . . . . . . . . 92--101
Janyce Wiebe and
Graeme Hirst and
Diane Horton Language Use in Context . . . . . . . . 102--111
Peter G. Neumann Risks in Digital Commerce . . . . . . . 154--154
Franz Alt Franz Alt remembers the early years of
computing and the creation of ACM . . . 1, 5, 6
Anonymous Computing week 96 ushers in ACM's 50th
anniversary . . . . . . . . . . . . . . 1--2
Anonymous Finals teams: 1996 international
collegiate programming contest . . . . . 3--3
Anonymous Entering its fourth decade, SIGPLAN
looks ahead . . . . . . . . . . . . . . 4--4
Anonymous ACM E-guide to debut this spring. Two
new books from ACM Press books . . . . . 7--7
Anonymous New on-line journal. TODAES begins
publications. New focus added: Asia
Pacific region . . . . . . . . . . . . . 8--8
Jeff Johnson Viewpoint: The Information Superhighway:
a Worst-Case Scenario . . . . . . . . . 15--17
Hal Berghel Digital Village: HTML Compliance and the
Return of the Test Pattern . . . . . . . 19--22
Larry Press Personal Computing: The Role of Computer
Networks in Development . . . . . . . . 23--30
Michael J. Woxny and
William C. Regli Computer science in manufacturing . . . 32--33
Michael J. Wozny and
William C. Regli Computer Science in Manufacturing . . . 33--33
J. W. Erkes and
K. B. Kenny and
J. W. Lewis and
B. D. Sarachan and
M. W. Sobolewski and
R. N. Sum, Jr. Implementing shared manufacturing
services on the World-Wide Web . . . . . 34--45
Martin Hardwick and
David L. Spooner and
Tom Rando and
K. C. Morris Sharing Manufacturing Information in
Virtual Enterprises . . . . . . . . . . 46--54
Vijay Kumar and
Ruzena Bajcsy and
William Harwin and
Patrick Harker Rapid Design and Prototyping of
Customized Rehabilitation Aids . . . . . 55--61
George A. Bekey Commentary: Trends in Robotics . . . . . 62--62
S. Finger and
M. Terk and
E. Subrahmanian and
C. Kasabach and
F. Prinz and
D. P. Siewiorek and
A. Smailagic and
J. Stivoric and
L. Weiss Rapid Design and Manufacture of Wearable
Computers . . . . . . . . . . . . . . . 63--70
Aristides A. G. Requicha Geometric Reasoning for Intelligent
Manufacturing . . . . . . . . . . . . . 71--76
Martti Mäntylä and
Dana Nau and
Jami Shah Challenges in Feature-Based
Manufacturing Research . . . . . . . . . 77--85
Philip A. Bernstein Middleware: a Model for Distributed
System Services . . . . . . . . . . . . 86--98
James W. Candler and
Prashant C. Palvia and
Jane D. Thompson and
Steven M. Zeltmann The ORION Project: Staged Business
Process Reengineering at FedEx . . . . . 99--107
Mohamed E. Fayad and
Wei-Tek Tsai and
Milton L. Fulghum Transition to Object-Oriented Software
Development . . . . . . . . . . . . . . 108--121
Peter G. Neumann and
Peter J. Denning W(h)ither Research and Education? . . . 154--154
Gordon Bell Viewpoint: 1995 Observations on
Supercomputing Alternatives: Did the MPP
Bandwagon Lead to a Cul-de-Sac? . . . . 11--15
Roy Rada Sharing standards: ISO 9000 Reflects the
Best in Standards . . . . . . . . . . . 17--20
Randall Davis and
Pamela Samuelson and
Mitchell Kapor and
Jerome Reichman A New View of Intellectual Property and
Software . . . . . . . . . . . . . . . . 21--30
Ravi Ganesan How To Use Key Escrow . . . . . . . . . 33--33
Dorothy E. Denning and
Dennis K. Branstad A Taxonomy for Key Escrow Encryption
Systems . . . . . . . . . . . . . . . . 34--40
Stephen T. Walker and
Steven B. Lipner and
Carl M. Ellison and
David M. Balenson Commercial Key Recovery . . . . . . . . 41--47
David Paul Maher Crypto Backup and Key Escrow . . . . . . 48--53
Ravi Ganesan The Yaksha Security System . . . . . . . 55--60
Frederick P. Brooks, Jr. The Computer Scientist as Toolsmith II 61--68
A. T. Wood-Harper and
Steve Corder and
J. R. G. Wood and
Heather Watson How We Profess: The Ethical Systems
Analyst . . . . . . . . . . . . . . . . 69--77
Anthony Ralston The Demographics of Candidates for
Faculty Positions in Computer Science 78--84
Guy E. Blelloch Programming Parallel Algorithms . . . . 85--97
Anonymous Information for Authors . . . . . . . . 98--99
Art Goldschmidt Technical Opinion: Report on NIIIP . . . 100--103
Robert N. Charette Taking Responsibility for Our Risks . . 122--122
Michael D. Myers International Perspectives: Can Kiwis
Fly? Computing in New Zealand . . . . . 11--15
Elliot Soloway and
Amanda Pryor Log on Education: The Next Generation in
Human-Computer Interaction . . . . . . . 16--18
Donald A. Norman and
James C. Spohrer Learner-centered education . . . . . . . 24--27
Roger C. Schank and
Alex Kass A Goal-Based Scenario for High School
Students . . . . . . . . . . . . . . . . 28--29
Beverly Park Woolf Intelligent Multimedia Tutoring Systems 30--31
Daniel C. Edelson and
Roy D. Pea and
Louis M. Gomez The Collaboratory Notebook . . . . . . . 32--33
Marcia C. Linn Key to the Information Highway . . . . . 34--35
Marlene Scardamalia and
Carl Bereiter Student Communities for the Advancement
of Knowledge . . . . . . . . . . . . . . 36--37
Yasmin B. Kafai Software by Kids for Kids . . . . . . . 38--39
Hal Eden and
Mike Eisenberg and
Gerhard Fischer and
Alexander Repenning Making Learning a Part of Life . . . . . 40--42
M. Guzdial and
J. Kolodner and
C. Hmelo and
H. Narayanan and
D. Carlson and
N. Rappin and
R. Hübscher and
J. Turns and
W. Newstetter Computer Support for Learning through
Complex Problem Solving . . . . . . . . 43--45
Mary Beth Rosson and
John M. Carroll Scaffolded Examples for Learning
Object-Oriented Design . . . . . . . . . 46--47
Shari L. Jackson and
Steven J. Stratford and
Joseph Krajcik and
Elliot Soloway A Learner-Centered Tool for Students
Building Models . . . . . . . . . . . . 48--49
David Powell Group communication . . . . . . . . . . 50--53
Louise E. Moser and
P. M. Melliar-Smith and
Deborah A. Agarwal and
Ravi K. Budhia and
Colleen A. Lingley-Papadopoulos Totem: a Fault-Tolerant Multicast Group
Communication System . . . . . . . . . . 54--63
Danny Dolev and
Dalia Malki The Transis Approach to High
Availability Cluster Communication . . . 64--70
Michael K. Reiter Distributing Trust with the Rampart
Toolkit . . . . . . . . . . . . . . . . 71--74
Robbert van Renesse and
Kenneth P. Birman and
Silvano Maffeis Horus: a Flexible Group Communication
System . . . . . . . . . . . . . . . . . 76--83
André Schiper and
Michael Raynat From Group Communication to Transactions
in Distributed Systems . . . . . . . . . 84--87
Flaviu Cristian Synchronous and Asynchronous Group
Communication . . . . . . . . . . . . . 88--97
Anonymous Information for Authors . . . . . . . . 98--99
Anonymous Calendar of Events . . . . . . . . . . . 100--101, 107--109
Peter G. Neumann Inside Risks: a Risks Related Bookshelf 122--122
Robert Fox News Track . . . . . . . . . . . . . . . 11--12
Randy H. Katz Viewpoint: Professor Katz Goes to
Washington . . . . . . . . . . . . . . . 13--17
Larry Press Personal Computing: Windows NT as a
Personal or Intranet Server . . . . . . 19--23
Brock N. Meeks Electronic Frontier: The Game Plan to
Save Cyberspace . . . . . . . . . . . . 24--26
Peter J. Denning The university's next challenges . . . . 27--31
Gurminder Singh and
Steven K. Feiner and
Daniel Thalmann Virtual reality: software and technology 35--36
Timothy Poston and
Luis Serra Dextrous Virtual Work . . . . . . . . . 37--45
Mark Green and
Sean Halliday A Geometric Modeling and Animation
System for Virtual Reality . . . . . . . 46--53
Michael F. Deering The HoloSketch VR Sketching System . . . 54--61
Steve Bryson Virtual Reality in Scientific
Visualization . . . . . . . . . . . . . 62--71
Salvador Bayarri and
Marcos Fernandez and
Mariano Perez Virtual Reality for Driving Simulation 72--76
Ronald Fagin and
Moni Naor and
Peter Winkler Comparing Information Without Leaking It 77--85
Henry C. Lucas, Jr. and
Donald J. Berndt and
Greg Truman A Reengineering Framework for Evaluating
a Financial Imaging System . . . . . . . 86--96
Edward A. Feigenbaum Turing Award Lecture: How the ``What''
Becomes the ``How'' . . . . . . . . . . 97--104
Raj Reddy Turing Award Lecture: To Dream The
Possible Dream . . . . . . . . . . . . . 105--112
Raymond McLeod, Jr. Comparing Undergraduate Courses in
Systems Analysis and Design . . . . . . 113--121
Anonymous Accredited Programs in Computing . . . . 122--127
Anonymous ACM General Elections . . . . . . . . . 128--135
Peter G. Neumann Inside Risks: Linguistic Risks . . . . . 154--154
Elliot Soloway Log on Education: Teachers are the Key 11--14
Hal Berghel Digital Village: U.S. Technology Policy
in the Information Age . . . . . . . . . 15--18
Raymond Pyle Electronic Commerce and the Internet . . 22--23
John R. Sivori Evaluated Receipts and Settlement at
Bell Atlantic . . . . . . . . . . . . . 24--28
Anish Bhimani Securing the Commercial Internet . . . . 29--35
Nathaniel S. Borenstein Perils and Pitfalls of Practical
Cybercommerce . . . . . . . . . . . . . 36--44
Patiwat Panurach Money in electronic commerce: digital
cash, electronic fund transfer, and
Ecash . . . . . . . . . . . . . . . . . 45--50
Matti Hämäläinen and
Andrew B. Whinston and
Svetlana Vishik Electronic Markets for Learning:
Education Brokerages on the Internet . . 51--58
Kilnam Chon Internet Inroads . . . . . . . . . . . . 59--60
Robert M. Hinden IP Next Generation Overview . . . . . . 61--71
Peng Hwa Ang and
Berlinda Nadarajan Censorship and the Internet: A Singapore
Perspective . . . . . . . . . . . . . . 72--78
Tim O'Reilly Publishing Models for Internet Commerce 79--86
Peter Kirstein and
Goli Montasser-Kohsari The C-ODA Project: Online Access to
Electronic Journals . . . . . . . . . . 87--99
Bruno Mannoni Bringing Museums Online . . . . . . . . 100--105
James E. Pitkow and
Colleen M. Kehoe Emerging Trends in the WWW User
Population . . . . . . . . . . . . . . . 106--108
Teresa F. Lunt Inside Risks: Securing the Information
Infrastructure . . . . . . . . . . . . . 130--130
L. T. Greenberg and
S. E. Goodman International Perspectives: Is Big
Brother Hanging by His Bootstraps? . . . 11--16
Pamela Samuelson Legally Speaking: Regulation of
Technologies to Protect Copyrighted
Works . . . . . . . . . . . . . . . . . 17--24
Andrew Grosso Viewpoint: Why Won't the President
Enforce the Constitution? . . . . . . . 25--26
H. Raghav Rao and
Kichan Nam and
A. Chaudhury Information systems outsourcing . . . . 27--28
Paul Nelson and
William Richmond and
Abraham Seidmann Two Dimensions of Software Acquisition 29--35
Kichan Nam and
S. Rajagopalan and
H. Raghav Rao and
A. Chaudhury A Two-Level Investigation of Information
Systems Outsourcing . . . . . . . . . . 36--44
Vijay Gurbaxani The New World of Information Technology
Outsourcing . . . . . . . . . . . . . . 45--46
Sandra A. Slaughter and
Soon Ang Employment Outsourcing in Information
Systems . . . . . . . . . . . . . . . . 47--54
Gordon Bell and
Jim Gemmell On-ramp prospects for the information
superhighway dream: will the goal of a
single, universally available network
carrying a wide variety of data types
ever be achieved? . . . . . . . . . . . 55--61
Lynn A. Streeter and
Robert E. Kraut and
Henry C. Lucas, Jr. and
Laurence Caby How Open Data Networks Influence
Business Performance and Market
Structure . . . . . . . . . . . . . . . 62--73
Karen D. Loch and
Sue Conger Evaluating Ethical Decision Making and
Computer Use . . . . . . . . . . . . . . 74--83
Jack J. Dongarra and
Steve W. Otto and
Marc Snir and
David Walker A message passing standard for MPP and
workstations . . . . . . . . . . . . . . 84--90
Toshinori Munakata Thoughts on Deep Blue vs. Kasparov . . . 91--92
Peter G. Neumann Inside Risks: Using Formal Methods to
Reduce Risks . . . . . . . . . . . . . . 114--114
Anonymous New Publishing Directions for ACM . . . 3--3
Anonymous New E-Guide CD-ROM Demo. Price Update 4--4
Anonymous SIGCHI Development Consortium Reaches
Out . . . . . . . . . . . . . . . . . . 7--7
Anonymous Electronic Services Working Group . . . 8--8
Robert Fox News Track . . . . . . . . . . . . . . . 11--12
Jonah Sieger From Washington: Communications Decency
Act is Defeated: Landmark Victory for
Netizens . . . . . . . . . . . . . . . . 13--15
Anonymous ACM Group Insurance Program Offers Term
Life Insurance at Special Rate . . . . . 14--15
James W. Moore and
Roy Rada Sharing Standards: Organizational Badge
Collecting . . . . . . . . . . . . . . . 17--21
Steve Mann Viewpoint: Smart Clothing: The Shift to
Wearable Computing . . . . . . . . . . . 23--24
Ted Selker New paradigms for computing . . . . . . 28--30
John Seely Brown To Dream the Invisible Dream . . . . . . 30--30
Nolan Bushnell Relationships between Fun and the
Computer Business . . . . . . . . . . . 31--37
Henry Lieberman Intelligent Graphics . . . . . . . . . . 38--48
Ken Kahn Drawings on Napkins, Video-Game
Animation, and Other Ways to Program
Computers . . . . . . . . . . . . . . . 49--59
Ted Selker New Paradigms for Using Computers . . . 60--69
Don Gentner and
Jakob Nielson The Anti-Mac Interface . . . . . . . . . 70--82
Elliot Soloway and
Amanda Pryor Introduction: Using computational media
to facilitate learning . . . . . . . . . 83--83
Andee Rubin and
Scott Bresnahan and
Ted Ducas Cartwheeling Through CamMotion . . . . . 84--85
Jere Confrey and
Alan Maloney Function Probe . . . . . . . . . . . . . 86--87
Wallace Feurzeig and
John Richards Function Machines . . . . . . . . . . . 88--90
Marge Cappo and
Kathy Darling Measurement in Motion . . . . . . . . . 91--93
Judah L. Schwartz Motion Toys for Eye and Mind . . . . . . 94--96
Jeremy Roschelle and
James J. Kaput SimCalc MathWorlds for the mathematics
of change . . . . . . . . . . . . . . . 97--99
Paul Horwitz and
Eric Neumann and
Joyce Schwartz Teaching Science at Multiple Space-Time
Scales . . . . . . . . . . . . . . . . . 100--102
Pierre Dillenbourg and
J. A. Self What if the Computer Doesn't Know the
Answer? . . . . . . . . . . . . . . . . 103--105
Anonymous A Multimedia Literacy Series: The
Cognition and Technology Group at
Vanderbilt . . . . . . . . . . . . . . . 106--109
Herbert Lin Inside Risks: Cryptography's Role in
Securing Information . . . . . . . . . . 131--131
Thomas Sterling The Scientific Workstation of the Future
May Be a Pile of PCs . . . . . . . . . . 11--12
Brock N. Meeks Dragging a Kicking-and-Screaming
Government into the 21st Century . . . . 13--15
Ellen A. Isaacs and
John C. Tang Technology transfer: so much research,
so few good products . . . . . . . . . . 22--25
Jean Scholtz Technology Transfer Through Prototypes 26--27
Allan Kuchinsky Transfer Means More Than Just Technology 28--29
Jim Foley Technology Transfer from University to
Industry . . . . . . . . . . . . . . . . 30--31
Jeff Johnson R-D, not R&D . . . . . . . . . . . . . . 32--34
John L. Bennett Building Relationships for Technology
Transfer . . . . . . . . . . . . . . . . 35--36
Nayeem Islam and
Roy H. Campbell Latest developments in operating systems 38--40
Peter Druschel Operating system support for high-speed
communication: techniques to eliminate
processing bottlenecks in high-speed
networking are presented . . . . . . . . 41--51
Mendel Rosenblum and
John Chapin and
Dan Teodosiu and
Scott Devine and
Tirthankar Lahiri and
Anoop Gupta Implementing efficient fault containment
for multiprocessors: confining faults in
a shared-memory multiprocessor
environment . . . . . . . . . . . . . . 52--61
John Rosenberg and
Alan Dearle and
David Hulse and
Anders Lindström and
Stephen Norris Operating System Support for Persistant
and Recoverable Computations . . . . . . 62--69
Jochen Liedtke Toward Real Microkernels . . . . . . . . 70--77
Mark R. Cutkosky and
Jay M. Tenenbaum and
Jay Glicksman Madefast: Collaborative Engineering over
the Internet . . . . . . . . . . . . . . 78--87
Uzi Vishkin Can Parallel Algorithms Enhance Serial
Implementation? . . . . . . . . . . . . 88--91
Kenneth C. Laudon Markets and Privacy . . . . . . . . . . 92--104
Richard Baker The corporate politics of CMM ratings 105--106
Lauren Weinstein Inside Risks: Behind the State of the
Art . . . . . . . . . . . . . . . . . . 130--130
Larry Press Seeding Networks: The Federal Role . . . 11--18
Hal Berghel Digital politics . . . . . . . . . . . . 19--25
Mark Luker Viewpoint: NSF's New Program for
High-Performance Internet Connections 27--28
Roy Rada and
Anne Mette Hass and
Don Herbison-Evans and
John Waterworth and
Magnus Kempe ACM forum: Request for a virtual IT
college . . . . . . . . . . . . . . . . 29--35
Douglas C. Schmidt and
Mohamed Fayad and
Ralph E. Johnson Software patterns: introductions . . . . 36--39
Alistair Cockburn The interaction of social issues and
software architecture . . . . . . . . . 40--46
Marshall P. Cline The pros and cons of adopting and
applying design patterns in the real
world . . . . . . . . . . . . . . . . . 47--49
Amund Aarsten and
Davide Brugali and
Giuseppe Menga Designing concurrent and distributed
control systems . . . . . . . . . . . . 50--58
Mohamed Fayad and
Marshall P. Cline Aspects of Software Adaptability . . . . 58--59
Brandon Goldfedder and
Linda Rising A training experience with patterns . . 60--64
Nayeem Islam and
Murthy Devarakonda An essential design pattern for
fault-tolerant distributed state sharing 65--74
Paul E. McKenney Selecting locking primitives and
parallel programming . . . . . . . . . . 75--82
Anonymous Where to Look for Patterns . . . . . . . 82--82
Paul Resnick and
James Miller PICS: Internet access controls without
censorship . . . . . . . . . . . . . . . 87--93
Juhani Iivari Why are case tools not used? . . . . . . 94--103
Victor R. Basili and
Lionel C. Briand and
Walcélio L. Melo How reuse influences productivity in
object-oriented systems . . . . . . . . 104--116
Peter G. Neumann Inside Risks: Disinformation Theory . . 138--138
Robert L. Glass Practical Programmer: The Relationship
Between Theory and Practice in Software
Engineering . . . . . . . . . . . . . . 11--13
Neil Munro From Washington: Sketching a National
Information Warfare Defense Plan . . . . 15--17
Usama Fayyad and
Ramasamy Uthurusamy Data Mining and Knowledge Discovery in
Databases . . . . . . . . . . . . . . . 24--27
Usama Fayyad and
Gregory Piatetsky-Shapiro and
Padhraic Smyth The KDD Process for Extracting Useful
Knowledge From Volumes of Data . . . . . 27--34
Clark Glymour and
David Madigan and
Daryl Pregibon and
Padhraic Smyth Statistical Inference and Data Mining 35--41
Ronald J. Brachman and
Tom Khabaza and
Willi Kloesgen and
Gregory Piatetsky-Shapiro and
Evangelos Simoudis Mining Business Databases . . . . . . . 42--48
W. H. Inmon The Data Warehouse and Data Mining . . . 49--50
Usama Fayyad and
David Haussler and
Paul Stolorz Mining Scientific Data . . . . . . . . . 51--57
Tomasz Imielinski and
Heikki Mannila A Database Perspective on Knowledge
Discovery . . . . . . . . . . . . . . . 58--64
Oren Etzioni The World-Wide Web: Quagmire or Gold
Mine? . . . . . . . . . . . . . . . . . 65--77
David Abramson and
Ian Foster and
John Michalakes and
Rok Soci\vc Relative Debugging: a New Methodology
for Debugging Scientific Applications 69--77
David E. Culler and
Rachard M. Karp and
David Patterson and
Abhijit Sahay and
Eunice E. Santos and
Klaus Erik Schauser and
Ramesh Subramonian and
Thorsten von Eicken LogP: a Practical Model of Parallel
Computation . . . . . . . . . . . . . . 78--85
Yair Wand and
Rachard Y. Wang Anchoring Data Quality Dimensions in
Ontological Foundations . . . . . . . . 86--95
Peter G. Neumann Inside Risks: Distributed Systems Have
Distributed Risks . . . . . . . . . . . 130--130
S. E. Goodman International Perspectives: War,
Information Technologies, and
International Asymmetries . . . . . . . 11--15
Pamela Samuelson Legally Speaking: Legal Protection for
Database Contents . . . . . . . . . . . 17--23
A. Michael Noll CyberNetwork Technology: Issues and
Uncertainties . . . . . . . . . . . . . 27--31
Robert Kraut The Internet@Home . . . . . . . . . . . 32--35
Donna L. Hoffman and
William D. Kalsbeek and
Thomas P. Novak Internet and Web Use in the U.S. . . . . 36--46
Alladi Venkatesh Computers and Other Interactive
Technologies for the Home . . . . . . . 47--54
Robert Kraut and
William Scherlis and
Tridas Mukhopadhyay and
Jane Manning and
Sara Kiesler The HomeNet Field Trial of Residential
Internet Services . . . . . . . . . . . 55--63
Marita Franzke and
Anne McClard Winona Gets Wired: Technical
Difficulties in the Home . . . . . . . . 64--66
George T. Duncan Is My Research Ethical? . . . . . . . . 67--68
John M. Carroll and
Mary Beth Rosson Developing the Blacksburg Electronic
Village . . . . . . . . . . . . . . . . 69--74
C. Dianne Martin and
Chuck Huff and
Donald Gotterbarn and
Keith Miller Implementing a Tenth Strand in the CS
Curriculum . . . . . . . . . . . . . . . 75--84
Henry M. Walker and
G. Michael Schneider A Revised Model Curriculum for a Liberal
Arts Degree in Computer Science . . . . 85--95
Robert Geist and
Madhu Chetuparambil and
Stephen Hedetniemi and
A. Joe Turner Computing Research Programs in the U.S. 96--99
Peter G. Neumann Inside Risks: Risks of Anonymity . . . . 162--162
C. David Kemp The Construction of Fast Portable
Multiplicative Congruential Random
Number Generators . . . . . . . . . . . 163--166
Alejandro Barrero Implementation of Abstract Data Types
with Arrays of Unbounded Dimensions . . 167--174
Zbigniew Michalewicz and
Cezary Z. Janikow GENOCOP: a Genetic Algorithm for
Numerical Optimization Problems with
Linear Constraints . . . . . . . . . . . 175--201
Barak A. Pearlmutter Garbage Collection with Pointers to
Individual Cells . . . . . . . . . . . . 202--206
Raúl Rojas A Graph Labelling Proof of the
Backpropagation Algorithm . . . . . . . 207--215
Wesley W. Chu and
Kuorong Chiang and
Chih-Cheng Hsu and
Henrick Yau An Error-based Conceptual Clustering
Method for Providing Approximate Query
Answers . . . . . . . . . . . . . . . . 216--230
Randolph D. Nelson Including Queueing Effects in Amdahl's
Law . . . . . . . . . . . . . . . . . . 231--238
Ronald E. Prather Harmonic Analysis from the Computer
Representation of a Musical Score . . . 239--255
Mark G. Staskausas An Experience in the Formal Verification
of Industrial Software . . . . . . . . . 256--272
Guy E. Blelloch and
Charles E. Leiserson and
Bruce M. Maggs and
C. Greg Plaxton and
Stephen J. Smith and
Marco Zagha A Comparison of Sorting Algorithms for
the Connection Machine CM-2 . . . . . . 273--297
Nathaniel Borenstein CMU's Andrew Project: a Retrospective 298--311
James H. Morris War Stories from Andrew . . . . . . . . 312--321
Neil Munro From Washington: If It Grows, Tax It . . 11--13
Robert L. Glass Practical Programmer: The Next Date
Crisis and the Ones After That . . . . . 15--17
Robert Fox On Site: Tomorrow's Library Today . . . 20--21
Alex Peleg and
Sam Wilkie and
Uri Weiser Intel MMX for Multimedia PCs . . . . . . 24--38
Andrew S. Grimshaw and
William A. Wulf The Legion vision of a worldwide virtual
computer . . . . . . . . . . . . . . . . 39--45
Carey Nachenberg Computer Virus: Antivirus Coevolution 46--51
Daniel E. O'Leary and
Daniel Kuokka and
Robert Plant Artificial Intelligence and Virtual
Organizations . . . . . . . . . . . . . 52--59
Deborah G. Johnson Ethics Online . . . . . . . . . . . . . 60--65
Sourav Bhattacharya and
Akira Onoma and
Farokh Bastani Guest Editor's Introduction:
High-Assurance Systems . . . . . . . . . 67--67
Nuno Neves and
W. Kent Fuchs Adaptive Recovery for Mobile
Environments . . . . . . . . . . . . . . 68--74
K. H. Kim and
Chittur Subbaraman Fault-Tolerant Real-Time Objects . . . . 75--82
Jeffrey J. P. Tsai and
Bing Li and
Eric Y. T. Juan Parallel Evaluation of Software
Architecture Specifications . . . . . . 83--86
David B. Stewart and
Pradeep K. Khosla Mechanisms for Detecting and Handling
Timing Errors . . . . . . . . . . . . . 87--93
Sherman R. Alpert and
Richard B. Lam The Ultimately Publishable Computer
Science Paper for the Latter '90s: a Tip
for Authors . . . . . . . . . . . . . . 94--94
Bruce Schneier Inside Risks: Cryptography, Security,
and the Future . . . . . . . . . . . . . 138--138
Anonymous ACM plus five other leading computing
societies met to discuss international
cooperation . . . . . . . . . . . . . . 3
Anonymous Member value Plus keeps on growing . . . 5
Anonymous ACM Committee on the Status of Women in
Computing moves ahead with new projects 8
Larry Press Personal Computing: Technology in Bloom:
Implications for the Next 50 Years . . . 11--17
Anonymous New ACM Transactions on Information and
System Security will begin publication 14
Hal Berghel Digital Village: Cyberspace 2000:
Dealing with Information Overload . . . 19--24
Nathan Myhrvold ACM 97: speakers corner . . . . . . . . 27--28
Diane Crawford The next 50 years . . . . . . . . . . . 29--29
Gordon Bell The Human Connection: The Body Electric 30--32
Tim O'Reilly The Human Connection: Hardware,
Software, and Infoware . . . . . . . . . 33--34
Esther Dyson The Human Connection: Education and Jobs
in the Digital World . . . . . . . . . . 35--36
Danny Hillis The Human Connection: a Time of
Transition . . . . . . . . . . . . . . . 37--39
Joel Birnbaum The Human Connection: Pervasive
Information Systems . . . . . . . . . . 40--41
Marc Davis The Human Connection: Garage Cinema and
the Future of Media Technology . . . . . 42--48
Dennis Tsichritzis The Human Connection: How to Surf the
Technology Waves We Created . . . . . . 49--54
Jaron Lanier The Human Connection: The Frontier
Between Us . . . . . . . . . . . . . . . 55--56
Tim Berners-Lee The Human Connection: World-Wide
Computer . . . . . . . . . . . . . . . . 57--58
Ben Shneiderman The Human Connection: Between Hope and
Fear . . . . . . . . . . . . . . . . . . 59--62
Andries van Dam The Human Connection: Post-WIMP User
Interfaces . . . . . . . . . . . . . . . 63--67
John Perry Barlow Societal Dimensions: The Best of All
Possible Worlds . . . . . . . . . . . . 68--74
Brock N. Meeks Societal Dimensions: Better Democracy
Through Technology . . . . . . . . . . . 75--78
Bruce Sterling Societal Dimensions: The Digital
Revolution in Retrospect . . . . . . . . 79--79
Steve Talbott Societal Dimensions: Asleep at the
Keyboard . . . . . . . . . . . . . . . . 80--82
Jerry Berman and
Daniel J. Weitzner Societal Dimensions: Directing
Policy-Making Beyond the Net's Metaphor 83--84
Richard Stallman Societal Dimensions: The Right to Read 85--87
Ted Selker Societal Dimensions: What Will Happen in
the Next 50 Years? . . . . . . . . . . . 88--89
Theodor Holm Nelson Societal Dimensions: Crush and Crash:
Logic of a Terrible Tomorrow . . . . . . 90--91
Paul Saffo The Science of Future Technology:
Sensors: The Next Wave of Innovation . . 92--97
Jef Raskin The Science of Future Technology:
Looking for a Humane Interface: Will
Computers Ever Become Easy to Use? . . . 98--101
Barry M. Leiner and
Vinton G. Cerf and
David D. Clark and
Robert E. Kahn and
Leonard Kleinrock and
Daniel C. Lynch and
Jon Postel and
Lawrence G. Roberts and
Stephen S. Wolff The Science of Future Technology: The
Past and Future History of the Internet 102--108
Wm. A. Wulf The Science of Future Technology: Look
in the Spaces for Tomorrow's Innovations 109--111
Gordon E. Moore The Science of Future Technology: The
Microprocessor: Engine of the Technology
Revolution . . . . . . . . . . . . . . . 112--114
Nabil Adam and
Baruch Awerbuch and
Jacob Slonim and
Peter Wegner and
Yelena Yesha The Science of Future Technology:
Globalizing Business, Education, Culture
Through the Internet . . . . . . . . . . 115--121
Charlie Rosen The Science of Future Technology: My
Computer-Related Wish List for the Next
50 Years . . . . . . . . . . . . . . . . 122--124
Sachem Web Slingers The Science of Future Technology:
Spinning Webs into the 21st Century . . 125--128
Nancy G. Leveson The Science of Future Technology:
Software Engineering: Stretching the
Limits of Complexity . . . . . . . . . . 129--131
Peter J. Denning The Science of Future Technology: a New
Social Contract for Research . . . . . . 132--134
David J. Farber The Science of Future Technology:
Communications Technology and its Impact
by 2010 . . . . . . . . . . . . . . . . 135--138
Henry F. Korth and
Abraham Silberschatz The Science of Future Technology:
Database Research Faces the Information
Explosion . . . . . . . . . . . . . . . 139--142
Peter G. Neumann Inside Risks: Hopes for Fewer Risks . . 170--170
Seán ÓRiain International Perspectives: The Birth of
a Celtic Tiger . . . . . . . . . . . . . 11--16
Roy Rada and
James Moore Sharing Standards: Standardizing Reuse 19--23
Carl Friedlander On Site: Speech Facilities for the
Reading Disabled . . . . . . . . . . . . 24--25
David Sallach and
Andrew Oram Forum: Digital politics . . . . . . . . 26--27
Michael G. Jones Forum: Inside the Beltway warfare plans 27--28
Steven Pemberton Forum: U.S. and them . . . . . . . . . . 28--28
Vir V. Phoha Forum: Theory and practice in software
engineering . . . . . . . . . . . . . . 28--28
Anthony Fedanzo Forum: Distributed systems registry . . 29--29
Robert L. Glass Forum: Response . . . . . . . . . . . . 29--29
Randall D. Beer and
Roger D. Quinn and
Hillel J. Chiel and
Roy E. Ritzmann Biologically inspired approaches to
robotics: what can we learn from
insects? . . . . . . . . . . . . . . . . 30--38
Milton Mueller Universal Service and the
Telecommunications Act: Myth Made Law 39--47
Daniel G. Aliaga Virtual Objects in the Real World . . . 49--54
Paul Resnick and
Hal R. Varian Recommender systems . . . . . . . . . . 56--58
Loren Terveen and
Will Hill and
Brian Amento and
David McDonald and
Josh Creter PHOAKS: a System for Sharing
Recommendations . . . . . . . . . . . . 59--62
Henry Kautz and
Bart Selman and
Mehul Shah Referral Web: Combining Social Networks
and Collaborative Filtering . . . . . . 63--65
Marko Balabanovíc and
Yoav Shoham Fab: Content-Based, Collaborative
Recommendation . . . . . . . . . . . . . 66--72
James Rucker and
Marcos J. Polanco Siteseer: Personalized Navigation for
the Web . . . . . . . . . . . . . . . . 73--76
Joseph A. Konstan and
Bradley N. Miller and
David Maltz and
Jonathan L. Herlocker and
Lee R. Gordon and
John Riedl GroupLens: Applying Collaborative
Filtering to Usenet News . . . . . . . . 77--87
Christopher Avery and
Richard Zeckhauser Recommender Systems for Evaluating
Computer Messages . . . . . . . . . . . 88--89
Adamantios Koumpis Situation room analysis in the
information technologies market . . . . 90--92
Richard I. Cook Inside Risks: Observations on RISKS and
Risks . . . . . . . . . . . . . . . . . 122--122
Hal Berghel Digital Village: Email: The Good, The
Bad, and The Ugly . . . . . . . . . . . 11--15
Robert L. Glass Practical Programmer: The Ups and Downs
of Programmer Stress . . . . . . . . . . 17--19
Jeff Johnson Forum: The Military Impact of
Information Technology . . . . . . . . . 20--20
Ronald L. Davis and
Roger W. Webster Forum: Questioning Proposed CS Knowledge
Units . . . . . . . . . . . . . . . . . 20--21
Crispin Cowan Forum: Amazing Transformation . . . . . 21--21
Frank Exner Forum: The Subject of Indexing . . . . . 21--21
Mayur Patel Forum: Filling a Niche . . . . . . . . . 21--22
Barry Goldstein Forum: URL Corrections . . . . . . . . . 22--22
Michael Lingle Forum: What Price Books . . . . . . . . 22--22
Carey Nachenberg Forum: Response . . . . . . . . . . . . 22--22
James K. Yun Forum: Missing Step . . . . . . . . . . 22--22
Richard C. Hsu Viewpoint: Taking Stock for University
Patents . . . . . . . . . . . . . . . . 23--25
Henry Lieberman Introduction . . . . . . . . . . . . . . 26--29
Marc Eisenstadt My Hairiest Bug War Stories . . . . . . 30--37
David Ungar and
Henry Lieberman and
Christopher Fry Debugging and the Experience of
Immediacy . . . . . . . . . . . . . . . 38--43
Ron Baecker and
Chris DiGiano and
Aaron Marcus Software Visualization for Debugging . . 44--54
Christopher Fry Programming on an Already Full Brain . . 55--64
John Domingue and
Paul Mulholland Fostering Debugging Communities on the
Web . . . . . . . . . . . . . . . . . . 65--71
Randall B. Smith and
Mario Wolczko and
David Ungar From Kansas to Oz: Collaborative
Debugging When a Shared World Breaks . . 72--78
D. James Gemmell and
C. Gordon Bell Noncollaborative Telepresentations Come
of Age . . . . . . . . . . . . . . . . . 79--89
Don Hardaway and
Richard P. Will Digital Multimedia Offers Key To
Educational Reform . . . . . . . . . . . 90--96
James Katz and
Philip Aspden Motives, Hurdles, and Dropouts . . . . . 97--102
Shashi Shekhar and
Mark Coyle and
Brajesh Goyal and
Duen-Ren Liu and
Shyamsundar Sarkar Data Models in Geographic Information
Systems . . . . . . . . . . . . . . . . 103--111
Dave West Technical Opinion: Hermeneutic Computer
Science . . . . . . . . . . . . . . . . 115--116
Edward W. Felten Inside Risks: Webware Security . . . . . 130--130
Anonymous Beyond Calculation: The Next 50 years of
Computing is published . . . . . . . . . 2
Anonymous Award winners are honored at 1997 ACM
Awards ceremony . . . . . . . . . . . . 4
Elliot Soloway and
Raven Wallace Log on Education: Does the Internet
Support Student Inquiry? Don't Ask . . . 11--16
Anonymous ACM Executive Committee will meet in
Stockholm . . . . . . . . . . . . . . . 13
Anonymous Two new books are published by ACM Press 15
Anonymous ACM states policy on refereed electronic
publications . . . . . . . . . . . . . . 16
Pamela Samuelson Legally Speaking: The Never-Ending
Struggle for Balance . . . . . . . . . . 17--21
Abbe Mowshowitz Viewpoint: Lessons From a Cautionary
Tale . . . . . . . . . . . . . . . . . . 23--25
Charles H. House ACM 97: an event to remember . . . . . . 31--34
Robert Laddaga and
James Veitch Dynamic object technology . . . . . . . 36--38
Paul Robertson Integrating Legacy Systems with Modern
Corporate Applications . . . . . . . . . 39--46
Daniel D. Corkill Countdown to success: dynamic objects,
GBB, and RADARSAT-1 . . . . . . . . . . 48--58
Robert E. Phillips Dynamic Objects for Engineering
Automation . . . . . . . . . . . . . . . 59--65
Byron Davies and
Victoria Bryan Davies Patching onto the Web: Common Lisp
Hypermedia for the Intranet . . . . . . 66--69
Amarnath Gupta and
Ramesh Jain Visual Information Retrieval . . . . . . 70--79
Peter Wegner Why Interaction Is More Powerful Than
Algorithms . . . . . . . . . . . . . . . 80--91
Rolf Oppliger Internet Security: Firewalls and Beyond 92--102
Diane M. Strong and
Yang W. Lee and
Richard Y. Wang Data Quality in Context . . . . . . . . 103--110
Dick Lefkon Technical Opinion(s): Seven Work Plans
for Year-2000 Upgrade Projects . . . . . 111--113
Georges Brigham The Year 2000 . . . . . . . . . . . . . 113--115
Robert A. Wagner Solving the Date Crisis . . . . . . . . 115--117
Peter G. Neumann Inside Risks: The Big Picture . . . . . 136--136
Robert L. Glass Revisiting the industry/academe
communication chasm . . . . . . . . . . 11--13
Neil Munro The magnetic poles of data collection 17--19
Jeff Kraus Counting furtive beasts by computer:
where have all the rhinos gone? . . . . 20--23
Christopher Fox and
William Frakes The quality approach: is it delivering? 24--29
James Herbsleb and
David Zubrow and
Dennis Goldenson and
Will Hayes and
Mark Paulk Software quality and the Capability
Maturity Model . . . . . . . . . . . . . 30--40
Craig Hollenbach and
Ralph Young and
Al Pflugrad and
Doug Smith Combining quality and software
improvement . . . . . . . . . . . . . . 41--45
Lowell Jay Arthur Quantum improvements in software system
quality . . . . . . . . . . . . . . . . 46--52
Michael A. Cusumano and
Richard W. Selby How Microsoft builds software . . . . . 53--61
Jeffrey Parsons and
Yair Wand Choosing classes in conceptual modeling 63--69
Soumitra Dutta and
Berend Wierenga and
Arco Dalebout Designing management support systems
using an integrative perspective . . . . 70--79
Bo Dahlbom and
Lars Mathiassen The future of our profession . . . . . . 80--89
David H. Bailey Technical Opinion: Onward to Petaflops
Computing . . . . . . . . . . . . . . . 90--92
Hal Berghel Digital Village: Informal Logic on Both
Sides of the CDA Debate . . . . . . . . 11--15
Larry Press Personal Computing: Toward an Access
Rights Policy . . . . . . . . . . . . . 17--21
Talin Viewpoint: The Power of Negative
Thinking . . . . . . . . . . . . . . . . 25--27
Peter J. Denning The ACM digital library goes live . . . 28--29
Olivier Fischer and
Richard Horn Electronic performance support systems 31--32
John Karat Evolving the Scope of User-Centered
Design . . . . . . . . . . . . . . . . . 33--38
Michel C. Desmarais and
Richard Leclair and
Jean-Yves Fiset and
Hichem Talbi Cost-Justifying Electronic Performance
Support Systems . . . . . . . . . . . . 39--48
Kevin Cole and
Olivier Fischer and
Phyllis Saltzman Just-in-Time Knowledge Delivery . . . . 49--53
Gloria Gery Granting Three Wishes through
Performance-Centered Design . . . . . . 54--59
Shelia Benko and
Shelley Webster Preparing for EPSS Projects . . . . . . 60--63
Samir Chatterjee Requirements for Success in Gigabit
Networking . . . . . . . . . . . . . . . 64--73
Andrew S. Patrick Media Lessons from the National Capital
FreeNet . . . . . . . . . . . . . . . . 74--80
Jesper Simonsen and
Finn Kensing Using Ethnography in Contextual Design 82--88
Arun Rai and
Ravi Patnayakuni and
Nainika Patnayakuni Technology Investment and Business
Performance . . . . . . . . . . . . . . 89--97
Domenico Talia Technical Opinion: Parallel Computation
Still Not Ready for the Mainstream . . . 98--99
Peter G. Neumann Inside Risks: Identity-Related Misuse 112--112
Brock N. Meeks From Washington: Privacy Lost, Anytime,
Anywhere . . . . . . . . . . . . . . . . 11--13
Will A. Foster and
Anthony M. Rutkowski and
Seymour E. Goodman International Perspectives: Who Governs
the Internet? . . . . . . . . . . . . . 15--20
Yasser Seirawan Viewpoint: Kasparov vs. Deep Blue: The
Aftermath Still No Match for the Human
Brain . . . . . . . . . . . . . . . . . 21--22
Herbert A. Simon and
Toshinori Munakata Viewpoint: Kasparov vs. Deep Blue: AI
Lessons . . . . . . . . . . . . . . . . 21, 23--25
Robert Fox On Site: Socializing Around Arcade
Technology . . . . . . . . . . . . . . . 26--28
Dorothy Strickland VR and health care . . . . . . . . . . . 32--32
Dorothy Strickland and
Larry Hodges and
Max North and
Suzanne Weghorst Overcoming Phobias by Virtual Exposure 34--39
Erik Viire Health and safety issues for VR . . . . 40--41
Walter J. Greenleaf Applying VR to Physical Medicine and
Rehabilitation . . . . . . . . . . . . . 42--46
Suzanne Weghorst Augmented Reality and Parkinson's
Disease . . . . . . . . . . . . . . . . 47--48
John P. Wann and
Simon K. Rushton and
Martin Smyth and
David Jones Rehabilitative Environments for
Attention and Movement Disorders . . . . 49--52
Dean P. Inman and
Ken Loge and
John Leavens VR Education and Rehabilitation . . . . 53--58
Tim Bowman VR Meets Physical Therapy . . . . . . . 59--60
David Zeltzer and
Rita K. Addison Responsive Virtual Environments . . . . 61--64
Kay M. Stanney and
Robert S. Kennedy The Psychometrics of Cybersickness . . . 66--68
Giuseppe Riva and
Luca Melis and
Mirco Bolzoni Treating Body-Image Disturbances . . . . 69--71
David J. Brown and
Steven Kerr and
John R. Wilson Virtual Environments in Special-Needs
Education . . . . . . . . . . . . . . . 72--75
Nigel Foreman and
Paul Wilson and
Danae Stanton VR and Spatial Awareness in Disabled
Children . . . . . . . . . . . . . . . . 76--77
W. Raghupathi Health care information systems . . . . 80--82
James G. Anderson Clearing the Way for Physicians' Use of
Clinical Information Systems . . . . . . 83--90
Thomas C. Rindfleisch Privacy, Information Technology, and
Health Care . . . . . . . . . . . . . . 93--100
William M. Detmer and
Edward H. Shortliffe Using the Internet to Improve Knowledge
Diffusion in Medicine . . . . . . . . . 101--108
David G. Kilman and
David W. Forslund An International Collaboratory Based on
Virtual Patient Records . . . . . . . . 110--117
A. Michael Noll Technical Opinion: Internet Pricing vs.
Reality . . . . . . . . . . . . . . . . 118--121
Peter G. Neumann Inside Risks: Crypto Key Management . . 136--136
Anonymous ACM Executive Committee meets in
Stockholm . . . . . . . . . . . . . . . 3
Anonymous Visit ACM's Digital Library Open House 5
Anonymous The Grace Murray Hopper Celebration will
be held in September . . . . . . . . . . 6
Anonymous ACM will provide professional liability
insurance . . . . . . . . . . . . . . . 7
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Robert L. Glass Practical Programmer: Cobol: a
Contradiction and an Enigma . . . . . . 11--13
Roy Rada and
James R. Schoening Sharing Standards: Educational
Technology Standards . . . . . . . . . . 15--18
Anonymous Joe Halpern is the new Editor-in-Chief
of Journal of the ACM . . . . . . . . . 15
Diane Crawford Forum: The power of interactive
computing . . . . . . . . . . . . . . . 20--23
Neil Munro and
Brock N. Meeks Viewpoint: Debating (What Once Was) the
CDA. For: Neil Munro; Against: Brock N.
Meeks . . . . . . . . . . . . . . . . . 25--28
Abbe Mowshowitz Virtual organization: a virtually
organized company dynamically links its
business goals with the procedures
needed to achieve them . . . . . . . . . 30--37
Murray Turoff Virtuality: Allowing users to negotiate
an agreed-upon reality, virtuality
requires system designers to anticipate
how their technology alters the social
order of the real world . . . . . . . . 38--43
Starr Roxanne Hiltz and
Barry Wellman Asynchronous Learning Networks as a
Virtual Classroom . . . . . . . . . . . 44--49
Claude Faucheux How Virtual Organizing Is Transforming
Management Science . . . . . . . . . . . 50--55
Ramnath Chellappa and
Anitesh Barua and
Andrew B. Whinston An Electronic Infrastructure for a
Virtual University . . . . . . . . . . . 56--58
Martin Hardwick and
Richard Bolton The Industrial Virtual Enterprise . . . 59--60
Bruno Mannoni A Virtual Museum . . . . . . . . . . . . 61--62
Russ Zajtchuk and
Richard M. Satava Medical Applications of Virtual Reality 63--64
Jeremy R. Cooperstock and
Sidney S. Fels and
William Buxton and
Kenneth C. Smith Reactive Environments . . . . . . . . . 65--73
Kweku Ewusi-Mensah Critical Issues in Abandoned Information
Systems Development Projects . . . . . . 74--80
Gail L. Rein and
Daniel L. McCue and
Judith A. Slein A Case for Document Management Functions
on the Web . . . . . . . . . . . . . . . 81--89
Herbert Maisel and
Catherine Gaddy Employment and Salaries of Recent
Doctorates in Computer Science . . . . . 90--93
J. Michael Pearson and
Leon Crosby and
J. P. Shim Measuring the Importance of Ethical
Behavior Criteria . . . . . . . . . . . 94--100
Mohamed E. Fayad Thinking Objectively: Software
Development Process: A Necessary Evil 101--103
David Lorge Parnas Inside Risks: Software Engineering: An
Unconsummated Marriage . . . . . . . . . 128--128
Pamela Samuelson Embedding technical self-help in
licensed software . . . . . . . . . . . 13--17
Tung Lai Lai and
Efraim Turban One organization's use of Lotus Notes 19--21
David R. R. Webber Forum: More on debugging . . . . . . . . 23--24
Richard C. Hsu and
William E. Mitchell After 400 years, print is still superior 27--28
Mohamed Fayad and
Douglas C. Schmidt Object-oriented application frameworks 32--38
Ralph E. Johnson Frameworks = (components + patterns) . . 39--42
Edward J. Posnak and
R. Greg Lavender and
Harrick M. Vin An adaptive framework for developing
multeda software componets . . . . . . . 43--47
Han Albrecht Schmid Systematic framework design . . . . . . 48--51
Dirk Bäumer and
Guido Gryczan and
Rolf Knoll and
Carola Linienthal and
Dirk Riehle and
Heinz Züllighoven Framwork development for large systems 53--59
Serge Demeyer and
Theo Dirk Meijlar and
Oscar Nierstrasz Design guidelines for ``tailorable''
frameworks . . . . . . . . . . . . . . . 60--64
Davide Brugali and
Giusee Menga and
Amund Aarsten The framework life span . . . . . . . . 65--68
Wim Codenie and
Koen De Hondt and
Patrick Steyaert and
Arlette Vercammen From custom applications to
domain-specific framworks . . . . . . . 71--77
Adele Goldberg and
Steven T. Abell and
David Leibs The LearningWorks development and
delivery frameworks . . . . . . . . . . 78--81
David Doscher and
Robert Hodges SEMATECH's experiences with the CIM
framework . . . . . . . . . . . . . . . 82--84
Mohamed E. Fayad and
Douglas C. Schmidt Lessons learned building reusable OO
frameworks for distributed software . . 85--87
Stephane Forrest and
Steven A. Hofmeyr and
Anil Somayaji Computer immunology . . . . . . . . . . 88--96
Annette Weintraub Art on the Web, the Web as art . . . . . 97--102
Tracy Camp The incredible shrinking pipeline . . . 103--110
D. Scott Brandt Constructivism: teaching for
understanding of the Internet . . . . . 112--117
Ivan Ryant Why inheritance means extra trouble . . 118--119
Peter G. Neumann Inside Risks: Integrity in software
development . . . . . . . . . . . . . . 144--144
Anonymous Carver Mead receives the ACM Allen
Newell Award . . . . . . . . . . . . . . 2
Anonymous ACM outreaches to Mexico . . . . . . . . 4
Anonymous USACM participates in protest against
restrictions on cryptography research
and development . . . . . . . . . . . . 5
Anonymous David Nicol is the new Editor-in-Chief
of TOMACS . . . . . . . . . . . . . . . 7
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Larry Press Personal Computing: Tracking the Global
Diffusion of the Internet . . . . . . . 11--17
Anonymous ACM Member Value Plus program adds the
Gartner Group . . . . . . . . . . . . . 16
Hal Berghel Digital Village --- Watermarking
Cyberspace . . . . . . . . . . . . . . . 19--24
Diane Crawford The mainstreaming of parallel
computation . . . . . . . . . . . . . . 25--26
Larry Smarr Toward the 21st century . . . . . . . . 28--32
Philip M. Smith The NSF partnerships and the tradition
of U.S. science and engineering . . . . 34--37
Daniel A. Reed and
Roscoe C. Giles and
Charles E. Catlett Distributed Data and Immersive
Collaboration . . . . . . . . . . . . . 38--48
Rick Stevens and
Paul Woodward and
Tom DeFanti and
Charlie Catlett From the I-WAY to the National
Technology Grid . . . . . . . . . . . . 50--60
Ken Kennedy and
Charles F. Bender and
John W. D. Connolly and
John L. Hennessy and
Mary K. Vernon and
Larry Smarr A Nationwide Parallel Computing
Environment . . . . . . . . . . . . . . 62--72
Gregory J. McRae How Application Domains Define
Requirements for the Grid . . . . . . . 74--83
Jeremiah P. Ostriker and
Michael L. Norman Cosmology of the Early Universe Viewed
Through the New Infrastructure . . . . . 84--94
Celia T. Romm and
Nava Pliskin Toward a Virtual Politicking Model . . . 95--100
Gezinus J. Hidding Reinventing Methodology: Who Reads It
and Why? . . . . . . . . . . . . . . . . 102--109
Don Gotterbarn and
Keith Miller and
Simon Rogerson Software Engineering Code of Ethics . . 110--118
Bill C. Hardgrave and
Kent A. Walstrom Forums for MIS Scholars . . . . . . . . 119--124
Mohamed E. Fayad and
Mauri Laitinen Thinking Objectively --- Process
Assessment Considered Wasteful . . . . . 125--128
Peter B. Ladkin Inside Risks --- Risks of Technological
Remedy . . . . . . . . . . . . . . . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Zixiang Alex Tan and
Milton Mueller and
Will Foster China's new Internet regulations: two
steps forward, one step back . . . . . . 11--16
Robert L. Glass How best to provide the services IS
programmers need . . . . . . . . . . . . 17--19
Neil A. M. Maiden and
Cornelious Ncube and
Andrew Moore Lessons learned during requirements
acquisition for COTS systems . . . . . . 21--25
Diane Crawford Forum: Cobol in question . . . . . . . . 27--29
Ramesh Jain Visual information management . . . . . 30--32
Amarnath Gupta and
Simone Santini and
Ramesh Jain In search of information in visual media 34--42
Boon-Lock Yeo and
Minerva M. Yeung Retrieving and visualizing video . . . . 43--52
Rainer Lienhart and
Silvia Pfeiffer and
Wolfgang Effelsberg Video abstracting . . . . . . . . . . . 54--62
Shih-Fu Chang and
John R. Smith and
Mandis Beigi and
Ana Benitez Visual information retrieval from large
distributed online repositories . . . . 63--71
William I. Grosky Managing multimedia information in
database systems . . . . . . . . . . . . 72--80
James E. Katz and
Philip Aspden A nation of strangers? . . . . . . . . . 81--86
Michael Franz and
Thomas Kistler Slim binaries . . . . . . . . . . . . . 87--94
Martin D. Fraser and
Vijay K. Vaishnavi A formal specifications maturity model 95--103
Jeffrey Parsons and
Yair Wand Using objects for systems analysis . . . 104--110
Neal Coulter ACM's computing classification system
reflects changing times . . . . . . . . 111--112
Nigel Ward Programming as a discipline? . . . . . . 113--114
Peter G. Neumann Inside Risks: System Development Woes 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Roy Rada Sharing standards: Corporate shortcut to
standardization . . . . . . . . . . . . 11--15
Neil Munro From Washington: Access charges under
scrutiny . . . . . . . . . . . . . . . . 17--19
Nora H. Sabelli Viewpoint: We are no longer a priesthood 20--21
Jennifer J. Burg and
Stan J. Thomas Computers across campus . . . . . . . . 22--25
David G. Brown and
Jennifer J. Burg and
Jay L. Dominick A strategic plan for ubiquitous laptop
computing . . . . . . . . . . . . . . . 26--35
Glenn MacDougall Acadia University's ``Sandbox'' . . . . 32--33
Alan Candiotti and
Neil Clarke Combining universal access with faculty
development and academic facilities . . 36--41
Mark Weiser The future of ubiquitous computing on
campus . . . . . . . . . . . . . . . . . 41--42
Janice Biros Changes in computer purchase,
distribution, and maintenance . . . . . 43--44
Lynn Kiaer and
David Mutchler and
Jeffrey Froyd Laptop computers in an integrated
first-year curriculum . . . . . . . . . 45--49
Carolyn Watters and
Marshall Conley and
Cynthia Alexander The digital agora: using technology for
learning in the social sciences . . . . 50--57
Ann Deden Computers and systemic change in higher
education . . . . . . . . . . . . . . . 58--63
Richard J. LeBlanc, Jr. and
Steven L. Teal Hardware and software choices for
student computer initiatives . . . . . . 64--69
Samuel L. Grier and
Larry W. Bryant The case for desktops . . . . . . . . . 70--71
Ho Guen Lee Do electronic marketplaces lower the
price of goods? . . . . . . . . . . . . 73--80
Sonya Freeman Cohen Quest for Java . . . . . . . . . . . . . 81--83
Peter G. Neumann Protecting the infrastructures . . . . . 128--128
Robert Fox News Track . . . . . . . . . . . . . . . 9--11
Elliot Soloway Long on Education: no one is making
money in education software . . . . . . 11--16
Brock N. Meeks Electronic frontier: no justice, no
peace . . . . . . . . . . . . . . . . . 17--20
Jan Guynes Clark and
Vincent S. Lai On site: Internet comes to Morocco . . . 21--26
Diane Crawford and
Larry Brunelle and
Morton Grosser and
Danielle Bernstein and
George Mallard and
Louis A. Russ and
Magnus Kempe Forum: Questioning Technical Self-Helf;
Women and Computer Science; Title by
License; Citizens of the Republic Speak 24--26
Brian C. Behrens and
Reuven R. Levary Practical legal aspects of software
reverse engineering . . . . . . . . . . 27--29
Leon A. Kappelman and
Darla Fent and
Kellie B. Keeling and
Victor Prybutok Calculating the cost of Year-2000
compliance . . . . . . . . . . . . . . . 30--39
Varun Grover and
James T. C. Teng and
Kirk D. Fiedler IS investment priorities in contemporary
organizations . . . . . . . . . . . . . 40--48
Philip M. Johnson Reengineering inspection . . . . . . . . 49--53
Giri Kumar Tayi and
Donald P. Ballou Special section: examining data quality 54--57
Richard Y. Wang A product perspective on total data
quality management . . . . . . . . . . . 58--65
Ken Orr Data Quality and systems theory . . . . 66--71
David Kaplan and
Ramayya Krishnan Assessing data quality in accounting
information systems . . . . . . . . . . 72--78
Thomas C. Redman The impact of poor data quality on the
typical enterprise . . . . . . . . . . . 79--82
Mauri Laitinen and
Mohamed E. Fayad Thinking objectively: surviving a
process performance crash . . . . . . . 83--86
Peter G. Neumann Inside risks: Internet gambling . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--11
Hal Berghel Digital village: the Year-2000 problem
and the new riddle of induction . . . . 13--17
Diane Crawford ACM fellows . . . . . . . . . . . . . . 18--18
Grey E. Burkhart and
Seymour E. Goodman International perspectives: the Internet
gains acceptance in the Persian Gulf . . 19--25
Diane Crawford and
Jimmy A. Castro and
Raman Kannan and
Mark C. Kilby and
Mohamed Fayad and
Earl F. Glynn and
Tracy Camp and
Mike Yaphe and
Abbe Mowshowitz and
Domenico Talla Forum: Praises come with a hitch; OO
Frameworks; Response; More Studies
Needed; Response; Metamanagement
Definition; Response; Parallel Computers
Revisited . . . . . . . . . . . . . . . 26--29
Charles H. House It's time for a change . . . . . . . . . 31--31
H. Raghav Rao and
A. F. Salam and
Brian DosSantos Marketing and the Internet . . . . . . . 32--34
P. K. Kannan and
Ai-Mei Chang and
Andrew B. Whinston Marketing information on the I-Way data
junkyard or information gold mine? . . . 35--43
Jonathan W. Palmer and
David A. Griffith An emerging model of Web site design for
marketing . . . . . . . . . . . . . . . 44--51
Lauren B. Eder and
Marvin E. Darter Physicians in cyberspace . . . . . . . . 52--54
Greg Elofson and
William N. Robinson Creating a custom mass-production
channel on the Internet . . . . . . . . 56--62
Huaiqing Wang and
Matthew K. O. Lee and
Chen Wang Consumer privacy concerns about Internet
marketing . . . . . . . . . . . . . . . 63--70
Robert M. O'Keefe and
Tim McEachern Web-based customer decision support
systems . . . . . . . . . . . . . . . . 71--76
A. F. Salam and
H. R. Rao and
C. C. Pegels Content of corporate Web pages as
advertising media . . . . . . . . . . . 76--77
Mark Bohr Silicon trends and limits for advanced
microprocessors . . . . . . . . . . . . 80--87
Robert J. Hall How to avoid unwanted email . . . . . . 88--95
Bonnie A. Nardi and
James R. Miller and
David J. Wright Collaborative, programmable intelligent
agents . . . . . . . . . . . . . . . . . 96--104
John T. Nosek Technical opinion: the case for
collaborative programming . . . . . . . 105--108
Peter G. Neumann Inside risks: Are computer addictive? 128--128
Robert Fox News track . . . . . . . . . . . . . . . 11--12
Pamela Samuelson Encoding the law into digital libraries 13--18
Nathaniel S. Borenstein Whose net is it anyway? . . . . . . . . 19--20
Diane Crawford Forum: Readers ``Thinking Objectively'' 22--27
Edward A. Fox and
Gary Marchionini Toward a worldwide digital library:
introduction . . . . . . . . . . . . . . 28--32
Andreas Paepcke and
Chen-Chuan K. Chang and
Terry Winograd and
Héctor García-Molina Interoperability for digital libraries
worldwide . . . . . . . . . . . . . . . 33--42
William E. Moen Accessing distributed cultural heritage
information . . . . . . . . . . . . . . 44--48
Henry M. Gladney and
Fred Mintzer and
Fabio Schiattarella and
Julián Bescós and
Martin Treu Digital access to antiquities . . . . . 49--57
Cathryn S. Dippo FedStats promotes statistical literacy 58--60
D. D. Cowan and
C. I. Mayfield and
F. W. Tompa and
W. Gasparini New role for community networks . . . . 61--63
Akira Maeda and
Myriam Dartois and
Takehisa Fujita and
Tetsuo Sakaguchi and
Shigeo Sugimoto and
Koichi Tabata Viewing multilingual documents on your
local Web browser . . . . . . . . . . . 64--65
M. K. Leong and
L. Cao and
Y. Lu Distributed Chinese bibliographic
searching . . . . . . . . . . . . . . . 66--68
Judith L. Klavans and
Peter Scha\``uble NSF-EU multilingual information access 69--70
Ian H. Witten and
Craig Nevill-Manning and
Rodger McNab and
Sally Jo Cunningham A public library based on full-text
retrieval . . . . . . . . . . . . . . . 71--75
Albert Endres and
Norbert Fuhr Students access books and journals
through MeDoc . . . . . . . . . . . . . 76--77
László Kovács Discovery of resources within a
distributed library system . . . . . . . 78--79
Marcos André Gonçalves and
Claudia Bauzer Medieros Initiatives that center on scientific
dissemination . . . . . . . . . . . . . 80--81
Sung Hyon Myaeng R&D for a nationwide general-purpose
system . . . . . . . . . . . . . . . . . 82--85
Cliff McKnight Many projects that depend on
collaboration . . . . . . . . . . . . . 86--87
Andrew E. Treloar Libraries' new role in electronic
scholarly publishing . . . . . . . . . . 88--89
Annelise Mark Pejtersen Semantic information retrieval . . . . . 90--92
Sanna Talja and
Rami Heinisuo and
Eija-Liisa Kasesniemi and
Harri Kemainen and
Sinikka Luukkainen and
Kirsi Pispa and
Kalervo Järvelin Discourse analysis of user requests . . 93--94
Ben Shneiderman and
Donald Byrd and
W. Burce Croft Sorting out searching: a user-interface
framework for text searches . . . . . . 95--98
Iris Vessey and
Robert Glass Strong vs. weak approaches to systems
development . . . . . . . . . . . . . . 99--102
A. C. Sodan Yin and Yang in computer science . . . . 103--114
Fred B. Schneider On concurrent programming . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--11
Brock N. Meeks Don't shoot me, I'm famous . . . . . . . 13--15
Robert Glass Everything old is new again . . . . . . 17--20
Diane Crawford Flogging the wrong house? . . . . . . . 22--27
Diane Crawford Virtual extension . . . . . . . . . . . 28--28
Bruce H. Barnes Assessing computer technology in Europe 29--32
James Veitch and
Robert Laddaga Distributed dynamic systems . . . . . . 34--36
Narinder Singh Unifying heterogeneous information
models: semantic tags support knowledge
webs . . . . . . . . . . . . . . . . . . 37--44
Jeffrey Morrill Distributed recognition of patterns in
time series data: from sensors to
informed decisions . . . . . . . . . . . 45--51
Jim Veitch A conversation with Paul Graham . . . . 52--54
David N. Gray and
John Hotchkiss and
Seth LaForge and
Andrew Shalit and
Toby Weinberg Modern languages and Microsoft's
component object model: programming COM
made simple . . . . . . . . . . . . . . 55--65
Janos Sztipanovits and
Gabor Karsai and
Ted Bapty Self-adaptive software for signal
processing: evolving systems in changing
environments without growing pains . . . 66--73
Vicky Hardman and
Martina Angela Sasse and
Isidor Kouvelas Successful multiparty audio
communication over the Internet . . . . 74--80
Akira K. Onoma and
Wei-Tek Tsai and
Mustafa Poonawala and
Hiroshi Suganuma Regressing testing in an industrial
environment: progress is attained by
looking backward . . . . . . . . . . . . 81--86
Deter Duchessi and
InduShobha Chengalur-Smith Client/server benefits, problems, best
practices: the goal: not just better
technology but better business processes
that make a company more competitive . . 87--94
William N. Robinson and
Vecheslav Volkov Supporting the negotiation life cycle 95--102
Mohamed E. Fayad The art of managing multiple processes 103--105
Rebecca Mercuri In search of academic integrity . . . . 136--136
David Alan Grier Politics, control, and computer
networks: the Chinese Student Lobby of
1989 . . . . . . . . . . . . . . . . . . 137--145
Michel Keable and
Maurice Landry and
Claude Banville The legitimacy gap between IS
professionals and users . . . . . . . . 146--156
Albert A. Angehrn and
Soumitra Dutta Case-based decision support . . . . . . 157--165
Christine Parent and
Stefano Spaccapietra Issues and approaches of database
integration . . . . . . . . . . . . . . 166--178
Uma G. Gupta Automatic tools for testing expert
systems . . . . . . . . . . . . . . . . 179--184
J. K. Joiner and
W. T. Tsai Re-engineering legacy Cobol programs . . 185--197
Takashi Nishiyama and
Junji Nomura and
Ryoji Nakajima and
Tetsuji Miyanoh A semi-autonomous security robot
employing telepresence . . . . . . . . . 198--205
Arun Sen From DSS to DSP: a taxonomic
retrospective . . . . . . . . . . . . . 206--216
Robert Fox News Track . . . . . . . . . . . . . . . 9--10
Stephen J. Lukasik and
Lawrence T. Greenberg and
Seymour E. Goodman Protecting an invaluable and
ever-widening infrastructure . . . . . . 11--16
Larry Press Low-cost estimation of travel trade-offs 17--20
Paul Carlisle and
Mike Anderson and
Ray Brown and
James Mitchell and
Anthony Ralston and
Herb Grosch and
Stewart A. Denenberg and
Rainer Schoenrank Who needs educational software? . . . . 22--26
Wayne Madsen Internet malcontents of the world ---
unite! . . . . . . . . . . . . . . . . . 27--28
Christopher Morgan Building an informational bridge to
China . . . . . . . . . . . . . . . . . 29--30
Diane Crawford and
Thomas Lambert and
Robert Fox and
Andrew Rosenbloom Information for authors . . . . . . . . 31--33
Sandeep Singhal and
Binh Nguyen The Java factor: Introduction . . . . . 34--37
Paul Tyma Why are we using Java again? . . . . . . 38--42
Kathy Bohrer and
Verlyn Johnson and
Anders Nilsson and
Bradley Rubin Business process components for
distributed object applications . . . . 43--48
Kelvin Nilsen Adding real-time capabilities to Java 49--56
Don Brutzman The Virtual Reality Modeling Language
and Java . . . . . . . . . . . . . . . . 57--64
James W. Cooper Using design patterns . . . . . . . . . 65--68
Annie Chabert and
Ed Grossman and
Larry S. Jackson and
Stephen R. Pietrowiz and
Chris Seguin Java object-sharing in Habanero . . . . 69--76
Soumitra Dutta and
Luk N. Van Wassenhove and
Selvan Kulandaiswamy Benchmarking European software
management practices . . . . . . . . . . 77--86
Larry Wos Programs that offer fast, flowless,
logical reasoning . . . . . . . . . . . 87--95
James T. C. Teng and
Seung Ryul Jeong and
Varun Grover Profiling successful reengineering
projects . . . . . . . . . . . . . . . . 96--102
Harold W. Lawson Infrastructure risk reduction . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--11
Robert L. Glass Practical programmer: Short-term and
long-term remedies for runaway projects 13--15
Roy Rada and
Carl Cargill and
John Klensin Sharing standards: Consensus and the Web 17--22
Roger C. Schank Viewpoint: Horses for courses . . . . . 23--25
Diane Crawford Forum: Hindsight is not always 20/20 . . 26--28
Minerva M. Yeung Digital watermarking . . . . . . . . . . 30--33
Nasir Memon and
Ping Wah Wong Protecting digital media content . . . . 35--43
Scott Craver and
Boon-Lock Yeo and
Minerva Yeung Technical trials and legal tribulations 45--54
Fred Mintzer and
Gordon W. Braudaway and
Alan E. Bell Opportunities for watermarking standards 57--64
Jian Zhao and
Eckhard Koch and
Chenghui Luo In Business Today and Tomorrow . . . . . 66--72
John M. Acken How watermarking adds value to digital
content . . . . . . . . . . . . . . . . 75--77
Tomás Isakowitz and
Michael Bieber and
Fabio Vitali Web information systems . . . . . . . . 78--80
Gerald L. Lohse and
Peter Spiller Electronic shopping . . . . . . . . . . 81--87
Jay M. Tenenbaum WISs and electronic commerce . . . . . . 89--90
Ajit Kambil and
Mark Ginsberg Public access Web information systems:
Lessons from the Internet EDGAR project 91--97
Albert L. Lederer and
Dinesh A. Mirchandani and
Kenneth Sims Using WISs to enhance Competitiveness 94--95
Harri Oinas-Kukkonen What is inside a link? . . . . . . . . . 98--98
Eric van Heck and
Peter Vervest How should CIOs deal with Web-based
auctions? . . . . . . . . . . . . . . . 99--100
Gustavo Arocena and
Alberto Mendelzon Viewing WISs as database applications 101--102
Kenji Takahashi Metalevel links: More power to your
links . . . . . . . . . . . . . . . . . 103--105
V. Balasubramanian and
Alf Bashian Document management and Web technologies 107--115
Alan R. Dennis Lessons from Three Years of Web
Development . . . . . . . . . . . . . . 112--113
Hermann A. Maurer Modern WISs . . . . . . . . . . . . . . 114--115
Murray Turoff and
Starr Roxanne Hiltz Superconnectivity . . . . . . . . . . . 116--116
James A. Senn WISs at Federal Express . . . . . . . . 117--118
Peter G. Neumann Inside risks: Laptops in Congress? . . . 128--128
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Elliot Soloway and
Cathie Norris Log on education: using technology to
address old problems in new ways . . . . 11--18
Diane Crawford From Washington: shaping public policy
in the information age . . . . . . . . . 21--24
Roger A. Coldwell Viewpoint: did Chuck Babbage predict
software piracy? . . . . . . . . . . . . 25--27
Diane Crawford Only the names have changed . . . . . . 28--31
Robert J. Kauffman and
Frederick J. Riggins Information systems and economics . . . 32--34
Yannis Bakos The emerging role of electronic
marketplaces on the Internet . . . . . . 35--42
Rajiv M. Dewan and
Marshall L. Freimer and
Abraham Seidmann Internet service providers, proprietary
content, and the battle for users'
dollars . . . . . . . . . . . . . . . . 43--48
Erik Brynjolfsson and
Lorin Hitt Beyond the productivity paradox . . . . 49--55
Sanjeev Dewan and
Kenneth L. Kraemer International dimensions of the
productivity paradox . . . . . . . . . . 56--62
Chris F. Kemerer Progress, obstacles, and opportunities
in software engineering economics . . . 63--66
Sandra A. Slaughter and
Donald E. Harter and
Mayuram S. Krishnan Evaluating the cost of software quality 67--73
Lorre Faith Cranor and
Brian A. LaMacchia Spam! . . . . . . . . . . . . . . . . . 74--83
Roy T. Fielding and
E. James Whitehead, Jr. and
Kenneth M. Anderson and
Gregory A. Bolcer and
Peyman Oreizy and
Richard N. Taylor Web-based development of complex
information products . . . . . . . . . . 84--92
Stan Jarzabek and
Riri Huang The case for user-centered CASE tools 93--99
Sandeep Purao and
Hemant Jain and
Derek Narareth Effective distribution of
object-oriented applications . . . . . . 100--108
David S. Hamu and
Mohamed E. Fayad Thinking objectively: achieving
bottom-line improvements with enterprise
frameworks . . . . . . . . . . . . . . . 110--113
Peter J. Denning Inside Risks: Computer science and
software engineering: filing for
divorce? . . . . . . . . . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Brock N. Meeks Electronic frontier: mainstream media
heartburn . . . . . . . . . . . . . . . 11--13
Pamela Samuelson Legally speaking: does information
really have to be licensed? . . . . . . 15--20
Don Smith Viewpoint: computerizing computer
science . . . . . . . . . . . . . . . . 21--23
Diane Crawford Forum: peeling the Y2K onion . . . . . . 24--27
Arun Sen and
Varghese S. Jacob Industrial-strength data warehousing . . 28--31
Hugh J. Watson and
Barbara J. Haley Managerial considerations . . . . . . . 32--37
Charles Bontempo and
George Zagelow The IBM data warehouse architecture . . 38--48
Michael Sigal A Common Sense Development Strategy . . 42--43
James R. Sutter Project-based warehouses . . . . . . . . 49--51
Stephen R. Gardner Building the data warehouse . . . . . . 52--60
Cecilia Claudio Health care management . . . . . . . . . 58--59
Katherine Glassey Seducing the end user . . . . . . . . . 62--69
Jim Scott Warehousing over the Web . . . . . . . . 64--65
Linda Huber Users drive move from mainframe . . . . 66--67
Jennifer Kreie and
Timothy Paul Cronan How men and women view ethics . . . . . 70--76
Judith Gal-Ezer and
David Harel What (else) should CS educators know? 77--84
Rudolf K. Keller and
Jean Tessier and
Gregor von Bochmann A pattern system for network management
interfaces . . . . . . . . . . . . . . . 86--93
Asuman Dogac and
Cevdet Dengi and
M. Tamer Öszu Distributed object computing platforms 95--103
Peter G. Neumann Inside risks: Y2K update . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--11
Hal Berghel Who won the Mosaic War? . . . . . . . . 13--16
Barbara Simons Outlawing technology . . . . . . . . . . 17--18
Larry Press and
Grey Burkhart and
Will Foster and
Sy Goodman and
Peter Wolcott and
Jon Woodard An Internet diffusion framework . . . . 21--26
Richard C. Hsu Viewpoint: Maintaining high living
standards through innovation, strong
patents . . . . . . . . . . . . . . . . 27--28
Diane Crawford Forum: The dirty secrets of runaway
projects . . . . . . . . . . . . . . . . 29--33
Krishnan Seetharaman The CORBA connection . . . . . . . . . . 34--36
Jon Siegel OMG overview: CORBA and the OMA in
enterprise computing . . . . . . . . . . 37--43
Steve Vinoski New features for CORBA 3.0 . . . . . . . 44--52
Douglas C. Schmidt Evaluating architectures for
multithreaded object request brokers . . 54--60
Michi Henning Binding, migration, and scalability in
CORBA . . . . . . . . . . . . . . . . . 62--71
Paul Haggerty and
Krishnan Seetharaman The benefits of CORBA-based network
management . . . . . . . . . . . . . . . 73--79
Arie Segev and
Jaana Porra and
Malu Roldan Internet security and the case of Bank
of America . . . . . . . . . . . . . . . 81--87
Frederick J. Riggins and
Hyeun-Suk (Sue) Rhee Toward a unified view of electronic
commerce . . . . . . . . . . . . . . . . 88--95
Arun Rai and
T. Ravichandran and
Subhashish Samaddar How to anticipate the Internet's global
diffusion . . . . . . . . . . . . . . . 97--106
Richard Gisselquist Engineering in software . . . . . . . . 107--108
Peter G. Neumann Inside Risks: Risks of E-education . . . 136--136
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford Forum: Stop, in the Name of Spam . . . . 11--14
Herbert Schorr and
Salvatore J. Stolfo From Washington: digital government for
the 21st century . . . . . . . . . . . . 15--19
Grey E. Burkhart and
Seymour E. Goodman and
Arun Mehta and
Larry Press International perspectives: the Internet
in India: better times ahead? . . . . . 21--26
Peter Wolcott and
Patrick Homer and
Seymour Goodman Viewpoint: HPC export controls:
navigating choppy waters . . . . . . . . 27--30
Sidney Karin and
Susan Graham The high-performance computing continuum 32--35
Paul Messina and
David Culler and
Wayne Pfeiffer and
Wiliam Martin and
J. Tinsley Oden and
Gary Smith Architecture . . . . . . . . . . . . . . 36--44
Andrew Grimshaw and
Adam Ferrari and
Greg Lindahl and
Katherine Holcomb Metasystems . . . . . . . . . . . . . . 46--55
Reagan Moore and
Thomas A. Prince and
Mark Ellisman Data-intensive computing and digital
libraries . . . . . . . . . . . . . . . 56--62
Joel H. Saltz and
Alan Sussman and
Susan Graham and
James Demmel and
Scott Baden and
Jack Dongarra Programming tools and environments . . . 64--73
Amy Finley and
Ann Redelfs and
Greg Moses Education, outreach, and training . . . 74--75
Mark Keil and
Paul Cule and
Kalle Lyytinen and
Roy Schmidt A framework for identifying software
projects risks . . . . . . . . . . . . . 76--83
John C. Kunz and
Tore R. Christiansen and
Geoff P. Cohen and
Yan Jin and
Raymond E. Levitt The virtual design team . . . . . . . . 84--91
Geng-Sheng Kuo and
Jing-Pei Lin New design concepts for an intelligent
Internet . . . . . . . . . . . . . . . . 93--98
Herbert Maisel and
Catherine Gaddy Employment and salaries of recent CS
doctorates . . . . . . . . . . . . . . . 99--101
Waldemar W. Koczkodaj and
Marian Orlowski and
Victor W. Marek Technical opinion: myths about rough set
theory . . . . . . . . . . . . . . . . . 102--103
Fred B. Schneider Inside Risks: toward trustworthy
networked information systems . . . . . 144--144
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Robert L. Glass Practical programmer: how not to prepare
for a consulting assignment, and other
ugly consultancy truths . . . . . . . . 11--13
Robert J. Aalberts and
Anthony M. Townsend and
Michael E. Whitman Legally speaking: the threat of long-arm
jurisdiction to electronic commerce . . 15--20
Robert Kraut and
Sara Kiesler and
Tridas Mukhopadhyay and
William Scherlies and
Michael Patterson On site: social impact of the Internet:
what does it mean? . . . . . . . . . . . 21--22
Diane Crawford Forum: Computers in Education:
Observations and Redress . . . . . . . . 23--26
Vinton G. Cerf Tribute: I remember IANA . . . . . . . . 27--28
Clare-Marie Karat Viewpoint: guaranteeing rights for the
user . . . . . . . . . . . . . . . . . . 29--31
Matthias Jarke Requirements tracing . . . . . . . . . . 32--36
Balasubramaniam Ramesh Factors influencing requirements
traceability practice . . . . . . . . . 37--44
Thomas Rose Visual assessment of engineering
processes in virtual enterprises . . . . 45--52
Ralf Dömges and
Klaus Pohl Adapting traceability environments to
project-specific needs . . . . . . . . . 55--62
Giorgio De Michelis and
Eric Dubois and
Matthias Jarke and
Florian Matthes and
John Mylopoulos and
Joachim W. Schmidt and
Eric Yu and
Carson Woo A three-faceted view of informations
systems . . . . . . . . . . . . . . . . 64--70
Loe Feijs and
Roel De Jong 3D visualization of software
architectures . . . . . . . . . . . . . 73--78
W. B. Noffsinger and
Robert Niedbalski and
Michael Blanks and
Niall Emmart Legacy object modeling speeds software
integration . . . . . . . . . . . . . . 80--89
Prabuddha De and
Thomas W. Ferratt An information system involving
competing organizations . . . . . . . . 90--98
C. J. Date and
Hugh Darwen Technical opinion: toward a model of
type inheritance . . . . . . . . . . . . 99--101
Peter Ladkin Inside risks: the risks of Hubris . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Timothy D. Prime and
Justus Pendleton and
Greg Kirsch and
Lyle P. Bickley and
Markku Sakkinen and
Jakob Engblom and
Howard L. Funk and
John Rieman and
Joy Davis and
David Balok Forum: Correlating patents and living
standards . . . . . . . . . . . . . . . 11--13
Michael W. Whitman and
Anthony M. Townsend and
Robert J. Aalberts Legally speaking: The Communications
Decency Act Is not as Dead as You Think 15--17
Hal Berghel Digital village: Value-added publishing 19--23
Max Hailperin Viewpoint: The COPA battle and the
future of free speech . . . . . . . . . 24--25
Barbara Simons From the President: Starr wars . . . . . 26--27
Hermann Kaindl and
John M. Carroll Symbolic Modeling in Practice . . . . . 28--30
John Mylopoulos and
Lawrence Chung and
Eric Yu From Object-Oriented to Goal-Oriented
Requirements Analysis . . . . . . . . . 31--37
Keith A. Butler and
Chris Esposito and
Ron Hebron Connecting the Design of Software to the
Design of Work . . . . . . . . . . . . . 38--46
Matthias Jarke Scenarios for Modeling . . . . . . . . . 47--48
Mary Beth Rosson Integrating Development of Task and
Object Models . . . . . . . . . . . . . 49--56
Brian R. Gaines and
Mildred L. G. Shaw Embedding Formal Knowledge Models in
Active Documents . . . . . . . . . . . . 57--63
Jakob Nielsen User interface directions for the Web 65--72
Donald P. Ballou and
Giri Kumar Tayi Enhancing data quality in data warehouse
environments . . . . . . . . . . . . . . 73--78
John R. Nicol and
Yechezkal S. Gutfreund and
Jim Paschetto and
Kimberly S. Rush and
Christopher Martin How the Internet helps build
collaborative multimedia applications 79--85
Pierre N. Robillard The role of knowledge in software
development . . . . . . . . . . . . . . 87--92
David E. Avison and
Francis Lau and
Michael D. Myers and
Peter Axel Nielsen Action research . . . . . . . . . . . . 94--97
Satish Nambisan and
Yu-Ming Wang Technical opinion: Roadblocks to Web
technology adoption? . . . . . . . . . . 98--101
Fred B. Schneider and
Steven M. Bellovin Inside risks: Evolving telephone
networks . . . . . . . . . . . . . . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--11
Larry Press Personal Computing: The next generation
of business data processing . . . . . . 13--16
Brock N. Meeks Electronic Frontier: The privacy hoax 17--19
Diane Crawford Forum: More ugly truths about consulting
assignments . . . . . . . . . . . . . . 21--24
Ghinwa Jalloul On site: Computing in Lebanon . . . . . 25--26
Lorrie Faith Cranor Internet privacy . . . . . . . . . . . . 28--38
Michael K. Reiter and
Aviel D. Rubin Anonymous Web transactions with crowds 32--48
David Goldschlag and
Michael Reed and
Paul Syverson Onion routing . . . . . . . . . . . . . 39--41
Eran Gabber and
Phillip B. Gibbons and
David M. Kristol and
Yossi Matias and
Alain Mayer Consistent, yet anonymous, Web access
with LPWA . . . . . . . . . . . . . . . 42--47
Joseph Reagle and
Lorrie Faith Cranor The platform for privacy preferences . . 48--55
Paola Benassi TRUSTe: An online privacy seal program 56--59
Roger Clarke Internet privacy concerns confirm the
case for intervention . . . . . . . . . 60--67
J. Arthur Gowan and
Chris Jesse and
Richard G. Mathieu Y2K compliance and the distributed
enterprise . . . . . . . . . . . . . . . 68--73
Robert L. Glass The realities of software technology
payoffs . . . . . . . . . . . . . . . . 74--79
Rajiv Sabherwal The role of trust in outsourced is
development projects . . . . . . . . . . 80--86
Wilhelm Hasselbring Technical opinion: On defining computer
science terminology . . . . . . . . . . 88--91
Peter G. Neumann Inside risks: Robust open-source
software . . . . . . . . . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 11--12
Kalle Lyytinen and
Seymour Goodman Finland: the unknown soldier on the IT
front . . . . . . . . . . . . . . . . . 13--17
Pamela Samuelson Good news and bad news on the
intellectual property front . . . . . . 19--24
Diane Crawford and
Clay Shirky and
David Webber and
Jakob Nielson and
Joseph M. Newcomer and
The HomeNet Group and
W. M. Jaworski and
Waldemar W. Koczkodaj and
Marian Orlowski and
Victor W. Marek Forum: Usability vs. the Web . . . . . . 27--32
Donald E. Rickert and
Thomas Nagy Viewpoint: focus groups, theory or the
kid in the garage? . . . . . . . . . . . 34--36
Anupam Joshi and
Munindar P. Singh Multiagent systems on the net . . . . . 38--40
Rune Gustavsson Agents with power . . . . . . . . . . . 41--47
Tzvetan Drashansky and
Elias N. Houstis and
Naren Ramakrishnan and
John R. Rice Networked agents for scientific
computing . . . . . . . . . . . . . . . 48--52, 54
Douglas E. Dyer Multiagent systems and DARPA . . . . . . 53--53
Fumio Hattori and
Takeshi Ohguro and
Makoto Yokoo and
Shigeo Matsubara and
Sen Yoshida Socialware: multiagent systems for
supporting network communities . . . . . 55--61
Alok R. Chaturvedi and
Shailendra R. Mehta Simulations in economics and management 60--61
Anuj K. Jain and
Manuel Aparico IV and
Munindar P. Singh Agents for process coherence in virtual
enterprises . . . . . . . . . . . . . . 62--69
Richard Green and
Sangam Pant Multiagent data collection in Lycos . . 70--70
Aaron Sloman and
Brian Logan Building cognitively rich agents using
the SIM\_Agent toolkit . . . . . . . . . 71--73, 75
Jeremy Baxter and
Richard Helewhite Agents in tank battle simulations . . . 74--75
Moses Ma Agents in E-commerce . . . . . . . . . . 78--80
Pattie Maes and
Robert H. Guttman and
Alexandros G. Moukas Agents that buy and sell . . . . . . . . 81--87, 90--91
Tuomas Sandholm Automated negotiation . . . . . . . . . 84--85
Danny B. Lange and
Mitsuru Oshima Seven good reasons for mobile agents . . 88--89
David Wong and
Noemi Paciorek and
Dana Moore Java-based mobile agents . . . . . . . . 92--95, 97--102
Reuven Koblick Concordia . . . . . . . . . . . . . . . 96--97
Hideki Tai and
Kazuya Kosaka The Aglets project . . . . . . . . . . . 100--101
Barbara Hayes-Roth and
Vaughan Johnson and
Robert van Gent and
Keith Wescourt Staffing the Web with interactive
characters . . . . . . . . . . . . . . . 103--105
Robert J. Glushko and
Jay M. Tenenbaum and
Bart Meltzer An XML framework for agent-based
E-commerce . . . . . . . . . . . . . . . 106--109, 111--114
Howard Smith and
Kevin Poulter Share the ontology in XML-based trading
architectures . . . . . . . . . . . . . 110--111
Albert Alderson and
Hanifa Shah Technical Opinion: Viewpoints on legacy
systems . . . . . . . . . . . . . . . . 115--116
Lauren Weinstein Inside Risks: Bit-rot roulette . . . . . 144--144
J. Yeandel and
D. Thulborn and
S. Jones The design and implementation of an
on-line testable UART . . . . . . . . . 187--198
M. F. Abdulla and
C. P. Ravikumar and
Anshul Kumar Optimization of mutual and signature
testing schemes for highly concurrent
systems . . . . . . . . . . . . . . . . 199--216
Zohair Sahraoui and
Francky Catthoor and
Paul Six and
Hugo de Man Techniques for reducing the number of
decisions and backtracks in
combinational test generation . . . . . 217--238
Lakshminarayana Pappu and
Michael L. Bushnell and
Vishwani D. Agrawal and
Srinivas Mandyam-Komar Statistical delay fault coverage
estimation for synchronous sequential
circuits . . . . . . . . . . . . . . . . 239--254
De-Qiang Wang and
Lian-Chang Zhao Combinatorial analysis of check set
construction for algorithm-based fault
tolerance systems . . . . . . . . . . . 255--260
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 11--12
Diane Crawford and
John Ehrt and
Joe Saltiel and
Robert Glass and
John Wubbel and
John Willmore and
Tom Moran Forum: a Righteous Balance of Internet
Freedom; Don't Compare Business Majors
to Hackers; ``Popular'' Press; Empirical
Studies vs. Armchair Argument . . . . . 13--16
Robert L. Glass Practical programmer: inspections---some
surprising findings . . . . . . . . . . 17--19
Roy Rada Sharing Standards: IT skills standards 21--26
Donald J. Bagert Viewpoint: taking the lead in licensing
software engineers . . . . . . . . . . . 27--29
John White ACM Digital Library Enhancements . . . . 30--31
Tim O'Reilly Lessons from open-source software
development . . . . . . . . . . . . . . 32--37
Linus Torvalds The Linux edge . . . . . . . . . . . . . 38--39
Larry Wall The origin of the camel lot in the
breakdown of the bilingual Unix . . . . 40--41
Roy T. Fielding Shared leadership in the Apache project 42--43
John Ousterhout Free software needs profit . . . . . . . 44--45
Xin Yao Following the path of evolvable hardware 46--49
Moshe Sipper and
Daniel Mange and
Eduardo Sanchez Quo Vadis evolvable hardware? . . . . . 50--56
Pierre Marchal Field-programmable gate arrays . . . . . 57--59
Tetsuya Higuchi and
Nobuki Kajihara Evolvable hardware chips for industrial
applications . . . . . . . . . . . . . . 60--66
Tomofumi Hikage and
Hitoshi Hemmi and
Katsunori Shimohara Hardware Evolution System AdAM . . . . . 64--65
Jason D. Lohn Experiments on Evolving Software Models
of Analog Circuits . . . . . . . . . . . 67--69
Adrian Thompson and
Paul Layzell Analysis of unconventional evolved
electronics . . . . . . . . . . . . . . 71--79
Donna L. Hoffman and
Thomas P. Novak and
Marcos Peralta Building consumer trust online . . . . . 80--85
Tomasz Imielinski and
Julio C. Navas GPS-based geographic addressing,
routing, and resource discovery . . . . 86--92
Niv Ahituv and
Moshe Zviran and
Chanan Glezer Top management toolbox for managing
Corporate IT . . . . . . . . . . . . . . 93--99
Rachid Guerraoui and
Mohamed E. Fayed Thinking objectively: OO distributed
programming is not distributed OO
programming . . . . . . . . . . . . . . 101--104
Lauren Weinstein Inside risks: just a matter of bandwidth 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Hal Berghel Digital village: how Xday figures in the
Y2K countdown . . . . . . . . . . . . . 11--15
Gerald V. Post Personal computing: how often should a
firm buy new PCs? . . . . . . . . . . . 17--21
Leon A. Kappelman Viewpoint: saving our sacred honor . . . 23--25
B. J. Fogg Persuasive technologies . . . . . . . . 26--29
Phillip King and
Jason Tester The landscape of persuasive technologies 31--38
Shawn Tseng and
B. J. Fogg Credibility and computing technology . . 39--44
Julie Khaslavsky and
Nathan Shedroff Understanding the seductive experience 45--49
Daniel Berdichevsky and
Erik Neunschwander Toward an ethics of persuasive
technology . . . . . . . . . . . . . . . 51--58
Kim Halskov Madsen The diversity of usability practices . . 60--62
Jacob Buur and
Kirsten Bagger Replacing usability testing with user
dialogue . . . . . . . . . . . . . . . . 63--66
Karel Vredenburg Increasing ease of use . . . . . . . . . 67--71
Klaus B. Bærentsen and
Henning Slavensky A contribution to the design process . . 72--77
Julia Gardner Strengthening the focus on users'
working practices . . . . . . . . . . . 79--82
pWilliam Dolan and
Joseph Dumas A flexible approach to third-party
usability . . . . . . . . . . . . . . . 83--85
Michael Muller and
Mary P. Czerwinski Organizing usability work to fit the
full product range . . . . . . . . . . . 87--90
Thea Borgholm and
Kim Halskov Madsen Cooperative usability practices . . . . 91--97
Jeffrey S. Poulin Technical opinion: reuse: been there,
done that . . . . . . . . . . . . . . . 98--100
David Lorge Parnas Inside risks: ten myths about Y2K
inspections . . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Robert L. Glass Practical programmer: is criticism of
computing academe inevitably divisive? 11--13
Richard B. Heeks International perspectives: software
strategies in developing countries . . . 15--20
Diane Crawford and
Jason Steffler and
Jane D. Bernstein and
John Chapin and
David M. Rockwell and
Kenneth Bell Forum: Don't Forget the Intangibles in
Improving Software Inspections; OO
Programming; Licensing a Unique Field 21--22
Wei-Lung Wang Viewpoint: Information in the
Information Age . . . . . . . . . . . . 23--24
Barbara Simons From the President: Melissa's Message 25--26
Milton Mueller Emerging Internet infrastructures
worldwide . . . . . . . . . . . . . . . 28--30
Ben Petrazzini and
Mugo Kibati The Internet in developing countries . . 31--36
Robert B. Cohen Moving toward a non-U.S.-centric
international Internet . . . . . . . . . 37--40
Milton Mueller Commentary: ICANN and Internet
regulation . . . . . . . . . . . . . . . 41--43
Zixiang (Alex) Tan and
William Foster and
Seymour Goodman China's state-coordinated Internet
infrastructure . . . . . . . . . . . . . 44--52
P. K. Agarwal Building India's national Internet
backbone . . . . . . . . . . . . . . . . 53--58
Mugo Kibati and
Donyaprueth Krairit The wireless local loop in developing
regions . . . . . . . . . . . . . . . . 60--66
Jon A. Peha Lessons from Haiti's Internet
development . . . . . . . . . . . . . . 67--72
Samir Chatterjee and
Suzanne Pawlowski All-optical networks . . . . . . . . . . 74--83
Randall D. Beer and
Hillel J. Chiel and
Richard F. Drushel Using Autonomous Robotics to teach
science and engineering . . . . . . . . 85--92
Dennis Tsichritzis Reengineering the University . . . . . . 93--100
Michael E. Whitman and
Anthony M. Townsend and
Robert J. Aalberts Considerations for an effective
telecommunications-use policy . . . . . 101--108
Vicki L. Sauter Intuitive decision-making . . . . . . . 109--115
David S. Wise Changes in ACM's revised copyright
policy . . . . . . . . . . . . . . . . . 116--119
A. Michael Noll Technical opinion: does data traffic
exceed voice traffic? . . . . . . . . . 121--124
Peter G. Neumann and
Declan McCullagh Inside risks: risks of Y2K . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Tom DeMarco and
Don Bagert and
Joel C. Ewing and
Hal Berghel and
Ken Kashmarek and
Hank Walker and
Don Unger Forum: Certification or
Decertification?; Rule as Myth; Earning
Trust; Misleading Numbers; Correction 11--13
Meg McGinity Staying connected: Telecom Act, scene
one . . . . . . . . . . . . . . . . . . 15--18
Neil Munro From Washington: Infowar: AK-47s, lies,
and videotape . . . . . . . . . . . . . 19--22
Scott Tilley On site: the need for speed . . . . . . 23--26
John Gallaugher Viewpoint: challenging the new
conventional wisdom of net commerce
strategies . . . . . . . . . . . . . . . 27--29
Brajendra Panda and
Joseph Giordano Defensive information warfare . . . . . 30--32
Shiu-Kai Chin High-confidence design for security:
don't trust --- verify . . . . . . . . . 33--37
Anup K. Ghosh and
Jeffrey M. Voas Inoculating software for survivability 38--44
Terrance Goan A cop on the beat: collecting and
appraising intrusion evidence . . . . . 46--52
Robert Durst and
Terrence Champion and
Brian Witten and
Eric Miller and
Luigi Spagnuolo Testing and evaluating computer
intrusion detection systems . . . . . . 53--61
Matthew Stillerman and
Carla Marceau and
Maureen Stillman Intrusion detection for distributed
applications . . . . . . . . . . . . . . 62--69
Sushil Jajodia and
Catherine D. McCollum and
Paul Ammann Trusted recovery . . . . . . . . . . . . 71--75
Jim Waldo The Jini architecture for
network-centric computing . . . . . . . 76--82
David Plummer and
Larry J. Dalton and
Frank Peter The recodable locking device . . . . . . 83--87
Janice C. Sipior and
Burke T. Ward The dark side of employee email . . . . 88--95
Ned Kock A case of academic plagiarism . . . . . 96--104
Peter G. Neumann Inside risks: information is a
double-edged sword . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Leon Kappelman and
Ken Mandefrot and
Chuck Crawford and
Dennis E. Hamilton and
Orville E. Wheeler and
Albert L. LeDuc and
Max Hailperin and
Michael E. Whitman and
Anthony M. Townsend and
Robert J. Aalberts and
Charles Hixson and
Daniel Berdichevsky and
Erik Neunschwander and
Bength Klenbergs and
Linux Torvalds Forum: The Folly of Laws Limiting Y2K
Liability; Regarding Glass; Duly Noted;
Persuasive Technologies; Linux Goal . . 11--15
Diane Crawford Correction: Richard Heeks' Column . . . 15--15
Robert L. Glass Practical programmer: buzzwordism and
the epic \$150 million software debacle 17--19
Elliot Soloway and
Wayne Grant and
Robert Tinger and
Jeremy Roschelle and
Mike Mills and
Mitchell Resnick and
Robbie Berg and
Mike Eisenberg Log on education: science in the palms
of their hands . . . . . . . . . . . . . 21--26
Andrew Rosenbloom Toward an image indistinguishable from
reality . . . . . . . . . . . . . . . . 28--30
Demetri Terzopoulos Artificial life for computer graphics 32--42
Donald P. Greenberg A framework for realistic image
synthesis . . . . . . . . . . . . . . . 44--53
George W. Fitzmaurice and
Ravin Balakrisnan and
Gordon Kurtenbach Sampling, synthesis, and input devices 54--63
Norman I. Badler and
Martha S. Palmer and
Rama Bindiganavale Animation control for real-time virtual
humans . . . . . . . . . . . . . . . . . 64--73
J. Kenneth Salisbury, Jr. Making graphics physically tangible . . 74--81
Steve Bryson and
David Kenwright and
Michael Cox and
David Ellsworth and
Robert Haimes Visually exploring gigabyte data sets in
real time . . . . . . . . . . . . . . . 82--90
Surendra N. Singh and
Nikunj P. Dalal Web home pages as advertisements . . . . 91--98
David Ebert and
Edward Bedwell and
Stephen Maher and
Laura Smoliar and
Elizabeth Downing Realizing $3$D visualization using
grossed-beam volumetric displays . . . . 100--107
Richard G. Vedder and
Michael T. Vanecek and
C. Stephen Guynes and
James J. Cappel CEO and CIO perspectives on competitive
intelligence . . . . . . . . . . . . . . 108--116
Duane P. Truex and
Richard Baskerville and
Heinz Klein Growing systems in emergent
organizations . . . . . . . . . . . . . 117--123
Rachid Guerraoui and
Mohamed E. Fayad Thinking objectively: object-oriented
abstractions for distributed programming 125--127
Bruce Schneier Inside risks: the uses and abuses of
biometrics . . . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Bob Quinn and
Daniel Dulitz and
Andrew Odlyzko and
Kerry Coffman and
Michael Noll and
James E. Harvey and
Misha Vaughan Forum: Voice and Data Traffic Jam;
Buying New PCs; ACM's Copyright Policy 11--15
Robert Durst and
Terrence Champion and
Eric Miller and
Luigi Spagnuolo and
Brian Witten Forum: Addendum to ``Testing and
evaluating computer intrusion detection
systems'' . . . . . . . . . . . . . . . 15--15
Pamela Samuelson Legally speaking: why the
anticircumvention regulations need
revision . . . . . . . . . . . . . . . . 17--21
William K. McHenry International perspectives: Y2K
international status and opportunities 23--27
Vir V. Phoha Viewpoint: Can a Course Be Taught
Entirely Via Email? . . . . . . . . . . 29--30
Jonathan W. Palmer and
Lars Bo Eriksen Digital newspapers explore marketing on
the Internet . . . . . . . . . . . . . . 32--40
Stewart Robertson and
Philip Powell Exploiting the benefits of Y2K
preparation . . . . . . . . . . . . . . 42--48
Rachna Dhamija and
Rachelle Heller and
Lance J. Hoffman Teaching e-commerce to a
multidisciplinary class . . . . . . . . 50--55
Alok Gupta and
Dale O. Stahl and
Andrew B. Whinston The economics of network management . . 57--63
R. Ramesh and
Dee H. Andrews Distributed mission training: teams,
virtual reality, and real-time
networking . . . . . . . . . . . . . . . 64--67
Lynn A. Carroll Multimodal integrated team training . . 68--71
Herbert H. Bell The effectiveness of distributed mission
training . . . . . . . . . . . . . . . . 72--78
Judith S. Dahmann and
James O. Calvin and
Richard M. Weatherly A reusable architecture for simulations 79--84
Philipp W. Peppler and
Steve Stephens Image generation systems in virtual
training platforms . . . . . . . . . . . 85--88
Peter Crane Implementing distributed mission
training . . . . . . . . . . . . . . . . 90--94
Eric W. Tatham Technical opinion: getting the best of
both real and virtual worlds . . . . . . 96--98
Bruce Schneier Inside risks: the Trojan horse race . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Saul I. Gass and
Rommert J. Casimir and
Adrian Bowyer and
Anonymous and
Glen Henshaw and
Scott M. Brown and
William Adams Forum: Solving the Plagiarism Problem;
The Limits of LEGOs; What About
Information Dominance Warfare?; The
Licensing Issue . . . . . . . . . . . . 11--14
Neil Munro From Washington: the ongoing tug-of-war
for e-commerce control . . . . . . . . . 17--20
Larry Press Personal computing: the post-PC era . . 21--24
Barbara Simons From the President: The Heroes Among Us 25, 112
Grady Booch UML in action . . . . . . . . . . . . . 26--28
Cris Kobryn UML 2001: a standardization odyssey . . 29--37
Grant Larsen Designing component-based frameworks
using patterns in the UML . . . . . . . 38--45
Bran Selic Turning clockwise: using UML in the
real-time domain . . . . . . . . . . . . 46--54
Alex E. Bell and
Ryan W. Schmidt UMLoquent expression of AWACS software
design . . . . . . . . . . . . . . . . . 55--61
Jim Conallen Modeling Web application architectures
with UML . . . . . . . . . . . . . . . . 63--70
Micheal A. Cusumano and
David B. Yoffie What Netscape learned from
cross-platform software development . . 72--78
Michael Mattsson and
Jan Bosch and
Mohamed E. Fayad Framework integration problems, causes,
solutions . . . . . . . . . . . . . . . 80--87
Tessa Lau and
Oren Etzioni and
Daniel S. Weld Privacy interfaces for information
management . . . . . . . . . . . . . . . 88--94
Håkon Wium Lie and
Janne Saarela Multipurpose Web publishing using HTML,
XML, and CSS . . . . . . . . . . . . . . 95--101
Don Gotterbarn and
Keith Miller and
Simon Rogerson Software engineering code of ethics is
approved . . . . . . . . . . . . . . . . 102--107
Lutz Prechelt Technical opinion: comparing Java vs.
C/C++ efficiency differences to
interpersonal differences . . . . . . . 109--112
Bruce Schneier Inside risks: Risks of relying on
cryptography . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track . . . . . . . . . . . . . . . 9--10
Hal Berghel Digital village: the cost of having
analog executives in a digital world . . 11--15
Robert L. Glass Evolving a new theory of project success 17--19
Diane Crawford and
Dino Mandrioli and
Paul Zeiger and
Dan Chisham and
Mark Wallace and
Ralph E. Johnson and
Robert Glass and
Robert A. Ellis and
Myles Losch and
Scott Tilley Forum: Software Project Failure Lessons
Learned; More Powerful Internet
Connections . . . . . . . . . . . . . . 21--24
Toshinori Munakata Knowledge discovery . . . . . . . . . . 26--29
Tom M. Mitchell Machine learning and data mining . . . . 30--36
Raúl E. Valdés-Pérez Discovery tools for science apps . . . . 37--41
Stephen Muggleton Scientific knowledge discovery using
inductive logic programming . . . . . . 42--46
LiMin Fu Knowledge discovery based on neural
networks . . . . . . . . . . . . . . . . 47--50
Kenneth A. De Jong Evolutionary computation for discovery 51--53
Wojciech Ziarko Discovery through rough set theory . . . 54--57
Kevin Knight Mining online text . . . . . . . . . . . 58--61
Steffen Schulze-Kremer Discovery in the human genome project 62--64
Murray Campbell Knowledge discovery in deep blue . . . . 65--67
Ravi Ganesan The messyware advantage: the precipitous
rise of the middleman . . . . . . . . . 68--73
Sharon Oviatt Ten myths of multimodal interaction . . 74--81
George S. Nezlek and
Hemant K. Jain and
Derek L. Nazareth An integrated approach to enterprise
computing architectures . . . . . . . . 82--90
Dawn G. Gregg and
Michael Goul A proposal for an open DSS protocol . . 91--96
Pascal Felber and
Rachid Guerraoui and
Mohamed E. Fayad Putting OO distributed programming to
work . . . . . . . . . . . . . . . . . . 97--101
Peter G. Neumann and
Lauren Weinstein Inside risks: risks of content filtering 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Peter Revesz and
Philip Gilbert and
S. W. Ng Forum: Reengineering the University . . 11--13
Mike Godwin From Washington: net to worry . . . . . 15--17
Meg McGinity Staying connected: flying wireless, with
a net . . . . . . . . . . . . . . . . . 19--21
Patrick Walsh and
Adamantios Koumpis On site: the Esprit ATLAS project . . . 23--26
Amr El-Kadi Viewpoint: stop that divorce! . . . . . 27--28
Dennis J. Frailey Licensing software engineers . . . . . . 29--30
Steven Bellman and
Gerald L. Lohse and
Eric J. Johnson Predictors of online buying behavior . . 32--38
Anne Adams and
Martina Angela Sasse Users are not the enemy . . . . . . . . 40--46
William H. Dutton and
Anita Elberse and
Matthew Hale A case study of a Netizen's guide to
elections . . . . . . . . . . . . . . . 48--54
Kai R. T. Larsen Voting technology implementation . . . . 55--57
Richard T. Watson and
Sigmund Akselsen and
Benete Evjemo and
Nils Aarsæther Teledemocracy in local government . . . 58--63
Magid Igbaria The driving forces in the virtual
society . . . . . . . . . . . . . . . . 64--70
Hilda Tellio\uglu and
Ina Wagner Software cultures . . . . . . . . . . . 71--77
Pearl Brereton and
David Budgen and
Keith Bennnett and
Malcolm Munro and
Paul Layzell and
Linda MaCaulay and
David Griffiths and
Charles Stannett The future of software . . . . . . . . . 78--84
Fay Cobb Payton and
Patricia Flatley Brennan How a community health information
network is really used . . . . . . . . . 85--89
Frank Cuccias Are we ready?: the FAA's Y2K
preparedness . . . . . . . . . . . . . . 91--92
Leon A. Kappelman Are we ready?: risk, reality, and
readiness . . . . . . . . . . . . . . . 93--94
Peter G. Neumann Inside risks: risks of insiders . . . . 160--160
James F. Blinn Jim Blinn's Corner: Fugue for MMX . . . 88--93
Donald E. Knuth and
J. H. Morris and
V. R. Pratt Fast pattern matching in strings . . . . 323--350