Table of contents for issues of Communications of the ACM

Last update: Wed Nov 8 12:49:02 MST 2023                Valid HTML 3.2!

Volume 43, Number 1, January, 2000
Volume 43, Number 2, February, 2000
Volume 43, Number 3, March, 2000
Volume 43, Number 4, April, 2000
Volume 43, Number 5, May, 2000
Volume 43, Number 6, June, 2000
Volume 43, Number 7, July, 2000
Volume 43, Number 8, August, 2000
Volume 43, Number 9, September, 2000
Volume 43, Number 10, October, 2000
Volume 43, Number 11, November, 2000
Volume 43, Number 11es, November, 2000
Volume 43, Number 12, December, 2000
Volume 44, Number 1, January, 2001
Volume 44, Number 2, February, 2001
Volume 44, Number 3, March, 2001
Volume 44, Number 4, April, 2001
Volume 44, Number 5, May, 2001
Volume 44, Number 6, June, 2001
Volume 44, Number 7, July, 2001
Volume 44, Number 8, August, 2001
Volume 44, Number 9, September, 2001
Volume 44, Number 10, October, 2001
Volume 44, Number 11, November, 2001
Volume 44, Number 12, December, 2001
Volume 45, Number 1, January, 2002
Volume 45, Number 2, February, 2002
Volume 45, Number 3, March, 2002
Volume 45, Number 4, April, 2002
Volume 45, Number 4ve, April, 2002
Volume 45, Number 5, May, 2002
Volume 45, Number 6, June, 2002
Volume 45, Number 7, July, 2002
Volume 45, Number 8, August, 2002
Volume 45, Number 9, September, 2002
Volume 45, Number 10, October, 2002
Volume 45, Number 11, November, 2002
Volume 45, Number 12, December, 2002
Volume 46, Number 1, January, 2003
Volume 46, Number 2, February, 2003
Volume 46, Number 3, March, 2003
Volume 46, Number 4, April, 2003
Volume 46, Number 5, May, 2003
Volume 46, Number 6, June, 2003
Volume 46, Number 7, July, 2003
Volume 46, Number 8, August, 2003
Volume 46, Number 9, September, 2003
Volume 46, Number 10, October, 2003
Volume 46, Number 11, November, 2003
Volume 46, Number 12, December, 2003
Volume 47, Number 1, January, 2004
Volume 47, Number 2, February, 2004
Volume 47, Number 3, March, 2004
Volume 47, Number 4, April, 2004
Volume 47, Number 5, May, 2004
Volume 47, Number 6, June, 2004
Volume 47, Number 7, July, 2004
Volume 47, Number 8, August, 2004
Volume 47, Number 9, September, 2004
Volume 47, Number 10, October, 2004
Volume 47, Number 11, November, 2004
Volume 47, Number 12, December, 2004
Volume 48, Number 1, January, 2005
Volume 48, Number 2, February, 2005
Volume 48, Number 3, March, 2005
Volume 48, Number 4, April, 2005
Volume 48, Number 5, May, 2005
Volume 48, Number 6, June, 2005
Volume 48, Number 7, July, 2005
Volume 48, Number 8, August, 2005
Volume 48, Number 9, September, 2005
Volume 48, Number 10, October, 2005
Volume 48, Number 11, November, 2005
Volume 48, Number 12, December, 2005
Volume 49, Number 1, January, 2006
Volume 49, Number 2, February, 2006
Volume 49, Number 3, March, 2006
Volume 49, Number 4, April, 2006
Volume 49, Number 5, May, 2006
Volume 49, Number 6, June, 2006
Volume 49, Number 7, July, 2006
Volume 49, Number 8, August, 2006
Volume 49, Number 9, September, 2006
Volume 49, Number 10, October, 2006
Volume 49, Number 11, November, 2006
Volume 49, Number 12, December, 2006
Volume 50, Number 1, January, 2007
Volume 50, Number 2, February, 2007
Volume 50, Number 3, March, 2007
Volume 50, Number 4, April, 2007
Volume 50, Number 5, May, 2007
Volume 50, Number 6, June, 2007
Volume 50, Number 7, July, 2007
Volume 50, Number 8, August, 2007
Volume 50, Number 9, September, 2007
Volume 50, Number 10, October, 2007
Volume 50, Number 11, November, 2007
Volume 50, Number 12, December, 2007
Volume 51, Number 1, January, 2008
Volume 51, Number 2, February, 2008
Volume 51, Number 3, March, 2008
Volume 51, Number 4, April, 2008
Volume 51, Number 5, May, 2008
Volume 51, Number 6, June, 2008
Volume 51, Number 7, July, 2008
Volume 51, Number 8, August, 2008
Volume 51, Number 9, September, 2008
Volume 51, Number 10, October, 2008
Volume 51, Number 11, November, 2008
Volume 51, Number 12, December, 2008
Volume 52, Number 1, January, 2009
Volume 52, Number 2, February, 2009
Volume 52, Number 3, March, 2009
Volume 52, Number 4, April, 2009
Volume 52, Number 5, May, 2009
Volume 52, Number 6, June, 2009
Volume 52, Number 7, July, 2009
Volume 52, Number 8, August, 2009
Volume 52, Number 9, September, 2009
Volume 52, Number 10, October, 2009
Volume 52, Number 11, November, 2009
Volume 52, Number 12, December, 2009


Communications of the ACM
Volume 43, Number 1, January, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Celestial backbone; Foreign
                                  hands off China's net; Women and the
                                  web; DOE says no nuke access; Worst net
                                  nightmare; Sidebar: Ethics quiz  . . . . 9--9
             Diane Crawford and   
          Brian K. E. Balke and   
             Steve Wilstrom and   
                 Jef Raskin and   
                      Pat McGee   Forum: Tackling OO Design Principles;
                                  Educational Concerns; Building LEGO
                                  Robots . . . . . . . . . . . . . . . . . 11--13
                 Brock N. Meeks   Electronic frontier: bugging out: Y2K
                                  fallout or business as usual?  . . . . . 15--15
             Elliot Soloway and   
            Cathleen Norris and   
         Phyllis Blumenfeld and   
              Barry Fishman and   
             Joseph Krajcik and   
                    Ronald Marx   Log on Education: K--12 and the Internet 19--19
                 Tom Porter and   
                   Galyn Susman   On site: creating lifelike characters in
                                  Pixar movies . . . . . . . . . . . . . . 25--25
                 Barbara Simons   From the President: building Big Brother 31--31
           Prabhudev Konana and   
             Nirup M. Menon and   
        Sridhar Balasubramanian   The implications of online investing . . 34--34
          Cecilia M. Gorriz and   
                 Claudia Medina   Engaging girls with computers through
                                  software games . . . . . . . . . . . . . 42--42
               Eszter Hargittai   Radio's lessons for the Internet . . . . 50--50
           Mark S. Ackerman and   
         Christine A. Hadverson   Reexamining organizational memory  . . . 58--58
              Mike Robinson and   
           Mikko Kovalainen and   
              Esa Auramäki   Diary as dialogue in papermill process
                                  control  . . . . . . . . . . . . . . . . 65--65
            Jagdish Chandra and   
         Salvatore T. March and   
           Satyen Mukherjee and   
                  Will Pape and   
                  R. Ramesh and   
              H. Raghav Rao and   
                Ray O. Waddoups   Information systems frontiers  . . . . . 71--71
          Srinarayan Sharma and   
                       Arun Rai   CASE deployment in IS organizations  . . 80--80
             Ruben Gonzalez and   
              Greg Cranitch and   
                         Jun Jo   Academic directions of multimedia
                                  education  . . . . . . . . . . . . . . . 89--89
               Carl Ellison and   
                 Bruce Schneier   Inside risks: risks of PKI: Secure Email 160--160

Communications of the ACM
Volume 43, Number 2, February, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: More pay now; Euro net use;
                                  The cursor who spied me; Robot
                                  wheelchair climbs stairs.; The boss
                                  knows; Y2K aftermath; High tech, hold
                                  the computer . . . . . . . . . . . . . . 9--9
             Diane Crawford and   
            Terry D. Decker and   
    Francisco M. De La Vega and   
            Jeffrey Shallit and   
              John A. Wills and   
          Dennis J. Frailey and   
            Brad Montgomery and   
          Carole M. Milazzo and   
           W. J. Liederbach and   
                David Mould and   
                   Ewen McNeill   Forum: Debating Distance Learning  . . . 11--15
                    Hal Berghel   Identity theft, Social Security Numbers,
                                  and the Web  . . . . . . . . . . . . . . 17--17
                  Andrew Grosso   Legally speaking: the promise and
                                  problems of the No Electronic Theft Act  23--23
                      F. Castel   Viewpoint: exploring virtuality  . . . . 27--27
                 Fran Allen and   
             Paula Hawthorn and   
                 Barbara Simons   Viewpoint: not now, not like this  . . . 29--29
                   Mark Maybury   News on demand: introduction . . . . . . 32--32
             Stanley Boykin and   
                 Andrew Merlino   Machine learning of event segmentation
                                  for news on demand . . . . . . . . . . . 35--35
          Howard D. Wactlar and   
     Alexander G. Hauptmann and   
        Michael G. Christel and   
          Ricky A. Houghton and   
      Andreas M. Olligschlaeger   Complementary video and audio analysis
                                  for broadcast news archives  . . . . . . 42--42
             Francis Kubala and   
               Sean Colbath and   
                  Daben Liu and   
            Amit Srivastava and   
                   John Makhoul   Integrated technologies for indexing
                                  spoken language  . . . . . . . . . . . . 48--48
           The SRI MAESTRO Team   MAESTRO: conductor of multimedia
                                  analysis technologies  . . . . . . . . . 57--57
           Jean-Luc Gauvain and   
                 Lori Lamel and   
                    Gilles Adda   Transcribing broadcast news for audio
                                  and video indexing . . . . . . . . . . . 64--64
              Sadaoki Furui and   
         Katsutoshi Ohtsuki and   
                 Zhi-Peng Zhang   Japanese broadcast news transcription
                                  and information extraction . . . . . . . 71--71
           David S. Pallett and   
           John S. Garofolo and   
             Jonathan G. Fiscus   Measurements in support of research
                                  accomplishments  . . . . . . . . . . . . 75--75
               Varun Grover and   
                Pradeep Vaswani   Partnerships in the U.S.
                                  telecommunications industry  . . . . . . 80--80
                  Anil Jain and   
                   Lin Hong and   
               Sharath Pankanti   Biometric identification . . . . . . . . 90--90
            Rudy Hirschheim and   
                    Mary Lacity   The myths and realities of information
                                  technology insourcing  . . . . . . . . . 99--99
           Kai R. T. Larsen and   
              Peter A. Bloniarz   A cost and performance model for Web
                                  service investment . . . . . . . . . . . 109--109
               David Gillibrand   Technical opinion: essential business
                                  object design  . . . . . . . . . . . . . 117--117
               Carl Ellison and   
                 Bruce Schneier   Inside risks: risks of PKI: e-commerce   152--152

Communications of the ACM
Volume 43, Number 3, March, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: A Future Space Odyssey;
                                  Calculating DNA; Rapid Tracking of
                                  diseases; Hunting Meteorites;
                                  ``Millennium'' Banished; English
                                  dominates Web; Top selling software; The
                                  Human Face of E-Commerce . . . . . . . . 9--10
             Diane Crawford and   
           Richard H. Veith and   
            Lauri Pirttiaho and   
               Ralph Miller and   
                Hal Berghel and   
           Paul E. McKenney and   
                  Tom Moran and   
        Antanas V. Dundzila and   
                  Frank Cuccias   Forum: Planning for Software Project
                                  Success; The Manhattan Project and
                                  Info-czars; Mastering the Basics the
                                  Highest Priority; More Net May Not Yield
                                  More Votes; Are IBM 3083s Vacuum Tube
                                  Systems  . . . . . . . . . . . . . . . . 11--15
                Robert L. Glass   Practical programmer: Y2K and believing
                                  in software practice . . . . . . . . . . 17--18
            James A. Rodger and   
            Parag C. Pendharkar   On site: using telemedicine in the
                                  Department of Defense  . . . . . . . . . 19--20
                   Roy Rada and   
                  John Ketchell   Sharing standards: standardizing the
                                  European information society . . . . . . 21--25
                 Barbara Simons   From the president: trademarking the Net 27--28
            Mohamed Khalifa and   
                 Robert Davison   Viewpoint: exploring the telecommuting
                                  paradox  . . . . . . . . . . . . . . . . 29--31
               Matthew Turk and   
               George Robertson   Perceptual user interfaces
                                  (introduction) . . . . . . . . . . . . . 32--34
                  Alex Pentland   Perceptual user interfaces: perceptual
                                  intelligence . . . . . . . . . . . . . . 35--44
                    Hong Z. Tan   Perceptual user interfaces: haptic
                                  interfaces . . . . . . . . . . . . . . . 40--41
              Sharon Oviatt and   
                   Philip Cohen   Perceptual user interfaces: multimodal
                                  interfaces that process what comes
                                  naturally  . . . . . . . . . . . . . . . 45--53
             Rosalind W. Picard   Perceptual user interfaces: affective
                                  perception . . . . . . . . . . . . . . . 50--51
           James L. Crowley and   
         Joëlle Coutaz and   
  François Bérard   Perceptual user interfaces: things that
                                  see  . . . . . . . . . . . . . . . . . . 54--54
            Aaron F. Bobick and   
         Stephen S. Intille and   
             James W. Davis and   
              Freedom Baird and   
        Claudio S. Pinhanez and   
            Lee W. Campbell and   
             Yuri A. Ivanov and   
         Arjan Schütte and   
                  Andrew Wilson   Perceptual user interfaces: the KidsRoom 60--61
               Byron Reeves and   
                  Clifford Nass   Perceptual user interfaces: perceptual
                                  bandwidth  . . . . . . . . . . . . . . . 65--70
                Henry Lieberman   Programming by example (introduction)    72--74
       David Canfield Smith and   
               Allen Cypher and   
                   Larry Tesler   Programming by example: novice
                                  programming comes of age . . . . . . . . 75--81
              Brad A. Myers and   
           Richard McDaniel and   
                   David Wolber   Programming by example: intelligence in
                                  demonstrational interfaces . . . . . . . 82--89
        Alexander Repenning and   
                Corrina Perrone   Programming by example: programming by
                                  analogous examples . . . . . . . . . . . 90--97
              Mathias Bauer and   
            Dietmar Dengler and   
              Gabriele Paul and   
                   Markus Meyer   Programming by example: programming by
                                  demonstration for information agents . . 98--103
                       Ken Kahn   Programming by example: generalizing by
                                  removing detail  . . . . . . . . . . . . 104--106
           Robert St. Amant and   
            Henry Lieberman and   
             Richard Potter and   
               Luke Zettlemoyer   Programming by example: visual
                                  generalization in programming by example 107--114
           Mohamed E. Fayad and   
             Mauri Laitinen and   
                 Robert P. Ward   Thinking objectively: software
                                  engineering in the small . . . . . . . . 115--118
               Peter G. Neumann   Inside risks: a tale of two thousands    144--144

Communications of the ACM
Volume 43, Number 4, April, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Merger Marriages; Call for
                                  Security; Gigahertz and beyond; Morphing
                                  Robotoys for X-mas; Plasma Display;
                                  Domain Name Stakes Upped; Olfactory Opt
                                  In; China's Email Shanghaid  . . . . . . 9--10
             Diane Crawford and   
              Paul Abrahams and   
             Bill Patterson and   
                Anthony Fedzano   Forum: Securing User Passwords;
                                  Combining OM and OG  . . . . . . . . . . 11--12
            Rosemary McGuinness   ACM fellows  . . . . . . . . . . . . . . 13--14
                     Neil Munro   From Washington: a patchwork of
                                  legislation and regulation . . . . . . . 15--17
                   Meg McGinity   Staying connected: surfing the turf  . . 19--21
              Kuldeep Kumar and   
          Jos van Hillegersberg   Enterprise resource planning:
                                  introduction . . . . . . . . . . . . . . 22--26
      Yvonne van Everdingen and   
      Jos van Hillegersberg and   
                    Eric Waarts   Enterprise resource planning: ERP
                                  adoption by European midsize companies   27--31
        Leslie P. Willcocks and   
                  Richard Sykes   Enterprise resource planning: the role
                                  of the CIO and IT function in ERP  . . . 32--38
     Irma Becerra-Fernandez and   
          Kenneth E. Murphy and   
                Steven J. Simon   Enterprise resource planning:
                                  integrating ERP in the business school
                                  curriculum . . . . . . . . . . . . . . . 39--41
            M. Lynne Markus and   
             Cornelis Tanis and   
             Paul C. van Fenema   Enterprise resource planning: multisite
                                  ERP implementations  . . . . . . . . . . 42--46
              Christina Soh and   
              Sia Siew Kien and   
                 Joanne Tay-Yap   Enterprise resource planning: cultural
                                  fits and misfits: is ERP a universal
                                  solution?  . . . . . . . . . . . . . . . 47--51
               Mark Kremers and   
                 Han van Dissel   Enterprise resource planning: ERP system
                                  migrations . . . . . . . . . . . . . . . 53--56
      August-Wilhelm Scheer and   
                Frank Habermann   Enterprise resource planning: making ERP
                                  a success  . . . . . . . . . . . . . . . 57--61
                   David Sprott   Enterprise resource planning:
                                  componentizing the enterprise
                                  application packages . . . . . . . . . . 63--69
                Justine Cassell   Embodied conversational interface
                                  agents+  . . . . . . . . . . . . . . . . 70--78
                 Albert Semtner   Ocean and climate modeling . . . . . . . 80--89
                 Jonathan Bowen   The ethics of safety-critical systems    91--97
                       Tim Bass   Intrusion detection systems and
                                  multisensor data fusion  . . . . . . . . 99--105
          Munindar P. Singh and   
                     Mona Singh   Technical Opinion: deconstructing the
                                  ``any'' key  . . . . . . . . . . . . . . 107--108
    Jerzy W. Grzymala-Busse and   
                Wojciech Ziarko   Data mining and rough set theory . . . . 108--109
             Friedrich Steimann   Abstract class hierarchies, factories,
                                  and stable designs . . . . . . . . . . . 109--111
               Peter G. Neumann   Inside Risks: denial-of-service attacks  136--136

Communications of the ACM
Volume 43, Number 5, May, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Flying the rails; Logging
                                  online hours at work; Top prize:
                                  embedded encryption; Digital Nose knows;
                                  Walking again via chip implant;
                                  Cell-phone-free class; Another node in
                                  the crowd  . . . . . . . . . . . . . . . 9--9
             Diane Crawford and   
                 Nancy Mead and   
            Thomas W. Moran and   
             Jason Steffler and   
                  Anonymous and   
          William Dan Terry and   
          Merrill Warkentin and   
      John Michael Williams and   
               Vir V. Phoha and   
                 Vic Basili and   
                Fred Brooks and   
                Tom DeMarco and   
               Ernst Denert and   
             Koichi Kishida and   
               Manny Lehman and   
                 Elliot Soloway   Forum: Much Ado About Licensing and
                                  Electronic Identity Theft and Email-Only
                                  Classes and Sign-Off on Y2K  . . . . . . 11--15
                    Larry Press   Personal computing: from P-books to
                                  E-books  . . . . . . . . . . . . . . . . 17--17
                    Hal Berghel   Digital village: predatory
                                  disintermediation  . . . . . . . . . . . 23--23
                 Barbara Simons   From the president: to DVD or not to DVD 31--31
                     Steve Mann   Viewpoint: existential education in the
                                  era of personal cybernetics  . . . . . . 33--33
             Deborah Estrin and   
            Ramesh Govindan and   
                 John Heidemann   Embedding the Internet: introduction . . 38--38
              David Tennenhouse   Embedding the Internet: proactive
                                  computing  . . . . . . . . . . . . . . . 43--43
               G. J. Pottie and   
                   W. J. Kaiser   Embedding the Internet: wireless
                                  integrated network sensors . . . . . . . 51--51
          Gaetano Borriello and   
                       Roy Want   Embedding the Internet: embedded
                                  computation meets the World Wide Web . . 59--59
         Gaurav S. Sukhatme and   
                Maja J. Mataric   Embedding the Internet: embedding robots
                                  into the Internet  . . . . . . . . . . . 67--67
             Harold Abelson and   
                  Don Allen and   
               Daniel Coore and   
               Chris Hanson and   
               George Homsy and   
           Thomas F. Knight and   
             Radhika Nagpal and   
                 Erik Rauch and   
         Gerald Jay Sussman and   
                      Ron Weiss   Embedding the Internet: amorphous
                                  computing  . . . . . . . . . . . . . . . 74--74
                Ben Shneiderman   Universal usability  . . . . . . . . . . 84--84
              John P. Baron and   
            Michael J. Shaw and   
               Andrew D. Bailey   Web-based E-catalog systems in B2B
                                  procurement  . . . . . . . . . . . . . . 93--93
             Marshall Cline and   
                     Mike Girou   Enduring business themes . . . . . . . . 101--101
         Laurie A. Williams and   
              Robert R. Kessler   All I really need to know about pair
                                  programming I learned in kindergarten    108--108
                   Susan Landau   Technical opinion: designing
                                  cryptography for the new century . . . . 115--115
           Lauren Weinstein and   
               Peter G. Neumann   Inside risks: Internet risks . . . . . . 144--144

Communications of the ACM
Volume 43, Number 6, June, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: The Supreme Court Goes
                                  Online; Coffee? Tea? Email?; Political
                                  Coffers; Smart Scalpel; Office
                                  Cube-icles; Law Preview; Piracy Rages;
                                  Wireless Rules; The Name Game  . . . . . 9--10
             Diane Crawford and   
             Morton Grosser and   
                 Don Walter and   
                Steve Grief and   
           Bernard Abramson and   
               Robert LeMay and   
                     Rob DuWors   Forum: A Plea for Dumb Computers;
                                  Gloom-and-Doom Predictions; Expanding
                                  the SE View  . . . . . . . . . . . . . . 11--14
        Anthony M. Townsend and   
         Robert J. Aalberts and   
               Steven A. Gibson   Legally speaking: libel and slander on
                                  the Internet . . . . . . . . . . . . . . 15--17
                 Brock N. Meeks   Electronic frontier: Bad moon rising . . 19--21
             Elliot Soloway and   
            Henry J. Becker and   
            Cathleen Norris and   
                      Neal Topp   Log on education: teachers and
                                  technology: easing the way . . . . . . . 23--26
               Richard Stallman   Viewpoint: Why we must fight UCITA . . . 27--28
                   Tim O'Reilly   Viewpoint: The Internet patent land grab 29--31
            Wilhelm Hasselbring   Information system integration . . . . . 32--38
                  Jian Yang and   
             Mike P. Papazoglou   Interoperation support for electronic
                                  business . . . . . . . . . . . . . . . . 39--47
               Jane Grimson and   
            William Grimson and   
            Wilhelm Hasselbring   The SI challenge in health care  . . . . 48--55
      Elke A. Rundensteiner and   
            Andreas Koeller and   
                      Xin Zhang   Maintaining data warehouses over
                                  changing information sources . . . . . . 57--62
              Nabil R. Adam and   
       Vijayalakshmi Atluri and   
                  Igg Adiwijaya   SI in digital libraries  . . . . . . . . 64--72
             Upkar Varshney and   
                     Ron Vetter   Emerging mobile and wireless networks    73--81
           Thomas A. Phelps and   
                Robert Wilensky   Multivalent documents  . . . . . . . . . 82--90
            Terry L. Huston and   
                Janis L. Huston   Is telemedicine a practical reality? . . 91--95
          Richard T. Watson and   
          George M. Zinkhan and   
                Leyland F. Pitt   Integrated Internet marketing  . . . . . 97--102
                Gerard Parr and   
                   Kevin Curran   A paradigm shift in the distribution of
                                  multimedia . . . . . . . . . . . . . . . 103--109
             Detlef Schoder and   
                 Torsten Eymann   Technical opinion: The real challenges
                                  of mobile agents . . . . . . . . . . . . 111--112
               Lauren Weinstein   Inside risks: Risks of Internet voting   128--128

Communications of the ACM
Volume 43, Number 7, July, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: E-Tending the farm; Latest
                                  agricultural stats; Myanmar cuts net;
                                  Video Games, violence linked; Flying the
                                  Web-connected skies; Intricate politics
                                  of weaving; Girls and computers; Wall of
                                  Tetris . . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Mark Wallace and   
              Albert Semter and   
           Alireza Ebrahimi and   
                  Pat McGee and   
         Rommert J. Casimir and   
                     Frank Land   Forum: Global Warning in Ocean and
                                  Climate Modeling; Add PBE to
                                  Conventional Languages; Abbreviation
                                  Hijacking; More to ERP than Org Issues   11--14
                Robert L. Glass   Practical programmer: On personal
                                  technical obsolescence . . . . . . . . . 15--17
            Phillip Ein-Dor and   
         Seymour E. Goodman and   
                  Peter Wolcott   International perspectives: From Via
                                  Maris to electronic highway: the
                                  Internet in Canaan . . . . . . . . . . . 19--23
                  Dori Kornfeld   On site: Deliberating on ICANN . . . . . 25--26
                    Les Earnest   Viewpoint: E2A is worse than Y2K . . . . 27--28
              Andrew Rosenbloom   Introduction . . . . . . . . . . . . . . 30--32
                   Chris Hecker   Physics in computer games  . . . . . . . 34--39
                     John Funge   Cognitive modeling for games and
                                  animation  . . . . . . . . . . . . . . . 40--48
                Zoran Popovi\'c   Controlling physics in realistic
                                  character animation  . . . . . . . . . . 50--58
                Nick Foster and   
               Dimitris Metaxas   Modeling water for computer animation    60--67
           James F. O'Brien and   
             Jessica K. Hodgins   Animating fracture . . . . . . . . . . . 68--75
                       Jos Stam   Interacting with smoke and fire in real
                                  time . . . . . . . . . . . . . . . . . . 76--83
       Przemyslaw Prusinkiewicz   Simulation modeling of plants and plant
                                  ecosystems . . . . . . . . . . . . . . . 84--93
          Torsten Fröhlich   The virtual oceanarium . . . . . . . . . 94--101
                Jakub Segen and   
                  Senthil Kumar   Look ma, no mouse! . . . . . . . . . . . 102--109
           Deborah K. Smith and   
          David B. Paradice and   
                Steven M. Smith   Prepare your mind for creativity . . . . 110--116
             Veda C. Storey and   
           Detmar W. Straub and   
           Kathy A. Stewart and   
               Richard J. Welke   A conceptual investigation of the
                                  e-commerce industry  . . . . . . . . . . 117--123
           Gurpreet Dhillon and   
                James Backhouse   Technical opinion: Information system
                                  security management in the new
                                  millennium . . . . . . . . . . . . . . . 125--128
               Peter G. Neumann   Inside risks: risks in retrospect  . . . 144--144

Communications of the ACM
Volume 43, Number 8, August, 2000

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Everybody Must Get Cloned; A
                                  Step Beyond Cookies; The Chicken and the
                                  Chip; Air Communication Breakdown; No
                                  Sale; Intestinal Pillage; Sidebar: Top
                                  10 Signals You're Tired of the Internet
                                  Business . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
              Robert Levine and   
              John A. Wills and   
                  James L. Rash   Forum: The Other Side of Embedding the
                                  Internet; A Cure for Lost Programming
                                  Companionship;l Licensing Software
                                  Developers . . . . . . . . . . . . . . . 11--14
                  Andrew Grosso   Legally Speaking: the economic espionage
                                  act: touring the minefields  . . . . . . 15--18
              Phillip G. Armour   The Business of Software: the case for a
                                  new business model . . . . . . . . . . . 19--22
                Daniel Berleant   On Site: does typography affect proposal
                                  assessment?  . . . . . . . . . . . . . . 24--25
                   Doug Riecken   Introduction: personalized views of
                                  personalization  . . . . . . . . . . . . 26--28
                Nigel Wells and   
                   Jeff Wolfers   The business of personalization: finance
                                  with a personalized touch  . . . . . . . 30--34
                 Udi Manber and   
                  Ash Patel and   
                   John Robison   The business of personalization:
                                  experience with personalization of
                                  Yahoo! . . . . . . . . . . . . . . . . . 35--39
                   Doug Riecken   The business of personalization:
                                  personalized communication networks  . . 41--42
              Joseph Kramer and   
              Sunil Noronha and   
                     John Vergo   The human element: a user-centered
                                  design approach to personalization . . . 44--48
                 John Karat and   
          Clare-Marie Karat and   
                  Jacob Ukelson   The human element: affordances,
                                  motivation, and the design of user
                                  interfaces . . . . . . . . . . . . . . . 49--51
            Edith Schonberg and   
              Thomas Cofino and   
                Robert Hoch and   
             Mark Podlaseck and   
             Susan L. Spraragen   The human element: measuring success . . 53--57
              Nicolas J. Belkin   The human element: helping people find
                                  what they don't know . . . . . . . . . . 58--61
                Linda Candy and   
                 Ernest Edmonds   The human element: creativity
                                  enhancement with emerging technologies   62--65
                  Marvin Minsky   Deep issues: commonsense-based
                                  interfaces . . . . . . . . . . . . . . . 66--73
                  John McCarthy   Deep issues: phenomenal data mining  . . 75--79
           Edwin P. D. Pednault   Deep issues: representation is
                                  everything . . . . . . . . . . . . . . . 80--83
                  Eugene Volokh   Deep issues: personalization and privacy 84--88
                   Doug Riecken   Deep issues: personal end-user tools . . 89--91
           David Canfield Smith   Deep issues: building personal tools by
                                  programming  . . . . . . . . . . . . . . 92--95
                Paul Maglio and   
                    Rob Barrett   Enabling technologies: intermediaries
                                  personalize information streams  . . . . 96--101
                 Haym Hirsh and   
                Chumki Basu and   
               Brian D. Davison   Enabling technologies: learning to
                                  personalize  . . . . . . . . . . . . . . 102--106
                Barry Smyth and   
                    Paul Cotter   Enabling technologies: a personalized
                                  television listings service  . . . . . . 107--111
             Paul B. Kantor and   
                Endre Boros and   
           Benjamin Melamed and   
     Vladimir Meñkov and   
             Bracha Shapira and   
                   David J. Neu   Enabling technologies: capturing human
                                  intelligence in the Net  . . . . . . . . 112--115
            Wlodek Zadrozny and   
             M. Budzikowska and   
                    J. Chai and   
               N. Kambhatla and   
                S. Levesque and   
                     N. Nicolov   Enabling technologies: natural language
                                  dialogue for personalized interaction    116--120
        Maurice D. Mulvenna and   
          Sarabjot S. Anand and   
           Alex G. Büchner   Personalization on the Net using Web
                                  mining: introduction . . . . . . . . . . 122--125
              Myra Spiliopoulou   Web usage mining for Web site evaluation 127--134
             Ibrahim Cingil and   
               Asuman Dogac and   
                     Ayca Azgin   A broader approach to personalization    136--141
           Bamshad Mobasher and   
              Robert Cooley and   
             Jaideep Srivastava   Automatic personalization based on Web
                                  usage mining . . . . . . . . . . . . . . 142--151
             Mike Perkowitz and   
                   Oren Etzioni   Adaptive Web sites . . . . . . . . . . . 152--158
                 Barbara Simons   Inside risks: shrink-wrapping our rights 168--168

Communications of the ACM
Volume 43, Number 9, September, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Prioritizing privacy; End of
                                  dot-com days; Online ivory tickling;
                                  Privacy fortress; Asteroids by the
                                  numbers  . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
                 John Letaw and   
               Mark Wallace and   
                Les Earnest and   
                    Peter Neely   Forum: Is AOL--Time Warner a Closed
                                  System? Repeating SDI Myths; Better Word
                                  Processors for the Vision Impaired . . . 11--12
                     Neil Munro   From Washington: Ethics, schmethics  . . 13--15
                   Meg McGinity   Staying Connected: Body of technology    17--19
            Andrew W. Appel and   
               Edward W. Felten   Viewpoint: Technological access control
                                  interferes with noninfringing
                                  scholarship  . . . . . . . . . . . . . . 21--23
                   Jennifer Lai   Conversational interfaces  . . . . . . . 24--27
                 Susan J. Boyce   Natural spoken dialogue systems for
                                  telephony applications . . . . . . . . . 29--34
              Clifford Nass and   
                        Li Gong   Speech interfaces from an evolutionary
                                  perspective  . . . . . . . . . . . . . . 36--43
                  Sharon Oviatt   Taming recognition errors with a
                                  multimodal interface . . . . . . . . . . 45--51
                    Bruce Lucas   VoiceXML for Web-based distributed
                                  conversational applications  . . . . . . 53--57
                   Mark Lucente   Conversational interfaces for e-commerce
                                  applications . . . . . . . . . . . . . . 59--61
                Ben Shneiderman   The limits of speech recognition . . . . 63--65
            Judith A. Markowitz   Voice biometrics . . . . . . . . . . . . 66--73
         Kenneth P. Fishkin and   
                 Anuj Gujar and   
        Beverly L. Harrison and   
            Thomas P. Moran and   
                       Roy Want   Embodied user interfaces for really
                                  direct manipulation  . . . . . . . . . . 74--80
               Ram D. Gopal and   
            G. Lawrence Sanders   Global software piracy: you can't get
                                  blood out of a turnip  . . . . . . . . . 82--89
                David Ferraiolo   Integrating RBAC into workflow and
                                  collaborative environments (panel
                                  session) . . . . . . . . . . . . . . . . 89--90
          Robert M. Davison and   
               Robert O. Briggs   GSS for presentation support . . . . . . 91--97
       Antonis C. Stylianou and   
                   Ram L. Kumar   An integrative framework for IS quality
                                  management . . . . . . . . . . . . . . . 99--104
             Mauri Laitinen and   
           Mohamed E. Fayad and   
                 Robert P. Ward   Thinking Objectively: The problem with
                                  scalability  . . . . . . . . . . . . . . 105--107
               Peter G. Neumann   Inside Risks: Missile defense  . . . . . 128--128

Communications of the ACM
Volume 43, Number 10, October, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Tech sector hot for
                                  teachers; Overhaul still lacking; Spy
                                  cooperative; E-casinos hit jackpot;
                                  Driving out counterfeiters; Polly wants
                                  a Web link . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
            Michael Gardner and   
              Andrew Bender and   
               Frank Linton and   
                Pete Patton and   
               David Parnas and   
                 Fran Allen and   
             Paula Hawthorn and   
                 Barbara Simons   Forum: what defines a programming relic? 11--12
                 Brock N. Meeks   Being blank in bright waters . . . . . . 13--16
              Phillip G. Armour   The five orders of ignorance . . . . . . 17--20
        Edmund M. A. Ronald and   
                   Moshe Sipper   What use is a Turing chatterbox?
                                  Continuing the debate on machine
                                  intelligence . . . . . . . . . . . . . . 21--23
                   Grant Larsen   Component-based enterprise frameworks    24--26
                    Jon Hopkins   Component primer . . . . . . . . . . . . 27--30
                    Cris Kobryn   Modeling components and frameworks with
                                  UML  . . . . . . . . . . . . . . . . . . 31--38
           Mohamed E. Fayad and   
              David S. Hamu and   
                 Davide Brugali   Enterprise frameworks characteristics,
                                  criteria, and challanges . . . . . . . . 39--46
               Michael Sparling   Lessons learned: through six years of
                                  component-based development  . . . . . . 47--53
                    Lu Jian and   
                 Li Yingjun and   
                Ma Xiaoxing and   
                    Cai Min and   
               Tao Xianping and   
              Zhang Guanqun and   
                  Liu Jianzhong   A hierarchical framework: for parallel
                                  seismic applications . . . . . . . . . . 55--59
                   Peter Fingar   Component-based frameworks for
                                  e-commerce . . . . . . . . . . . . . . . 61--67
             Richard A. Johnson   The ups and downs of object-oriented
                                  systems development  . . . . . . . . . . 68--73
        Sudip Bhattacharjee and   
                      R. Ramesh   Enterprise computing environments and
                                  cost assessment  . . . . . . . . . . . . 74--82
               Ritu Agarwal and   
               Prabuddha De and   
             Atish P. Sinha and   
                  Mohan Tanniru   On the usability of OO representations   83--89
              Garland Brown and   
            Marshall Fisher and   
                  Ned Stoll and   
               Dave Beeksma and   
                 Mark Black and   
                 Ron Taylor and   
              Choe Seok Yon and   
          Aaron J. Williams and   
             William Bryant and   
              Bernard J. Jansen   Using the lessons of Y2K to improve
                                  information systems architecture . . . . 90--97
             Zakaria Maamar and   
                Jeff Sutherland   Toward intelligent business objects  . . 99--102
                 Matt Blaze and   
             Steven M. Bellovin   Inside risks: Tapping on my network door 136--136

Communications of the ACM
Volume 43, Number 11, November, 2000

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Fed Sites Fail on Privacy;
                                  Memory-chip Sandwich; Better X-Ray Tech;
                                  Paper Still King; Tricky Restoration;
                                  Going Coffin Shopping; Sidebar:
                                  Engineering Grads Rankings . . . . . . . 9--10
             Diane Crawford and   
             John Bashinski and   
              Eugene Volokh and   
                Brian Balke and   
      John Michael Williams and   
             Neville Holmes and   
            Daniel Berleant and   
             John J. Bosley and   
          Jeffrey Rosenwald and   
      Christopher G. Prince and   
               Chris Hecker and   
                   Terry Denton   Forum: The Ethics of Personalization;
                                  The Economic Espionage Act: A Lawyer's
                                  Perspective; Proposal Typography
                                  Deserves Fuller Treatment; Superficial
                                  Ethical Rant; Who is Worthy; A Point
                                  About Flight Simulators; Predatory
                                  Disintermediation in the Travel Industry 11--15
                    Hal Berghel   Digital village: digital politics 2000   17--22
            Seymour Goodman and   
              Timothy Kelly and   
             Michael Minges and   
                    Larry Press   International perspectives: computing at
                                  the top of the world . . . . . . . . . . 23--27
                 Jason W. Fouts   On site: an ``out-of-box'' experience    28--29
                   Steven Clift   Viewpoint: an Internet of democracy  . . 31--32
            Lambertus Hesselink   Ultra-high-density data storage:
                                  introduction . . . . . . . . . . . . . . 33--34
            Garth A. Gibson and   
               Rodney Van Meter   Network attached storage architecture    37--45
                Sergei S. Orlov   Volume holographic data storage  . . . . 46--54
                 Terry McDaniel   Magneto-optical data storage . . . . . . 56--63
            Henk van Houten and   
              Wouter Leibbrandt   Phase change recording . . . . . . . . . 64--71
          L. Richard Carley and   
          Gregory R. Ganger and   
                 David F. Nagle   MEMS-based integrated-circuit
                                  mass-storage systems . . . . . . . . . . 72--80
                   Ming Fan and   
              Jan Stallaert and   
             Andrew B. Whinston   The Internet and the future of financial
                                  markets  . . . . . . . . . . . . . . . . 82--88
               Philip Ginzboorg   Seven comments on charging and billing   89--92
                 Ziming Liu and   
                 David G. Stork   Is paperless really more?  . . . . . . . 94--97
             Amit Bhatnagar and   
               Sanjog Misra and   
                  H. Raghav Rao   On risk, convenience, and Internet
                                  shopping behavior  . . . . . . . . . . . 98--105
                       Ned Kock   Benefits for virtual organizations from
                                  distributed groups . . . . . . . . . . . 107--112
             Robert P. Ward and   
             Mauri Laitinen and   
               Mohamed E. Fayad   Thinking objectively: management in the
                                  small  . . . . . . . . . . . . . . . . . 113--116
                      Anonymous   Career opportunities . . . . . . . . . . 117--168
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 169--174
                Rebecca Mercuri   Inside risks: voting automation (early
                                  and often?)  . . . . . . . . . . . . . . 176--176

Communications of the ACM
Volume 43, Number 11es, November, 2000

                 Diane Crawford   Editorial  . . . . . . . . . . . . . . . 
               Ritu Agarwal and   
              Jayesh Prasad and   
              Mohan Tanniru and   
                     John Lynch   Risks of rapid application development   
                  Zafar Ali and   
                   Arif Ghafoor   Synchronized delivery of multimedia
                                  information over ATM networks  . . . . . 
              Elisa Bertino and   
               Elena Pagani and   
           Gian Paolo Rossi and   
            Pierangela Samarati   Protecting information on the Web  . . . 
           Joseph Blackburn and   
               Gary Scudder and   
          Luk N. Van Wassenhove   Concurrent software development  . . . . 
          Susanne Bòdker   Coordinating technical support platforms 
                Manhoi Choy and   
              Hong Va Leong and   
                   Man Hon Wong   Disaster recovery techniques for
                                  database systems . . . . . . . . . . . . 
            Deborah A. Dahl and   
            Lewis M. Norton and   
                   K. W. Scholz   Commercialization of natural language
                                  processing technology  . . . . . . . . . 
           David E. Douglas and   
              Bill C. Hardgrave   Object-oriented curricula in academic
                                  programs . . . . . . . . . . . . . . . . 
                Ajit Kambil and   
               Arnold Kamis and   
            Marios Koufaris and   
                 Henry C. Lucas   Influences on the corporate adoption of
                                  Web technology . . . . . . . . . . . . . 
                 D. W. Loveland   Automated deduction: achievements and
                                  future directions  . . . . . . . . . . . 
          Daniel E. O'Leary and   
                Peter Selfridge   Knowledge management for best practices  
                Derek Partridge   Non-programmed computation . . . . . . . 
              Arik Ragowsky and   
                 Niv Ahituv and   
                   Seev Neumann   The benefits of using information
                                  systems  . . . . . . . . . . . . . . . . 
                Louis Scott and   
            Levente Horvath and   
                     Donald Day   Characterizing case constraints  . . . . 
          Vijayan Sugumaran and   
              Mohan Tanniru and   
                 Veda C. Storey   Supporting reuse in systems analysis . . 

Communications of the ACM
Volume 43, Number 12, December, 2000

                 Diane Crawford   Editorial  . . . . . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Cut kids computer time;
                                  Computers killed the radio; 3D
                                  Orthodonture; Denial of isolation;
                                  You've got Braille; All's fare; Sidebar:
                                  Connecting the dots  . . . . . . . . . . 9--10
             Diane Crawford and   
            David Davenport and   
          Michael P. Conlon and   
            Wallace Koehler and   
              Henry Gladney and   
            Andrew W. Appel and   
           Edward W. Felten and   
               Mark Wallace and   
               Fred Ballard and   
                 Rich Morin and   
                    Steve Green   Forum: Software Piracy Is Not Just
                                  Economics Anymore; Need Stronger
                                  Argument for Access Control; Most
                                  Enlightening Ever  . . . . . . . . . . . 11--13
             Elliot Soloway and   
            Cathleen Norris and   
         Phyllis Blumenfeld and   
                   Ron Marx and   
                Joe Krajcik and   
                  Barry Fishman   Log on education: the three Ts of
                                  elementary education . . . . . . . . . . 15--19
                   Roy Rada and   
                   John Craparo   Sharing standards: standardizing
                                  software projects  . . . . . . . . . . . 21--25
                   Boaz Gelbord   Viewpoint: signing your 011001010  . . . 27--28
              Andrew Rosenbloom   Trusting technology  . . . . . . . . . . 31--32
             Batya Friedman and   
              Peter H. Khan and   
                 Daniel C. Howe   Trust online . . . . . . . . . . . . . . 34--40
            Judith S. Olson and   
                  Gary M. Olson   i2i trust in e-commerce  . . . . . . . . 41--44
               Paul Resnick and   
                Ko Kuwabara and   
         Richard Zeckhauser and   
                  Eric Friedman   Reputation systems . . . . . . . . . . . 45--48
            Justine Cassell and   
               Timothy Bickmore   External manifestations of
                                  trustworthiness in the interface . . . . 50--56
                Ben Shneiderman   Designing trust into online experiences  57--59
                Eric M. Uslaner   Social capital and the net . . . . . . . 60--64
             Jennifer Kreie and   
            Timothy Paul Cronan   Making ethical decisions . . . . . . . . 66--71
             Detlef Schoder and   
                   Pai-Ling Yin   Building firm trust online . . . . . . . 73--79
                 Sara Jones and   
              Marc Wilikens and   
              Philip Morris and   
                 Marcelo Masera   Trust requirements in e-business . . . . 81--87
              Trevor Moores and   
               Gurpreet Dhillon   Software piracy: a view from Hong Kong   88--93
              Masud Ahmad Malik   Technical opinion: On the perils of
                                  programming  . . . . . . . . . . . . . . 95--97
                 Bruce Schneier   Inside risks: semantic network attacks   168--168


Communications of the ACM
Volume 44, Number 1, January, 2001

                 Diane Crawford   Editorial  . . . . . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Code-breaking software
                                  officially illegal; Clogging sky
                                  channels; Info-tech giant Japan; Global
                                  dot-cons; Salmon sensoring; Boots made
                                  for walking; Sidebar: Top 10 Fastest
                                  Growing, High-Tech Metro Areas in the
                                  U.S. . . . . . . . . . . . . . . . . . . 9--10
                Robert L. Glass   Practical programmer: an embarrassing,
                                  yet rewarding, ending to a previous
                                  column . . . . . . . . . . . . . . . . . 11--11
              Phillip G. Armour   The business of software: the laws of
                                  software process . . . . . . . . . . . . 15--15
                    Lenny Foner   Viewpoint: fixing a flawed domain name
                                  system . . . . . . . . . . . . . . . . . 19--19
        Åke Grönlund   Democracy in an IT-framed society:
                                  introduction . . . . . . . . . . . . . . 22--22
          Richard T. Watson and   
                    Bryan Mundy   A strategic perspective of electronic
                                  democracy  . . . . . . . . . . . . . . . 27--27
          Ari-Veikko Anttiroiko   Toward the European information society  31--31
           Per-Olof Ågren   Is online democracy in the EU for
                                  professionals only?  . . . . . . . . . . 36--36
                     Ted Becker   Rating the impact of new technologies on
                                  democracy  . . . . . . . . . . . . . . . 39--39
                 Ignace Snellen   ICTs, bureaucracies, and the future of
                                  democracy  . . . . . . . . . . . . . . . 45--45
      Joachim Åström   Should democracy online be quick,
                                  strong, or thin? . . . . . . . . . . . . 49--49
                   Doug Schuler   Computer professionals and the next
                                  culture of democracy . . . . . . . . . . 52--52
             John A. Taylor and   
                   Eleanor Burt   Not-for-profits in the democratic polity 58--58
           Todd M. La Porte and   
           Chris C. Demchak and   
                Christian Friis   Webbing governance: global trends across
                                  national-level public agencies . . . . . 63--63
           Lance J. Hoffman and   
                  Lorrie Cranor   Internet voting for public officials:
                                  introduction . . . . . . . . . . . . . . 69--69
                  Joe Mohen and   
                  Julia Glidden   The case for Internet voting . . . . . . 72--72
        Deborah M. Phillips and   
          Hans A. von Spakovsky   Gauging the risks of Internet elections  73--73
                    Gordon Bell   A personal digital store . . . . . . . . 86--86
                 Thomas M. Chen   Increasing the observability of Internet
                                  behavior . . . . . . . . . . . . . . . . 93--93
          Abhijit Chaudhury and   
           Debasish Mallick and   
                  H. Raghav Rao   Web channels in e-commerce . . . . . . . 99--99
             Simon N. Foley and   
                 Robert Dumigan   Are handheld viruses a significant
                                  threat?  . . . . . . . . . . . . . . . . 105--105
         Rebecca T. Mercuri and   
               Peter G. Neumann   Inside risks: system integrity revisited 160--160

Communications of the ACM
Volume 44, Number 2, February, 2001

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Crash-free consortium; Pooh
                                  Corner; Bedside matters; Silver lining;
                                  No home work; Ear shot; Quick Picks  . . 9--10
             Diane Crawford and   
                 Mick Zraly and   
                Hal Berghel and   
                   Ken Pugh and   
                Mat H. West and   
             Conrad Weisert and   
             Terry Steyaert and   
                Richard Johnson   Forum: How Can the Web Advance Western
                                  Democracies? Who Needs Digital
                                  Signatures; Misinformation and the
                                  Emulex Hoax; OOSCD Not Really So
                                  Unified; Go Back to Non-OOSD . . . . . . 11--13
               Peter J. Denning   The profession of IT: who are we?  . . . 15--19
                   Meg McGinity   Staying connected: name is the game  . . 21--23
             Steven Bellman and   
            Eric J. Johnson and   
                Gerald L. Lohse   On site: opt-in or opt-out?: it depends
                                  on the question  . . . . . . . . . . . . 25--27
               Imran Bashir and   
            Enrico Serafini and   
                     Kevin Wall   Securing network software applications:
                                  introduction . . . . . . . . . . . . . . 28--30
                 John Viega and   
            Tadayoshi Kohno and   
                   Bruce Potter   Trust (and mistrust) in secure
                                  applications . . . . . . . . . . . . . . 31--36
          James B. D. Joshi and   
              Walid G. Aref and   
               Arif Ghafoor and   
             Eugene H. Spafford   Security models for Web-based
                                  applications . . . . . . . . . . . . . . 38--44
           Richard M. Smith and   
           Michael Brittain and   
                 Ivan Fetch and   
                  Hailin Wu and   
                David M. Martin   The privacy practices of Web browser
                                  extensions . . . . . . . . . . . . . . . 45--50
              Anup K. Ghosh and   
             Tara M. Swaminatha   Software security and privacy risks in
                                  mobile e-commerce  . . . . . . . . . . . 51--57
               Chris Dalton and   
                 Tse Huong Choo   An operating system approach to securing
                                  e-services . . . . . . . . . . . . . . . 58--64
               Pamela Samuelson   Intellectual property for an information
                                  age: introduction  . . . . . . . . . . . 66--68
                    Dan L. Burk   Copyrightable functions and patentable
                                  speech . . . . . . . . . . . . . . . . . 69--75
                  Randall Davis   The digital dilemma  . . . . . . . . . . 77--83
                 Yochai Benkler   The battle over the institutional
                                  ecosystem in the digital environment . . 84--90
            A. Michael Froomkin   The collision of trademarks, domain
                                  names, and due process in cyberspace . . 91--97
            Maureen A. O'Rourke   Is virtual trespass an apt analogy?  . . 98--103
               Peter G. Neumann   Inside risks: what to know about . . . . 136--136

Communications of the ACM
Volume 44, Number 3, March, 2001

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: The Future of the Tech
                                  Workplace and From the Desk of Rage and
                                  Smarty Pants and Toddlers and Computers
                                  Don't Mix and Dot-Com Graveyard and
                                  Monkeying Around and Mating Call . . . . 9--10
              Phillip G. Armour   The Business of Software: Software as
                                  Currency . . . . . . . . . . . . . . . . 13--14
                    Hal Berghel   Digital Village: A Cyberpublishing
                                  Manifesto  . . . . . . . . . . . . . . . 17--20
                Gordon Bell and   
                       Jim Gray   Digital immortality  . . . . . . . . . . 28--30
                Rita R. Colwell   Closing the circle of information
                                  technology . . . . . . . . . . . . . . . 31--34
               Norman I. Badler   Virtual beings . . . . . . . . . . . . . 33--35
               Donald A. Norman   Cyborgs  . . . . . . . . . . . . . . . . 36--37
                    Ramesh Jain   Digital experience . . . . . . . . . . . 38--40
                Joseph Jacobson   The desktop fab  . . . . . . . . . . . . 41--43
                   Dan Bricklin   Look to the past to envision the future  44--44
                     Ted Selker   Affecting humanity . . . . . . . . . . . 45--45
                 Leon Kappelman   The future is ours . . . . . . . . . . . 46--47
                V. Michael Bove   Astronauts and mosquitoes  . . . . . . . 48--49
                Andries van Dam   User interfaces: disappearing,
                                  dissolving, and evolving . . . . . . . . 50--52
                 Eric A. Brewer   When everything is searchable  . . . . . 53--54
                  Martin Cooper   Bandwidth and the creation of awareness  55--57
                Thomas A. Horan   The paradox of place . . . . . . . . . . 58--59
                     Ron Vetter   The wireless web . . . . . . . . . . . . 60--61
                   Usama Fayyad   The digital physics of data mining . . . 62--65
                   Jennifer Lai   When computers speak, hear, and
                                  understand . . . . . . . . . . . . . . . 66--67
                      Jim Waldo   When the network is everything . . . . . 68--69
             Steven J. Schwartz   Wearables in 2048  . . . . . . . . . . . 70--71
                  Cameron Miner   Pushing functionality into even smaller
                                  devices  . . . . . . . . . . . . . . . . 72--73
         Christopher R. Johnson   Computational bioimaging for medical
                                  diagnosis and treatment  . . . . . . . . 74--75
                  Jacques Cohen   Computers and biology  . . . . . . . . . 76--79
                Thomas Sterling   Continuum computer architecture for
                                  exaflops computation . . . . . . . . . . 78--80
                  Jon Crowcroft   Never lost, never forgotten  . . . . . . 81--81
          Michael J. Muller and   
         Ellen Christiansen and   
               Bonnie Nardi and   
                     Susan Dray   Spiritual life and information
                                  technology . . . . . . . . . . . . . . . 82--83
               Whitfield Diffie   Ultimate cryptography  . . . . . . . . . 84--86
                   Ray Kurzweil   Promise and peril-the deeply intertwined
                                  poles of 21st century technology . . . . 88--91
             Edsger W. Dijkstra   The end of computing science?  . . . . . 92--92
                  Hal R. Varian   The computer-mediated economy  . . . . . 93--93
             Robert X. Cringely   Be absolute for death: life after
                                  Moore's law  . . . . . . . . . . . . . . 94--94
                 Brock N. Meeks   Accountability through transparency:
                                  life in 2050 . . . . . . . . . . . . . . 96--97
               Pamela Samuelson   Toward a new politics of intellectual
                                  property . . . . . . . . . . . . . . . . 98--99
             Dennis Tsichritzis   Forget the past to win the future  . . . 100--101
                  Andrew Grosso   The demise of sovereignty  . . . . . . . 102--103
        Anthony M. Townsend and   
               James T. Bennett   Electronic empire  . . . . . . . . . . . 104--105
                   Ari Schwartz   A larger role in the public policy
                                  process for user control . . . . . . . . 106--107
               Karen Holtzblatt   Inventing the future . . . . . . . . . . 108--110
               Richard Stallman   Can freedom withstand e-books? . . . . . 111--111
               Peter J. Denning   Many zeros ahead . . . . . . . . . . . . 112--112
                 Bruce Schneier   Insurance and the computer industry  . . 114--115
                    Kilnam Chon   The future of the Internet digital
                                  divide . . . . . . . . . . . . . . . . . 116--117
                    Grady Booch   Developing the future  . . . . . . . . . 118--121
            Henry Lieberman and   
                Christopher Fry   Will software ever work? . . . . . . . . 122--124
             Mark Gorenberg and   
                    Ann Winblad   A just-in-time software-based world  . . 125--125
           Larry L. Constantine   Back to the future . . . . . . . . . . . 126--126
                 Cherri Pancake   The ubiquitous beauty of user-aware
                                  software . . . . . . . . . . . . . . . . 130--130
             Steven M. Bellovin   Computer security --- an end state?  . . 131--132
                   Doug Riecken   A commonsense opportunity for computing  133--133
                   Ravi Ganesan   Keep (over) reaching for the stars . . . 134--135
                     John Glenn   Education is the key to future dreams    136--138
                     Anita Borg   Universal literacy --- a challenge for
                                  computing in the 21st Century  . . . . . 139--141
                Roger C. Schank   The computer isn't the medium, it's the
                                  message  . . . . . . . . . . . . . . . . 142--143
                Mitchel Resnick   Closing the fluency gap  . . . . . . . . 144--145
           Peter G. Neumann and   
                David L. Parnas   Inside risks: Computers: Boon or Bane?   168--168

Communications of the ACM
Volume 44, Number 4, April, 2001

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: ICANN's Domain Name
                                  Experiment; Paper Voting Prevails;
                                  Printed-On Battery Power; Campus Net
                                  Access Rethought; Who Let The Robots
                                  Out?; U.S. Patent Lead; Taste The Web;
                                  Have Virus, Will Work For Mayor  . . . . 9--10
             Diane Crawford and   
              Thomas Tiahrt and   
               Moti Ben-Ari and   
                  Matt West and   
      Hans A. von Spakovsky and   
               Deborah Phillips   Forum: Participatory Vs. Representative
                                  Democracy; Why Store Everything?; Emulex
                                  Hoax; Correction . . . . . . . . . . . . 13--15
                Robert L. Glass   Practical programmer: academics, and the
                                  scarlet letter ``A'' . . . . . . . . . . 17--18
               Peter J. Denning   The profession of IT: crossing the chasm 21--25
                  David Lanning   Viewpoint: on bias, science, equal
                                  protection, and liability  . . . . . . . 27--29
                 Sahin Albayrak   Agent-oriented technology for
                                  telecommunications: introduction . . . . 30--33
           Nicholas R. Jennings   An agent-based approach for building
                                  complex software systems . . . . . . . . 35--41
              Stefan Fricke and   
             Karsten Bsufka and   
                 Jan Keiser and   
              Torge Schmidt and   
              Ralf Sesseler and   
                 Sahin Albayrak   Agent-based telematic services and
                                  telecom applications . . . . . . . . . . 43--48
          Munindar P. Singh and   
                     Bin Yu and   
          Mahadevan Venkatraman   Community-based service location . . . . 49--54
             Marcus Brunner and   
          Bernhard Plattner and   
                   Rolf Stadler   Service creation and management in
                                  active telecom networks  . . . . . . . . 55--61
           Francisco Valera and   
Jorge E. López de Vergara and   
      José I. Moreno and   
Víctor A. Villagrá and   
                 Julio Berrocal   Communication management experiences in
                                  e-commerce . . . . . . . . . . . . . . . 63--69
             Mike P. Papazoglou   Agent-oriented technology in support of
                                  e-business . . . . . . . . . . . . . . . 71--77
               Varun Grover and   
               James T. C. Teng   E-commerce and the information market    79--86
                  Mark Keil and   
                   Daniel Robey   Blowing the whistle on troubled software
                                  projects . . . . . . . . . . . . . . . . 87--93
            Tanya L. Cheyne and   
                Frank E. Ritter   Targeting audiences on the Internet  . . 94--98
                  G. Kappel and   
           S. Rausch-Schott and   
          W. Retschitzegger and   
                    M. Sakkinen   Bottom-up design of active
                                  object-oriented databases  . . . . . . . 99--104
             Robert P. Ward and   
           Mohamed E. Fayad and   
                 Mauri Laitinen   Thinking objectively: software process
                                  improvement in the small . . . . . . . . 105--107
                 Diane Crawford   Career opportunities . . . . . . . . . . 109--124
                 Diane Crowford   Calendar of events . . . . . . . . . . . 125--125
                 Bruce Schneier   Inside risks: cyber underwriters lab . . 128--128

Communications of the ACM
Volume 44, Number 5, May, 2001

                 Diane Crawford   Editorial  . . . . . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Euro Net Access Exceeds
                                  U.S.; In-Dash MP3; Poll on the Future;
                                  Beam of Pain; Laundry Made Easier;
                                  Detecting Schizophrenia; Internet
                                  Earthquake Warnings; Patron Net Saint    9--10
             Diane Crawford and   
            John F. Dalphin and   
                  Andy Oram and   
              Louis A. Russ and   
                  Peter Denning   Forum: Evolving commitment to the
                                  profession of computer science . . . . . 11--12
                     Neil Munro   From Washington: The unhappy but
                                  beneficial coexistence of the FBI and
                                  the tech elite . . . . . . . . . . . . . 15--18
                    Hal Berghel   Digital Village: Caustic cookies . . . . 19--22
                    Alan Howard   On site: Software engineering project
                                  management . . . . . . . . . . . . . . . 23--24
               Krzysztof R. Apt   Viewpoint: One more revolution to make:
                                  free scientific publishing . . . . . . . 25--28
              Edward A. Fox and   
               Gary Marchionini   Digital libraries: Introduction  . . . . 30--32
              Gregory Crane and   
           Robert F. Chavez and   
               Anne Mahoney and   
          Thomas L. Milbank and   
     Jeffrey A. Rydberg-Cox and   
             David A. Smith and   
            Clifford E. Wulfman   Drudgery and deep thought  . . . . . . . 34--40
           Craig Nevill-Manning   The biological digital library . . . . . 41--42
                 Alan S. Inouye   A digital strategy for the library of
                                  congress . . . . . . . . . . . . . . . . 43--43
                     Paul Jones   Open (source)ing the doors for
                                  contributor-run digital libraries  . . . 45--46
              Ian H. Witten and   
           David Bainbridge and   
                  Stefan Boddie   Greenstone: Open-source DL software  . . 47--47
            Alexa T. McCray and   
             Marie E. Gallagher   Principles for digital library
                                  development  . . . . . . . . . . . . . . 48--54
      Catherine C. Marshall and   
          Gene Golovchinsky and   
                Morgan N. Price   Digital libraries and mobility . . . . . 55--56
           Michael S. Brown and   
            W. Brent Seales and   
            Stephen B. Webb and   
          Christopher O. Jaynes   Building large-format displays for
                                  digital libraries  . . . . . . . . . . . 57--59
          Michael L. Nelson and   
                      Kurt Maly   Buckets: smart objects for digital
                                  libraries  . . . . . . . . . . . . . . . 60--62
              H. M. Gladney and   
                   Arthur Cantu   Authorization management for digital
                                  libraries  . . . . . . . . . . . . . . . 63--65
           Christine L. Borgman   Where is the librarian in the digital
                                  library? . . . . . . . . . . . . . . . . 66--68
                William Y. Arms   Uniform resource names: handles, PURLs,
                                  and digital object identifiers . . . . . 68--68
                 Helen R. Tibbo   Archival perspectives on the emerging
                                  digital library  . . . . . . . . . . . . 69--70
                 Erik Duval and   
                 Eddy Forte and   
            Kris Cardinaels and   
             Bart Verhoeven and   
            Rafael Van Durm and   
              Koen Hendrikx and   
       Maria Wentland Forte and   
               Norbert Ebel and   
            Maciej Macowicz and   
             Ken Warkentyne and   
                Florence Haenni   The Ariadne knowledge pool system  . . . 72--78
             David McArthur and   
              Sarah Giersch and   
                Bill Graves and   
            Charles R. Ward and   
           Richard Dillaman and   
             Russell Herman and   
               Gabriel Lugo and   
               James Reeves and   
                 Ron Vetter and   
               Deborah Knox and   
                     Scott Owen   Toward a sharable digital library of
                                  reusable teaching resources  . . . . . . 79--79
               Mary Marlino and   
              Tamara Sumner and   
               David Fulker and   
            Cathryn Manduca and   
                     David Mogk   The digital library for Earth system
                                  education: building community, building
                                  the library  . . . . . . . . . . . . . . 80--81
              Ian H. Witten and   
               Michel Loots and   
          Maria F. Trujillo and   
               David Bainbridge   The promise of digital libraries in
                                  developing countries . . . . . . . . . . 82--85
                     Lee L. Zia   The NSF national science, mathematics,
                                  engineering, and technology education
                                  digital library program  . . . . . . . . 83--83
              Mark Apperley and   
        Sally Jo Cunningham and   
             Te Taka Keegan and   
                  Ian H. Witten   NIUPEPA: a historical newspaper
                                  collection . . . . . . . . . . . . . . . 86--87
             Shalini R. Urs and   
                 K. S. Raghavan   Vidyanidhi: Indian digital library of
                                  electronic theses  . . . . . . . . . . . 88--89
                   Bernard Rous   The ACM digital library  . . . . . . . . 90--91
                Greg Baster and   
           Prabhudev Konana and   
                  Judy E. Scott   Business components: a case study of
                                  Bankers Trust Australia Limited  . . . . 92--98
                Mark Astley and   
             Daniel Sturman and   
                       Gul Agha   Customizable middleware for modular
                                  distributed software . . . . . . . . . . 99--107
              J. McGrath Cohoon   Toward improving female retention in the
                                  computer science major . . . . . . . . . 108--114
               Lauren Weinstein   Inside risks: be seeing you! . . . . . . 128--128

Communications of the ACM
Volume 44, Number 6, June, 2001

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Security Stats; Robotic
                                  Insect; Disposable Phones; Scientific
                                  Oath; Simulating Dripped Drops; An
                                  Aviation First; Coffee-Cam to Go Black   9--10
             Diane Crawford and   
              Ilya Yakovlev and   
             Yochai Benkler and   
              Paul McKenney and   
                 Donn B. Parker   Forum: More than One Way to Product
                                  Quality Information; Hope for
                                  Educational Sea Change; A Consistent
                                  Definition of Information Security . . . 11--14
             Elliot Soloway and   
            Cathleen Norris and   
         Phyllis Blumenfeld and   
              Barry Fishman and   
             Joseph Krajcik and   
                       Ron Marx   Log on education: Handheld devices are
                                  ready-at-hand  . . . . . . . . . . . . . 15--20
         Seymour E. Goodman and   
         James B. Gottstein and   
               Diane S. Goodman   International perspectives: Wiring the
                                  wilderness in Alaska and the Yukon . . . 21--26
                  Paul de Palma   Viewpoint: Why women avoid computer
                                  science  . . . . . . . . . . . . . . . . 27--30
                Rajiv Dewan and   
               Abraham Seidmann   Current issues in e-banking:
                                  introduction . . . . . . . . . . . . . . 31--32
           Kemal Saatcioglu and   
              Jan Stallaert and   
             Andrew B. Whinston   Design of a financial portal . . . . . . 33--38
             Yoram (Jerry) Wind   The challenge of ``customerization'' in
                                  financial services . . . . . . . . . . . 39--44
              Kermal Altinkemer   Bundling e-banking services  . . . . . . 45--47
                     Niv Ahituv   The open information society . . . . . . 48--52
     Christopher P. Holland and   
               John B. Westwood   Product-market and technology strategies
                                  in banking . . . . . . . . . . . . . . . 53--57
                  Kuldeep Kumar   Technology for supporting supply chain
                                  management: introduction . . . . . . . . 58--61
               Steve John Simon   The art of military logistics  . . . . . 62--66
                 Bill Welty and   
         Irma Becerra-Fernandez   Managing trust and commitment in
                                  collaborative supply chain relationships 67--73
      Jos van Hillegersberg and   
               Rob Zuidwijk and   
               Jo van Nunen and   
                 Diane van Eijk   Supporting return flows in the supply
                                  chain  . . . . . . . . . . . . . . . . . 74--79
        Girish Ramachandran and   
                  Sanjay Tiwari   Challenges in the air cargo supply chain 80--82
                    R. Krishnan   Technology in the Indian retail supply
                                  chain  . . . . . . . . . . . . . . . . . 83--87
               David Schuff and   
               Robert St. Louis   Centralization vs. decentralization of
                                  application software . . . . . . . . . . 88--94
                 Gary Klein and   
             James J. Jiang and   
                Marion G. Sobol   A new view of IS personnel performance
                                  evaluation . . . . . . . . . . . . . . . 95--102
              Terry Shepard and   
              Margaret Lamb and   
                    Diane Kelly   More testing should be taught  . . . . . 103--108
              Michael McCormick   Technical opinion: Programming extremism 109--119
              Richard Forno and   
              William Feinbloom   Inside risks: PKI: a question of trust
                                  and value  . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 44, Number 7, July, 2001

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Net Population's Newest
                                  Numbers; Brush-on Smart Paint; Losses in
                                  the Face of Piracy; Losses in the Name
                                  of Quality; Hear the Earth's Patter;
                                  Radio Frequency Fries Electronics;
                                  Click, Drag, Plagiarize, Gotcha; Web as
                                  Close as Your Wrist  . . . . . . . . . . 9--9
             Diane Crawford and   
         Richard G. Canning and   
                 Todd Hodes and   
                  Bill Leal and   
                George Nagy and   
                Alan Knight and   
                  G. Kappel and   
           S. Rausch-Schott and   
          W. Retschitzegger and   
                M. Sakkinen and   
               Luke Hohmann and   
                    Nils Jensen   Forum: Reviewer Bias vs. Review
                                  Validity; Millennium Reflections;
                                  Unfashionable Smalltalk; Don't Forget
                                  Existing Customers; The ``Character'' of
                                  Software . . . . . . . . . . . . . . . . 11--13
                     John White   ACM Opens portal . . . . . . . . . . . . 14--16, 28
                  Andrew Grosso   Legally speaking: the individual in the
                                  new age  . . . . . . . . . . . . . . . . 17--17
              Phillip G. Armour   The business of software: Matching
                                  process to types of teams  . . . . . . . 21--21
        Quentin Stafford-Fraser   On site: The life and times of the first
                                  Web Cam  . . . . . . . . . . . . . . . . 25--25
               Scott Hazelhurst   Viewpoint: Developing IT skills
                                  internationally: who's developing whom?  27--27
               David Arnold and   
                 Fred Niederman   The global IT work force: introduction   30--30
           Lawrence A. West and   
              Walter A. Bogumil   Immigration and the global IT work force 34--34
                 Phalguni Gupta   Growth scenario of IT industries in
                                  India  . . . . . . . . . . . . . . . . . 40--40
                   Keith Mander   The decline and fall of the American
                                  programmer . . . . . . . . . . . . . . . 43--43
          Liisa von Hellens and   
                    Sue Nielsen   Australian women in IT . . . . . . . . . 46--46
               Philip J. Sallis   Some thoughts on IT employment in New
                                  Zealand  . . . . . . . . . . . . . . . . 53--53
                 Diane Crawford   ACM general elections  . . . . . . . . . 54--54
                 Linda Marshall   A perspective on the IT industry in
                                  South Africa . . . . . . . . . . . . . . 55--55
               Ritu Agarwal and   
              Thomas W. Ferratt   Crafting an HR strategy to meet the need
                                  for IT workers . . . . . . . . . . . . . 58--58
                   Kam-Fai Wong   Labor shortfall in Hong Kong's IT
                                  industry . . . . . . . . . . . . . . . . 65--65
                    Maria Klawe   Refreshing the nerds . . . . . . . . . . 67--67
             Jo Ellen Moore and   
             Susan E. Yager and   
                Mary Sumner and   
                  Galen B. Crow   Facilitating career changes into IT  . . 70--70
               Eileen M. Trauth   Mapping information-sector work to the
                                  work force . . . . . . . . . . . . . . . 74--74
                      Wang Shan   The IT work force in China . . . . . . . 76--76
          Uladzimir Anishchanko   The IT staffing situation in Belarus . . 77--77
              Steve Benford and   
           Chris Greenhalgh and   
                 Tom Rodden and   
                   James Pycock   Collaborative virtual environments . . . 79--79
                 Karim K. Hirji   Exploring data mining implementation . . 87--87
                 Vincent S. Lai   Intraorganizational communication with
                                  intranets  . . . . . . . . . . . . . . . 95--95
                    Jim Horning   Inside risks: Learning from experience   112--112

Communications of the ACM
Volume 44, Number 8, August, 2001

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Sensing Global Vibrations;
                                  The Big Four Online; Gender Gap
                                  Perceptions; Portion of the World
                                  Offline; Cat \ldots and Mouse; 20
                                  Gigahertz Chip 3 Atoms Thick; Apple
                                  Motto Exorcised  . . . . . . . . . . . . 9--10
             Diane Crawford and   
                Richar Hill and   
           George Ellingham and   
        Lawrence C. Paulson and   
              Adriano Comai and   
           Bill Brykczynski and   
               Saul I. Gass and   
           Ferdinand Wagner and   
             Peter Wolstenholme   Forum: The ICANN Framework Better Than
                                  Going to Court; Drop the Adjective
                                  [Digital Library]; Keep E-Journals
                                  Affordable; Needs and Adoption of
                                  Process; Give Security Accreditation a
                                  Chance; Keeping Out Cookies; The Joy of
                                  Coding . . . . . . . . . . . . . . . . . 11--13
                    Hal Berghel   Digital: The Y2K e-commerce tumble . . . 15--15
               Peter J. Denning   The profession of IT: The IT schools
                                  movement . . . . . . . . . . . . . . . . 19--19
             David S. Touretzky   Viewpoint: Free speech rights for
                                  programmers  . . . . . . . . . . . . . . 23--23
               Eric M. Freedman   Viewpoint: Pondering pixelized pixies    27--27
              Nahum Gershon and   
                      Ward Page   What storytelling can do for information
                                  visualization  . . . . . . . . . . . . . 31--31
                 Daniel A. Keim   Visual exploration of large data sets    38--38
                Stephen G. Eick   Visualizing online activity  . . . . . . 45--45
               Fred Mintzer and   
        Gordon W. Braudaway and   
        Francis P. Giordano and   
                Jack C. Lee and   
         Karen A. Magerlein and   
            Silvana D'Auria and   
                Amnon Ribak and   
                 Gil Shapir and   
        Fabio Schiattarella and   
                 John Tolva and   
                Andrey Zelenkov   Populating the Hermitage Museum's new
                                  Web site . . . . . . . . . . . . . . . . 52--52
           Calvin K. M. Lam and   
              Bernard C. Y. Tan   The Internet is changing the music
                                  industry . . . . . . . . . . . . . . . . 62--62
            Henry Lieberman and   
            Christopher Fry and   
                 Louis Weitzman   Exploring the Web with reconnaissance
                                  agents . . . . . . . . . . . . . . . . . 69--69
                    Nong Ye and   
            Joseph Giordano and   
                   John Feldman   A process control approach to cyber
                                  attack detection . . . . . . . . . . . . 76--76
              John Benamati and   
              Albert L. Lederer   Coping with rapid changes in IT  . . . . 83--83
                Albert Levi and   
   Çetin Kaya Koç   Inside risks: Risks in email security    112--112

Communications of the ACM
Volume 44, Number 9, September, 2001

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Telecommuting Loses Appeal;
                                  Privacy Issue for DNA Database; No
                                  Copying, No Warning; Big `Boss' Is
                                  Watching; Men Outperform Women in
                                  Virtual World; Cell Phone Radio Waves
                                  Made Public; The Mystery of the Sucking
                                  Shower Curtain . . . . . . . . . . . . . 9--10
             Diane Crawford and   
                 Oleg Dulin and   
               David Arnold and   
             Fred Niederman and   
             Ralpha Castain and   
                    Bill Rivera   Forum: How to Address the Global IT
                                  Worker Shortage; Proposals for
                                  Attracting Women Back into IT  . . . . . 11--11
                Robert L. Glass   Practical programmer: of model
                                  changeovers, style, and fatware  . . . . 17--20
                   Meg McGinity   Staying connected: suit yourself . . . . 21--24
               Jane C. Ginsberg   Viewpoint: what to know before reissuing
                                  old titles as e-books  . . . . . . . . . 25--25
   Nikolaos A. Mylonopoulos and   
            Vasilis Theoharakis   On site: global perceptions of IS
                                  journals . . . . . . . . . . . . . . . . 29--33
                    Vinton Cerf   Beyond the post-PC Internet  . . . . . . 34--37
                   Adrian Hooke   The interplanetary Internet  . . . . . . 38--40
              Leonard Kleinrock   Breaking loose . . . . . . . . . . . . . 41--46
        José A. Corrales   An Asturian view of networking 2015  . . 47--54
             Lada A. Adamic and   
           Bernardo A. Huberman   The Web's hidden order . . . . . . . . . 55--60
                    Mark Weiser   Whatever happened to the next-generation
                                  Internet?  . . . . . . . . . . . . . . . 61--69
         Lawrence A. Gordon and   
                 Martin P. Loeb   Using information security as a response
                                  to competitor analysis systems . . . . . 70--75
           Alvin T. S. Chan and   
               Jiannong Cao and   
                 Henry Chan and   
                  Gilbert Young   A Web-enabled framework for smart card
                                  applications in health services  . . . . 76--82
              Glenn B. Bell and   
                     Anil Sethi   Matching records in a national medical
                                  patient index  . . . . . . . . . . . . . 83--88
                   Terry Huston   Security issues for implementation of
                                  e-medical records  . . . . . . . . . . . 89--94
          Mohammed E. Fayad and   
                    Adam Altman   Thinking objectively: an introduction to
                                  software stability . . . . . . . . . . . 95--95
                   Emil Sit and   
                       Kevin Fu   Inside Risks: Web cookies: not just a
                                  privacy risk . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 44, Number 10, October, 2001

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: ACM Files Declaration;
                                  Taking a Bite Out of Shark Attacks;
                                  China Web Growth; Photomapping
                                  Technology; Simulating Mercury's Wobble;
                                  Cell Phone Impact on Wildlife; Wile E.
                                  Coyote Doesn't Stand a Chance  . . . . . 9--10
             Diane Crawford and   
               Ted Mihalsin and   
            William Bogstad and   
                Daniel Kiem and   
            J. William Cupp and   
                  Sandy Ressler   Forum: How Big is ``Big'' When it Comes
                                  to Data Sets? Similar Figures for Women
                                  Math Majors; Commendation  . . . . . . . 11--12
                 Phillip Armour   The business of software: Zeppelins and
                                  jet planes: a metaphor for modern
                                  software projects  . . . . . . . . . . . 13--15
                     Neil Munro   From Washington: considering the
                                  broadband debate . . . . . . . . . . . . 17--19
                   Keith Devlin   Viewpoint: the real reason why software
                                  engineers need math  . . . . . . . . . . 21--22
                 Barbara Simons   Viewpoint: the ACM declaration in Felten
                                  v. RIAA  . . . . . . . . . . . . . . . . 23--26
               Tzilla Elrad and   
           Robert E. Filman and   
                     Atef Bader   Aspect-oriented programming:
                                  Introduction . . . . . . . . . . . . . . 29--32
               Tzilla Elrad and   
              Mehmet Aksits and   
            Gregor Kiczales and   
            Karl Lieberherr and   
                  Harold Ossher   Discussing aspects of AOP  . . . . . . . 33--38
            Karl Lieberherr and   
               Doug Orleans and   
                 Johan Ovlinger   Aspect-oriented programming with
                                  adaptive methods . . . . . . . . . . . . 39--41
              Harold Ossher and   
                      Peri Tarr   Using multidimensional separation of
                                  concerns to (re)shape evolving software  43--50
          Lodewijk Bergmans and   
                  Mehmet Aksits   Composing crosscutting concerns using
                                  composition filters  . . . . . . . . . . 51--57
            Gregor Kiczales and   
              Erik Hilsdale and   
                Jim Hugunin and   
                Mik Kersten and   
               Jeffrey Palm and   
               William Griswold   Getting started with ASPECTJ . . . . . . 59--65
J. Andrés Díaz Pace and   
               Marcelo R. Campo   Analyzing the role of aspects in
                                  software design  . . . . . . . . . . . . 66--73
             Gail C. Murphy and   
           Robert J. Walker and   
      Elisa L. A. Baniassad and   
        Martin P. Robillard and   
                 Albert Lai and   
                 Mik A. Kersten   Does aspect-oriented programming work?   75--77
               Yvonne Coady and   
            Gregor Kiczales and   
                Mike Feeley and   
            Norm Hutchinson and   
                  Joon Suan Ong   Structuring operating system aspects:
                                  using AOP to improve OS structure
                                  modularity . . . . . . . . . . . . . . . 79--82
            Paniti Netinant and   
               Tzilla Elrad and   
               Mohamed E. Fayad   A layered approach to building open
                                  aspect-oriented systems: a framework for
                                  the design of on-demand system
                                  demodularization . . . . . . . . . . . . 83--85
                  Jeff Gray and   
                  Ted Bapty and   
              Sandeep Neema and   
                     James Tuck   Handling crosscutting constraints in
                                  domain-specific modeling . . . . . . . . 87--93
            Gregory T. Sullivan   Aspect-oriented programming using
                                  reflection and metaobject protocols  . . 95--97
             Cherri Pancake and   
             Christian Lengauer   High-performance Java  . . . . . . . . . 98--101
     José E. Moreira and   
          Samuel P. Midkiff and   
               Manish Gupta and   
           Pedro V. Artigas and   
                    Peng Wu and   
                  George Almasi   The NINJA project  . . . . . . . . . . . 102--109
             Thilo Kielmann and   
             Philip Hatcher and   
           Luc Bougé and   
                   Henri E. Bal   Enabling Java for high-performance
                                  computing  . . . . . . . . . . . . . . . 110--117
             Vladimir Getov and   
       Gregor von Laszewski and   
         Michael Philippsen and   
                     Ian Foster   Multiparadigm communications in Java for
                                  grid computing . . . . . . . . . . . . . 118--125
               Henry F. Ledgard   Technical opinion: The emperor with no
                                  clothes  . . . . . . . . . . . . . . . . 126--128
                 Ralph Westfall   Technical opinion: Hello, world
                                  considered harmful . . . . . . . . . . . 129--130
            Stephan Somogyi and   
                 Bruce Schneier   Inside Risks: The perils of port 80  . . 168--168

Communications of the ACM
Volume 44, Number 11, November, 2001

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: NSA's Data Overload Slows
                                  Intelligence; Disaster Plans, Thanks to
                                  Y2K; Simulating the Birth of the Moon;
                                  Looking for a Few Good Hackers; GPS for
                                  Plane Navigation; Free Medical Journal
                                  Access; Music to Live By; Tracking
                                  Employee Trust . . . . . . . . . . . . . 9--10
             Diane Crawford and   
          Scott E. Hamilton and   
            David Touretzky and   
           Raymond Michiels and   
               David Parnas and   
              Peter Denning and   
                     Alan Creak   Forum: Simple Copyright Violation or
                                  Unlawful Circumvention? Outlawing
                                  Numbers Impractical; Defining
                                  Information; Special Needs and Sound
                                  Scholarship  . . . . . . . . . . . . . . 11--15
                 Brock N. Meeks   Electronic Frontier: Blanking on
                                  rebellion: where the future is
                                  ``Nabster''  . . . . . . . . . . . . . . 17--20
           Peter J. Denning and   
                  Robert Dunham   The Profession of IT: The core of the
                                  third-wave professional  . . . . . . . . 21--25
                    Fran Berman   Viewpoint: From TeraGrid to knowledge
                                  grid . . . . . . . . . . . . . . . . . . 27--28
                   Albert Huang   On Site: Innovative use of email for
                                  teaching . . . . . . . . . . . . . . . . 29--32
                  Brad A. Myers   Using handhelds and PCs together . . . . 34--41
                 Ravi Bapna and   
                 Paulo Goes and   
                     Alok Gupta   Insights and analyses of online auctions 42--50
           Michael Ettredge and   
       Vernon J. Richardson and   
                   Susan Scholz   A Web site design model for financial
                                  information  . . . . . . . . . . . . . . 51--56
            Alina M. Chircu and   
         Robert J. Kauffman and   
                    Doug Keskey   Maximizing the value of Internet-based
                                  corporate travel reservation systems . . 57--63
                      John Gray   The end of career  . . . . . . . . . . . 65--69
                    John Backus   Funding the computing revolution's third
                                  wave . . . . . . . . . . . . . . . . . . 70--76
          Nicholas Carriero and   
                David Gelernter   A computational model of everything  . . 77--81
                    Mark Burgin   How we know what technology can do . . . 82--88
                 Henry C. Lucas   Information technology and physical
                                  space  . . . . . . . . . . . . . . . . . 89--96
                   Steve Sawyer   A market-based perspective on
                                  information systems development  . . . . 97--102
           Lauren Weinstein and   
               Peter G. Neumann   Inside Risks: Risks of panic . . . . . . 152--152

Communications of the ACM
Volume 44, Number 12, December, 2001

                 Diane Crawford   Editorial Pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Privacy Tradeoff Fighting
                                  Terrorism; Information Removal;
                                  Military-Issue Handhelds; Haptic
                                  Tug-of-War; Turning Back 10 Billion
                                  (Web) Pages of Time; Brainy Baboons;
                                  Grunt Work . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
            Scott W. Ambler and   
                 John Jaros and   
              Jim Highsmith and   
            Kurt Guntheroth and   
              Eric A. Weiss and   
                 Steven Pothier   Forum: One Sure Thing if Good Clean
                                  Code; Exposing Agency Injustices;
                                  Targeting Software Project Goals; Taking
                                  a Stand on Copyright . . . . . . . . . . 11--13
                    Hal Berghel   Digital Village: The Code Red Worm . . . 15--19
                Roger C. Schank   Log on Education: Revolutionizing the
                                  Traditional Classroom Course . . . . . . 21--24
                    Ka-Ping Yee   On Site: Operating an Emergency
                                  Information Service  . . . . . . . . . . 25--28
                    Jon M. Peha   On Site: The Growing Debate Over Science
                                  and Technology Advice for Congress . . . 29--31
                   Vir V. Phoha   Viewpoint: The DMCA Needs Fixing . . . . 33--34
             Zakaria Maamar and   
                Eric Dorion and   
               Catherine Daigle   Technical Opinion: Toward Virtual
                                  Marketplaces for E-Commerce Support  . . 35--38
            James M. Ragusa and   
              Grace M. Bochenek   Collaborative Virtual Design
                                  Environments: Introduction . . . . . . . 40--43
               Randall C. Smith   Shared Vision  . . . . . . . . . . . . . 45--48
                R. Bowen Loftin   Design Engineering in Virtual
                                  Environments . . . . . . . . . . . . . . 49--50
                   Mark Maybury   Collaborative Virtual Environments for
                                  Analysis and Decision Support  . . . . . 51--54
               Mark Maybury and   
                Ray D'Amore and   
                    David House   Expert Finding for Collaborative Virtual
                                  Environments . . . . . . . . . . . . . . 55--56
                   Simon Su and   
                R. Bowen Loftin   A Shared Virtual Environment for
                                  Exploring and Designing Molecules  . . . 57--58
        Imre Horváth and   
     Zoltán Rusák   Collaborative Shape Conceptualization in
                                  Virtual Design Environments  . . . . . . 59--63
           Cristian Luciano and   
               Pat Banerjee and   
                Sanjay Mehrotra   3$D$ Animation of Telecollaborative
                                  Anthropomorphic Avatars  . . . . . . . . 64--67
             Robert Davison and   
             Gert-Jan De Vreede   Global Applications of Collaborative
                                  Technology: Introduction . . . . . . . . 68--70
           Line Dubé and   
                Guy Paré   Global Virtual Teams . . . . . . . . . . 71--73
                 Sue Newell and   
                Shan L. Pan and   
         Robert D. Galliers and   
                 Jimmy C. Huang   The Myth of the Boundaryless
                                  Organization . . . . . . . . . . . . . . 74--76
        Séamas Kelly and   
                  Matthew Jones   Groupware and the Social Infrastructure
                                  of Communication . . . . . . . . . . . . 77--79
        Gerardine DeSanctis and   
             Matthew Wright and   
                       Lu Jiang   Building a Global Learning Community . . 80--82
             Anne P. Massey and   
        Mitzi Montoya-Weiss and   
                 Caisy Hung and   
                      V. Ramesh   Cultural Perceptions of Task-Technology
                                  Fit  . . . . . . . . . . . . . . . . . . 83--84
              Sajda Qureshi and   
                    Ilze Zigurs   Paradoxes and Prerogatives in Global
                                  Virtual Collaboration  . . . . . . . . . 85--88
               Roberto Evaristo   Nonconsensual Negotiation in Distributed
                                  Collaboration  . . . . . . . . . . . . . 89--89
               Ram D. Gopal and   
             Zhiping Walter and   
             Arvind K. Tripathi   Admediation: New Horizons in Effective
                                  Email Advertising  . . . . . . . . . . . 91--96
             Eric J. Glover and   
             Steve Lawrence and   
          Michael D. Gordon and   
      William P. Birmingham and   
                   C. Lee Giles   Web Search---Your Way  . . . . . . . . . 97--102
               J. Leon Zhao and   
                Vincent H. Resh   Internet Publishing and Transformation
                                  of Knowledge Processes . . . . . . . . . 103--109
           Peter G. Neumann and   
               Lauren Weinstein   Inside Risks: Risks of National Identity
                                  Cards  . . . . . . . . . . . . . . . . . 176--176


Communications of the ACM
Volume 45, Number 1, January, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Working Shadow; Hold That
                                  Thought; Access Advantage; Tuned Out or
                                  In?; Strength in Numbers; Research
                                  Salaries; Bye Big Blues; Sidebar: Hooked
                                  U. . . . . . . . . . . . . . . . . . . . 9--10
              Phillip G. Armour   The business of software: The spiritual
                                  life of projects . . . . . . . . . . . . 11--14
                     Neil Munro   From Washington: Too much of a good
                                  thing  . . . . . . . . . . . . . . . . . 15--17
        Lloyd W. Bartholome and   
                 David H. Olsen   On site: A practical approach for
                                  implementing e-commerce programs in
                                  business schools . . . . . . . . . . . . 19--21
        Anthony M. Townsend and   
     Anthony R. Hendrickson and   
              Samuel M. DeMarie   Viewpoint: Meeting the virtual work
                                  imperative . . . . . . . . . . . . . . . 23--26
              Michael Lewis and   
               Jeffrey Jacobson   Game engines in scientific research:
                                  Introduction . . . . . . . . . . . . . . 27--31
                  Michael Lewis   The new cards  . . . . . . . . . . . . . 30--31
                  John E. Laird   Research in human-level AI using
                                  computer games . . . . . . . . . . . . . 32--35
            Wayne Piekarski and   
                   Bruce Thomas   ARQuake: the outdoor augmented reality
                                  gaming system  . . . . . . . . . . . . . 36--38
           Jeffrey Jacobson and   
                    Zimmy Hwang   Unreal tournament for immersive
                                  interactive theater  . . . . . . . . . . 39--42
             Gal A. Kaminka and   
          Manuela M. Veloso and   
             Steve Schaffer and   
             Chris Sollitto and   
           Rogelio Adobbati and   
         Andrew N. Marshall and   
             Andrew Scholer and   
                  Sheila Tejada   GameBots: a flexible test bed for
                                  multiagent team research . . . . . . . . 43--45
              Markus Bylund and   
               Fredrik Espinoza   Testing and demonstrating context-aware
                                  services with Quake III Arena  . . . . . 46--48
                     CACM Staff   The ACM annual report FY01 . . . . . . . 49--52
            Murugan Anandarajan   Internet abuse in the workplace:
                                  Introduction . . . . . . . . . . . . . . 53--54
             Jeffrey M. Stanton   Company profile of the frequent Internet
                                  user . . . . . . . . . . . . . . . . . . 55--59
                  Jo Ann Oravec   Constructive approaches to Internet
                                  recreation in the workplace  . . . . . . 60--63
            France Belanger and   
                Craig Van Slyke   Abuse or learning? . . . . . . . . . . . 64--65
           Vivien K. G. Lim and   
         Thompson S. H. Teo and   
                  Geok Leng Loo   How do I loaf here? Let me count the
                                  ways . . . . . . . . . . . . . . . . . . 66--70
              Claire A. Simmers   Aligning Internet usage with business
                                  priorities . . . . . . . . . . . . . . . 71--74
                  Keng Siau and   
         Fiona Fui-Hoon Nah and   
                     Limei Teng   Acceptable Internet use policy . . . . . 75--79
         Andrew Urbaczewski and   
              Leonard M. Jessup   Does electronic monitoring of employee
                                  Internet usage work? . . . . . . . . . . 80--83
           Raymond R. Panko and   
                Hazel Glenn Beh   Monitoring for pornography and sexual
                                  harassment . . . . . . . . . . . . . . . 84--87
             Upkar Varshney and   
                  Andy Snow and   
              Matt McGivern and   
                 Christi Howard   Voice over IP  . . . . . . . . . . . . . 89--96
       Chittibabu Govindarajulu   The status of helpdesk support . . . . . 97--100
          Julie Smith David and   
               David Schuff and   
               Robert St. Louis   Managing your total IT cost of ownership 101--106
                    Cris Kobryn   Technical opinion: Will UML 2.0 be agile
                                  or awkward?  . . . . . . . . . . . . . . 107--110
                  Mohamed Fayad   Thinking objectively: Accomplishing
                                  software stability . . . . . . . . . . . 111--115
           Robert E. Filman and   
             Stuart Barrett and   
               Diana D. Lee and   
                     Ted Linden   Inserting ilities by controlling
                                  communications . . . . . . . . . . . . . 116--122
                Rebecca Mercuri   Inside risks: Uncommon criteria  . . . . 172--172

Communications of the ACM
Volume 45, Number 2, February, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     Robert Fox   News Track: A Blessing and a Curse;
                                  Jacked-In Jersey; Not Just Music;
                                  Infectious Glow; All-Seeing; On Your
                                  Mark; Brain Waves; Diabolical Degree . . 9--10
             Diane Crawford and   
         Byron Weber Becker and   
                 Jaime Nino and   
               Hugh McGuire and   
                Gil Colgate and   
                Mark Lutton and   
           Vladimir Safonov and   
             Ralph Westfall and   
         Bradley K. Sherman and   
                   Ed Lowry and   
                Kurt Guntheroth   Forum: `Hello, World' Gets Mixed
                                  Greetings; Westfall Responds; The
                                  Emperor's Wardrobe; Targeting Zeppelins  11--17
                  Andrew Grosso   Legally speaking: Why the Digital
                                  Millennium Copyright Act is a failure of
                                  reason . . . . . . . . . . . . . . . . . 19--23
                Robert L. Glass   Practical programmer: Stodgy by design,
                                  and the notion of `dumbing up' . . . . . 25--27
                  Felipe Castel   Ontological computing  . . . . . . . . . 29--30
                Ben Shneiderman   Viewpoint: ACM's computing professionals
                                  face new challenges  . . . . . . . . . . 31--34
            Qing Bian Zhang and   
             Patrick Y. K. Chau   On site: Creating e-commerce courses
                                  with regional intent . . . . . . . . . . 35--37
          Michael Gruninger and   
                     Jintae Lee   Ontology applications and design:
                                  Introduction . . . . . . . . . . . . . . 39--41
         Clyde W. Holsapple and   
                    K. D. Joshi   A collaborative approach to ontology
                                  design . . . . . . . . . . . . . . . . . 42--47
                      Henry Kim   Predicting how ontologies for the
                                  semantic Web will evolve . . . . . . . . 48--54
            John O. Everett and   
           Daniel G. Bobrow and   
            Reinhard Stolle and   
             Richard Crouch and   
           Valeria de Paiva and   
            Cleo Condoravdi and   
        Martin van den Berg and   
                  Livia Polanyi   Making ontologies work for resolving
                                  redundancies across documents  . . . . . 55--60
             Nicola Guarino and   
              Christopher Welty   Evaluating ontological decisions with
                                  OntoClean  . . . . . . . . . . . . . . . 61--65
            Bert J. Dempsey and   
                Debra Weiss and   
                 Paul Jones and   
                 Jane Greenberg   Who is an open source software
                                  developer? . . . . . . . . . . . . . . . 67--72
             Jo Ellen Moore and   
                  Lisa A. Burke   How to turn around `turnover culture' in
                                  IT . . . . . . . . . . . . . . . . . . . 73--78
       William J. Kettinger and   
                  Choong C. Lee   Understanding the IS-user divide in IT
                                  innovation . . . . . . . . . . . . . . . 79--84
                   Delvin Grant   A wider view of business process
                                  reengineering  . . . . . . . . . . . . . 85--90
                Gordon Bell and   
                       Jim Gray   What's next in high-performance
                                  computing? . . . . . . . . . . . . . . . 91--95
           Richard T. Snodgrass   Rights and responsibilities in ACM
                                  publishing: Progress on ACM's becoming
                                  the Preferred Publisher  . . . . . . . . 97--101
                Thomas Erickson   Technical opinion: Some problems with
                                  the notion of context-aware computing    102--104
        Evgeniy Gabrilovich and   
                Alex Gontmakher   Inside risks: The homograph attack . . . 128--128

Communications of the ACM
Volume 45, Number 3, March, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Boosting Military Tech
                                  Spending; Press `Eject' Button and Call
                                  Security; Identity Tops Theft List;
                                  Pashto-Phonics; Talk to the (Gloved)
                                  Hand; Winning Over Girls on the Gadget
                                  Front; A Robot to Do a Nano-Crab's Work;
                                  When Web Surfing Turns to Googlewhacking 9--10
             Diane Crawford and   
            Richard Staehli and   
           Donald J. Reifer and   
                  Anonymous and   
        William L. Anderson and   
            Atanas Radenski and   
                Rick Simkin and   
               Ram D. Gopal and   
             Zhiping Walter and   
         Arvind K. Tripathi and   
                    Phil Armour   Forum: Doubts and Hopes for AOP; Social
                                  and Technical Aspects of Information
                                  Systems Design and Deployment; Classroom
                                  Teaching vs. Online Courses; No
                                  Unsolicited Email Ads for Me, Please; A
                                  Chilling Virus . . . . . . . . . . . . . 11--14
                  Peter Denning   Internet time out  . . . . . . . . . . . 15--18
                   Meg McGinity   Call it techonomics  . . . . . . . . . . 19--21
The Stanford Student Computer and   
        Network Privacy Project   A study of student privacy issues at
                                  Stanford University  . . . . . . . . . . 23--25
                   Ananda Mitra   Trust, authenticity, and discursive
                                  power in cyberspace  . . . . . . . . . . 27--29
         Gaurav S. Sukhatme and   
              Maja J. Matari\'c   Robots: Intelligence, Versatility,
                                  Adaptivity . . . . . . . . . . . . . . . 30--32
                  Rodney Brooks   Humanoid robots  . . . . . . . . . . . . 33--38
                Daniela Rus and   
                Zack Butler and   
                Keith Kotay and   
                  Marsette Vona   Self-reconfiguring robots  . . . . . . . 39--45
             Oussama Khatib and   
               Oliver Brock and   
            Kyong-Sok Chang and   
      François Conti and   
              Diego Ruspini and   
                    Luis Sentis   Robotics and interactive simulation  . . 46--51
                Sebastian Thrun   Probabilistic robotics . . . . . . . . . 52--57
              Manuela M. Veloso   Entertainment robotics . . . . . . . . . 59--63
          Richard T. Grenci and   
                  Peter A. Todd   Solutions-driven marketing . . . . . . . 64--71
                   John Cameron   Configurable development processes . . . 72--77
                   Leysia Palen   Mobile telephony in a connected life . . 78--82
              Huaiqing Wang and   
            John Mylopoulos and   
                   Stephen Liao   Intelligent agents and financial risk
                                  monitoring systems . . . . . . . . . . . 83--88
             Vincent S. Lai and   
                  Wingyan Chung   Managing international data
                                  communications . . . . . . . . . . . . . 89--93
              Ruzena Bajcsy and   
                 Craig Reynolds   Computer science: the science of and
                                  about information and computation  . . . 94--98
           Peter J. Denning and   
               James J. Horning   Inside Risks: Risks of linear thinking   120--120

Communications of the ACM
Volume 45, Number 4, April, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Security Boom; Line-of-Sight
                                  Laser Communication; Toxic Tech Exports;
                                  Internet Not Ready for Public Elections;
                                  Chip Implant for Positive ID; Clicking
                                  Overseas to the Movies; Finland? How
                                  About Nokialand? . . . . . . . . . . . . 9--10
             Diane Crawford and   
          Edward J. Beroset and   
                 John Jaros and   
                 C. J. Date and   
             Robert Plotkin and   
                Rick Simkin and   
            Thomas W. Moran and   
              Hugh Kawabata and   
                 Neil Munro and   
                 Jason Funk and   
            Pal Valckenaers and   
                 Bob Rinker and   
                Brock Meeks and   
        Dennis de Champeaux and   
              John A. Wills and   
               Gabriel Mateescu   Forum: Don't Take Civil Liberties in the
                                  Name of National Security; Spare Me the
                                  Paranoia; Taking Responsibility for
                                  Worms and Viruses; Who's Research is
                                  Unethical?; Dual Parallelism in the Grid 11--16
               Mark Guzdial and   
                 Elliot Soloway   Log on education: Teaching the Nintendo
                                  generation to program  . . . . . . . . . 17--21
                    Hal Berghel   Digital village: Hijacking the Web:
                                  Cookies revisited: Continuing the
                                  dialogue on personal security and
                                  underlying privacy issues  . . . . . . . 23--27
                  Murray Turoff   On site: Past and future emergency
                                  response information systems . . . . . . 29--32
                David Davenport   Viewpoint: Anonymity on the Internet:
                                  why the price may be too high  . . . . . 33--35
                   Jenny Preece   Introduction: Supporting community and
                                  building social capital  . . . . . . . . 37--39
            Thomas Erickson and   
        Christine Halverson and   
           Wendy A. Kellogg and   
                  Mark Laff and   
                    Tracee Wolf   Social translucence: designing social
                                  infrastructures that make collective
                                  activity visible . . . . . . . . . . . . 40--44
                  Judith Donath   A semantic approach to visualizing
                                  online conversations . . . . . . . . . . 45--49
                     Marc Smith   Tools for navigating large social
                                  cyberspaces  . . . . . . . . . . . . . . 51--55
        Starr Roxanne Hiltz and   
                  Murray Turoff   What makes learning networks effective?  56--59
                   Amy Bruckman   The future of e-learning communities . . 60--63
              Dorine C. Andrews   Audience-specific online community
                                  design . . . . . . . . . . . . . . . . . 64--68
            David R. Millen and   
        Michael A. Fontaine and   
              Michael J. Muller   Understanding the benefit and costs of
                                  communities of practice  . . . . . . . . 69--73
              Judy E. Scott and   
                    Iris Vessey   Managing risks in enterprise systems
                                  implementations  . . . . . . . . . . . . 74--81
           Thomas Schambach and   
               J. Ellis Blanton   The professional development challenge
                                  for IT professionals . . . . . . . . . . 83--87
            Bonnie A. Nardi and   
            Steve Whittaker and   
               Ellen Isaacs and   
                Mike Creech and   
               Jeff Johnson and   
                John Hainsworth   Integrating communication and
                                  information through ContactMap . . . . . 89--95
     Mordechai Ben-Menachem and   
                    Roy Gelbard   Integrated IT management tool kit  . . . 96--102
                     Arnd Weber   Enabling crypto: how radical innovations
                                  occur  . . . . . . . . . . . . . . . . . 103--107
               Mohamed E. Fayad   Thinking objectively: How to deal with
                                  software stability . . . . . . . . . . . 109--112
   David W. J. Stringer-Calvert   Inside Risks: Digital evidence . . . . . 128--128

Communications of the ACM
Volume 45, Number 4ve, April, 2002

     Marie-Mich\`ele Boulet and   
          Faouzi Ben Jebara and   
              Fathi Bemmira and   
               Serge Boudreault   A Comparison of Three Delivery Systems
                                  for Teaching an Information Technology
                                  Course . . . . . . . . . . . . . . . . . 129--135
            Vladan Deved\vzi\'c   Understanding Ontological Engineering    136--144
       Christos J. Georgiou and   
            Petros S. Stefaneas   Strategies for Accelerating the
                                  Worldwide Adoption of E-Commerce . . . . 145--151
            T. Dean Hendrix and   
          Michelle P. Schneider   NASA's TReK Project: A Case Study in
                                  Using the Spiral Model of Software
                                  Development  . . . . . . . . . . . . . . 152--159
            William Hibbard and   
              Curtis Rueden and   
             Steve Emmerson and   
                   Tom Rink and   
             David Glowacki and   
              Tom Whittaker and   
                 Don Murray and   
               David Fulker and   
                  John Anderson   Java Distributed Objects for Numerical
                                  Visualization in VisAD . . . . . . . . . 160--170
      Gretchen L. Robertson and   
                    Deborah Hix   Making the Computer Accessible to
                                  Mentally Retarded Adults . . . . . . . . 171--183
            Beverly K. Kahn and   
            Diane M. Strong and   
                Richard Y. Wang   Information Quality Benchmarks: Product
                                  and Service Performance  . . . . . . . . 184--192
          Anandasivam Gopal and   
        Tridas Mukhopadhyay and   
            Mayuram S. Krishnan   The Role of Software Processes and
                                  Communication in Offshore Software
                                  Development  . . . . . . . . . . . . . . 193--200
           Ravi Patnayakuni and   
                       Arun Rai   Development Infrastructure
                                  Characteristics and Process Capability   201--210
              Leo L. Pipino and   
                Yang W. Lee and   
                Richard Y. Wang   Data Quality Assessment  . . . . . . . . 211--218
                   Moshe Zviran   Securing PC Applications: The Relay Race
                                  Approach . . . . . . . . . . . . . . . . 219--227

Communications of the ACM
Volume 45, Number 5, May, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Part Cyborg, Part Human;
                                  Airline (Web) Revenue Soars; Cutting
                                  Work Privileges; Slight Change in
                                  High-Tech Hirings; Monkey Think, Monkey
                                  Do; Campus File-Swapping Truce; Love
                                  Found, Love Lost . . . . . . . . . . . . 9--10
             Diane Crawford and   
          Steven Warshawsky and   
     Kamesh Balasubramanian and   
             H. Paul Zeiger and   
                 Richard Ho and   
              David Cymbala and   
               John C. Nash and   
             Bertrand Meyer and   
         Mordechai Ben-Menachem   Forum: The Spirited Sides of a Story;
                                  Strength in Stability; Total Picture; A
                                  Readable Plea; The More Things
                                  Change\ldots . . . . . . . . . . . . . . 11--13
                Robert L. Glass   Searching for the holy grail of software
                                  engineering  . . . . . . . . . . . . . . 15--16
              Phillip G. Armour   The organism and the mechanism of
                                  projects . . . . . . . . . . . . . . . . 17--20
           Pratyush Bharati and   
               Peter Tarasewich   Global perceptions of journals
                                  publishing e-commerce research . . . . . 21--26
                  Wei-Lung Wang   Beware the engineering metaphor  . . . . 27--29
          Peter Brusilovsky and   
                Mark T. Maybury   From adaptive hypermedia to the adaptive
                                  Web  . . . . . . . . . . . . . . . . . . 30--33
             Daniel Billsus and   
          Clifford A. Brunk and   
                Craig Evans and   
              Brian Gladish and   
                Michael Pazzani   Adaptive interfaces for ubiquitous Web
                                  access . . . . . . . . . . . . . . . . . 34--38
                Barry Smyth and   
              Keith Bradley and   
                 Rachael Rafter   Personalization techniques for online
                                  recruitment services . . . . . . . . . . 39--40
                 Josef Fink and   
      Jürgen Koenemann and   
             Stephan Noller and   
                    Ingo Schwab   Putting personalization into practice    41--42
     Elisabeth André and   
                    Thomas Rist   From adaptive hypertext to personalized
                                  Web companions . . . . . . . . . . . . . 43--46
             Keith Cheverst and   
             Keith Mitchell and   
                   Nigel Davies   The role of adaptive hypermedia in a
                                  context-aware tourist GUIDE  . . . . . . 47--51
          Liliana Ardissono and   
                   Anna Goy and   
           Giovanna Petrone and   
                  Marino Segnan   Personalization in business-to-customer
                                  interaction  . . . . . . . . . . . . . . 52--53
                 Marc Light and   
                Mark T. Maybury   Personalized multimedia information
                                  access . . . . . . . . . . . . . . . . . 54--59
                    Paul De Bra   Adaptive educational hypermedia on the
                                  Web  . . . . . . . . . . . . . . . . . . 60--61
               Diana Bental and   
                  Alison Cawsey   Personalized and adaptive systems for
                                  medical consumer applications  . . . . . 62--63
                   Alfred Kobsa   Personalized hypermedia and
                                  international privacy  . . . . . . . . . 64--67
           Edieal J. Pinker and   
           Abraham Seidmann and   
             Reginald C. Foster   Strategies for transitioning `old
                                  economy' firms to e-business . . . . . . 76--83
           Christian Wagner and   
                  Efraim Turban   Are intelligent e-commerce agents
                                  partners or predators? . . . . . . . . . 84--90
                  Barry Wellman   Designing the Internet for a networked
                                  society  . . . . . . . . . . . . . . . . 91--96
              John J. Helly and   
             T. Todd Elvins and   
                 Don Sutton and   
             David Martinez and   
            Scott E. Miller and   
            Steward Pickett and   
               Aaron M. Ellison   Controlled publication of digital
                                  scientific data  . . . . . . . . . . . . 97--101
                       Ned Kock   Managing with Web-based IT in mind . . . 102--106
         Michael Tow Cheung and   
                      Ziqi Liao   Time-asymmetry in business processes . . 107--108
               Lauren Weinstein   Inside Risks: Risks of inaction  . . . . 120--120

Communications of the ACM
Volume 45, Number 6, June, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Floating Transponders; Gonzo
                                  Journalism Redefined; China Second in
                                  Web Use; Household Appliances, Lend Me
                                  Your Ears; GPS as Prison Guard; Newest
                                  Hack: Blinking Lights; Its Name Is
                                  ASIMO; Beware Net Spirituality . . . . . 9--10
             Diane Crawford and   
               Peter Magsig and   
               Marc Shapiro and   
                Paul Zeiger and   
             Pete McDougall and   
                Earl Furman and   
                 James Bach and   
              Sandy Ressler and   
                Daniel Savarese   Forum: Weighing in on the notion of
                                  `dumbing up' . . . . . . . . . . . . . . 11--13
               Peter J. Denning   The profession of IT: Flatlined  . . . . 15--19
                   Meg McGinity   Staying connected: Broadband to go . . . 21--24
               Harold W. Lawson   Viewpoint: Rebirth of the computer
                                  industry . . . . . . . . . . . . . . . . 25--29
                    Gul A. Agha   Introduction: Adaptive Middleware  . . . 30--32
                  Fabio Kon and   
                Fabio Costa and   
               Gordon Blair and   
                Roy H. Campbell   The case for reflective middleware . . . 33--38
                 Anand Tripathi   Challenges designing next-generation
                                  middleware systems . . . . . . . . . . . 39--42
             Douglas C. Schmidt   Middleware for real-time and embedded
                                  systems  . . . . . . . . . . . . . . . . 43--48
      Nalini Venkatasubramanian   Safe `composability' of middleware
                                  services . . . . . . . . . . . . . . . . 49--52
     Valérie Issarny and   
         Christos Kloukinas and   
               Apostolos Zarras   Systematic aid for developing middleware
                                  architectures  . . . . . . . . . . . . . 53--58
                 Jean Bacon and   
                      Ken Moody   Toward open, secure, widely distributed
                                  services . . . . . . . . . . . . . . . . 59--64
                 Diane Crawford   ACM fellows  . . . . . . . . . . . . . . 65--65
           Michael Ettredge and   
       Vernon J. Richardson and   
                   Susan Scholz   \em Timely financial reporting at
                                  corporate Web sites? . . . . . . . . . . 67--71
               Kai Lung Hui and   
             Patrick Y. K. Chau   Classifying digital products . . . . . . 73--79
                 Gary Klein and   
             James J. Jiang and   
                Debbie B. Tesch   Wanted: project teams with a blend of is
                                  professional orientations  . . . . . . . 81--87
                    Gloria Mark   Extreme collaboration  . . . . . . . . . 89--93
           Raquel Benbunan-Fich   Improving education and training with IT 94--99
             James A. Aries and   
         Subhankar Banerjee and   
            Marc S. Brittan and   
                Eric Dillon and   
          Janusz S. Kowalik and   
                 John P. Lixvar   Capacity and performance analysis of
                                  distributed enterprise systems . . . . . 100--105
           Patrick P. Gelsinger   Technical opinion: Power play  . . . . . 106--106
                  Ross Anderson   Inside Risks: Free speech online and
                                  offline  . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 45, Number 7, July, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News Track: Eye on Sensitive Student
                                  Visas; E-Tooling Government IT
                                  Recruiting; Remote Control Ratbots; More
                                  Hack Attacks in Israel; Felt-Tipped Pen
                                  Mightier Than CD Copy Protection; Need a
                                  Screen? Paint One; Where High-Tech CEOs
                                  See Growth; All Thumbs in Japan  . . . . 9--10
             Diane Crawford and   
                Aram Gharib and   
                   Ken Kahn and   
             B. Jagannathan and   
           Richard Stallman and   
                   Jim Densmore   Forum: In Praise of Work's Human
                                  Dimension; Make it Visible, Tangible,
                                  Graphical; Justifying Anonymity; Free
                                  Software Reality v. Deception; Already
                                  Maxed Out  . . . . . . . . . . . . . . . 11--12
                 Brock N. Meeks   Electronic frontier: True blue and
                                  vigilante, too . . . . . . . . . . . . . 13--15
                     Neil Munro   From Washington: The ever-expanding
                                  network of local and federal databases   17--19
                  Shai Simonson   On site: A post-baccalaureate
                                  undergraduate-level program in computer
                                  science  . . . . . . . . . . . . . . . . 21--24
        Maris G. Martinsons and   
              Valdis Martinsons   Viewpoint: Rethinking the value of IT,
                                  again  . . . . . . . . . . . . . . . . . 25--26
              Andrew Rosenbloom   How the virtual inspires the real  . . . 28--31
               W. Daniel Hillis   The power to shape the world . . . . . . 32--35
                 Alvy Ray Smith   The reality of simulated actors  . . . . 36--39
            Theresa-Marie Rhyne   Computer games and scientific
                                  visualization  . . . . . . . . . . . . . 40--44
             Clemens Wagner and   
              Markus Schill and   
           Reinhard Männer   Intraocular surgery on a virtual eye . . 45--49
             Marc Pollefeys and   
                   Luc Van Gool   From images to $3$D models . . . . . . . 50--55
           Norman I. Badler and   
         Charles A. Erignac and   
                       Ying Liu   Virtual humans for validating
                                  maintenance procedures . . . . . . . . . 56--63
          Mark Billinghurst and   
                  Hirokazu Kato   Collaborative augmented reality  . . . . 64--70
                Gordon Bell and   
                    Jim Gemmell   A call for the home media network  . . . 71--75
                    Toru Ishida   Digital city Kyoto . . . . . . . . . . . 76--81
       Katherine M. Shelfer and   
             J. Drew Procaccino   Smart card evolution . . . . . . . . . . 83--88
             John M. Gallaugher   E-commerce and the undulating
                                  distribution channel . . . . . . . . . . 89--95
          Snehamay Banerjee and   
                   Ram L. Kumar   Managing electronic interchange of
                                  business documents . . . . . . . . . . . 96--102
       Jonathon N. Cummings and   
               Brian Butler and   
                   Robert Kraut   The quality of online social
                                  relationships  . . . . . . . . . . . . . 103--108
                 Robert Davison   Technical opinion: Cultural
                                  complications of ERP . . . . . . . . . . 109--111
               Donald A. Norman   Inside risks: Beyond the computer
                                  industry . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 45, Number 8, August, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News tracks  . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
          Srinivas Nedunuri and   
              Adrian Bowyer and   
                 Arnd Weber and   
              Greg A. Woods and   
                     Mark Adler   Forum: Embrace the Engineering Metaphor;
                                  Credit for Crypto's Parallel
                                  Development; Enough PDF: Give me HTML    11--14
         Cathleen Norrisand and   
             Elliot Soloway and   
                 Terry Sullivan   Log on education: Examining 25 years of
                                  technology in U.S. education . . . . . . 15--18
                Robert L. Glass   Practical programmer: The proof of
                                  correctness wars . . . . . . . . . . . . 19--21
          Christof Teuscher and   
                   Moshe Sipper   Viewpoint: Hypercomputation: hype or
                                  computation? . . . . . . . . . . . . . . 23--24
                 Ross A. Malaga   On site: Additional methods when using
                                  email for teaching . . . . . . . . . . . 25--27
               Usama Fayyad and   
            Ramasamy Uthurusamy   Evolving data into mining solutions for
                                  insights . . . . . . . . . . . . . . . . 28--31
             Padhraic Smyth and   
             Daryl Pregibon and   
             Christos Faloutsos   Data-driven evolution of data mining
                                  algorithms . . . . . . . . . . . . . . . 33--37
               Paul Bradley and   
            Johannes Gehrke and   
         Raghu Ramakrishnan and   
           Ramakrishnan Srikant   Scaling mining algorithms to large
                                  databases  . . . . . . . . . . . . . . . 38--43
                 Ron Kohavi and   
          Neal J. Rothleder and   
             Evangelos Simoudis   Emerging trends in business analytics    45--48
             Chidanand Apte and   
                   Bing Liu and   
       Edwin P. D. Pednault and   
                 Padhraic Smyth   Business applications of data mining . . 49--53
                 Jiawei Han and   
             Russ B. Altman and   
                Vipin Kumar and   
             Heikki Mannila and   
                 Daryl Pregibon   Emerging scientific applications in data
                                  mining . . . . . . . . . . . . . . . . . 54--58
         Robert L. Grossman and   
            Mark F. Hornick and   
                   Gregor Meyer   Data mining standards initiatives  . . . 59--61
           Peter Tarasewich and   
            Patrick R. McMullen   Swarm intelligence: power in numbers . . 62--67
                Tim Coltman and   
        Timothy M. Devinney and   
          Alopi S. Latukefu and   
               David F. Midgley   Keeping e-business in perspective  . . . 69--73
          Clayton A. Looney and   
           Debabroto Chatterjee   Web-enabled transformation of the
                                  brokerage industry . . . . . . . . . . . 75--81
            Craig Van Slyke and   
       Christie L. Comunale and   
                France Belanger   Gender differences in perceptions of
                                  Web-based shopping . . . . . . . . . . . 82--86
                George Chin and   
                James Myers and   
                     David Hoyt   Social networks in the virtual science
                                  laboratory . . . . . . . . . . . . . . . 87--92
              M. A. Quaddus and   
                   Lai Lai Tung   Explaining cultural differences in
                                  decision conferencing  . . . . . . . . . 93--98
          Lawrence G. Jones and   
                Arthur L. Price   Changes in computer science
                                  accreditation  . . . . . . . . . . . . . 99--103
                  Nick Ourosoff   Technical opinion: Primitive types in
                                  Java considered harmful  . . . . . . . . 105--106
                 Tolga Acar and   
               John R. Michener   Inside risks: Risks in features vs.
                                  assurance  . . . . . . . . . . . . . . . 112--112

Communications of the ACM
Volume 45, Number 9, September, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Symbols for Vagabond Users;
                                  Chipped Tooth; Pixel Fix on Visual
                                  Intelligence; Blinking Bumper; Virtual
                                  House Calls; More Than One Billion
                                  Served; Math and Science Teachers
                                  Wanted; Crash Test Dummy . . . . . . . . 9--10
             Diane Crawford and   
                  Al Endres and   
                 Jason Funk and   
             John Florentin and   
                Gregg Irwin and   
                 Bud Lawson and   
           Alvin P. Mullery and   
           Christian Wagner and   
                  Efraim Turban   Forum: Influencing Factors in the
                                  Computer Industry; The Difference
                                  Between Intelligent Agents and Mobile
                                  Agents . . . . . . . . . . . . . . . . . 11--14
                    Hal Berghel   Digital Village: Responsible Web caching 15--20
               Peter J. Denning   The Profession of IT: Career redux . . . 21--26
                   Paul F. Ross   On Site: Whatever became of integrity?   27--28
                 Maria M. Klawe   Letter from the President: Making a
                                  difference through computing communities 29--30
                Ralph R. Miller   Viewpoint: Information management in the
                                  aftermath of 9/11  . . . . . . . . . . . 31--33
                   Simon Davies   A year after 9/11: where are we now? . . 35--39
                 Eric A. Brewer   Introduction: The Consumer Side of
                                  Search . . . . . . . . . . . . . . . . . 40--41
               Marti Hearst and   
                Ame Elliott and   
           Jennifer English and   
               Rashmi Sinha and   
         Kirsten Swearingen and   
                    Ka-Ping Yee   Finding the flow in Web site search  . . 42--49
               James Pitkow and   
       Hinrich Schütze and   
                  Todd Cass and   
                 Rob Cooley and   
               Don Turnbull and   
               Andy Edmonds and   
                 Eytan Adar and   
                  Thomas Breuel   Personalized search  . . . . . . . . . . 50--55
            Abbe Mowshowitz and   
                Akira Kawaguchi   Bias on the Web  . . . . . . . . . . . . 56--60
              James Gerlach and   
              Bruce Neumann and   
             Edwin Moldauer and   
                Martha Argo and   
                  Daniel Frisby   Determining the cost of IT services  . . 61--67
               Ellen Isaacs and   
           Alan Walendowski and   
              Dipti Ranganathan   Mobile instant messaging through Hubbub  68--72
               Ritu Agarwal and   
              Thomas W. Ferratt   Enduring practices for managing IT
                                  professionals  . . . . . . . . . . . . . 73--79
              Mike Morrison and   
            Joline Morrison and   
                   Anthony Keys   Integrating Web sites and databases  . . 81--86
             Craig K. Tyran and   
                 Joey F. George   Improving software inspections with
                                  group process support  . . . . . . . . . 87--92
            William R. King and   
        Peter V. Marks, Jr. and   
                    Scott McCoy   The most important issues in knowledge
                                  management . . . . . . . . . . . . . . . 93--97
          Nikolay V. Shilov and   
                   Kwangkeun Yi   Engaging students with theory through
                                  ACM Collegiate Programming Contests  . . 98--101
              Mohamed Fayad and   
                      Shasha Wu   Thinking Objectively: Merging multiple
                                  conventional models in one stable model  102--106
                     Mark Stamp   Inside Risks: Risks of digital rights
                                  management . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 45, Number 10, October, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Liquid Light; Let Your
                                  Finging Do the Paying; IT Professional
                                  Pressure Cooker; A Spot in the Clouds;
                                  Must See Floppy TV; Mainframe Skill
                                  Shortage; Moore's Law and Cyronic
                                  Suspension . . . . . . . . . . . . . . . 9--10
             Rebecca T. Mercuri   Security Watch: Computer security:
                                  quality rather than quantity . . . . . . 11--14
               Pamela Samuelson   Legally Speaking: Reverse engineering
                                  under siege  . . . . . . . . . . . . . . 15--20
                R. S. Boyer and   
                  W. Feijen and   
                   D. Gries and   
             C. A. R. Hoare and   
                   J. Misra and   
                   J. Moore and   
                    H. Richards   In memoriam: Edsger W. Dijkstra
                                  1930--2002 . . . . . . . . . . . . . . . 21--22
                Rafael Palacios   On Site: Remote automatic doorman via
                                  the Internet . . . . . . . . . . . . . . 23--25
                    Alan Howard   Viewpoint: Rapid Application
                                  Development: rough and dirty or
                                  value-for-money engineering? . . . . . . 27--29
                  Ali Arsanjani   Introduction: Developing and Integrating
                                  Enterprise Components and Services . . . 30--34
             Ivica Crnkovic and   
               Brahim Hnich and   
            Torsten Jonsson and   
                Zeynep Kiziltan   Specification, implementation, and
                                  deployment of components . . . . . . . . 35--40
                Erik Meijer and   
              Clemens Szyperski   Overcoming independent extensibility
                                  challenges . . . . . . . . . . . . . . . 41--44
                 Keith Levi and   
                  Ali Arsanjani   A goal-driven approach to enterprise
                                  component identification and
                                  specification  . . . . . . . . . . . . . 45--52
Ricardo Jardim-Gonçalves and   
Adolfo Steiger-Garção   Implicit multilevel modeling in flexible
                                  business environments  . . . . . . . . . 53--57
            Jeff Sutherland and   
      Willem-Jan van den Heuvel   Enterprise application integration and
                                  complex adaptive systems . . . . . . . . 59--64
          Aniruddha Gokhale and   
         Douglas C. Schmidt and   
     Balachandran Natarajan and   
                    Nanbor Wang   Applying model-integrated computing to
                                  component middleware and enterprise
                                  applications . . . . . . . . . . . . . . 65--70
                   Michael Stal   Web services: beyond component-based
                                  computing  . . . . . . . . . . . . . . . 71--76
             Paul Fremantle and   
        Sanjiva Weerawarana and   
                   Rania Khalaf   Enterprise services  . . . . . . . . . . 77--82
                   Soo Dong Kim   Lessons learned from a nationwide CBD
                                  promotion project  . . . . . . . . . . . 83--87
           Winslow Burleson and   
                     Ted Selker   Introduction: Creativity and Interface   88--90
             Ernest Edmonds and   
                    Linda Candy   Creativity, art practice, and knowledge  91--95
              Lena Mamykina and   
                Linda Candy and   
                 Ernest Edmonds   Collaborative creativity . . . . . . . . 96--99
               Sharon L. Greene   Characteristics of applications that
                                  support creativity . . . . . . . . . . . 100--104
              Michael Terry and   
            Elizabeth D. Mynatt   Supporting experimentation with
                                  Side-Views . . . . . . . . . . . . . . . 106--108
                Chris Roast and   
              Innes Ritchie and   
               Stephanie Thomas   Re-creating the reader: supporting
                                  active reading in literary research  . . 109--111
             John C. Thomas and   
                 Alison Lee and   
                 Catalina Danis   Enhancing creative design via software
                                  tools  . . . . . . . . . . . . . . . . . 112--115
                Ben Shneiderman   Creativity support tools . . . . . . . . 116--120
                E. Vance Wilson   Email winners and losers . . . . . . . . 121--126
          Ali F. Farhoomand and   
                   Don H. Drury   Managerial information overload  . . . . 127--131
            H. James Nelson and   
       Deborah J. Armstrong and   
                    Mehdi Ghods   Old dogs and new tricks  . . . . . . . . 132--137
         Patrick Y. K. Chau and   
               Melissa Cole and   
             Anne P. Massey and   
        Mitzi Montoya-Weiss and   
              Robert M. O'Keefe   Cultural differences in the online
                                  behavior of consumers  . . . . . . . . . 138--143
          Rajeswari Malladi and   
              Dharma P. Agrawal   Technical Opinion: Current and future
                                  applications of mobile and wireless
                                  networks . . . . . . . . . . . . . . . . 144--146
              Fred B. Schneider   Inside Risks: Secure systems conundrum   160--160

Communications of the ACM
Volume 45, Number 11, November, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: A Thousand Points of Light;
                                  Typing with Your Eyes; Cleaning
                                  Crustacean; The E-Bay of Argentina;
                                  Online Abduction Alerts; Fighting
                                  Airport Noise; Happy Birthday :-)  . . . 9--10
             Diane Crawford and   
              Sherif Yacoub and   
               John Stracke and   
                Gordon Bell and   
                Jim Gemmell and   
                  Bob Ellis and   
                Myles Losch and   
                Ronnie Ward and   
            Anthony Ralston and   
               Rich Henders and   
               Steve Arnold and   
                    Mark Lutton   Forum: I Want My Home Network;
                                  Consumer-Created Content Key to
                                  Broadband; Still Living Off Y2K
                                  Spending; Grading Education; Objective
                                  Opinion; PDF Peeves; Homemade
                                  Hypercomputation . . . . . . . . . . . . 11--14
                 Phillip Armour   Business of Software: Ten unmyths of
                                  project estimation . . . . . . . . . . . 15--18
                Robert L. Glass   Practical Programmer: Sorting out
                                  software complexity  . . . . . . . . . . 19--21
               Boaz Gelbord and   
                 Gert Roelofsen   Viewpoint: New surveillance techniques
                                  raise privacy concerns . . . . . . . . . 23--24
             Zakaria Maamar and   
                   Weiming Shen   Introduction: Computer-Supported
                                  Cooperative Work in Design . . . . . . . 25--26
                 Mark Klein and   
              Hiroki Sayama and   
             Peyman Faratin and   
                 Yaneer Bar-Yam   A complex systems perspective on
                                  computer-supported collaborative design
                                  technology . . . . . . . . . . . . . . . 27--31
           Soroush Sedaghat and   
             Josef Pieprzyk and   
                 Ehsan Vossough   On-the-fly Web content integrity check
                                  boosts users' confidence . . . . . . . . 33--37
          Federico Bergenti and   
             Agostino Poggi and   
                Matteo Somacher   A collaborative platform for fixed and
                                  mobile networks  . . . . . . . . . . . . 39--44
                 Lihui Wang and   
                 Brian Wong and   
               Weiming Shen and   
                   Sherman Lang   A Java 3D-enabled cyber workspace  . . . 45--49
                   Jim Gray and   
                    Alex Szalay   The World-Wide Telescope . . . . . . . . 50--55
          David P. Anderson and   
                  Jeff Cobb and   
               Eric Korpela and   
              Matt Lebofsky and   
                  Dan Werthimer   SETI@home: an experiment in
                                  public-resource computing  . . . . . . . 56--61
                    Jon Genetti   Volume-rendered galactic animations  . . 62--66
                 Joaquin Miller   Introduction: What UML Should Be . . . . 67--69
                 Bran Selic and   
             Guus Ramackers and   
                    Cris Kobryn   Evolution, not revolution  . . . . . . . 70--72
                    Keith Duddy   UML2 must enable a family of languages   73--75
              Stephen J. Mellor   Make models be assets  . . . . . . . . . 76--78
              William Frank and   
                 Kevin P. Tyson   Be clear, clean, concise . . . . . . . . 79--81
                       Dov Dori   Why significant UML change is unlikely   82--85
             John C. Knight and   
               Nancy G. Leveson   Should software engineers be licensed?   87--90
                 John White and   
                 Barbara Simons   ACM's position on the licensing of
                                  software engineers . . . . . . . . . . . 91--91
               Donald J. Bagert   Texas licensing of software engineers:
                                  all's quiet, for now . . . . . . . . . . 92--94
                Ken Kennedy and   
                 Moshe Y. Vardi   A Rice University perspective on
                                  software engineering licensing . . . . . 94--95
             David Lorge Parnas   Licensing software engineers in Canada   96--98
                   Gord McCalla   Software engineering requires individual
                                  professionalism  . . . . . . . . . . . . 98--101
            Dennis de Champeaux   Technical opinion: Software engineering
                                  considered harmful . . . . . . . . . . . 102--104
                Rebecca Mercuri   Inside Risks: Florida 2002: sluggish
                                  systems, vanishing votes . . . . . . . . 136--136

Communications of the ACM
Volume 45, Number 12, December, 2002

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Software to Combat Terror;
                                  Translating the Art of War; Pressing
                                  Flesh for Transmission; Ripping and
                                  Burning DNA; New Meaning of ``PDA'';
                                  Advanced Electronics Second Guesses
                                  Umps; Sports in the Dark Possible  . . . 9--10
             Diane Crawford and   
              C. W. Neville and   
            James H. Fetzer and   
            Rodney M. Bates and   
           Paul E. McKenney and   
                  Ann Sobel and   
           Michael Clarkson and   
                Todd Palino and   
                    Hal Berghel   Forum: Resolving the
                                  Program-Verification Debate; Handling
                                  Web Content  . . . . . . . . . . . . . . 11--15
             Victor Mbarika and   
                Mike Jensen and   
                     Peter Meso   International Perspectives: Cyberspace
                                  across sub-Saharan Africa  . . . . . . . 17--21
              Jens Palsberg and   
                Scott J. Baxter   On Site: Teaching reviewing to graduate
                                  students . . . . . . . . . . . . . . . . 22--24
                  Felipe Castel   Viewpoint: Theory, theory on the wall    25--26
                 Upkar Varshney   Multicast over wireless networks . . . . 31--37
                 Aviel D. Rubin   Security considerations for remote
                                  electronic voting  . . . . . . . . . . . 39--44
            Troy J. Strader and   
           Sridhar N. Ramaswami   The value of seller trustworthiness in
                                  C2C online markets . . . . . . . . . . . 45--49
Christoph Schlueter-Langdon and   
                Michael J. Shaw   Emergent patterns of integration in
                                  electronic channel systems . . . . . . . 50--55
    Wullianallur Raghupathi and   
                     Joseph Tan   Strategic IT applications in health care 56--61
             Kalle Lyytinen and   
                   Youngjin Yoo   Introduction: Issues and challenges in
                                  ubiquitous computing . . . . . . . . . . 62--65
                Gordon B. Davis   Anytime/anyplace computing and the
                                  future of knowledge work . . . . . . . . 67--73
                Jonathan Grudin   Group dynamics and ubiquitous computing  74--78
            Daniel P. Siewiorek   New frontiers of application design  . . 79--82
                Andrew Fano and   
               Anatole Gershman   The future of business services in the
                                  age of ubiquitous computing  . . . . . . 83--87
          Leonard M. Jessup and   
                   Daniel Robey   The relevance of social issues in
                                  ubiquitous computing environments  . . . 88--91
           Guruduth Banavar and   
              Abraham Bernstein   Software infrastructure and design
                                  challenges for ubiquitous computing
                                  applications . . . . . . . . . . . . . . 92--96
            Fernando Berzal and   
             Ignacio Blanco and   
         Juan-Carlos Cubero and   
                  Nicolas Marin   Technical opinion: Component-based data
                                  mining frameworks  . . . . . . . . . . . 97--100
                   Avishai Wool   Inside risks: Why security standards
                                  sometimes fail . . . . . . . . . . . . . 144--144


Communications of the ACM
Volume 46, Number 1, January, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News tracks: Incredible Shrinking
                                  Computing; Super-size Telescope; Global
                                  Reach Around; Gastric Simulation;
                                  Filipino Text-Message TV; Caging
                                  Hackers; Japan's Singing, Dancing Robot  9--10
             Diane Crawford and   
             Barbara Simons and   
         Eugene H. Spafford and   
      Christof Schmalenbach and   
László Karafiát and   
                Dave Isaacs and   
                Ken Kennedy and   
                    Moshe Vardi   Forum: A Lawful Way to Acquire a Trade
                                  Secret; Criteria for Integration
                                  Technology; The Current State of
                                  Hypercomputation; Still No Licensing in
                                  Texas  . . . . . . . . . . . . . . . . . 11--12
                   Meg McGinity   Staying connected: Hibernating during
                                  telecom winter . . . . . . . . . . . . . 13--15
             Rebecca T. Mercuri   Security watch: On auditing audit trails 17--20
                   Alan H. Karp   Viewpoint: Making money selling content
                                  that others are giving away  . . . . . . 21--22
           Gary Marchionini and   
                Hanan Samet and   
                   Larry Brandt   Introduction: Digital government . . . . 24--27
              Hsinchun Chen and   
                Daniel Zeng and   
             Homa Atabakhsh and   
             Wojciech Wyzga and   
                Jenny Schroeder   COPLINK: managing law enforcement data
                                  and knowledge  . . . . . . . . . . . . . 28--34
              Steve Goddard and   
            Sherri K. Harms and   
     Stephen E. Reichenbach and   
            Tsegaye Tadesse and   
             William J. Waltman   Geospatial decision support for drought
                                  risk management  . . . . . . . . . . . . 35--37
             Lois Delcambre and   
              Timothy Tolle and   
        The Forest Project Team   Harvesting information to sustain
                                  forests  . . . . . . . . . . . . . . . . 38--39
            Sharon S. Dawes and   
        Lise Préfontaine   Understanding new models of
                                  collaboration for delivering government
                                  services . . . . . . . . . . . . . . . . 40--42
               Jane E. Fountain   Prospects for improving the regulatory
                                  process using e-rulemaking . . . . . . . 43--44
               Sarah Nusser and   
              Leslie Miller and   
               Keith Clarke and   
              Michael Goodchild   Geospatial IT for mobile field data
                                  collection . . . . . . . . . . . . . . . 45--46
                    Eduard Hovy   Using an ontology to simplify data
                                  access . . . . . . . . . . . . . . . . . 47--49
            Leana Golubchik and   
           William C. Cheng and   
              Cheng-Fu Chou and   
              Samir Khuller and   
                Hanan Samet and   
                  C. Justin Wan   Bistro: a scalable and secure data
                                  transfer service for digital government
                                  applications . . . . . . . . . . . . . . 50--51
              Carol A. Hert and   
         Elizabeth D. Liddy and   
            Ben Shneiderman and   
               Gary Marchionini   Supporting statistical electronic table
                                  usage by citizens  . . . . . . . . . . . 52--54
                  Cathryn Dippo   FedStats: the gateway to federal
                                  statistics . . . . . . . . . . . . . . . 55--55
               Alan F. Karr and   
               Adrian Dobra and   
                Ashish P. Sanil   Table servers protect confidentiality in
                                  tabular data releases  . . . . . . . . . 57--58
         Alan M. MacEachren and   
             Frank Hardisty and   
                 Xiping Dai and   
                   Linda Pickle   Supporting visual analysis of federal
                                  geospatial statistics  . . . . . . . . . 59--60
                Hanan Samet and   
             Houman Alborzi and   
         Franti\vsek Brabec and   
   Claudio Esperança and   
  Gísli R. Hjaltason and   
               Frank Morgan and   
                   Egemen Tanin   Use of the SAND spatial browser for
                                  digital government applications  . . . . 61--64
              Peggy Agouris and   
             Anthony Stefanidis   Efficient summarization of
                                  spatiotemporal events  . . . . . . . . . 65--66
        William L. Scherlis and   
                  Jon Eisenberg   IT research, innovation, and
                                  e-government . . . . . . . . . . . . . . 67--68
                  Melvyn Ciment   A personal history of the NSF digital
                                  government program . . . . . . . . . . . 69--70
             Diomidis Spinellis   The decay and failures of Web references 71--77
            David E. Avison and   
                 Guy Fitzgerald   Where now for development methodologies? 78--82
                Ken Peffers and   
             Charles E. Gengler   How to identify new high-payoff
                                  information systems for the organization 83--88
            Mario Cannataro and   
                 Domenico Talia   The knowledge grid . . . . . . . . . . . 89--93
             Pak Chung Wong and   
            Kwong-kwok Wong and   
                   Harlan Foote   Organic data memory using the DNA
                                  approach . . . . . . . . . . . . . . . . 95--98
               Kevin C. Desouza   Technical opinion: Barriers to effective
                                  use of knowledge management systems in
                                  software engineering . . . . . . . . . . 99--101
                   Michael Lesk   Inside risks: The mindset of
                                  dependability  . . . . . . . . . . . . . 136--136

Communications of the ACM
Volume 46, Number 2, February, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: NET Works for Volunteers;
                                  Lights Out Back In; China Holds Tightest
                                  Net Reins; Hints of Recovery; Talk is
                                  Hardly Cheap; '02 Views  . . . . . . . . 9--10
             Diane Crawford and   
              Simon Bennett and   
               Lesley Clark and   
               Dan Klarmann and   
              Gernot Salzer and   
                Dan Hestand and   
             Richard Molpus and   
                Rebecca Mercuri   Forum: Why Projects As Knowledge
                                  Acquisition Work; Complex, But Not That
                                  Complex; Blame the Process, Not the
                                  Parties  . . . . . . . . . . . . . . . . 11--13
                 Brock N. Meeks   Electronic frontier: Conspicuous in
                                  their silence  . . . . . . . . . . . . . 15--16
                 Phillip Armour   The business of software: The reorg
                                  cycle  . . . . . . . . . . . . . . . . . 19--22
          Jessica Brazelton and   
               G. Anthony Gorry   On site: Creating a knowledge-sharing
                                  community: if you build it, will they
                                  come?  . . . . . . . . . . . . . . . . . 23--25
                 Diane Crawford   ACM Fellows  . . . . . . . . . . . . . . 26--26
             Detlef Schoder and   
                  Kai Fischbach   Viewpoint: Peer-to-peer prospects  . . . 27--29
                 Richard Lethin   Introduction: Technical and social
                                  components of peer-to-peer computing . . 30--32
               John Kubiatowicz   Extracting guarantees from chaos . . . . 33--38
                 Philip E. Agre   P2P and the promise of Internet equality 39--42
          Hari Balakrishnan and   
          M. Frans Kaashoek and   
               David Karger and   
              Robert Morris and   
                     Ion Stoica   Looking up data in P2P systems . . . . . 43--48
                     Jintae Lee   An end-user perspective on file-sharing
                                  systems  . . . . . . . . . . . . . . . . 49--53
                Jinyoul Lee and   
                  Keng Siau and   
                   Soongoo Hong   Enterprise integration with ERP and EAI  54--60
                 Bay Arinze and   
            Murugan Anandarajan   A framework for using OO mapping methods
                                  to rapidly configure ERP systems . . . . 61--65
              Amitava Dutta and   
                      Rahul Roy   Anticipating Internet diffusion  . . . . 66--71
             James J. Jiang and   
                 Gary Klein and   
               Debbie Tesch and   
                  Hong-Gee Chen   Closing the user and provider service
                                  quality gap  . . . . . . . . . . . . . . 72--76
             Ravindra Krovi and   
           Akhilesh Chandra and   
             Balaji Rajagopalan   Information flow parameters for managing
                                  organizational processes . . . . . . . . 77--82
                Xinping Shi and   
               Philip C. Wright   E-commercializing business operations    83--87
               Nayeem Islam and   
                  Mohamed Fayad   Thinking objectively: Toward ubiquitous
                                  acceptance of ubiquitous computing . . . 89--92
               Peter G. Neumann   Inside risks: Gambling on system
                                  accountability . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 46, Number 3, March, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Thanks, But No Thanks; Still
                                  Choking on Spam; Cameras, Cameras,
                                  Everywhere; Rat's Sense; One Person's
                                  Garbage; Easy Dot-Com and Go . . . . . . 9--10
             Diane Crawford and   
        Dennis de Champeaux and   
         David Lorge Parnas and   
            Craig Partridge and   
                 Julio Lerm and   
            Oladokun Olajoyegbe   Forum: Extending and Shrinking UML; Give
                                  Meaning to the Status of Software
                                  Engineer; The Art of the Paper Review;
                                  No Waiting for Enterprise-Integration
                                  Products; Mathematical Rigor for the
                                  Social Sciences  . . . . . . . . . . . . 11--13
               Michael Cusumano   Technology strategy and management:
                                  Finding your balance in the products and
                                  services debate  . . . . . . . . . . . . 15--17
           Peter J. Denning and   
                  Robert Dunham   The profession of IT: The missing
                                  customer . . . . . . . . . . . . . . . . 19--23
                   Mohammad Rob   On site: The rise and fall of an
                                  e-commerce program . . . . . . . . . . . 25--26
                     Bob Besaha   Viewpoint: Bounty hunting in the patent
                                  base . . . . . . . . . . . . . . . . . . 27--29
                 Roel Vertegaal   Introduction: Attentive User Interfaces  30--33
                    Shumin Zhai   What's in the eyes for attentive input   34--39
           Jeffrey S. Shell and   
                 Ted Selker and   
                 Roel Vertegaal   Interacting with groups of computers . . 40--46
             Paul P. Maglio and   
        Christopher S. Campbell   Attentive agents . . . . . . . . . . . . 47--51
               Eric Horvitz and   
                 Carl Kadie and   
                   Tim Paek and   
                    David Hovel   Models of attention in computing and
                                  communication: from principles to
                                  applications . . . . . . . . . . . . . . 52--59
           Patrick Baudisch and   
               Doug DeCarlo and   
        Andrew T. Duchowski and   
              Wilson S. Geisler   Focusing on the essential: considering
                                  attention in display design  . . . . . . 60--66
        D. Scott McCrickard and   
                   C. M. Chewar   Attuning notification design to user
                                  goals and attention costs  . . . . . . . 67--72
José del R. Millán   Adaptive brain interfaces  . . . . . . . 74--80
         Lawrence A. Gordon and   
             Martin P. Loeb and   
                Tashfeen Sohail   A framework for using insurance for
                                  cyber-risk management  . . . . . . . . . 81--85
Gustavo da Rocha Barreto Pinto and   
   Sergio Palma J. Medeiros and   
      Jano Moreira de Souza and   
Julia Celia Mercedes Strauch and   
Carlete Rosana Ferreira Marques   Spatial data integration in a
                                  collaborative design framework . . . . . 86--90
           Mark C. Anderson and   
            Rajiv D. Banker and   
                 Sury Ravindran   The new productivity paradox . . . . . . 91--94
             Roger Evernden and   
                Elaine Evernden   Third-generation information
                                  architecture . . . . . . . . . . . . . . 95--98
                 David Chadwick   Deficiencies in LDAP when used to
                                  support PKI  . . . . . . . . . . . . . . 99--104
              Gary F. Templeton   Technical opinion: Object-oriented
                                  programming of integrated circuits . . . 105--108
             Barbara Simons and   
             Eugene H. Spafford   Inside risks: Risks of total
                                  surveillance . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 46, Number 4, April, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: More Tech Dollars for
                                  Defense; No Hands, No Break; More Net
                                  $=$ Less TV; Brain Scan; A Word to the
                                  Hip; Smart Dresser . . . . . . . . . . . 9--10
             Diane Crawford and   
              Sandy Ressler and   
           Michael DeBellis and   
               Mark Wallace and   
        Arthur M. Rosenberg and   
              Robert Levine and   
                Barry I. Soroka   Forum: The `Terrible Price' of the DMCA;
                                  The Patriot Act Is Only the Beginning;
                                  Communicating vs. Computing; Don't Tag
                                  Living Organisms . . . . . . . . . . . . 11--14
                Hal Berghel and   
                     Kim Womack   Digital village: Anonymizing the net . . 15--20
                     Jeff Grove   Viewpoint: Legal and technological
                                  efforts to lock up content threaten
                                  innovation . . . . . . . . . . . . . . . 21--22
                   Meg McGinity   Staying connected: Getting real  . . . . 23--26
                    Ramesh Jain   Viewpoint: Folk computing  . . . . . . . 27--29
            Deirdre K. Mulligan   Introduction: Digital Rights Management
                                  and Fair Use by Design . . . . . . . . . 30--33
               John S. Erickson   Fair use, DRM, and trusted computing . . 34--39
               Pamela Samuelson   DRM and, or, vs. the law . . . . . . . . 41--45
                 Julie E. Cohen   DRM and privacy  . . . . . . . . . . . . 46--49
      Séverine Dusollier   Fair use by design in the European
                                  Copyright Directive of 2001  . . . . . . 51--55
               Edward W. Felten   A skeptical view of DRM and fair use . . 56--59
             Barbara L. Fox and   
             Brian A. LaMacchia   Encouraging recognition of fair uses in
                                  DRM systems  . . . . . . . . . . . . . . 61--63
           Brian Fitzgerald and   
             Nancy L. Russo and   
                     Tom O'Kane   Software development method tailoring at
                                  Motorola . . . . . . . . . . . . . . . . 64--70
         François Pachet   Content management for electronic music
                                  distribution . . . . . . . . . . . . . . 71--75
             Susan A. Brown and   
            Viswanath Venkatesh   Bringing non-adopters along: the
                                  challenge facing the PC industry . . . . 76--80
              Julia B. Earp and   
                   David Baumer   Innovative Web use to learn about
                                  consumer behavior and online privacy . . 81--83
          Ali F. Farhoomand and   
           Pauline S. P. Ng and   
              William L. Conley   Building a successful e-business: the
                                  FedEx story  . . . . . . . . . . . . . . 84--89
                  Keng Siau and   
                    Zixing Shen   Building customer trust in mobile
                                  commerce . . . . . . . . . . . . . . . . 91--94
                Shan L. Pan and   
                    Jae-Nam Lee   Using e-CRM for a unified view of the
                                  customer . . . . . . . . . . . . . . . . 95--99
               Peter Wegner and   
                    Dina Goldin   Technical opinion: Computation beyond
                                  Turing machines  . . . . . . . . . . . . 100--102
                  Andrew Wright   Inside risks: On Sapphire and type-safe
                                  languages  . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 46, Number 5, May, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     Robert Fox   News track: Antiterror Gizmos; Grayer
                                  Days Ahead; Take Your Receipt; Gramr
                                  CWOT; Dot.con; Work Free on Free Time;
                                  Cyber Arches . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
                Urs Hoelzle and   
            Michael Lewchuk and   
        Lawrence A. Stabile and   
             Donn B. Parker and   
         Lawrence A. Gordon and   
             Martin P. Loeb and   
            Tashfeen Sohail and   
                    Harry Rudin   Forum: Archiving the Web is Feasible
                                  Today; Stop the Reorg Cycle; Customer
                                  Found; Cyber-Risk Management Not
                                  Feasible; Dear Life  . . . . . . . . . . 11--13
                 Phillip Armour   The business of software: In the zone:
                                  the need for flexible roles  . . . . . . 15--19
                Robert L. Glass   Practical programmer: One giant step
                                  backward . . . . . . . . . . . . . . . . 21--23
             Dennis Tsichritzis   Viewpoint: Life beyond the bubbles . . . 25--27
                 Aviel D. Rubin   Introduction: Wireless Networking
                                  Security . . . . . . . . . . . . . . . . 28--30
               Russ Housley and   
                William Arbaugh   Security problems in 802.11-based
                                  networks . . . . . . . . . . . . . . . . 31--34
           Nancy Cam-Winget and   
               Russ Housley and   
               David Wagner and   
                   Jesse Walker   Security flaws in 802.11 data link
                                  protocols  . . . . . . . . . . . . . . . 35--39
                Simon Byers and   
                   Dave Kormann   802.11b access point mapping . . . . . . 41--46
              Terry Schmidt and   
               Anthony Townsend   Why Wi-Fi wants to be free . . . . . . . 47--52
                  Amir Herzberg   Payments and banking with mobile
                                  personal devices . . . . . . . . . . . . 53--58
                Jae Kyu Lee and   
                    Mye M. Sohn   The eXtensible Rule Markup Language  . . 59--64
          Julie Smith David and   
        William E. McCarthy and   
                Brian S. Sommer   Agility: the key to survival of the
                                  fittest in the software market . . . . . 65--69
                Leah Graham and   
       Panagiotis Takis Metaxas   ``Of course it's true; I saw it on the
                                  Internet!'': critical thinking in the
                                  Internet era . . . . . . . . . . . . . . 70--75
                   Amrit Tiwana   Affinity to infinity in peer-to-peer
                                  knowledge platforms  . . . . . . . . . . 76--80
                      Ziqi Liao   Real-time taxi dispatching using Global
                                  Positioning Systems  . . . . . . . . . . 81--83
                Jae-Nam Lee and   
              Minh Q. Huynh and   
           Ron Chi-Wai Kwok and   
                   Shih-Ming Pi   IT outsourcing evolution: past, present,
                                  and future . . . . . . . . . . . . . . . 84--89
               George Marsaglia   Technical opinion: Seeds for random
                                  number generators: Techniques for
                                  choosing seeds for social and scientific
                                  applications of random number generators 90--93
               Peter G. Neumann   Inside risks: E-epistemology and
                                  misinformation . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 46, Number 6, June, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM staff   News track: Federal Red Flag; Proof in
                                  Numbers; Bots for What?; Spell Checked;
                                  Now You See It; Profiles in Trouble  . . 9--10
             Diane Crawford and   
               Mark Strefik and   
                 Rory Short and   
            Simone Santinie and   
               Peter Wegner and   
                    Dina Goldin   Forum: In DRM, Rethink Business
                                  Practices, Not Just Technology and the
                                  Law; Don't Forget Mental Models in
                                  Systems Development; What the Turing
                                  Machine Doesn't Model  . . . . . . . . . 11--13
             Rebecca T. Mercuri   Security watch: Analyzing security costs 15--18
               Pamela Samuelson   Legally speaking: Trade secrets vs. free
                                  speech . . . . . . . . . . . . . . . . . 19--23
                    Tom DeMarco   Viewpoint: The McCarthy protocols  . . . 24--25
             Thomas F. Stafford   Introduction: E-Services . . . . . . . . 26--28
                 Heather Kreger   Fulfilling the Web services promise  . . 29--30
         Christopher Ferris and   
                   Joel Farrell   What are Web services? . . . . . . . . . 31--31
             Roland T. Rust and   
                   P. K. Kannan   E-service: a new paradigm for business
                                  in the electronic environment  . . . . . 36--42
                 Ruth N. Bolton   Marketing challenges of e-services . . . 43--44
                   Hongjun Song   E-services at FedEx  . . . . . . . . . . 45--46
         M. Kathryn Brohman and   
          Richard T. Watson and   
           Gabriele Piccoli and   
                  A. Parasurama   Data completeness: a key to effective
                                  net-based customer service systems . . . 47--51
             K. Douglas Hoffman   Marketing + MIS $=$ e-service  . . . . . 53--55
               Neal G. Shaw and   
       Christopher W. Craighead   Technology enablers to recover from
                                  failures in e-services . . . . . . . . . 56--57
                Joseph Williams   The Web services debate: J2EE vs. .NET   58--63
                   Gerry Miller   The Web services debate: .NET vs. J2EE   64--67
            Walid Ben-Ameur and   
           Hervé Kerivin   New Economical Virtual Private Networks  69--73
              Huaiqing Wang and   
                      Chen Wang   Taxonomy of security considerations and
                                  software quality . . . . . . . . . . . . 75--78
                E. Vance Wilson   Asynchronous health care communication   79--84
               Kevin C. Desouza   Facilitating tacit knowledge exchange    85--88
                Fay Cobb Payton   Rethinking the digital divide  . . . . . 89--91
              Peter E. Hart and   
                     Ziming Liu   Trust in the preservation of digital
                                  information  . . . . . . . . . . . . . . 93--97
            James Backhouse and   
                  Carol Hsu and   
                Aidan McDonnell   Technical opinion: Toward public-key
                                  infrastructure interoperability  . . . . 98--100
             Diomidis Spinellis   Inside risks: Reflections on trusting
                                  trust revisited  . . . . . . . . . . . . 112--112

Communications of the ACM
Volume 46, Number 7, July, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Cinematic Watermark;
                                  Eye-Opening Education; Roaming Time;
                                  Stand By Me; Savings Bonds Fade to Net;
                                  Phone Home . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
             Simone Santini and   
              Ralph Castain and   
         William F. Dowling and   
                  John Cook and   
               Simon Dobson and   
           Peter J. Denning and   
              Robert Dunham and   
                 Jef Raskin and   
             Dennis Tsichritzis   Forum: When Is a Computer More Like a
                                  Guitar than a Washing Machine?;
                                  Corroboration the Only Way to Determine
                                  Web Accuracy; How to Teach Critical
                                  Thinking about Web Content; Create a
                                  Random Number Service Based on the
                                  Mersenne Twister; Make Fair Uses a Legal
                                  Requirement in DRM Systems; ``The
                                  Missing Customer'' Redux; Enthusiasm,
                                  Drive, Wisdom, Patience Not Tied to Age  11--13
               Michael Cusumano   Technology strategy and management:
                                  Beware the lure of the horizontal  . . . 15--17
               Peter J. Denning   The profession of IT: Accomplishment . . 19--23
                Rita R. Colwell   Viewpoint: From terabytes to insights    25--27
              Andrew Rosenbloom   Introduction: A Game Experience in Every
                                  Application  . . . . . . . . . . . . . . 28--31
           William Swartout and   
               Michael van Lent   Making a game of system design . . . . . 32--39
                Mary C. Whitton   Making virtual environments compelling   40--47
                    Ramesh Jain   Experiential computing . . . . . . . . . 48--55
              Michael Tsang and   
         George Fitzmaurice and   
            Gord Kurtenbach and   
                      Azam Khan   Game-like navigation and responsiveness
                                  in non-game applications . . . . . . . . 56--61
             Joseph A. Paradiso   Tracking contact and free gesture across
                                  large interactive surfaces . . . . . . . 62--69
               Carlo Tomasi and   
                Abbas Rafii and   
               Ilhami Torunoglu   Full-size projection keyboard for
                                  handheld devices . . . . . . . . . . . . 70--75
           Cynthia Breazeal and   
              Andrew Brooks and   
                 Jesse Gray and   
               Matt Hancher and   
                John McBean and   
                 Dan Stiehl and   
                Joshua Strickon   Interactive robot theatre  . . . . . . . 76--85
               Paul Vickers and   
                  James L. Alty   Siren songs and swan songs debugging
                                  with music . . . . . . . . . . . . . . . 86--93
                 Daniel May and   
                    Paul Taylor   Knowledge management with patterns . . . 94--99
                Jackie Rees and   
   Subhajyoti Bandyopadhyay and   
             Eugene H. Spafford   PFIRES: a policy framework for
                                  information security . . . . . . . . . . 101--106
        Sudip Bhattacharjee and   
               Ram D. Gopal and   
            G. Lawrence Sanders   Digital music and online sharing:
                                  software piracy 2.0? . . . . . . . . . . 107--111
                   Alan H. Karp   E-speak e-xplained . . . . . . . . . . . 112--118
               Varun Grover and   
                  Khawaja Saeed   The telecommunication industry
                                  revisited: the changing pattern of
                                  partnerships . . . . . . . . . . . . . . 119--125
                Timon C. Du and   
                Eldon Y. Li and   
                   An-Pin Chang   Mobile agents in distributed network
                                  management . . . . . . . . . . . . . . . 127--132
            D. Scott Brandt and   
                     Lorna Uden   Insight into mental models of novice
                                  Internet searchers . . . . . . . . . . . 133--136
               Younghwa Lee and   
                 Zoonky Lee and   
               Kai R. T. Larsen   Coping with Internet channel conflict    137--142
             Zakaria Maamar and   
              Paul Labbé   Technical opinion: Moving vs. inviting
                                  software agents  . . . . . . . . . . . . 143--144
                    Albert Levi   Inside risks: How secure is secure Web
                                  browsing?  . . . . . . . . . . . . . . . 152--152

Communications of the ACM
Volume 46, Number 8, August, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                      ACM Staff   News track; Blood Spills Builds Skills;
                                  Canary in a Chip; PlayStation
                                  Superpower; Personal Shopper; Learner
                                  and Meaner; Get Me Rewrite!  . . . . . . 9--10
             Diane Crawford and   
              Ralph Castain and   
               Viktor Decyk and   
                Ben Schwarz and   
            Michael Metcalf and   
                 Rob Dublin and   
            Robert L. Glass and   
               Bob Morrison and   
               Frans Swaalf and   
                    Martin Henz   Forum: Backward and Forward with the
                                  Practical Programmer; Don't Forget
                                  Experience in Role Definition; Correct
                                  Me If I'm Wrong; Article or Ad?  . . . . 11--13
                    Hal Berghel   Digital village: The discipline of
                                  Internet forensics . . . . . . . . . . . 15--20
                Robert L. Glass   Practical programmer: A mugwump's-eye
                                  view of Web work . . . . . . . . . . . . 21--23
             William W. Agresti   Viewpoint: Discovery informatics . . . . 25--28
              David L. Dill and   
             Bruce Schneier and   
                 Barbara Simons   Viewpoint: Voting and technology: who
                                  gets to count your vote? Paperless
                                  voting machines threaten the integrity
                                  of democratic process by what they \em
                                  don't do . . . . . . . . . . . . . . . . 29--31
            Bjorn De Sutter and   
              Koen De Bosschere   Introduction: Software techniques for
                                  program compaction . . . . . . . . . . . 32--34
                  Frank Tip and   
           Peter F. Sweeney and   
                   Chris Laffra   Extracting library-based Java
                                  applications . . . . . . . . . . . . . . 35--40
               Bruno De Bus and   
        Daniel Kästner and   
           Dominique Chanet and   
               Ludo Van Put and   
                Bjorn De Sutter   Post-pass compaction techniques  . . . . 41--46
        Arvind Krishnaswamy and   
                    Rajiv Gupta   Mixed-width instruction sets . . . . . . 47--52
              Saumya Debray and   
               William S. Evans   Cold code decompression at runtime . . . 54--60
           William S. Evans and   
          Christopher W. Fraser   Grammar-based compression of interpreted
                                  code . . . . . . . . . . . . . . . . . . 61--66
               Padmal Vitharana   Risks and challenges of component-based
                                  software development . . . . . . . . . . 67--72
              Richard E. Potter   How CIOs manage their superiors'
                                  expectations . . . . . . . . . . . . . . 74--79
          Thomas W. Jackson and   
                 Ray Dawson and   
                  Darren Wilson   Understanding email interaction
                                  increases organizational productivity    80--84
              Bruce Russell and   
              Sangit Chatterjee   Relationship quality: the undervalued
                                  dimension of software quality  . . . . . 85--89
             Michael E. Whitman   Enemy at the gate: threats to
                                  information security . . . . . . . . . . 91--95
         Gert-Jan de Vreede and   
          Robert M. Davison and   
               Robert O. Briggs   How a silver bullet may lose its shine   96--101
               Kenneth R. Walsh   Analyzing the application ASP concept:
                                  technologies, economies, and strategies  103--107
            T. Ravichandran and   
         Marcus A. Rothenberger   Software reuse strategies and component
                                  markets  . . . . . . . . . . . . . . . . 109--114
                   Zhou Zhiying   CMM in uncertain environments  . . . . . 115--119
           P. Nicopolitidis and   
        G. I. Papadimitriou and   
              M. S. Obaidat and   
               A. S. Pomportsis   Technical opinion: Third generation and
                                  beyond wireless systems  . . . . . . . . 120--124
               Lauren Weinstein   Inside risks: Spam wars  . . . . . . . . 136--136

Communications of the ACM
Volume 46, Number 9, September, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 7--7
                     CACM staff   News track: Juggling Outsourcing Stats;
                                  He Said, She Said; Royal E-Flush; Plane
                                  Precision; Email Evidence; VCR RIP?
                                  Driver to Distraction  . . . . . . . . . 11--12
             Diane Crawford and   
        Richard M. Stallman and   
          Richard Proudfoot and   
        Sudip Bhattacharjee and   
               Ram D. Gopal and   
        G. Lawrence Sanders and   
                Tom Pittman and   
          Richard R. Brooks and   
             Dennis E. Hamilton   Forum: Legalize Music Sharing Now; Hold
                                  the Games; Give Up Trying to Halt the
                                  Flow of Information; Praise for
                                  Denning's Powerful Chord of
                                  Professionalism  . . . . . . . . . . . . 13--15
                   Meg McGinity   Staying connected: Power to the people   17--20
                Seymour Goodman   International perspectives: The origins
                                  of digital computing in Europe . . . . . 21--25
                 Phillip Armour   The business of software: Closing the
                                  learning application gap . . . . . . . . 27--31
                Yigal Arens and   
             Paul S. Rosenbloom   Viewpoint: Responding to the unexpected  33--35
                   Keith Devlin   Introduction: Why universities require
                                  computer science students to take math   36--39
               Kim B. Bruce and   
    Robert L. Scot Drysdale and   
            Charles Kelemen and   
                   Allen Tucker   Why math?  . . . . . . . . . . . . . . . 40--44
             Peter B. Henderson   Mathematical reasoning in software
                                  engineering education  . . . . . . . . . 45--50
              Vicki L. Almstrum   What is the attraction to computing? . . 51--55
                  Alfred W. Loo   The future of peer-to-peer computing . . 56--61
             Michiel Ronsse and   
          Koen De Bosschere and   
           Mark Christiaens and   
Jacques Chassin de Kergommeaux and   
       Dieter Kranzlmüller   Record/replay for nondeterministic
                                  program executions . . . . . . . . . . . 62--67
         Atreyi Kankanhalli and   
      Fransiska Tanudidjaja and   
            Juliana Sutanto and   
              Bernard C. Y. Tan   The role of IT in successful knowledge
                                  management initiatives . . . . . . . . . 69--73
          Roberto Di Pietro and   
               Luigi V. Mancini   Security and privacy issues of handheld
                                  and wearable wireless devices  . . . . . 74--79
          Ali F. Farhoomand and   
               Pauline S. P. Ng   Creating sustainable competitive
                                  advantage through internetworked
                                  communities  . . . . . . . . . . . . . . 83--88
              G. Prem Premkumar   Alternate distribution strategies for
                                  digital music  . . . . . . . . . . . . . 89--95
          Robert G. Fichman and   
                 Mary J. Cronin   Information-rich commerce at a
                                  crossroads: business and technology
                                  adoption requirements  . . . . . . . . . 96--102
                  Ziqi Liao and   
             Michael Tow Cheung   Concurrent-convergent strategy in IT
                                  consulting . . . . . . . . . . . . . . . 103--104
               Stefan Baldi and   
                Hauke Heier and   
            Anett Mehler-Bicher   Technical opinion: Open courseware and
                                  open source software . . . . . . . . . . 105--107
               Peter G. Neumann   Inside risks: Risks in trusting
                                  untrustworthiness  . . . . . . . . . . . 120--120
          Ari-Veikko Anttiroiko   Building strong e-democracy: the role of
                                  technology in developing democracy for
                                  the information age  . . . . . . . . . . 121--128
         Patrick Y. K. Chau and   
                   Simpson Poon   Octopus: an e-cash payment system
                                  success story  . . . . . . . . . . . . . 129--133
              John Erickson and   
                      Keng Siau   E-ducation . . . . . . . . . . . . . . . 134--140
         Kiran J. Fernandes and   
                Vinesh Raja and   
                    Julian Eyre   Cybersphere: the fully immersive
                                  spherical projection system  . . . . . . 141--146
                 Lee A. Freeman   A refresher in data flow diagramming: an
                                  effective aid for analysts . . . . . . . 147--151
       Chittibabu Govindarajulu   End users: who are they? . . . . . . . . 152--159
                Ernest Goss and   
                      Uma Gupta   Women and the Internet: is there an
                                  economic payoff? . . . . . . . . . . . . 160--166
               Kathleen Hartzel   How self-efficacy and gender issues
                                  affect software adoption and use . . . . 167--171
       Richard D. Holowczak and   
              Nabil R. Adam and   
       Francisco J. Artigas and   
                     Irfan Bora   Data warehousing in environmental
                                  digital libraries  . . . . . . . . . . . 172--178
                   Ned Kock and   
            Camille Auspitz and   
                      Brad King   Web-supported course partnerships:
                                  bringing industry and academia together  179--183
               Sarv Devaraj and   
                   Ming Fan and   
                    Rajiv Kohli   E-loyalty: elusive ideal or competitive
                                  edge?  . . . . . . . . . . . . . . . . . 184--191
            James M. Laffey and   
                Dale Musser and   
            Herbert Remidez and   
                Josh Gottdenker   Networked systems for schools that learn 192--200
         William Lewis, Jr. and   
          Richard T. Watson and   
                    Ann Pickren   An empirical assessment of IT disaster
                                  risk . . . . . . . . . . . . . . . . . . 201--206
               Trevor T. Moores   The effect of national culture and
                                  economic wealth on global software
                                  piracy rates . . . . . . . . . . . . . . 207--215
       Scott L. Schneberger and   
              Ephraim R. McLean   The complexity cross: implications for
                                  practice . . . . . . . . . . . . . . . . 216--225
         Jeff Hoi Yan Yeung and   
                 J. P. Shim and   
               Andy Yin Kit Lai   Current progress of e-commerce adoption:
                                  small and medium enterprises in Hong
                                  Kong . . . . . . . . . . . . . . . . . . 226--232
              Kunihiko Higa and   
                   Bongsik Shin   The telework experience in Japan . . . . 233--242
                    Nitin Singh   Emerging technologies to support supply
                                  chain management . . . . . . . . . . . . 243--247
               Ritu Agarwal and   
                 Atish P. Sinha   Object-oriented modeling with UML: a
                                  study of developers' perceptions . . . . 248--256
          Jarke J. van Wijk and   
              Frank van Ham and   
           Huub van de Wetering   Rendering hierarchical data  . . . . . . 257--263
                  Kevin Zhu and   
               Bryan MacQuarrie   The economics of digital bundling: the
                                  impact of digitization and bundling on
                                  the music industry . . . . . . . . . . . 264--270

Communications of the ACM
Volume 46, Number 10, October, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                      ACM Staff   News track: Salt in the Wound; Coming
                                  into Focus; Study in Slime; That's
                                  Courriel, S'il Vous Pla\^\it; A Healthy
                                  Spritz; How Does That Make You Feel?;
                                  Dial-A-Dolphin . . . . . . . . . . . . . 9--10
             Diane Crawford and   
              Peter Sommers and   
                Hal Berghel and   
         W. Terry Hardgrave and   
               Chris Morris and   
                     Jim Haynes   Forum: Tell It to the Judge; What
                                  Software Engineering Can Do for Web
                                  Development  . . . . . . . . . . . . . . 11--13
               Pamela Samuelson   Legally speaking: Unsolicited
                                  communications as trespass?  . . . . . . 15--20
               Michael Cusumano   Technology strategy and management:
                                  Company character and the software
                                  business . . . . . . . . . . . . . . . . 21--23
           M. P. Papazoglou and   
              D. Georgakopoulos   Introduction: Service-Oriented Computing 24--28
          Francisco Curbera and   
               Rania Khalaf and   
               Nirmal Mukhi and   
                 Stefan Tai and   
            Sanjiva Weerawarana   The next step in Web services  . . . . . 29--34
                      Jian Yang   Web service componentization . . . . . . 35--40
             L. G. Meredith and   
                    Steve Bjorg   Contracts and types  . . . . . . . . . . 41--47
                    Mark Little   Transactions and Web services  . . . . . 49--54
               Fabio Casati and   
                  Eric Shan and   
             Umeshwar Dayal and   
                Ming-Chien Shan   Business-oriented management of Web
                                  services . . . . . . . . . . . . . . . . 55--60
                       Dov Dori   Introduction: Conceptual Modeling and
                                  System Architecting  . . . . . . . . . . 62--65
        Nathan R. Soderborg and   
          Edward F. Crawley and   
                       Dov Dori   System function and architecture:
                                  OPM-based definitions and operational
                                  templates  . . . . . . . . . . . . . . . 67--72
        Brian Henderson-Sellers   Method engineering for OO systems
                                  development  . . . . . . . . . . . . . . 73--78
              Andrew Gemino and   
                      Yair Wand   Evaluating modeling techniques based on
                                  models of learning . . . . . . . . . . . 79--84
              Graeme Shanks and   
          Elizabeth Tansley and   
                      Ron Weber   Using ontology to validate conceptual
                                  models . . . . . . . . . . . . . . . . . 85--89
                   Hans Moravec   Robots, after all  . . . . . . . . . . . 90--97
                    Sai Ho Kwok   Watermark-based copyright protection
                                  system security  . . . . . . . . . . . . 98--101
  Willem-Jan Van Den Heuvel and   
                 Zakaria Maamar   Intelligent Web services moving toward a
                                  framework to compose . . . . . . . . . . 103--109
      Pairin Katerattanakul and   
                Bernard Han and   
                   Soongoo Hong   Objective quality ranking of computing
                                  journals . . . . . . . . . . . . . . . . 111--114
             Cong-cong Xing and   
          Boumediene Belkhouche   Technical opinion: On pseudo
                                  object-oriented programming considered
                                  harmful  . . . . . . . . . . . . . . . . 115--117
               Peter G. Neumann   Inside risks: Information system
                                  security redux . . . . . . . . . . . . . 136--136

Communications of the ACM
Volume 46, Number 11, November, 2003

                 Diane Crawford   Editoral pointers  . . . . . . . . . . . 5--5
                      ACM Staff   News track: Security holes; Don't Look
                                  Back; Developing PC Nations; Hari Today,
                                  Brain Surgery Tomorrow?; IMing at Work;
                                  Now Speak  . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
            Joseph F. Traub and   
             Reidar Conradi and   
              Steve Johnson and   
                Clinton Mah and   
Frédéric Guéron and   
                 David lowe and   
               Bill Willcox and   
         Rommert J. Casimir and   
               Kevin Mackie and   
               Mark Wallace and   
                Andries van Dam   Forum: CS Student's Need Other Kinds of
                                  Math, Too; Web Development Not So
                                  Different After All; For Responsible
                                  Spam, Pay As You Go; No Innovation Means
                                  No Customers; Computer Allure Moves East 11--13
               Peter J. Denning   The profession of IT: Great principles
                                  of computing . . . . . . . . . . . . . . 15--20
                Robert L. Glass   Practical programmer: A sociopolitical
                                  look at open source  . . . . . . . . . . 21--23
               Geoffrey Sampson   Viewpoint: The myth of diminishing firms 25--28
                Maxine D. Brown   Introduction: Blueprint for the future
                                  of high-performance networking . . . . . 30--33
                Tom DeFanti and   
               Cees de Laat and   
              Joe Mambretti and   
               Kees Neggers and   
                Bill St. Arnaud   TransLight: a global-scale LambdaGrid
                                  for e-science  . . . . . . . . . . . . . 34--41
                 Aaron Falk and   
                  Ted Faber and   
           Joseph Bannister and   
               Andrew Chien and   
            Robert Grossman and   
                    Jason Leigh   Transport protocols for high performance 42--49
                 Ian Foster and   
             Robert L. Grossman   Data integration in a bandwidth-rich
                                  world  . . . . . . . . . . . . . . . . . 50--57
             Larry L. Smarr and   
            Andrew A. Chien and   
                Tom DeFanti and   
                Jason Leigh and   
         Philip M. Papadopoulos   The OptIPuter  . . . . . . . . . . . . . 58--67
           Harvey B. Newman and   
           Mark H. Ellisman and   
                 John A. Orcutt   Data-intensive e-science frontier
                                  research . . . . . . . . . . . . . . . . 68--77
           Stuart J. Barnes and   
                    Sid L. Huff   Rising sun: iMode and the wireless
                                  Internet . . . . . . . . . . . . . . . . 78--84
              Daniel P. Lorence   The perils of data misreporting  . . . . 85--88
           Robert F. Easley and   
             John G. Michel and   
                   Sarv Devaraj   The MP3 open standard and the music
                                  industry's response to Internet piracy   90--96
           Padmal Vitharana and   
      Fatemah Mariam Zahedi and   
                    Hemant Jain   Design, retrieval, and assembly in
                                  component-based software development . . 97--102
                A. Graham Peace   Balancing free speech and censorship:
                                  academia's response to the Internet  . . 104--109
             Narasimhaiah Gorla   Features to consider in a data
                                  warehousing system . . . . . . . . . . . 111--115
          Jeffrey P. Landry and   
           J. Harold Pardue and   
Herbert E. Longenecker, Jr. and   
             David F. Feinstein   A common theme for IT degree programs    117--120
             Donald Anselmo and   
                  Henry Ledgard   Measuring productivity in the software
                                  industry . . . . . . . . . . . . . . . . 121--125
             David Nordfors and   
               Michel Bajuk and   
               Lena Norberg and   
           Jochen Brinkmann and   
                    Dan Forbush   Introducing a country to
                                  Internet-enabled expert networks . . . . 127--132
         Rebecca T. Mercuri and   
               Peter G. Neumann   Inside risks: Security by obscurity  . . 160--160

Communications of the ACM
Volume 46, Number 12, December, 2003

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                      ACM Staff   News track: Pay as You Go Plan; You Say
                                  ``Potato''; Who Types There?; Homework
                                  and the Web; \`A la Cart; Shattering Net
                                  Speeds; Gift Bots  . . . . . . . . . . . 9--10
             Diane Crawford and   
             Simone Santini and   
                Bill Buxton and   
               Joanna Wolfe and   
            Carl J. Mueller and   
                Halina Kaminski   Forum: Keep the Pedagogical Ahead of the
                                  Technological; Minds Over Math;
                                  Requirements vs. Components; Mark Every
                                  Vote Count . . . . . . . . . . . . . . . 11--13
       ACM Nominating Committee   Nominees for elections and report of the
                                  ACM Nominating Committee . . . . . . . . 14--14
                    Hal Berghel   Digital Village: Malware month . . . . . 15--19
             Rebecca T. Mercuri   Security Watch: Standards insecurity . . 21--25
                   Alan H. Karp   Viewpoint: Enforce POLA on processes to
                                  control viruses  . . . . . . . . . . . . 27--29
         Andrew Urbaczewski and   
         Joseph S. Valacich and   
              Leonard M. Jessup   Introduction: Mobile Commerce:
                                  Opportunities and Challenges . . . . . . 30--32
         Thomas F. Stafford and   
              Mark L. Gillenson   Mobile commerce: what it is and what it
                                  could be . . . . . . . . . . . . . . . . 33--34
           Suprateek Sarker and   
                  John D. Wells   Understanding mobile handheld device use
                                  and adoption . . . . . . . . . . . . . . 35--40
        Sirkka L. Jarvenpaa and   
           Karl Reiner Lang and   
                Yoko Takeda and   
      Virpi Kristiina Tuunainen   Mobile commerce at crossroads  . . . . . 41--44
                        Jun Sun   Information requirement elicitation in
                                  mobile commerce  . . . . . . . . . . . . 45--47
              Young Eun Lee and   
                  Izak Benbasat   Interface design for mobile commerce . . 48--52
        Viswanath Venkatesh and   
                  V. Ramesh and   
                 Anne P. Massey   Understanding usability in mobile
                                  commerce . . . . . . . . . . . . . . . . 53--56
               Peter Tarasewich   Designing mobile commerce applications   57--60
                 Bharat Rao and   
                Louis Minakakis   Evolution of mobile location-based
                                  services . . . . . . . . . . . . . . . . 61--65
        William E. Spangler and   
           Mordechai Gal-Or and   
                 Jerrold H. May   Using data mining to profile TV viewers  66--72
                Jim Q. Chen and   
                 Ted E. Lee and   
              Ruidong Zhang and   
                 Yue Jeff Zhang   Systems requirements for organizational
                                  learning . . . . . . . . . . . . . . . . 73--78
                         Xu Yan   Mobile data communications in China  . . 80--85
              Rajiv Kishore and   
                  H. R. Rao and   
                     K. Nam and   
             S. Rajagopalan and   
                   A. Chaudhury   A relationship perspective on IT
                                  outsourcing  . . . . . . . . . . . . . . 86--92
              Tim Chenoweth and   
               David Schuff and   
               Robert St. Louis   A method for developing dimensional data
                                  marts  . . . . . . . . . . . . . . . . . 93--98
              Coskun Bayrak and   
                     Chad Davis   The relationship between distributed
                                  systems and open software development    99--102
               Lauren Weinstein   Inside Risks: The devil you know . . . . 144--144
                Manju Ahuja and   
               Babita Gupta and   
                 Pushkala Raman   An empirical investigation of online
                                  consumer purchasing behavior . . . . . . 145--151
                     Ravi Bapna   When snipers become predators: can
                                  mechanism design save online auctions?   152--158
                  Amit Basu and   
                   Steve Muylle   Authentication in e-commerce . . . . . . 159--166
                  Sid Davis and   
                  Keng Siau and   
             Kumar Dhenuvakonda   A fit-gap analysis of e-business
                                  curricula vs. industry needs . . . . . . 167--177
  Pattarawan Prasarnphanich and   
              Mark L. Gillenson   The hybrid clicks and bricks business
                                  model  . . . . . . . . . . . . . . . . . 178--185
              Sanjay Gosain and   
            Arvind Malhotra and   
            Omar A. El Sawy and   
                   Fadi Chehade   The impact of common e-business
                                  interfaces . . . . . . . . . . . . . . . 186--195
           Stefano Grazioli and   
            Sirkka L. Jarvenpaa   Deceived: under target online  . . . . . 196--205
           Khawaja A. Saeed and   
               Varun Grover and   
                   Yujong Hwang   Creating synergy with a clicks and
                                  mortar approach  . . . . . . . . . . . . 206--212
              Andrew Holmes and   
                      John Ryan   Viewpoint: the end of the long boom  . . 213--216
          Philip M. Johnson and   
           Mette L. Moffett and   
              Brian T. Pentland   Lessons learned from VCommerce . . . . . 217--225
      Pairin Katerattanakul and   
                      Keng Siau   Creating a virtual store image . . . . . 226--232
            Mohamed Khalifa and   
                   Moez Limayem   Drivers of Internet shopping . . . . . . 233--239
                Minhee Chae and   
                     Jinwoo Kim   What's so different about the mobile
                                  Internet?  . . . . . . . . . . . . . . . 240--247
                  Ziqi Liao and   
             Michael Tow Cheung   Challenges to Internet e-banking . . . . 248--250
                 Zakaria Maamar   Commerce, e-commerce, and m-commerce:
                                  what comes next? . . . . . . . . . . . . 251--257
               David Martin and   
                  Hailin Wu and   
                    Adil Alsaid   Hidden surveillance by Web sites: Web
                                  bugs in contemporary use . . . . . . . . 258--264
           Trevor T. Moores and   
               Gurpreet Dhillon   Do privacy seals in e-commerce really
                                  work?  . . . . . . . . . . . . . . . . . 265--271
             Kyle B. Murray and   
              Gerald Häubl   A human capital perspective of skill
                                  acquisition and interface loyalty  . . . 272--278
              G. Prem Premkumar   Perspectives of the e-marketplace by
                                  multiple stakeholders  . . . . . . . . . 279--288
          Robert W. Proctor and   
           Kim-Phuong L. Vu and   
         Lawrence J. Najjar and   
           Misha W. Vaughan and   
               Gavriel Salvendy   Content preparation and management for
                                  e-commerce Web sites . . . . . . . . . . 289--299
          Mani R. Subramani and   
             Balaji Rajagopalan   Knowledge-sharing and influence in
                                  online social networks via viral
                                  marketing  . . . . . . . . . . . . . . . 300--307
             C. Ranganathan and   
                 Vern Goode and   
            Arkalgud Ramaprasad   Managing the transition to bricks and
                                  clicks . . . . . . . . . . . . . . . . . 308--316
               Dan Jong Kim and   
             Manish Agrawal and   
           Bharat Jayaraman and   
                  H. Raghav Rao   A comparison of B2B e-service solutions  317--324
                A. F. Salam and   
                  H. R. Rao and   
                   C. C. Pegels   Consumer-perceived risk in e-commerce
                                  transactions . . . . . . . . . . . . . . 325--331
               Xiaowen Fang and   
               Gavriel Salvendy   Customer-centered rules for design of
                                  e-commerce Web sites . . . . . . . . . . 332--336
             Fang-Fang Tang and   
             Marcel G. Thom and   
            Liang Toon Wang and   
             Joai Ching Tan and   
               Wai Yee Chow and   
                   Xiaoyun Tang   Using insurance to create trust on the
                                  Internet . . . . . . . . . . . . . . . . 337--344
               Amrit Tiwana and   
              Ephraim R. McLean   The tightrope to e-business project
                                  success  . . . . . . . . . . . . . . . . 345--350
        Anthony M. Townsend and   
               James T. Bennett   Viewpoint: living and bidding in an
                                  auction economy  . . . . . . . . . . . . 351--353
        Ganesh Vaidyanathan and   
                   Sarv Devaraj   A five-factor framework for analyzing
                                  online risks in e-businesses . . . . . . 354--361


Communications of the ACM
Volume 47, Number 1, January, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                      ACM Staff   News track: Sound of Silence; `And For
                                  Out Next Nano Number \ldots';
                                  International Enrollment Slows; The Body
                                  Electric; Calling All Buoys; Checked Out 9--10
             Diane Crawford and   
            H. Joel Jeffrey and   
               Hans Moravec and   
             Joseph Frisina and   
               Douglas Lyon and   
                 Jef Raskin and   
                 John Craig and   
                  Joy Getha and   
                  Art Gittleman   Forum: More Startling AI Predictions;
                                  Mandate Safety-Critical Software;
                                  Limited Math Limits the CS Curriculum;
                                  Hands-On How We Learn; Not Enough Joy of
                                  Computing  . . . . . . . . . . . . . . . 11--13
                   Meg McGinity   Staying connected: RFID: is this game of
                                  tag fair play? . . . . . . . . . . . . . 15--18
                 Phillip Armour   The Business of Software: When
                                  executives code  . . . . . . . . . . . . 19--22
                     CACM Staff   ACM annual report for FY03 . . . . . . . 23--29
              Sharon Oviatt and   
             Trevor Darrell and   
                 Myron Flickner   Introduction: Multimodal interfaces that
                                  flex, adapt, and persist . . . . . . . . 30--33
               Anil K. Jain and   
                      Arun Ross   Multibiometric systems . . . . . . . . . 34--40
            Philip R. Cohen and   
                 David R. McGee   Tangible multimodal interfaces for
                                  safety-critical applications . . . . . . 41--46
         Roberto Pieraccini and   
          Krishna Dayanidhi and   
             Jonathan Bloom and   
             Jean-Gui Dahan and   
           Michael Phillips and   
           Bryan R. Goodman and   
            K. Venkatesh Prasad   Multimodal conversational systems for
                                  automobiles  . . . . . . . . . . . . . . 47--49
            Harriet J. Nock and   
         Giridharan Iyengar and   
                Chalapathy Neti   Multimodal processing by finding common
                                  cause  . . . . . . . . . . . . . . . . . 51--56
             Leah M. Reeves and   
               Jennifer Lai and   
            James A. Larson and   
              Sharon Oviatt and   
               T. S. Balaji and   
   Stéphanie Buisine and   
             Penny Collings and   
                 Phil Cohen and   
                  Ben Kraal and   
         Jean-Claude Martin and   
             Michael McTear and   
                T. V. Raman and   
             Kay M. Stanney and   
                     Hui Su and   
                 Qian Ying Wang   Guidelines for multimodal user interface
                                  design . . . . . . . . . . . . . . . . . 57--59
                   Matthew Turk   Computer vision in the interface . . . . 60--67
                    Li Deng and   
                  Xuedong Huang   Challenges in adopting speech
                                  recognition  . . . . . . . . . . . . . . 69--75
           Cynthia F. Cohen and   
          Stanley J. Birkin and   
         Monica J. Garfield and   
                 Harold W. Webb   Managing conflict in software testing    76--81
      Albert B. Schwarzkopf and   
          Roberto J. Mejias and   
      `Jon (Sean) Jasperson and   
          Carol S. Saunders and   
              Hermann Gruenwald   Effective practices for IT skills
                                  staffing . . . . . . . . . . . . . . . . 83--88
        B. Craig Cumberland and   
         Joseph S. Valacich and   
              Leonard M. Jessup   Understanding meteor burst
                                  communications technologies  . . . . . . 89--92
            Robert J. Aiken and   
            Javad Boroumand and   
                  Stephen Wolff   Network and computing research
                                  infrastructure: back to the future . . . 93--98
             Ronald Dattero and   
                Stuart D. Galup   Programming languages and gender . . . . 99--102
           Seung Kyoon Shin and   
               Ram D. Gopal and   
        G. Lawrence Sanders and   
             Andrew B. Whinston   Global software piracy revisited . . . . 103--107
                Wenhong Luo and   
               Mohammad Najdawi   Trust-building measures: a review of
                                  consumer health portals  . . . . . . . . 108--113
                Marcus J. Ranum   Inside Risks: Believing in myths . . . . 144--144

Communications of the ACM
Volume 47, Number 2, February, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                      ACM Staff   News track: Resizing America; Little
                                  Shop of Software; What Women Want in
                                  Wheels; Virtual Autopsies; Coming of
                                  Age; Poetic Programming  . . . . . . . . 9--10
             Diane Crawford and   
            Steve Wildstrom and   
                Hal Berghel and   
           Charles Burnette and   
                 Jiming Liu and   
           Peter J. Denning and   
               Carl Binding and   
                   Robert Swarr   Forum: Defense in Depth Gets the Worm;
                                  Put Cognitive Modes in CS and Its
                                  Curricula; Don't Blame WAP [Wireless
                                  Application Protocol]; Market Share vs.
                                  Peer Approval in Open Source . . . . . . 11--13
               Pamela Samuelson   Legally speaking: What's at stake in \em
                                  MGM v. Grokster? . . . . . . . . . . . . 15--20
              Gregory J. Pottie   Viewpoint: Privacy in the global
                                  e-village  . . . . . . . . . . . . . . . 21--23
                Robert L. Glass   Practical programmer: A look at the
                                  economics of open source . . . . . . . . 25--27
            Jakka Sairamesh and   
                 Alison Lee and   
                 Loretta Anania   Introduction: Information Cities . . . . 28--31
                Lee Sproull and   
              John F. Patterson   Making information cities livable  . . . 33--37
        Elizabeth Churchill and   
         Andreas Girgensohn and   
                 Les Nelson and   
                     Alison Lee   Blending digital and physical spaces for
                                  ubiquitous community participation . . . 38--44
            Donald Ferguson and   
            Jakka Sairamesh and   
                 Stuart Feldman   Open frameworks for information cities   45--49
          Petros Kavassalis and   
              Stelios Lelis and   
              Mahmoud Rafea and   
                    Seif Haridi   What makes a Web site popular? . . . . . 50--55
               Luis von Ahn and   
                Manuel Blum and   
                  John Langford   Telling humans and computers apart
                                  automatically  . . . . . . . . . . . . . 56--60
             Yossi Lichtenstein   Puzzles in software development
                                  contracting  . . . . . . . . . . . . . . 61--65
              Conan C. Albrecht   How clean is the future of SOAP? . . . . 66--68
              Rajiv Kishore and   
                 Hong Zhang and   
                      R. Ramesh   A Helix-Spindle model for ontological
                                  engineering  . . . . . . . . . . . . . . 69--75
                 Pearl Brereton   The software customer/supplier
                                  relationship . . . . . . . . . . . . . . 77--81
            Elizabeth M. Pierce   Assessing data quality with control
                                  matrices . . . . . . . . . . . . . . . . 82--86
         Patrick Y. K. Chau and   
                Paul Jen-Hwa Hu   Technology implementation for
                                  telemedicine programs  . . . . . . . . . 87--92
              Csaba Egyhazy and   
                   Raj Mukherji   Interoperability architecture using
                                  RM-ODP . . . . . . . . . . . . . . . . . 93--97
      Ruth Bolotin Schwartz and   
               Michele C. Russo   Technical opinion: How to quickly find
                                  articles in the top IS journals  . . . . 98--101
               Lauren Weinstein   Inside risks: Outsourced and out of
                                  control  . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 47, Number 3, March, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Blurred vision; (Keep) Phone
                                  Home; Love/Hate Relationship; Image
                                  Makeover; Robot Scientist; Rooms with a
                                  View . . . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
             Peter G. Raeth and   
               Mark Wallace and   
               David Hawley and   
             Donald Anselmo and   
              Henry Ledgard and   
              Dwayne Nelson and   
          Yitzchak Gottlieb and   
             Alex Simonelis and   
              Coskun Bayrak and   
                     Chad Davis   Forum: Principles of Logical Thought
                                  Before Technical Details; Why Reinvent
                                  When We Have Open Source?; Still Seeking
                                  Software Productivity; Spare Me the
                                  Self-Service; Lineage of the Internet's
                                  Open Systems Foundation  . . . . . . . . 11--13
             Rebecca T. Mercuri   Security watch: Superscaled security . . 15--18
                     CACM Staff   ACM fellows  . . . . . . . . . . . . . . 19--20
              Phillip G. Armour   The business of software: Beware of
                                  counting LOC . . . . . . . . . . . . . . 21--24
            Michael A. Cusumano   Technology strategy and management: Who
                                  is liable for bugs and security flaws in
                                  software?  . . . . . . . . . . . . . . . 25--27
               John G. Messerly   Viewpoint: How computer games affect CS
                                  (and other) students' school performance 29--31
                       John Yen   Emerging technologies for homeland
                                  security: Introduction . . . . . . . . . 32--35
                Robert Popp and   
              Thomas Armour and   
                Ted Senator and   
                Kristen Numrych   Countering terrorism through information
                                  technology . . . . . . . . . . . . . . . 36--43
             Thayne Coffman and   
            Seth Greenblatt and   
                  Sherry Marcus   Graph-based technologies for
                                  intelligence analysis  . . . . . . . . . 45--47
                 Paul Kogut and   
                   John Yen and   
                  Yui Leung and   
                 Shuang Sun and   
                   Rui Wang and   
             Ted Mielczarek and   
                     Ben Hellar   Proactive information gathering for
                                  homeland security teams  . . . . . . . . 48--50
               O. Sami Saydjari   Cyber defense: art to science  . . . . . 52--57
                  R. Bajcsy and   
                  T. Benzel and   
                  M. Bishop and   
                  B. Braden and   
                 C. Brodley and   
                   S. Fahmy and   
                   S. Floyd and   
                W. Hardaker and   
                  A. Joseph and   
                 G. Kesidis and   
                  K. Levitt and   
                 B. Lindell and   
                     P. Liu and   
                  D. Miller and   
                   R. Mundy and   
                  C. Neuman and   
                R. Ostrenga and   
                  V. Paxson and   
                  P. Porras and   
               C. Rosenberg and   
                J. D. Tygar and   
                  S. Sastry and   
                  D. Sterne and   
                       S. F. Wu   Cyber defense technology networking and
                                  evaluation . . . . . . . . . . . . . . . 58--61
               Steve Sawyer and   
               Andrea Tapia and   
            Leonard Pesheck and   
                 John Davenport   Mobility and the first responder . . . . 62--65
                Robin R. Murphy   Rescue robotics for homeland security    66--68
                  Gang Wang and   
              Hsinchun Chen and   
                 Homa Atabakhsh   Automatically detecting deceptive
                                  criminal identities  . . . . . . . . . . 70--76
   Alberto Escudero-Pascual and   
                     Ian Hosein   Questioning lawful access to traffic
                                  data . . . . . . . . . . . . . . . . . . 77--82
            Nikunj P. Dalal and   
           Manjunath Kamath and   
         William J. Kolarik and   
                Eswar Sivaraman   Toward an integrated framework for
                                  modeling enterprise processes  . . . . . 83--87
                   Luigi Suardi   How to manage your software product life
                                  cycle with MAUI  . . . . . . . . . . . . 89--94
               Eyong B. Kim and   
          Marc J. Schniederjans   The role of personality in Web-based
                                  distance education courses . . . . . . . 95--98
               Vikram Sethi and   
               Ruth C. King and   
           James Campbell Quick   What causes stress in information system
                                  professionals? . . . . . . . . . . . . . 99--102
                     Mark Stamp   Inside risks: Risks of monoculture . . . 120--120

Communications of the ACM
Volume 47, Number 4, April, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Political Agendas; Spam
                                  Rage; Digital Doubts; Women Got Game;
                                  Perfict Fit; Awkshun Serchs  . . . . . . 9--10
             Diane Crawford and   
             David Monniaux and   
              Ralph Johnson and   
     Clark E. Hartsock, III and   
              Ken Nickerson and   
            Robert L. Glass and   
              Marc Bellusci and   
                 Alex Simonelis   Forum: Open Source vs. Capitalism and
                                  Communism; What Worker Shortage?; Design
                                  for Pedagogy Not Just for Software . . . 11--13
                     John White   ACM's Professional Development Centre
                                  expands learning opportunities . . . . . 14--14
               Peter J. Denning   The profession of IT: The social life of
                                  innovation . . . . . . . . . . . . . . . 15--19
                Hal Berghel and   
              Natasa Brajkovska   Digital village: Wading into alternate
                                  data streams . . . . . . . . . . . . . . 21--27
                Eric M. Uslaner   Viewpoint: Trust online, trust offline   28--29
          Christopher A. Miller   Introduction: Human-computer etiquette:
                                  managing expectations with intentional
                                  agents . . . . . . . . . . . . . . . . . 30--34
                  Clifford Nass   Etiquette equality: exhibitions and
                                  expectations of computer politeness  . . 35--37
            Timothy W. Bickmore   Unspoken rules of spoken interaction . . 38--44
               Punya Mishra and   
             Kathryn A. Hershey   Etiquette and the design of educational
                                  technology . . . . . . . . . . . . . . . 45--49
           Raja Parasuraman and   
          Christopher A. Miller   Trust and etiquette in high-criticality
                                  automated systems  . . . . . . . . . . . 51--55
                   Jenny Preece   Etiquette online: from nice to necessary 56--61
                 S. Krishna and   
              Sundeep Sahay and   
                  Geoff Walsham   Managing cross-cultural issues in global
                                  software outsourcing . . . . . . . . . . 62--66
              Linda Wallace and   
                      Mark Keil   Software project risks and their effect
                                  on outcomes  . . . . . . . . . . . . . . 68--73
                 Blake Ives and   
           Kenneth R. Walsh and   
               Helmut Schneider   The domino effect of password reuse  . . 75--78
                 Anat Hovav and   
                      Paul Gray   Managing academic e-journals . . . . . . 79--82
       Petros Nicopolitidis and   
     Georgios Papadimitriou and   
        Mohammed S. Obaidat and   
          Andreas S. Pomportsis   The economics of wireless networks . . . 83--86
           Kevin C. Desouza and   
            J. Roberto Evaristo   Managing knowledge in distributed
                                  projects . . . . . . . . . . . . . . . . 87--91
                    Xiaotong Li   Informational cascades in IT adoption    93--97
               John Gerdes, Jr.   Technical opinion: The viability of
                                  supporting anonymous employees . . . . . 98--100
                    Jim Horning   Inside Risks: Coincidental risks . . . . 112--112

Communications of the ACM
Volume 47, Number 5, May, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Concerts to Go: No Foul;
                                  Press This!; Littlest Champ; Truth Be
                                  Told . . . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
             Michael J. Wax and   
                Tom Pittman and   
             Madhu Banavati and   
                 Jef Raskin and   
         Rebecca T. Mercuri and   
                  Bob Ellis and   
                 Paul Nicholson   Forum: Why Count Lines of Code?;
                                  Computers and Consciousness; Computers,
                                  ACM, and Everyday Existence; Don't
                                  Dismiss Computers in the Classroom . . . 11--13
                   Meg McGinity   Staying connected: It's alive: Reports
                                  of the demise of the telecom industry
                                  have been greatly exaggerated  . . . . . 15--18
                Robert L. Glass   Practical programmer: Matching
                                  methodology to problem domain  . . . . . 19--21
                     Jeff Grove   Viewpoint: Wanted: public policies that
                                  foster creation of knowledge . . . . . . 23--25
              Kuldeep Kumar and   
          Jos van Hillegersberg   Introduction: New architectures for
                                  financial services . . . . . . . . . . . 26--30
             Krishnan Dandapani   Success and failure in Web-based
                                  financial services . . . . . . . . . . . 31--33
              Ulrich Homann and   
               Michael Rill and   
                 Andreas Wimmer   Flexible value structures in banking . . 34--36
                Alberto Pan and   
       Ángel Viña   An alternative architecture for
                                  financial data integration . . . . . . . 37--40
               Niina Mallat and   
                Matti Rossi and   
      Virpi Kristiina Tuunainen   Mobile banking services  . . . . . . . . 42--46
          N. Chandrasekaran and   
                   Geert Ensing   ODC: a global IT services delivery model 47--49
                 Jeroen Tas and   
                   Shyam Sunder   Financial services business process
                                  outsourcing  . . . . . . . . . . . . . . 50--52
              John S. Zdanowicz   Detecting money laundering and terrorist
                                  financing via data mining  . . . . . . . 53--55
                  Ton Slewe and   
                Mark Hoogenboom   Who will rob you on the digital highway? 56--60
               Sarv Devaraj and   
                 S. Ramesh Babu   How to measure the relationship between
                                  training and job performance . . . . . . 62--67
                Weidong Xia and   
                    Gwanhoo Lee   Grasping the complexity of IS
                                  development projects . . . . . . . . . . 68--74
             Dongsong Zhang and   
               J. Leon Zhao and   
                  Lina Zhou and   
          Jay F. Nunamaker, Jr.   Can e-learning replace classroom
                                  learning?  . . . . . . . . . . . . . . . 75--79
                   Gerald Segal   2004 ACM elections . . . . . . . . . . . 80--89
           I. Robert Chiang and   
             Vijay S. Mookerjee   Improving software team productivity . . 89--93
            Rishi Toshniwal and   
              Dharma P. Agrawal   Tracing the roots of markup languages    95--98
                 Masanori Arita   Technical opinion: Comma-free design for
                                  DNA words  . . . . . . . . . . . . . . . 99--100
           Peter J. Denning and   
             Dorothy E. Denning   Inside Risks: Artificial stupidity . . . 112--112

Communications of the ACM
Volume 47, Number 6, June, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Special Skills Draft; MBA
                                  Outsourcing Track; Ancient Egypt Online;
                                  Rx PlayStation; Camera Ready; Blogging
                                  Bahgdad  . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
                Mark Sadler and   
                  Anonymous and   
           Michael Cusumano and   
                  Alan Karp and   
             Lee A. Hollaar and   
             Chuck Walbourn and   
            Thomas W. Moran and   
           Seung Kyoon Shin and   
               Ram D. Gopal and   
        G. Lawrence Sanders and   
             Andrew B. Whinston   Forum: The Threat from Within; No
                                  Excuses for Microsoft; How About a
                                  Manageable Password?; When is Copyright
                                  Infringement Legal? Don't Miss the
                                  Lessons in Games; Inconsistent
                                  Statistics Unconvincing  . . . . . . . . 11--13
              Phillip G. Armour   The business of software: Real work,
                                  necessary friction, optional chaos . . . 15--18
               Pamela Samuelson   Legally speaking: Why reform the U.S.
                                  patent system? . . . . . . . . . . . . . 19--23
                    Stephen Lau   Viewpoint: The Spinning Cube of
                                  Potential Doom . . . . . . . . . . . . . 25--26
               Allan Glaser and   
                    Snow Fu and   
                   Mark Tumelty   On Site: Growing a participatory
                                  programming environment  . . . . . . . . 27--29
            David E. Culler and   
                       Wei Hong   Introduction: Wireless sensor networks   30--33
            Robert Szewczyk and   
             Eric Osterweil and   
            Joseph Polastre and   
           Michael Hamilton and   
            Alan Mainwaring and   
                 Deborah Estrin   Habitat monitoring with sensor networks  34--40
                 Jason Hill and   
                Mike Horton and   
                Ralph Kling and   
         Lakshman Krishnamurthy   The platforms enabling wireless sensor
                                  networks . . . . . . . . . . . . . . . . 41--46
                   Alec Woo and   
                 Sam Madden and   
                Ramesh Govindan   Networking support for query processing
                                  in sensor networks . . . . . . . . . . . 47--52
              Adrian Perrig and   
             John Stankovic and   
                   David Wagner   Security in wireless sensor networks . . 53--57
           Janice C. Sipior and   
              Burke T. Ward and   
              P. Gregory Bonner   Should spam be on the menu?  . . . . . . 59--63
       Banphot Vatanasombut and   
       Antonis C. Stylianou and   
                  Magid Igbaria   How to retain online customers . . . . . 64--70
          Clayton A. Looney and   
          Leonard M. Jessup and   
             Joseph S. Valacich   Emerging business models for mobile
                                  brokerage services . . . . . . . . . . . 71--77
         Narasimhaiah Gorla and   
                    Yan Wah Lam   Who should work with whom?: Building
                                  effective software project teams . . . . 79--82
                Hal Berghel and   
               David L. Sallach   A paradigm shift in computing and IT
                                  education  . . . . . . . . . . . . . . . 83--88
            Robert L. Glass and   
                  V. Ramesh and   
                    Iris Vessey   An analysis of research in computing
                                  disciplines  . . . . . . . . . . . . . . 89--94
                 Weiling Ke and   
                   Kwok Kee Wei   Successful e-government in Singapore . . 95--99
           Hartmut Wedekind and   
                   Erich Ortner   Technical opinion: Toward universal
                                  literacy: from computer science upward   101--104
               Peter G. Neumann   Inside risks: Optimistic optimization    112--112

Communications of the ACM
Volume 47, Number 7, July, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Dominance Lost; Vocal Cards;
                                  Flexible Flying; Fantastic Voyage;
                                  Uninvited Consequences; Snooze Control   9--10
             Diane Crawford and   
Industry Usability Reporting Project Steering Committee, National Institute of Standards and   
                 Technology and   
           Peter J. Denning and   
              Lennart Meier and   
                Jim Farrans and   
                    Li Deng and   
              Xuedong Huang and   
                James D. Mooney   Forum: Don't Neglect Usability in the
                                  Total Cost of Ownership; Where's the
                                  Steak?; Discourage the Sale of
                                  Credentials in Anonymous Employment; For
                                  Voice Interfaces, Hold the SALT; Look
                                  Deeper for Markup Roots  . . . . . . . . 11--13
               Peter J. Denning   The profession of IT: The field of
                                  programmers myth . . . . . . . . . . . . 15--20
           Victor W. A. Mbarika   On Site: Is telemedicine the panacea for
                                  Sub-Saharan Africa's medical nightmare?  21--24
             Rebecca T. Mercuri   Security watch: The HIPAA-potamus in
                                  health care data security  . . . . . . . 25--28
            Michael A. Cusumano   Technology strategy and management: More
                                  lawyers than programmers? Microsoft must
                                  alter its strategy to avoid an
                                  increasingly litigious future  . . . . . 29--31
              Catherine L. Mann   Viewpoint: What global sourcing means
                                  for U.S. IT workers and for the U.S.
                                  economy  . . . . . . . . . . . . . . . . 33--35
           Donna L. Hoffman and   
            Thomas P. Novak and   
               Alladi Venkatesh   Has the Internet become indispensable?   37--42
           Linda A. Jackson and   
          Alexander von Eye and   
         Gretchen Barbatsis and   
               Frank Biocca and   
        Hiram E. Fitzgerald and   
                      Yong Zhao   The impact of Internet use on the other
                                  side of the digital divide . . . . . . . 43--47
            Warren Harrison and   
             George Heuston and   
                Sarah Mocas and   
             Mark Morrissey and   
                John Richardson   High-tech forensics: An Oregon police
                                  department successfully enlists
                                  tech-savvy citizens to serve as police
                                  reserve specialists  . . . . . . . . . . 48--52
               George P. Schell   Universities marginalize online courses  53--56
              Kaushal Chari and   
             Saravanan Seshadri   Demystifying integration . . . . . . . . 58--63
            Maris G. Martinsons   ERP in China: one package, two profiles  65--68
              Huigang Liang and   
                Yajiong Xue and   
         William R. Boulton and   
             Terry Anthony Byrd   Why Western vendors don't dominate
                                  China's ERP market . . . . . . . . . . . 69--72
            Troy J. Strader and   
           Sridhar N. Ramaswami   Investor perceptions of traditional and
                                  online channels  . . . . . . . . . . . . 73--76
              Graeme Shanks and   
          Elizabeth Tansley and   
                      Ron Weber   Representing composites in conceptual
                                  modeling . . . . . . . . . . . . . . . . 77--80
              Narasimha Bolloju   Improving the quality of business object
                                  models using collaboration patterns  . . 81--86
          Huseyin Cavusoglu and   
            Birendra Mishra and   
         Srinivasan Raghunathan   A model for evaluating IT security
                                  investments  . . . . . . . . . . . . . . 87--92
                Paul Kocher and   
                 Bruce Schneier   Inside risks: Insider risks in elections 104--104

Communications of the ACM
Volume 47, Number 8, August, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Who Gets the Last Word? Pay
                                  Up or Scram; Smart Stepping; China
                                  Follows Own Drummer; Elusive
                                  E-Government; In the Groove  . . . . . . 9--10
             Diane Crawford and   
             Donn B. Parker and   
              Dani Oderbolz and   
             Kurt Gunteroth and   
          Nicholas Ourosoff and   
         Michael J. Lewchuk and   
                      Ian Perry   Forum: The Folk Art of Information
                                  Security Needs an Upgrade; Don't Let
                                  Patents Inhibit Software Innovation;
                                  Hold the Methodologies: Give Me Tools;
                                  Measuring Project Friction and Chaos;
                                  Less is More Code  . . . . . . . . . . . 11--13
                Robert L. Glass   Practical programmer: The mystery of
                                  formal methods disuse  . . . . . . . . . 15--17
              Peter Freeman and   
                     David Hart   Viewpoint: A science of design for
                                  software-intensive systems . . . . . . . 19--21
                 Martin E. Bush   On site: Computer science education in
                                  Japan  . . . . . . . . . . . . . . . . . 23--26
              Andrew Rosenbloom   Introduction: Interactive immersion in
                                  $3$D graphics  . . . . . . . . . . . . . 28--31
             Chris Scharver and   
              Ray Evenhouse and   
             Andrew Johnson and   
                    Jason Leigh   Designing cranial implants in a haptic
                                  augmented reality environment  . . . . . 32--38
                   Ming Lin and   
             William Baxter and   
             Vincent Scheib and   
                   Jeremy Wendt   Physically based virtual painting  . . . 40--47
                Benjamin C. Lok   Toward the merging of real and virtual
                                  spaces . . . . . . . . . . . . . . . . . 48--53
               Mike Houston and   
           Chris Niederauer and   
           Maneesh Agrawala and   
                 Greg Humphreys   Visualizing dynamic architectural
                                  environments . . . . . . . . . . . . . . 54--59
             Charles Jacobs and   
                     Wil Li and   
               Evan Schrier and   
             David Bargeron and   
                  David Salesin   Adaptive document layout . . . . . . . . 60--66
             Mike Burmester and   
                 Yvo G. Desmedt   Is hierarchical public-key certification
                                  the next target for hackers? . . . . . . 68--74
                  Rolf Oppliger   Certified mail: the next challenge for
                                  secure messaging . . . . . . . . . . . . 75--79
            John Gallaugher and   
                 Nigel Melville   Electronic frontiers in foreign exchange
                                  trading  . . . . . . . . . . . . . . . . 81--87
                     CACM Staff   2004 ACM awards banquet: a night to
                                  celebrate  . . . . . . . . . . . . . . . 89--92
              Ralph D. Westfall   Does telecommuting really increase
                                  productivity?  . . . . . . . . . . . . . 93--96
             David J. Paper and   
            James A. Rodger and   
                Steven J. Simon   Voice says it all in the Navy  . . . . . 97--101
            Ahmed Elfatatry and   
                   Paul Layzell   Negotiating in service-oriented
                                  environments . . . . . . . . . . . . . . 103--108
               Lauren Weinstein   Inside risks: Close exposures of the
                                  digital kind . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 47, Number 9, September, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Political Lines; Virtual
                                  Visions; E-Earache; Sensors on Ice; Coke
                                  Promo Fizzles  . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Peter Wegner and   
             Kurt Gunteroth and   
               Joshua Stern and   
                David Marks and   
               Peter J. Denning   Forum: No Scientific Discipline Was Ever
                                  Built on a Myth  . . . . . . . . . . . . 11--13
                   Meg McGinity   Staying connected: Weaving a wireless
                                  safety net . . . . . . . . . . . . . . . 15--18
                    Hal Berghel   Digital village: Wireless infidelity I:
                                  war driving  . . . . . . . . . . . . . . 21--26
            James A. Jacobs and   
               Charles Humphrey   Viewpoint: Preserving research data  . . 27--29
         Alistair Sutcliffe and   
             Nikolay Mehandjiev   Introduction: End-user development . . . 31--32
                 G. Fischer and   
               E. Giaccardi and   
                      Y. Ye and   
            A. G. Sutcliffe and   
                  N. Mehandjiev   Meta-design: a manifesto for end-user
                                  development  . . . . . . . . . . . . . . 33--37
                 Joerg Beringer   Reducing expertise tension . . . . . . . 39--40
                Volker Wulf and   
                 Matthias Jarke   The economics of end-user development    41--42
        Alexander Repenning and   
                Andri Ioannidou   Agent-based end-user development . . . . 43--46
              Brad A. Myers and   
               John F. Pane and   
                        Andy Ko   Natural programming languages and
                                  environments . . . . . . . . . . . . . . 47--52
           Margaret Burnett and   
                Curtis Cook and   
                Gregg Rothermel   End-user software engineering  . . . . . 53--58
     Anders I. Mòrch and   
             Gunnar Stevens and   
                 Markus Won and   
               Markus Klann and   
            Yvonne Dittrich and   
                    Volker Wulf   Component-based technologies for
                                  end-user development . . . . . . . . . . 59--62
               Silvia Berti and   
            Fabio Patern\`o and   
                 Carmen Santoro   Natural development of ubiquitous
                                  interfaces . . . . . . . . . . . . . . . 63--64
              Alan F. Blackwell   End-user developers at home  . . . . . . 65--66
            Paul J. Resnick and   
            Derek L. Hansen and   
         Caroline R. Richardson   Calculating error rates for filtering
                                  software . . . . . . . . . . . . . . . . 67--71
             Ozgur Turetken and   
               David Schuff and   
              Ramesh Sharda and   
                  Terence T. Ow   Supporting systems analysis and design
                                  through fisheye views  . . . . . . . . . 72--77
                  Hai Zhuge and   
                   Xiaoqing Shi   Toward the eco-grid: a harmoniously
                                  evolved interconnection environment  . . 78--83
            Michael J. Hine and   
                  Mark Hill and   
                 David Ruth and   
                Bob Carlson and   
                 Dave Banks and   
                    Jim Troxell   Empowering persons with disabilities
                                  with decision-support technology . . . . 85--89
           Susan K. Lippert and   
            Murugan Anandarajan   Academic vs. practitioner systems
                                  planning and analysis  . . . . . . . . . 91--94
            Jason E. Bailes and   
              Gary F. Templeton   Technical opinion: Managing P2P security 95--98
               Peter G. Neumann   Inside risks: The big picture  . . . . . 112--112

Communications of the ACM
Volume 47, Number 10, October, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Experts Dispute Passport
                                  Plan; Parliament Endorses Open Access; A
                                  Shadow Over the Valley; Paint by
                                  Numbers; Talk of the Future; Emotional
                                  Ride . . . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Scott Ambler and   
           Peter G. Neumann and   
                 Peter Turk and   
           Hartmut Wedekind and   
               John Stanley and   
            Julian V. Noble and   
                Hong-Lok Li and   
              Michael Blaha and   
                  Dean Wakerley   Forum: Consider Long-Term Implications
                                  Now and Forever; The Real Philosophical
                                  Roots of Literacy; Give Me Common
                                  Carrier Internet Service; For Science
                                  and Math, Skip the Online Course;
                                  Prepare CS Graduates for Industrial
                                  Reality; Elegant Code Produces Maximal
                                  Comprehension  . . . . . . . . . . . . . 11--13
              Phillip G. Armour   The business of software: Not-defect:
                                  the mature discipline of testing . . . . 15--18
             David A. Patterson   Hot links: Hot Links . . . . . . . . . . 19--20
               Fred von Lohmann   Viewpoint: Voluntary collective
                                  licensing for music file sharing . . . . 21--24
            Michael A. Cusumano   Technology strategy and management:
                                  Reflections on free and open software    25--27
               Peter G. Neumann   Introduction: The problems and
                                  potentials of voting systems . . . . . . 28--30
               Herb Deutsch and   
                 Stephen Berger   Voting systems standards and
                                  certifications . . . . . . . . . . . . . 31--33
                Carolyn Coggins   Independent testing of voting systems    34--38
           Brit J. Williams and   
                  Merle S. King   Implementing voting systems: the Georgia
                                  method . . . . . . . . . . . . . . . . . 39--42
          Anthony Di Franco and   
               Andrew Petro and   
               Emmett Shear and   
            Vladimir Vladimirov   Small vote manipulations can swing
                                  elections  . . . . . . . . . . . . . . . 43--45
               Douglas W. Jones   Auditing elections . . . . . . . . . . . 46--50
         Rebecca T. Mercuri and   
                   L. Jean Camp   The code of elections  . . . . . . . . . 52--57
            David Jefferson and   
             Aviel D. Rubin and   
             Barbara Simons and   
                   David Wagner   Analyzing Internet voting security . . . 59--64
                   Jason Kitcat   Source availability and e-voting: an
                                  advocate recants . . . . . . . . . . . . 65--67
                     Jeff Grove   ACM statement on voting systems  . . . . 69--70
             David A. Patterson   Latency lags bandwith  . . . . . . . . . 71--75
              Huaiqing Wang and   
                 Shuozhong Wang   Cyber warfare: steganography vs.
                                  steganalysis . . . . . . . . . . . . . . 76--82
          Ioannis Samoladas and   
           Ioannis Stamelos and   
           Lefteris Angelis and   
            Apostolos Oikonomou   Open source software development should
                                  strive for even greater code
                                  maintainability  . . . . . . . . . . . . 83--87
              Nancy J. Lightner   Evaluating e-commerce functionality with
                                  a focus on customer service  . . . . . . 88--92
             Michael Alan Smith   Portals: toward an application framework
                                  for interoperability . . . . . . . . . . 93--97
          Peter B. Southard and   
                      Keng Siau   A survey of online e-banking retail
                                  initiatives  . . . . . . . . . . . . . . 99--102
             Casey G. Cegielski   Technical opinion: Who values technology
                                  certification? . . . . . . . . . . . . . 103--105
                 Bruce Schneier   Inside risks: The nonsecurity of secrecy 120--120

Communications of the ACM
Volume 47, Number 11, November, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track: Spam Spotting the DNA Way;
                                  Majoring in Homeland Security; In the
                                  Driver's Seat; Campus Security; Bay Area
                                  Attractions; Hello, I Must be Going  . . 9--10
             Diane Crawford and   
             Alex Simonelis and   
               Mike Brenner and   
              Spike McLeary and   
                Jack Nilles and   
              Ralph D. Westfall   Forum: Design Principles Are Where You
                                  Find Them; The Computer Didn't Make You
                                  Do It; Why Doesn't Everyone Telecommute? 11--13
               Peter J. Denning   The profession of IT: Network laws . . . 15--20
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Portal . . . . . . . . . . . . . . . . . 21--22
                Robert L. Glass   Practical programmer: Is this a
                                  revolutionary idea, or not?  . . . . . . 23--25
                 Norman Matloff   Viewpoint: Globalization and the
                                  American IT worker . . . . . . . . . . . 27--29
               Craig A. Stewart   Introduction: Bioinformatics:
                                  transforming biomedical research and
                                  medical care . . . . . . . . . . . . . . 30--33
                 David A. Bader   Computational biology and
                                  high-performance computing . . . . . . . 34--41
        Toshikazu Ebisuzaki and   
             Robert Germain and   
                   Makoto Taiji   PetaFLOPS computing  . . . . . . . . . . 42--45
              Ross Overbeek and   
                 Terry Disz and   
                   Rick Stevens   The SEED: a peer-to-peer environment for
                                  genome annotation  . . . . . . . . . . . 46--51
              Mark Ellisman and   
              Michael Brady and   
                 David Hart and   
              Fang-Pang Lin and   
       Matthias Müller and   
                    Larry Smarr   The emerging role of biogrids  . . . . . 52--57
              Homa Javahery and   
               Ahmed Seffah and   
    Thiruvengadam Radhakrishnan   Beyond power: making bioinformatics
                                  tools user-centered  . . . . . . . . . . 58--63
           Chris R. Johnson and   
                Rob MacLeod and   
           Steven G. Parker and   
                David Weinstein   Biomedical computing and visualization
                                  software environments  . . . . . . . . . 64--71
               Amrit Tiwana and   
                      Mark Keil   The one-minute risk assessment tool  . . 73--77
          James Y. L. Thong and   
                Weiyin Hong and   
                    Kar Yan Tam   What leads to acceptance of digital
                                  libraries? . . . . . . . . . . . . . . . 78--83
          Theresa Edgington and   
               Beomjin Choi and   
           Katherine Henson and   
                T. S. Raghu and   
                     Ajay Vinze   Adopting ontology to facilitate
                                  knowledge sharing  . . . . . . . . . . . 85--90
           Shobha Ganapathy and   
             C. Ranganathan and   
        Balaji Sankaranarayanan   Visualization strategies and tools for
                                  enhancing customer relationship
                                  management . . . . . . . . . . . . . . . 92--99
               Markus Biehl and   
              Edmund Prater and   
               John R. McIntyre   Remote repair, diagnostics, and
                                  maintenance  . . . . . . . . . . . . . . 100--106
         Thomas F. Stafford and   
                  Dennis Gonier   What Americans like about being online   107--112
              Ken Donaldson and   
                    Vicki Stone   Technical opinion: Nanoscience fact
                                  versus fiction . . . . . . . . . . . . . 113--115
                 P. L. Vora and   
                   B. Adida and   
                 R. Bucholz and   
                   D. Chaum and   
                 D. L. Dill and   
               D. Jefferson and   
                D. W. Jones and   
                  W. Lattin and   
                A. D. Rubin and   
               M. I. Shamos and   
                        M. Yung   Inside risks: Evaluation of voting
                                  systems  . . . . . . . . . . . . . . . . 144--144

Communications of the ACM
Volume 47, Number 12, December, 2004

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: A World Connected;
                                  Invisa-Bills; Starting Over; Bots Wild;
                                  Creative Measures; By George!  . . . . . 9--10
             Diane Crawford and   
               Ben Bederson and   
           Harry Hochheiser and   
               Jeff Johnson and   
          Clare-Marie Karat and   
             Jonathan Lazar and   
                 John David and   
       Frances C. Bernstein and   
       Andrew D. Wolfe, Jr. and   
                Hong-Lok Li and   
                Mark Burgin and   
                Nicholas Roeder   Forum: For a Fair Election, Ensure
                                  Usability; Don't Skip Secrecy If
                                  Security is the Goal; Let Users Program
                                  Their Own Systems; Put More Science in
                                  Computer Science; What We Don't Know . . 11--13
                Hal Berghel and   
                   Jacob Uecker   Digital village: Wireless infidelity II:
                                  airjacking . . . . . . . . . . . . . . . 15--20
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 21--22
             David A. Patterson   President's Letter: The health of
                                  research conferences and the dearth of
                                  big idea papers  . . . . . . . . . . . . 23--24
             Rebecca T. Mercuri   Security watch: The many colors of
                                  multimedia security  . . . . . . . . . . 25--29
              Andrew Rosenbloom   Introduction: Special Issue: The
                                  blogosphere  . . . . . . . . . . . . . . 30--33
                 Ravi Kumar and   
              Jasmine Novak and   
         Prabhakar Raghavan and   
                 Andrew Tomkins   Structure and evolution of blogspace . . 35--39
            Bonnie A. Nardi and   
           Diane J. Schiano and   
         Michelle Gumbrecht and   
                    Luke Swartz   Why we blog  . . . . . . . . . . . . . . 41--46
                   Steve Cayzer   Semantic blogging and decentralized
                                  knowledge management . . . . . . . . . . 47--52
                  Rebecca Blood   How blogging software reshapes the
                                  online community . . . . . . . . . . . . 53--55
               Cass R. Sunstein   Democracy and filtering  . . . . . . . . 57--59
              Kenneth P. Birman   Viewpoint: Like it or not, Web services
                                  are distributed objects  . . . . . . . . 60--62
                     CACM Staff   ACM annual report for FY04 . . . . . . . 63--69
               Ahmed Seffah and   
                 Eduard Metzker   The obstacles and myths of usability and
                                  software engineering . . . . . . . . . . 71--76
           Pratyush Bharati and   
              Abhijit Chaudhury   Using choiceboards to create business
                                  value  . . . . . . . . . . . . . . . . . 77--81
            Eleanor T. Loiacono   Cyberaccess: Web accessibility and
                                  corporate America  . . . . . . . . . . . 82--87
            Yogesh Malhotra and   
             Dennis F. Galletta   Building systems that users want to use  88--94
                   Steve Sawyer   Software development teams . . . . . . . 95--99
            Hannes Werthner and   
                Francesco Ricci   E-commerce and tourism . . . . . . . . . 101--105
             Steven M. Bellovin   Inside risks: Spamming, phishing,
                                  authentication, and privacy  . . . . . . 144--144


Communications of the ACM
Volume 48, Number 1, January, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Sniffing out Trouble; Home
                                  Improvements; Patent Number 977; On the
                                  Nose; Take a Number; Sick Thoughts . . . 9--10
             Diane Crawford and   
               Brad Kidwell and   
           Jeffrey P. Buzen and   
         David A. Patterson and   
             Bradley Dilger and   
           Brit J. Williams and   
              Merle S. King and   
               Chris Morris and   
           David H. Jameson and   
              Ralph Johnson and   
               I. Samoladas and   
                I. Stamelos and   
                     L. Angelis   Forum: Bandwidth, Latency, and Physical
                                  Reality; Share Disturbing Information on
                                  e-Voting; Ensure Quality Assurance for
                                  Bioinformatics Applications; Follow the
                                  Money; Share Open Source Sources . . . . 11--13
              Phillip G. Armour   The business of software: The
                                  unconscious art of software testing  . . 15--18
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 19--20
                   Meg McGinity   Staying connected: Let your fingers do
                                  the talking  . . . . . . . . . . . . . . 21--23
             David A. Patterson   President's letter: Minority-minority
                                  and minority-majority technology
                                  transfer . . . . . . . . . . . . . . . . 25--26
               Deborah Anderson   Viewpoint: Global linguistic diversity
                                  for the Internet . . . . . . . . . . . . 27--28
               Chris Stephenson   Viewpoint: Creating a national K--12
                                  computer science community . . . . . . . 29--31
              Allison Druin and   
            Juan Pablo Hourcade   Interaction design and children  . . . . 32--34
               David Kestenbaum   The challenges of IDC: what have we
                                  learned from our past? . . . . . . . . . 35--38
            Mona Leigh Guha and   
              Allison Druin and   
               Gene Chipman and   
           Jerry Alan Fails and   
                Sante Simms and   
                 Allison Farber   Working with young children as
                                  technology design partners . . . . . . . 39--42
     Johanna Höysniemi and   
Perttu Hämäläinen and   
               Laura Turkki and   
                    Teppo Rouvi   Children's intuitive gestures in
                                  vision-based action games  . . . . . . . 44--50
              Michael Eisenberg   The material side of educational
                                  technology . . . . . . . . . . . . . . . 51--54
              Yvonne Rogers and   
                 Sara Price and   
              Cliff Randell and   
       Danae Stanton Fraser and   
                  Mark Weal and   
          Geraldine Fitzpatrick   Ubi-learning integrates indoor and
                                  outdoor experiences  . . . . . . . . . . 55--59
             Judy Robertson and   
                    Judith Good   Story creation in virtual game worlds    61--65
       RadhaKanta Mahapatra and   
                 Vincent S. Lai   Evaluating end-user training programs    66--70
              Andreas Holzinger   Usability engineering methods for
                                  software developers  . . . . . . . . . . 71--74
             John Tillquist and   
                Waymond Rodgers   Using asset specificity and asset scope
                                  to measure the value of IT . . . . . . . 75--80
            Rodrigo Fonseca and   
    Virgílio Almeida and   
                  Mark Crovella   Locality in a web of streams . . . . . . 82--88
            Ganesh Vaidyanathan   A framework for evaluating third-party
                                  logistics  . . . . . . . . . . . . . . . 89--94
           Michael Ettredge and   
                John Gerdes Jr.   Timeliness of investor relations data at
                                  corporate Web sites  . . . . . . . . . . 95--100
               Ines Herrero and   
               Jose L. Salmeron   Using the DEA methodology to rank
                                  software technical efficiency  . . . . . 101--105
               Stuart J. Barnes   Technical opinion: Assessing the value
                                  of IS journals . . . . . . . . . . . . . 110--112
              George Ledin, Jr.   Inside risks: Not teaching viruses and
                                  worms is harmful . . . . . . . . . . . . 144--144

Communications of the ACM
Volume 48, Number 2, February, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Not All Fun and Games; IT
                                  Hiring Up; What Lies A-Head; IT Budget
                                  Ups and Downs; Phishing Expeditions; The
                                  (Really) Big Picture; Number One
                                  ``Blog'' . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
             Serdar Tasiran and   
             Norman Matloff and   
             Dana Honeycutt and   
           Cass R. Sunstein and   
             Wolter Pieters and   
           Joseph R. Kintry and   
           Tyrone Grandison and   
               Peter G. Neumann   Forum: A Global Audience Deserves a
                                  Global Perspective; Blogs No Threat to
                                  Democracy; Internet Voting Not
                                  Impossible; Don't Trade Privacy for
                                  Security . . . . . . . . . . . . . . . . 11--13
             David A. Patterson   President's letter: Why join ACM?  . . . 14--14
            Michael A. Cusumano   Technology strategy and management:
                                  Google: what it is and what it is not    15--17
                  Jon Crowcroft   Viewpoint: On the nature of computing    19--20
                     CACM Staff   SIGs announce candidates for election    21--22
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 23--24
               Dimitris Metaxas   Medical image modeling tools and
                                  applications . . . . . . . . . . . . . . 26--29
           Herve Delingette and   
                Nicholas Ayache   Hepatic surgery simulation . . . . . . . 31--36
            Arie E. Kaufman and   
              Sarang Lakare and   
              Kevin Kreeger and   
                  Ingmar Bitter   Virtual colonoscopy  . . . . . . . . . . 37--41
              Kyoungju Park and   
            Albert Montillo and   
           Dimitris Metaxas and   
                      Leon Axel   Volumetric heart modeling and analysis   43--48
          Celina Imielinska and   
                    Pat Molholt   Incorporating $3$D virtual anatomy into
                                  the medical curriculum . . . . . . . . . 49--54
               Terry S. Yoo and   
            Michael J. Ackerman   Open source software for medical image
                                  processing and visualization . . . . . . 55--59
                     CACM Staff   Notice of intent to de-charter
                                  professional chapters  . . . . . . . . . 61--62
                     CACM Staff   Notice of intent to de-charter student
                                  chapters . . . . . . . . . . . . . . . . 63--65
        J. Roberto Evaristo and   
           Kevin C. Desouza and   
                Kevin Hollister   Centralization momentum: the pendulum
                                  swings back again  . . . . . . . . . . . 66--71
                A. F. Salam and   
               Lakshmi Iyer and   
            Prashant Palvia and   
                    Rahul Singh   Trust in e-commerce  . . . . . . . . . . 72--77
          Lawrence D. Bodin and   
         Lawrence A. Gordon and   
                 Martin P. Loeb   Evaluating information security
                                  investments using the analytic hierarchy
                                  process  . . . . . . . . . . . . . . . . 78--83
         Fiona Fui-Hoon Nah and   
                  Keng Siau and   
                     Hong Sheng   The value of mobile applications: a
                                  utility company study  . . . . . . . . . 85--90
       R. Kelly Rainer, Jr. and   
                 Mark D. Miller   Examining differences across journal
                                  rankings . . . . . . . . . . . . . . . . 91--94
                 Yufei Yuan and   
                   Brian Detlor   Intelligent mobile crisis response
                                  systems  . . . . . . . . . . . . . . . . 95--98
                    Chenglie Hu   Technical opinion: Dataless objects
                                  considered harmful . . . . . . . . . . . 99--101
             Shirley Ann Becker   Technical opinion: E-government
                                  usability for older adults . . . . . . . 102--104
               Peter G. Neumann   Inside risks: Responsibilities of
                                  technologists  . . . . . . . . . . . . . 128--128

Communications of the ACM
Volume 48, Number 3, March, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Ominous Clouds; In the Wrong
                                  Hands; China's Netizens to Soar; Chess
                                  Champs in Check; Painful Plateau; War is
                                  No Game  . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
              Marius Matioc and   
         Steven M. Bellovin and   
             Richard Hubert and   
       Andrew D. Wolfe, Jr. and   
              David Foulser and   
               Andrew R. Kilner   Forum: To Block Spam, Demand Sender
                                  Authentication; Not Revolutionary (Thank
                                  Goodness); How to Know the Known from
                                  the Unknowns; User First in
                                  User-Centered Design . . . . . . . . . . 11--13
                     CACM Staff   ACM Fellows  . . . . . . . . . . . . . . 14--14
             David A. Patterson   President's letter: 20$^{th}$ century
                                  vs. 21$^{st}$ century C&C: the SPUR
                                  manifesto  . . . . . . . . . . . . . . . 15--16
              Phillip G. Armour   The business of software: Project
                                  portfolios: organizational management of
                                  risk . . . . . . . . . . . . . . . . . . 17--20
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 21--22
                  Gregory Conti   Viewpoint: Why computer scientists
                                  should attend hacker conferences . . . . 23--24
                Robert L. Glass   Practical programmer: The first business
                                  application: a significant milestone in
                                  software history . . . . . . . . . . . . 25--26
               Pamela Samuelson   Legally speaking: Legislative challenges
                                  to the \em Sony safe harbor rule . . . . 27--31
            Norbert Streitz and   
                    Paddy Nixon   The disappearing computer  . . . . . . . 32--35
          Gaetano Borriello and   
           Matthew Chalmers and   
            Anthony LaMarca and   
                    Paddy Nixon   Delivering real-world ubiquitous
                                  location systems . . . . . . . . . . . . 36--41
          Daniel M. Russell and   
         Norbert A. Streitz and   
                 Terry Winograd   Building disappearing computers  . . . . 42--48
         Joëlle Coutaz and   
           James L. Crowley and   
               Simon Dobson and   
                   David Garlan   Context is key . . . . . . . . . . . . . 49--53
              Steve Benford and   
         Carsten Magerkurth and   
              Peter Ljungstrand   Bridging the physical and digital in
                                  pervasive gaming . . . . . . . . . . . . 54--57
               Saadi Lahlou and   
          Marc Langheinrich and   
            Carsten Röcker   Privacy and trust issues with invisible
                                  computers  . . . . . . . . . . . . . . . 59--60
                Liam Bannon and   
              Steve Benford and   
                John Bowers and   
                Christian Heath   Hybrid design creates innovative museum
                                  experiences  . . . . . . . . . . . . . . 62--65
                 Hans Gellersen   Smart-Its: computers for artifacts in
                                  the physical world . . . . . . . . . . . 66--66
               Spyros Lalis and   
       Alexandros Karypidis and   
                Anthony Savidis   Ad-hoc composition in wearable and
                                  mobile computing . . . . . . . . . . . . 67--68
            Achilles Kameas and   
               Irene Mavrommati   Extrovert gadgets  . . . . . . . . . . . 69--69
             Joseph A. Paradiso   Sensate media  . . . . . . . . . . . . . 70--70
           Anatole Gershman and   
                    Andrew Fano   Examples of commercial applications of
                                  ubiquitous computing . . . . . . . . . . 71--71
                  Jacques Cohen   Computer science and bioinformatics  . . 72--78
                   Arun Sen and   
                 Atish P. Sinha   A comparison of data warehousing
                                  methodologies  . . . . . . . . . . . . . 79--84
                     CACM Staff   SIGs announce candidates for election    85--85
                  Trevor Moores   Do consumers understand the role of
                                  privacy seals in e-commerce? . . . . . . 86--91
  Bonnie Rubenstein Montano and   
              Victoria Yoon and   
               Stuart Lowry and   
                  Teresa Merlau   A multiagent system for U.S. defense
                                  research contracting . . . . . . . . . . 93--97
            William Hibbard and   
              Curtis Rueden and   
             Steve Emmerson and   
                   Tom Rink and   
             David Glowacki and   
              Tom Whittaker and   
                 Don Murray and   
               David Fulker and   
                  John Anderson   Java distributed components for
                                  numerical visualization in VisAD . . . . 98--104
                  Ji-Ye Mao and   
           Karel Vredenburg and   
              Paul W. Smith and   
                      Tom Carey   The state of user-centered design
                                  practice . . . . . . . . . . . . . . . . 105--109
               Xiaoni Zhang and   
             Victor R. Prybutok   How the mobile communication markets
                                  differ in China, the U.S., and Europe    111--114
                 Marco Gori and   
                     Ian Witten   Technical opinion: The bubble of Web
                                  visibility . . . . . . . . . . . . . . . 115--117
               Peter G. Neumann   Inside risks: Anticipating disasters . . 128--128

Communications of the ACM
Volume 48, Number 4, April, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Setting the Bar; China's Café
                                  Count; Portrait of Excess; U.S. Visa
                                  Rules Relax; Knock on Wood . . . . . . . 9--10
             Diane Crawford and   
            Rodney M. Bates and   
            David Armstrong and   
                Robin Evans and   
          Phillip G. Armour and   
               Scott Duncan and   
                    Hong-Lok Li   Forum: For Programmers: Objects Are Not
                                  the Only Tool; Computing is Mathematical
                                  Engineering; Blog on Blog  . . . . . . . 11--13
                    Hal Berghel   Digital Village: The two sides of ROI:
                                  return on investment vs. risk of
                                  incarceration  . . . . . . . . . . . . . 15--20
             David A. Patterson   President's Letter: The state of funding
                                  for new initiatives in computer science
                                  and engineering  . . . . . . . . . . . . 21--25
               Peter J. Denning   The Profession of IT: Is computer
                                  science science? . . . . . . . . . . . . 27--31
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 33--34
           Richard P. Suttmeier   Viewpoint: A new technonationalism?:
                                  China and the development of technical
                                  standards  . . . . . . . . . . . . . . . 35--37
                 Vinton G. Cerf   Viewpoint: Spam, spim, and spit  . . . . 39--43
            Maris G. Martinsons   Introduction: Transforming China . . . . 44--48
         Jonathan J. H. Zhu and   
                     Enhai Wang   Diffusion, use, and effect of the
                                  Internet in China  . . . . . . . . . . . 49--53
                 Xunhua Guo and   
                   Guoqing Chen   Internet diffusion in Chinese companies  54--58
            Maris G. Martinsons   The Internet enlightens and empowers
                                  Chinese society  . . . . . . . . . . . . 59--60
          Robert M. Davison and   
           Douglas R. Vogel and   
                Roger W. Harris   The e-transformation of western China    62--67
                  Jing Quan and   
                    Qing Hu and   
                     Xinan Wang   IT is not for everyone in China  . . . . 69--72
            Glen R. Burrows and   
          Damon L. Drummond and   
            Maris G. Martinsons   Knowledge management in China  . . . . . 73--76
                   Qiang Tu and   
              Kanliang Wang and   
                        Qin Shu   Computer-related technostress in China   77--81
     Charalambos L. Iacovou and   
               Albert S. Dexter   Surviving IT project cancellations . . . 83--86
         Christian Collberg and   
               Stephen Kobourov   Self-plagiarism in computer science  . . 88--94
             Ellen Christiaanse   Performance benefits through integration
                                  hubs . . . . . . . . . . . . . . . . . . 95--100
            Bettina Berendt and   
        Oliver Günther and   
              Sarah Spiekermann   Privacy in e-commerce: stated
                                  preferences vs. actual behavior  . . . . 101--106
               Dursun Delen and   
            Nikunj P. Dalal and   
           Perakath C. Benjamin   Integrated modeling: the key to holistic
                                  understanding of the enterprise  . . . . 107--112
                  K. C. Tan and   
                 M. L. Wang and   
                        W. Peng   A P2P genetic algorithm environment for
                                  the Internet . . . . . . . . . . . . . . 113--116
                      Hai Zhuge   Semantic Grid: scientific issues,
                                  infrastructure, and methodology  . . . . 117--119
                 Bruce Schneier   Two-factor authentication: too little,
                                  too late . . . . . . . . . . . . . . . . 136--136

Communications of the ACM
Volume 48, Number 5, May, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Hackers Sacked; Back to the
                                  Future; U.K. Alerts Netizens; Schoolyard
                                  E-Bullies; IT and Work, Work, Work;
                                  Clocking Family Moves \`a la Potter  . . 9--10
             Diane Crawford and   
           Richard Stallman and   
              Peter Denning and   
              Jon Crowcroft and   
             Herbert Kanner and   
       Edwin D. Reilly, Jr. and   
                  Len Cohen and   
             Larry Brunelle and   
             Philip Burgess and   
                Jonathan Grudin   Forum: To Defend Privacy, Don't Collect
                                  Personal Data; Look Beyond Abstraction
                                  to Define Computing; Voter Anonymity and
                                  Vote Security Still Impossible; Hold the
                                  LEO and Celebrate Tools; Must Reading
                                  for Software Engineers; When Is It OK to
                                  Republish? . . . . . . . . . . . . . . . 11--13
             Rebecca T. Mercuri   Security Watch: Trusting in transparency 15--19
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 21--22
           Meg McGinity Shannon   Staying Connected: It's the FCC on the
                                  line . . . . . . . . . . . . . . . . . . 23--26
             David A. Patterson   President's Letter: Recognizing
                                  individual excellence helps us all . . . 27--28
                Satish Nambisan   Viewpoint: How to prepare tomorrow's
                                  technologists for global networks of
                                  innovation . . . . . . . . . . . . . . . 29--31
                    Anand Desai   Introduction: Special Issue: Adaptive
                                  complex enterprises  . . . . . . . . . . 32--35
                 Joseph Tan and   
              H. Joseph Wen and   
                    Neveen Awad   Health care and services delivery
                                  systems as complex adaptive systems  . . 36--44
               Albert Jones and   
               Abhijit Deshmukh   Test beds for complex systems  . . . . . 45--50
                 Jay Ramanathan   Fractal architecture for the adaptive
                                  complex enterprise . . . . . . . . . . . 51--57
              Rajiv Ramnath and   
              David Landsbergen   IT-enabled sense-and-respond strategies
                                  in complex public organizations  . . . . 58--64
             Ashley A. Bush and   
                   Amrit Tiwana   Designing sticky knowledge networks  . . 66--71
              Sridhar Nerur and   
       RadhaKanta Mahapatra and   
              George Mangalaraj   Challenges of migrating to agile
                                  methodologies  . . . . . . . . . . . . . 72--78
             Vincent S. Lai and   
                     Bo K. Wong   Business types, e-strategies, and
                                  performance  . . . . . . . . . . . . . . 80--85
       Suzanne D. Pawlowski and   
               Pratim Datta and   
              Andrea L. Houston   The (gradually) changing face of state
                                  IT jobs  . . . . . . . . . . . . . . . . 87--91
     Kenneth R. Fleischmann and   
             William A. Wallace   A covenant with transparency: opening
                                  the black box of models  . . . . . . . . 93--97
               Alex Potanin and   
                James Noble and   
               Marcus Frean and   
                  Robert Biddle   Scale-free geometry in OO programs . . . 99--103
               Baihua Zheng and   
                    Dik Lun Lee   Information dissemination via wireless
                                  broadcast  . . . . . . . . . . . . . . . 105--110
            Serge Abiteboul and   
             Rakesh Agrawal and   
             Phil Bernstein and   
                 Mike Carey and   
               Stefano Ceri and   
                Bruce Croft and   
               David DeWitt and   
              Mike Franklin and   
       Hector Garcia Molina and   
             Dieter Gawlick and   
                   Jim Gray and   
                 Laura Haas and   
                Alon Halevy and   
            Joe Hellerstein and   
           Yannis Ioannidis and   
             Martin Kersten and   
            Michael Pazzani and   
                  Mike Lesk and   
                David Maier and   
              Jeff Naughton and   
                 Hans Schek and   
               Timos Sellis and   
           Avi Silberschatz and   
           Mike Stonebraker and   
             Rick Snodgrass and   
                Jeff Ullman and   
             Gerhard Weikum and   
             Jennifer Widom and   
                    Stan Zdonik   The Lowell database research
                                  self-assessment  . . . . . . . . . . . . 111--118
                      Ben Light   Technical Opinion: Potential pitfalls in
                                  packaged software adoption . . . . . . . 119--121
                 Bruce Schneier   Inside Risks: Risks of third-party data  136--136

Communications of the ACM
Volume 48, Number 6, June, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Betting the Pharm; Mindful
                                  of Trust; Asian Jam Session; Schools
                                  Unplugged, FCC Undone; Data for a Song;
                                  A Fitting Solution . . . . . . . . . . . 9--10
             Diane Crawford and   
              David Jameson and   
                Vinton Cerf and   
            Eugen Weinstein and   
          Robert M. Davison and   
           Douglas R. Vogel and   
                Matt Wimble and   
           Michael Cusumano and   
         Charles W. Neville and   
                 Philip Wandler   Forum: The Imperceptible Cost of
                                  Eliminating Spam; Taiwan's place in
                                  China; Don't Discount Capital Structure;
                                  Beware the Consequences of Citing
                                  Self-Plagiarism  . . . . . . . . . . . . 11--13
              Phillip G. Armour   The business of software:
                                  Sarbanes--Oxley and software projects    15--17
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 19--20
               Pamela Samuelson   Legally speaking: The Supreme Court
                                  revisits the \em Sony safe harbor  . . . 21--25
             David A. Patterson   President's letter: Do you \em Queue?    27--28
                  Jacques Cohen   Viewpoint: Updating computer science
                                  education  . . . . . . . . . . . . . . . 29--31
              Andrew Rosenbloom   Introduction: $3$D hard copy . . . . . . 32--35
                 Paul K. Wright   Rapid prototyping in consumer product
                                  design . . . . . . . . . . . . . . . . . 36--41
                    Mike Bailey   Layered manufacturing for scientific
                                  visualization  . . . . . . . . . . . . . 42--48
                   Sara McMains   Layered manufacturing technologies . . . 50--56
          Thomas Funkhouser and   
            Michael Kazhdan and   
                Patrick Min and   
                 Philip Shilane   Shape-based retrieval and analysis of
                                  $3$D models  . . . . . . . . . . . . . . 58--64
         Carlo H. Séquin   Rapid prototyping: a $3$D visualization
                                  tool takes on sculpture and mathematical
                                  forms  . . . . . . . . . . . . . . . . . 66--73
               David Koller and   
                     Marc Levoy   Protecting $3$D graphics content . . . . 74--80
                U. N. Umesh and   
              Minh Q. Huynh and   
                     Len Jessup   Creating successful entrepreneurial
                                  ventures in IT . . . . . . . . . . . . . 82--87
             Jo Ellen Moore and   
                  Mary Sue Love   IT professionals as organizational
                                  citizens . . . . . . . . . . . . . . . . 88--93
         James A. M. McHugh and   
                   Fadi P. Deek   An incentive system for reducing malware
                                  attacks  . . . . . . . . . . . . . . . . 94--99
                Jennifer Xu and   
                  Hsinchun Chen   Criminal network analysis and
                                  visualization  . . . . . . . . . . . . . 100--107
                Rahul Singh and   
                A. F. Salam and   
                   Lakshmi Iyer   Agents in e-supply chains  . . . . . . . 108--115
         Fiona Fui-Hoon Nah and   
                  Keng Siau and   
                    Yuhong Tian   Knowledge management mechanisms of
                                  financial service sites  . . . . . . . . 117--123
              Tapas Kanungo and   
              Philip Resnik and   
                   Song Mao and   
                Doe-Wan Kim and   
                   Qigong Zheng   The Bible and multilingual optical
                                  character recognition  . . . . . . . . . 124--130
                   Younghwa Lee   Technical opinion: The CAN-SPAM Act: a
                                  silver bullet solution?  . . . . . . . . 131--132
                   Susan Landau   Inside risks: What lessons are we
                                  teaching?  . . . . . . . . . . . . . . . 144--144

Communications of the ACM
Volume 48, Number 7, July, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Hacker Posse; Moore at Home;
                                  Sniffing out Cancer; Retiring Old
                                  Friends; A Rose By Any Other Name?;
                                  Robo-Jockeys . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Rajesh Gupta and   
            Ashley Braganza and   
          Raymond L. Robert and   
                Hal Berghel and   
           Richard Stallman and   
           Michael Cusumano and   
             Ephraim McLean and   
                 Ralph Westfall   Forum: DARPA (and U.S.) Opportunities
                                  Lost; Don't Ignore the CIO's Legal
                                  Burdens; Free is Not Open Software; LEO
                                  Lives; Resolving the Dataless Dilemma in
                                  OO Programming . . . . . . . . . . . . . 11--13
             David A. Patterson   President's letter: Reflections on a
                                  programming Olympiad . . . . . . . . . . 15--16
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 17--18
               Peter J. Denning   The Profession of IT: The locality
                                  principle  . . . . . . . . . . . . . . . 19--24
            Michael A. Cusumano   Technology Strategy and Management: The
                                  puzzle of Japanese software  . . . . . . 25--27
                 Naomi S. Baron   Viewpoint: Instant Messaging and the
                                  future of language . . . . . . . . . . . 29--31
               Karen Holtzblatt   Introduction: Designing for the Mobile
                                  Device: Experiences, Challenges, and
                                  Methods  . . . . . . . . . . . . . . . . 32--35
                   Jan Blom and   
              Jan Chipchase and   
              Jaakko Lehikoinen   Contextual and cultural challenges for
                                  user mobility research . . . . . . . . . 37--41
                   Colleen Page   Mobile research strategies for a global
                                  market . . . . . . . . . . . . . . . . . 42--48
               T. S. Balaji and   
              Brian Landers and   
                Jesse Kates and   
                     Bob Moritz   A carrier's perspective on creating a
                                  mobile multimedia service  . . . . . . . 49--53
                Eeva Kangas and   
                  Timo Kinnunen   Applying user-centered design to mobile
                                  application development  . . . . . . . . 55--59
               David B. Rondeau   For mobile applications, branding is
                                  experience . . . . . . . . . . . . . . . 61--66
           Barbara P. Heath and   
          David J. McArthur and   
      Marilyn K. McClelland and   
               Ronald J. Vetter   Metadata lessons from the iLumina
                                  digital library  . . . . . . . . . . . . 68--74
                 Gun A. Lee and   
              Gerard J. Kim and   
              Mark Billinghurst   Immersive authoring: What You eXperience
                                  Is What You Get (WYXIWYG)  . . . . . . . 76--81
         Dennis F. Galletta and   
        Alexandra Durcikova and   
             Andrea Everard and   
                 Brian M. Jones   Does spell-checking software need a
                                  warning label? . . . . . . . . . . . . . 82--86
            James J. Cappel and   
         Victor R. Prybutok and   
                 Benny Varghese   A closer look at attention to detail . . 87--92
                  Mike Thelwall   Scientific Web intelligence: finding
                                  relationships in university Webs . . . . 93--96
                Rudy Hirschheim   The Internet-based education bandwagon:
                                  look before you leap . . . . . . . . . . 97--101
               Robert Davis and   
                     David Yung   Technical Opinion: Understanding the
                                  interactivity between television and
                                  mobile commerce  . . . . . . . . . . . . 103--105
               Edward W. Felten   Inside risks: DRM and public policy  . . 112--112

Communications of the ACM
Volume 48, Number 8, August, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: A Scattering Flock?
                                  Transistor Treasure; Unions Lose Legion;
                                  Piracy Pays; Pacman Unleashed  . . . . . 9--10
             Diane Crawford and   
             Amir Ben-Amram and   
         Christian Collbert and   
           Stephen Kobourov and   
             Alex Simonelis and   
             Ashley A. Bush and   
               Amrit Tiwana and   
            Larry Bernstein and   
                  Rich Altmaier   Forum: Rights and Wrongs in Scientific
                                  Publications; Give Users More Than
                                  Propaganda; Define Accountability in
                                  Software Development; Stick to Public
                                  Safety, Not Business Software, in Laws
                                  and Regulations  . . . . . . . . . . . . 11--13
                Robert L. Glass   Practical programmer: ``Silver bullet''
                                  milestones in software history . . . . . 15--18
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 19--20
                Hal Berghel and   
                   Jacob Uecker   Digital village: WiFi attack vectors . . 21--28
             David A. Patterson   President's letter: Does ACM support
                                  matter to conferences or journals? . . . 29--30
              Sanjeev Arora and   
               Bernard Chazelle   Viewpoint: Is the thrill gone? . . . . . 31--33
             Thomas F. Stafford   Introduction: Spyware  . . . . . . . . . 34--36
                   Steve Gibson   Spyware was inevitable . . . . . . . . . 37--39
                 Roger Thompson   Why spyware poses multiple threats to
                                  security . . . . . . . . . . . . . . . . 41--43
                   Xiaoni Zhang   What do consumers really know about
                                  spyware? . . . . . . . . . . . . . . . . 44--48
             Lee A. Freeman and   
             Andrew Urbaczewski   Why do people hate spyware?  . . . . . . 50--53
          Neveen Farag Awad and   
            Kristina Fitzgerald   The deceptive behaviors that offend us
                                  most about spyware . . . . . . . . . . . 55--60
                    Qing Hu and   
                   Tamara Dinev   Is spyware an Internet nuisance or
                                  public menace? . . . . . . . . . . . . . 61--66
            Mark B. Schmidt and   
                 Kirk P. Arnett   Spyware: a little knowledge is a
                                  wonderful thing  . . . . . . . . . . . . 67--70
               Younghwa Lee and   
               Kenneth A. Kozar   Investigating factors affecting the
                                  adoption of anti-spyware systems . . . . 72--77
          Merrill Warkentin and   
                    Xin Luo and   
              Gary F. Templeton   A framework for spyware assessment . . . 79--84
           Sudhindra Shukla and   
             Fiona Fui-Hoon Nah   Web browsing and spyware intrusion . . . 85--90
             Kirk P. Arnett and   
                Mark B. Schmidt   Busting the ghost in the machine . . . . 92--95
               Robin Poston and   
         Thomas F. Stafford and   
                 Amy Hennington   Spyware: a view from the (online) street 96--99
              Indranil Bose and   
                     Raktim Pal   Auto-ID: managing anything, anywhere,
                                  anytime in the supply chain  . . . . . . 100--106
         Yihua Philip Sheng and   
      Peter P. Mykytyn, Jr. and   
             Charles R. Litecky   Competitor analysis and its defenses in
                                  the e-marketplace  . . . . . . . . . . . 107--112
         Casey G. Cegielski and   
           Brian J. Reithel and   
                 Carl M. Rebman   Emerging information technologies:
                                  developing a timely IT strategy  . . . . 113--117
                Gregory W. Bond   Software as art  . . . . . . . . . . . . 118--124
             Donald E. Hardaway   Sharing research in the 21st Century:
                                  borrowing a page from open source
                                  software . . . . . . . . . . . . . . . . 125--128
          Jeanette Nasem Morgan   Why the software industry needs a good
                                  ghostbuster  . . . . . . . . . . . . . . 129--133
              Harry L. Reif and   
                   Michel Mitri   Technical opinion: How university
                                  professors teach project management for
                                  information systems  . . . . . . . . . . 134--136
           Peter G. Neumann and   
               Michael D. Byrne   Inside Risks: Disability-related risks   144--144

Communications of the ACM
Volume 48, Number 9, September, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Low-Tech Security Prevails;
                                  Change for the Meter; Quicky Wiki;
                                  Kicking and Screaming; Career Swings; A
                                  News Item We Couldn't Refuse . . . . . . 9--10
             Diane Crawford and   
                Lee Hollaar and   
           Edward W. Felten and   
             Bradley Rhodes and   
           Richard H. Veith and   
                 Scott Reynolds   Forum: Which Use Is Fair in Digital
                                  Rights Management?; We All Own David;
                                  Less Than Meets the Eye in Online
                                  Coursework; Software Lessons From the
                                  Dallas Cowboys . . . . . . . . . . . . . 11--13
              Phillip G. Armour   The Business of Software: To plan, two
                                  plans  . . . . . . . . . . . . . . . . . 15--19
           Meg McGinity Shannon   Staying Connected: Nanotechnology's
                                  shadow . . . . . . . . . . . . . . . . . 21--23
             David A. Patterson   President's letter: Restoring the
                                  popularity of computer science . . . . . 25--28
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 29--30
                  Frank Stajano   RFID is x-ray vision . . . . . . . . . . 31--33
              Gaetano Borriello   Introduction: Special Issue: RFID:
                                  Tagging the world  . . . . . . . . . . . 34--37
            Joshua R. Smith and   
         Kenneth P. Fishkin and   
                 Bing Jiang and   
         Alexander Mamishev and   
          Matthai Philipose and   
                Adam D. Rea and   
                  Sumit Roy and   
          Kishore Sundara-Rajan   RFID-based techniques for human-activity
                                  detection  . . . . . . . . . . . . . . . 39--44
              Ramesh Raskar and   
             Paul Beardsley and   
                 Paul Dietz and   
                Jeroen van Baar   Photosensing wireless tags for geometric
                                  procedures . . . . . . . . . . . . . . . 46--51
              Trevor Pering and   
            Rafael Ballagas and   
                       Roy Want   Spontaneous marriages of mobile devices
                                  and interactive spaces . . . . . . . . . 53--59
                 Sherry Hsi and   
                     Holly Fait   RFID enhances visitors' museum
                                  experience at the Exploratorium  . . . . 60--65
              Miyako Ohkubo and   
            Koutarou Suzuki and   
               Shingo Kinoshita   RFID privacy issues and technical
                                  challenges . . . . . . . . . . . . . . . 66--71
        Oliver Günther and   
              Sarah Spiekermann   RFID and the perception of control: the
                                  consumer's view  . . . . . . . . . . . . 73--76
                 Bruce Eckfeldt   What does RFID do for the consumer?  . . 77--79
              Rajiv C. Shah and   
                   Jay P. Kesan   Nurturing software . . . . . . . . . . . 80--85
            James Backhouse and   
                  Carol Hsu and   
             Jimmy C. Tseng and   
                  John Baptista   A question of trust  . . . . . . . . . . 87--91
              Zhenhui Jiang and   
               Weiquan Wang and   
                  Izak Benbasat   Multimedia-based interactive advising
                                  technology for online consumer decision
                                  support  . . . . . . . . . . . . . . . . 92--98
            Charles A. Wood and   
                  Terence T. Ow   WEBVIEW: an SQL extension for joining
                                  corporate data to data derived from the
                                  web  . . . . . . . . . . . . . . . . . . 99--104
                 Ping Zhang and   
                          Na Li   The importance of affective quality  . . 105--108
                      Hai Zhuge   Exploring an epidemic in an e-science
                                  environment  . . . . . . . . . . . . . . 109--114
           Deborah K. Smith and   
              Trevor Moores and   
                    Jerry Chang   Prepare your mind for learning . . . . . 115--118
               G. Anthony Gorry   Technical Opinion: As simple as
                                  possible, but not simpler  . . . . . . . 119--122
             Barbara Simons and   
                    Jim Horning   Inside risks: Risks of
                                  technology-oblivious policy  . . . . . . 136--136

Communications of the ACM
Volume 48, Number 10, October, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Medicare to the E-Rescue;
                                  Virus Motors Running; Border Security
                                  Tags; Japan Sets `Super' Sites;
                                  Beautiful Music; Energy-Saving
                                  Appliances . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
         Diomidis Spinellis and   
           Peter J. Denning and   
                Henry Baker and   
           Peter J. Denning and   
             Alex Simonelis and   
            David Patterson and   
                   Jeff Johnson   Forum: Why Computing Parallels Brain
                                  Function; The Government's Response to
                                  Tech and CS Downturns; Disband the
                                  Hacker Posse . . . . . . . . . . . . . . 11--13
             David A. Patterson   President's letter: The \em new
                                  Professional Development Centre boasts
                                  1,000 courses, O'Reilly Books, and CS
                                  classics . . . . . . . . . . . . . . . . 15--16
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 17--18
               Pamela Samuelson   Legally speaking: Did MGM really win the
                                  \em Grokster case? . . . . . . . . . . . 19--24
            Michael A. Cusumano   Technology strategy and management:
                                  Software in Ireland: a balance of
                                  entrepreneurship and\ldots lifestyle
                                  management?  . . . . . . . . . . . . . . 25--27
                Kenneth A. Ross   Viewpoint: Academic dishonesty and the
                                  Internet . . . . . . . . . . . . . . . . 29--31
            Abbe Mowshowitz and   
                  Murray Turoff   Introduction: The digital society  . . . 32--35
                Edward N. Wolff   The growth of information workers in the
                                  U.S. economy . . . . . . . . . . . . . . 37--42
              Sara J. Czaja and   
            Starr Roxanne Hiltz   Digital aids for an aging society  . . . 43--44
                Elia Zureik and   
                Abbe Mowshowitz   Consumer power in the digital society    46--51
                  Barry Wellman   Community: from neighborhood to network  53--55
                    Eli M. Noam   Why the Internet is bad for democracy    57--58
        Starr Roxanne Hiltz and   
                  Murray Turoff   Education goes digital: the evolution of
                                  online learning and the revolution in
                                  higher education . . . . . . . . . . . . 59--64
                  Hal R. Varian   Universal access to information  . . . . 65--66
           Peter G. Goldschmidt   HIT and MIS: implications of health
                                  information technology and medical
                                  information systems  . . . . . . . . . . 68--74
               Yong Jin Kim and   
              Rajiv Kishore and   
            G. Lawrence Sanders   From DQ to EQ: understanding data
                                  quality in the context of e-business
                                  systems  . . . . . . . . . . . . . . . . 75--81
      Gediminas Adomavicius and   
             Alexander Tuzhilin   Personalization technologies: a
                                  process-oriented perspective . . . . . . 83--90
            Bipin Prabhakar and   
         Charles R. Litecky and   
                    Kirk Arnett   IT skills in a tough job market  . . . . 91--94
             Dragomir Radev and   
          Jahna Otterbacher and   
                Adam Winkel and   
         Sasha Blair-Goldensohn   NewsInEssence: summarizing online news
                                  topics . . . . . . . . . . . . . . . . . 95--98
                Sang M. Lee and   
                    Xin Tan and   
                  Silvana Trimi   Current practices of leading
                                  e-government countries . . . . . . . . . 99--104
            Arvind Malhotra and   
               Albert H. Segars   Investigating wireless Web adoption
                                  patterns in the U.S. . . . . . . . . . . 105--110
                 Alan R. Peslak   Technical opinion: The educational
                                  productivity paradox . . . . . . . . . . 111--114
               Lauren Weinstein   Inside risks: The best-laid plans: a
                                  cautionary tale for developers . . . . . 128--128

Communications of the ACM
Volume 48, Number 11, November, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Attracting Hackers; Super
                                  Competition; Blog Profiles; Improvements
                                  in Hand; Tattooed Fruit; Love Lost . . . 9--10
             Diane Crawford and   
        Lawrence C. Paulson and   
        Michael A. Cusumano and   
             Stephen Schmid and   
         Fabio A. Schreiber and   
                   Hal Lowe and   
           Günter Rote and   
              William Adams and   
             David Anderson and   
         Thomas E. Stafford and   
            Arthur M. Rosenberg   Forum: Welcome Defects as a Sign of
                                  Innovation?; Homage to the Relational
                                  Database; The Cultural Roots of Computer
                                  Science; Look to Human Nature for the
                                  Roots of Spyware; Wireless at Work . . . 11--13
           Peter J. Denning and   
              Andrew McGettrick   The profession of IT: Recentering
                                  computer science . . . . . . . . . . . . 15--19
                Robert L. Glass   Practical programmer: The plot to
                                  deskill software engineering . . . . . . 21--24
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 25--26
                Maria Klawe and   
                Ben Shneiderman   Viewpoint: Crisis and opportunity in
                                  computer science . . . . . . . . . . . . 27--28
             David A. Patterson   President's letter: Rescuing our
                                  families, our neighbors, and ourselves   29--31
                    Peter Kugel   It's time to think outside the
                                  computational box  . . . . . . . . . . . 32--37
               Alvin T. S. Chan   Mobile cookies management on a smart
                                  card . . . . . . . . . . . . . . . . . . 38--43
               Richard A. Frost   Call for a public-domain SpeechWeb . . . 45--49
       Benjamin A. Kuperman and   
           Carla E. Brodley and   
          Hilmi Ozdoganoglu and   
           T. N. Vijaykumar and   
                   Ankit Jalote   Detection and prevention of stack buffer
                                  overflow attacks . . . . . . . . . . . . 50--56
            Chuan-Fong Shih and   
              Jason Dedrick and   
             Kenneth L. Kraemer   Rule of law and the international
                                  diffusion of e-commerce  . . . . . . . . 57--62
            Rana Tassabehji and   
                   Maria Vakola   Business email: the killer impact  . . . 64--70
              Sridhar Nerur and   
               Riyaz Sikora and   
          George Mangalaraj and   
          VenuGopal Balijepally   Assessing the relative influence of
                                  journals in a citation network . . . . . 71--74
                Radha Mookerjee   Maintaining enterprise software
                                  applications . . . . . . . . . . . . . . 75--79
           Rosemary H. Wild and   
          Kenneth A. Griggs and   
                    Eldon Y. Li   An architecture for distributed scenario
                                  building and evaluation  . . . . . . . . 80--86
           Michael Ettredge and   
                John Gerdes and   
                 Gilbert Karuga   Using Web-based search data to predict
                                  macroeconomic statistics . . . . . . . . 87--92
          Bill C. Hardgrave and   
           Deborah J. Armstrong   Technical opinion: Software process
                                  improvement: it's a journey, not a
                                  destination  . . . . . . . . . . . . . . 93--96
         Steven M. Bellovin and   
                 Matt Blaze and   
                   Susan Landau   Inside risks: The real national-security
                                  needs for VoIP . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 48, Number 12, December, 2005

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track: Consumers Strike Back;
                                  Addictive Hackers; Fish's Tale; A
                                  Gamer's Life; Rankings Irk Profs . . . . 9--10
             Diane Crawford and   
               Kevin Markey and   
                 Scott Peer and   
           Philip Machanick and   
                  Jim Chorn and   
             C. J. Fearnley and   
               Melvin Perez and   
          Jeanette Nasem Morgan   Forum: No RFID Choice, No Thanks; Booms,
                                  Bust, and CS Enrollment; Who Needs a
                                  Certificate? . . . . . . . . . . . . . . 11--13
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 15--16
                Rebecca Mercuri   Security Watch: Challenges in forensic
                                  computing  . . . . . . . . . . . . . . . 17--21
                Hal Berghel and   
                  David Hoelzer   Digital Village: Pernicious ports  . . . 23--30
             David A. Patterson   Robots in the desert: a research parable
                                  for our times  . . . . . . . . . . . . . 31--33
                Amy S. Bruckman   Viewpoint: Student research and the
                                  Internet . . . . . . . . . . . . . . . . 35--37
                Rahul Singh and   
            Lakshmi S. Iyer and   
                    A. F. Salam   Introduction: The Semantic E-Business
                                  Vision . . . . . . . . . . . . . . . . . 38--41
              Jos de Bruijn and   
              Dieter Fensel and   
                 Uwe Keller and   
              Rubén Lara   Using the Web service modeling ontology
                                  to enable semantic e-business  . . . . . 43--47
                 JinKyu Lee and   
       Shambhu J. Upadhyaya and   
              H. Raghav Rao and   
                    Raj Sharman   Secure knowledge management and the
                                  Semantic Web . . . . . . . . . . . . . . 48--54
               Manoj Thomas and   
            Richard Redmond and   
              Victoria Yoon and   
                    Rahul Singh   A semantic approach to monitor business
                                  process  . . . . . . . . . . . . . . . . 55--59
                 Ejub Kajan and   
               Leonid Stoimenov   Toward an ontology-driven architectural
                                  framework for B2B  . . . . . . . . . . . 60--66
            Thomas P. Moran and   
                 Alex Cozzi and   
             Stephen P. Farrell   Unified activity management: supporting
                                  people in e-business . . . . . . . . . . 67--70
          Bhavani Thuraisingham   Directions for security and privacy for
                                  semantic e-business applications . . . . 71--73
                  Juhnyoung Lee   Model-driven business transformation and
                                  the Semantic Web . . . . . . . . . . . . 75--77
           Michael J. O'Donnell   Separate handles from names on the
                                  Internet . . . . . . . . . . . . . . . . 78--83
           Sanjiv Augustine and   
                  Bob Payne and   
           Fred Sencindiver and   
                 Susan Woodcock   Agile project management: steering from
                                  the edges  . . . . . . . . . . . . . . . 85--89
               Younghwa Lee and   
           Kenneth A. Kozar and   
                  Kai R. Larsen   Does avatar email improve communication? 91--95
    Torgeir Dingsòyr and   
        Hans Karim Djarraya and   
            Emil Ròyrvik   Practical knowledge management tool use
                                  in a software consulting company . . . . 96--100
           Akhilesh Chandra and   
                Thomas Calderon   Challenges and constraints to the
                                  diffusion of biometrics in information
                                  systems  . . . . . . . . . . . . . . . . 101--106
             Stephan Kudyba and   
             G. Brent Hamar and   
               William M. Gandy   Enhancing efficiency in the health care
                                  industry . . . . . . . . . . . . . . . . 107--110
             Philip F. Musa and   
          Victor W. Mbarika and   
                     Peter Meso   Calling for programmed technology
                                  transfer and adoption strategies for
                                  sustainable LDC growth . . . . . . . . . 111--116
              Peter Denning and   
                Jim Horning and   
               David Parnas and   
               Lauren Weinstein   Inside risks: Wikipedia risks  . . . . . 152--152


Communications of the ACM
Volume 49, Number 1, January, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--7
                     CACM Staff   News track: Litter Unleashed; China's
                                  Net Preferences; Brain Drained; Cell
                                  Phones Alter African Life; U.S. IT
                                  Salaries to Rise; Runway Techno-Chic . . 9--10
             Diane Crawford and   
                George Dodd and   
                Thomas Joos and   
            Anthony Ralston and   
           Peter J. Denning and   
          Andrew McGettrick and   
                Todd Hartle and   
            Robert L. Glass and   
                Ed Callaway and   
              George Hacken and   
                David P. Duggan   Forum: Call It Anything But Programming,
                                  Even Science; Put Creativity Back in
                                  Programming; The Internet's Greatest
                                  Contribution to Democracy; Japanese
                                  Rigor for Everyone . . . . . . . . . . . 11--13
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 15--16
              Phillip G. Armour   The business of software: Counting
                                  boulders and measuring mountains . . . . 17--20
         David A. Patterson and   
                     CACM Staff   ACM annual report for FY05 . . . . . . . 21--30
           Meg McGinity Shannon   Staying connected: The network of life   29--32
             David A. Patterson   President's letter: New Directions for
                                  \em CACM?  . . . . . . . . . . . . . . . 33--35
                 Scott Campbell   Viewpoint: How to think about security
                                  failures . . . . . . . . . . . . . . . . 37--39
               Jaime Teevan and   
              William Jones and   
           Benjamin B. Bederson   Introduction: Personal information
                                  management . . . . . . . . . . . . . . . 40--43
            Mary Czerwinski and   
            Douglas W. Gage and   
                Jim Gemmell and   
      Catherine C. Marshall and   
Manuel A. Pérez-Quiñonesis and   
         Meredith M. Skeels and   
                Tiziana Catarci   Digital memories in an era of ubiquitous
                                  computing and abundant storage . . . . . 44--50
                Wanda Pratt and   
               Kenton Unruh and   
               Andrea Civan and   
                Meredith Skeels   Personal health information management   51--55
          Clare-Marie Karat and   
             Carolyn Brodie and   
                     John Karat   Usable privacy and security for personal
                                  information management . . . . . . . . . 56--57
             Edward Cutrell and   
            Susan T. Dumais and   
                   Jaime Teevan   Searching to eliminate personal
                                  information management . . . . . . . . . 58--64
      Catherine C. Marshall and   
                  William Jones   Keeping encountered information  . . . . 66--67
            Steve Whittaker and   
          Victoria Bellotti and   
                  Jacek Gwizdka   Email in personal information management 68--73
                Thomas Erickson   From PIM to GIM: personal information
                                  management in group contexts . . . . . . 74--75
            David R. Karger and   
                  William Jones   Data unification in personal information
                                  management . . . . . . . . . . . . . . . 77--82
                    Diane Kelly   Evaluating personal information
                                  management behaviors and tools . . . . . 84--86
                Jim Gemmell and   
                Gordon Bell and   
                   Roger Lueder   MyLifeBits: a personal database for
                                  everything . . . . . . . . . . . . . . . 88--95
           Kevin C. Desouza and   
               Yukika Awazu and   
                   Amrit Tiwana   Four dynamics for bringing use back into
                                  software reuse . . . . . . . . . . . . . 96--100
              George Pallis and   
                  Athena Vakali   Insight and perspectives for content
                                  delivery networks  . . . . . . . . . . . 101--106
           Grace J. Johnson and   
                Paul J. Ambrose   Neo-tribes: the power and potential of
                                  online communities in health care  . . . 107--113
              Tim Chenoweth and   
               Karen Corral and   
                 Haluk Demirkan   Seven key interventions for data
                                  warehouse success  . . . . . . . . . . . 114--119
         Lawrence A. Gordon and   
                 Martin P. Loeb   Budgeting process for information
                                  security expenditures  . . . . . . . . . 121--125
                Matti Tedre and   
              Erkki Sutinen and   
    Esko Kähkönen and   
                   Piet Kommers   Ethnocomputing: ICT in cultural and
                                  social context . . . . . . . . . . . . . 126--130
           Christoph Meinel and   
                   Volker Klotz   Technical opinion: The first 10 years of
                                  the ECCC digital library . . . . . . . . 131--134
             John C. Knight and   
               Nancy G. Leveson   Inside risks: Software and higher
                                  education  . . . . . . . . . . . . . . . 160--160

Communications of the ACM
Volume 49, Number 2, February, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Moon Match; Billboard
                                  Ratings; StAIRway to Heaven; Google
                                  Eyes; Owning to Nano Unknowns; What's
                                  the Buzz?  . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
            Kurt Guntheroth and   
            Andy K. Y. Poon and   
                 John Leary and   
               Mike Brenner and   
           Robert J. DuWors and   
      Gediminas Adomavicius and   
         Alexander Tuzhilin and   
                 Alex Simonelis   Forum: Only More Original Research Can
                                  Save Computer Science; Testing Wiki
                                  Credibility; No One Programs From
                                  Scratch; Emphasize Positive Feedback in
                                  Personalization; Why the Internet is
                                  Good for Democracy . . . . . . . . . . . 11--13
              Gary F. Templeton   Technical opinion: Video image
                                  stabilization and registration
                                  technology . . . . . . . . . . . . . . . 15--18
        Siri Birgitte Uldal and   
          Muhammad Aimal Marjan   International perspectives: Computing in
                                  post-war Afghanistan . . . . . . . . . . 19--24
               Pamela Samuelson   Legally speaking: Regulating technical
                                  design . . . . . . . . . . . . . . . . . 25--30
            Michael A. Cusumano   Technology strategy and management:
                                  Where does Russia fit into the global
                                  software industry? . . . . . . . . . . . 31--34
                Nanda Kumar and   
                Abbe Mowshowitz   Viewpoint: Who should govern the
                                  Internet?  . . . . . . . . . . . . . . . 35--37
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 39--40
             David A. Patterson   President's letter: Offshoring: Finally
                                  Facts vs. Folklore . . . . . . . . . . . 41--42
            Brajendra Panda and   
            Joseph Giordano and   
                   Daniel Kalil   Introduction: Next-generation cyber
                                  forensics  . . . . . . . . . . . . . . . 44--47
                   Eoghan Casey   Investigating sophisticated security
                                  breaches . . . . . . . . . . . . . . . . 48--55
               Brian D. Carrier   Risks of live digital forensic analysis  56--61
                Frank Adelstein   Live forensics: Diagnosing your system
                                  without killing it first . . . . . . . . 63--66
The Common Digital Evidence Storage Format Working Group   Standardizing digital evidence storage   67--68
                    Chet Hosmer   Digital evidence bag . . . . . . . . . . 69--70
            Sheldon Teelink and   
             Robert F. Erbacher   Improving the computer forensic analysis
                                  process through visualization  . . . . . 71--75
     Golden G. Richard, III and   
                 Vassil Roussev   Next-generation digital forensics  . . . 76--80
                  Rahul Bhaskar   State and local law enforcement is not
                                  ready for a cyber Katrina  . . . . . . . 81--83
            Simson L. Garfinkel   AFF: a new format for storing hard drive
                                  images . . . . . . . . . . . . . . . . . 85--87
  Ganesan Shankaranarayanan and   
                      Adir Even   The metadata enigma  . . . . . . . . . . 88--94
               Pak-Lok Poon and   
                  Amy H. L. Lau   The present B2C implementation framework 96--103
              Jan Damsgaard and   
            Mihir A. Parikh and   
                     Bharat Rao   Wireless commons perils in the common
                                  good . . . . . . . . . . . . . . . . . . 104--109
                     CACM Staff   Student de-charter notice  . . . . . . . 110--110
                  H. M. Gladney   Principles for digital preservation  . . 111--116
               Stephen Owen and   
             Pearl Brereton and   
                   David Budgen   Protocol analysis: a neglected practice  117--122
           Deborah J. Armstrong   The quarks of object-oriented
                                  development  . . . . . . . . . . . . . . 123--128
                     Roli Varma   Making computer science
                                  minority-friendly  . . . . . . . . . . . 129--134
               Peter G. Neumann   Inside risks: Trustworthy systems
                                  revisited  . . . . . . . . . . . . . . . 152--152

Communications of the ACM
Volume 49, Number 3, March, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Wars Blogged; Snap
                                  Judgments; CMU's Robo-Receptionist; Have
                                  We Got Mail! . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Peter Wegner and   
                Dina Goldin and   
          Jean-Pierre Rosen and   
              Curtis Rhodes and   
             C. J. Fearnley and   
           Peter J. Denning and   
          Andrew McGettrick and   
                 Mike Segel and   
           Michael J. O'Donnell   Forum: Interactive Computing is Already
                                  Outside the Box; Lack of Ada Reflects
                                  Software Immaturity; Be Skeptical of
                                  Rhetorical Slight of Hand; More to
                                  Innovation than Innovation Alone;
                                  Handles Not a Naming Solution  . . . . . 11--13
              Phillip G. Armour   The Business of Software: The
                                  operational executive sponsor  . . . . . 15--18
                Robert L. Glass   Practical programmer: Is the crouching
                                  tiger a threat?  . . . . . . . . . . . . 19--20
             Bertrand Meyer and   
               Willy Zwaenepoel   The European report: Europe's computer
                                  scientists take fate into their own
                                  hands  . . . . . . . . . . . . . . . . . 21--24
                     CACM Staff   Call for nominations for advanced member
                                  grades in the ACM  . . . . . . . . . . . 25--26
             David A. Patterson   President's letter: Computer science
                                  education in the 21$^{st}$ century . . . 27--30
             David A. Patterson   Reviving your favorite CS books  . . . . 31--31
              Jeannette M. Wing   Viewpoint: Computational thinking  . . . 33--35
Jean-Philippe Martin-Flatin and   
                Joe Sventek and   
                     Kurt Geihs   Introduction: Self-managed systems and
                                  services . . . . . . . . . . . . . . . . 36--39
             Paul Robertson and   
                 Brian Williams   Automatic recovery from software failure 41--47
              George Porter and   
                  Randy H. Katz   Effective Web service load balancing
                                  through statistical monitoring . . . . . 48--54
                Jerry Rolia and   
         Ludmila Cherkasova and   
              Martin Arlitt and   
                Vijay Machiraju   Supporting application quality of
                                  service in shared resource pools . . . . 55--60
             Kenji Leibnitz and   
             Naoki Wakamiya and   
                Masayuki Murata   Biologically inspired self-adaptive
                                  multi-path routing in overlay networks   62--67
                 Atul Singh and   
                     Mads Haahr   Creating an adaptive network of hubs
                                  using Schelling's model  . . . . . . . . 69--73
                     CACM Staff   ACM fellows  . . . . . . . . . . . . . . 74--75
              Martin Halvey and   
              Mark T. Keane and   
                    Barry Smyth   Mobile Web surfing is the same as Web
                                  surfing  . . . . . . . . . . . . . . . . 76--81
          Vicki R. McKinney and   
              Mary M. Whiteside   Maintaining distributed relationships    82--86
             Zhiping Walter and   
                   George Scott   Management issues of Internet/Web
                                  systems  . . . . . . . . . . . . . . . . 87--91
               Aldo de Moor and   
                    Mark Aakhus   Argumentation support: From technologies
                                  to tools . . . . . . . . . . . . . . . . 93--98
                Juan E. Gilbert   Applications quest: Computing diversity  99--104
           Robert C. Beatty and   
              Craig D. Williams   ERP II: Best practices for successfully
                                  implementing an ERP upgrade  . . . . . . 105--109
             Mazliza Othman and   
                  Rodziah Latih   Women in computer science: No shortage
                                  here!  . . . . . . . . . . . . . . . . . 111--114
        Brian L. Dos Santos and   
               Andrew L. Wright   Technical opinion: Using bulletin boards
                                  in an educational setting  . . . . . . . 115--118
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 126--127
                 Marc Rotenberg   Inside risks: Real ID, real trouble? . . 128--128

Communications of the ACM
Volume 49, Number 4, April, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: The Big Sweep; BMW Blasted;
                                  Americans turn to the Net;
                                  High-Performance Help; ACM issues
                                  offshoring report; The Boss is Watching;
                                  Fast(er) Food to Go  . . . . . . . . . . 9--10
             Diane Crawford and   
              William Adams and   
          Phillip G. Armour and   
         Peter Farrel-Vinay and   
           Sanjiv Augustine and   
                  Bob Payne and   
             Susan Woodcock and   
         David Lorge Parnas and   
            Amy S. Bruckman and   
              Adrian Bowyer and   
           Alessandro Berni and   
                   Jack Ganssle   Forum: To Produce a Good Plan, Start
                                  with a Good Process; Who Defined the
                                  Requirements?; Proff Depends on
                                  Evidence; End the Tragedy of the
                                  Wireless Commons; Look Further for
                                  Domain Name Persistence; Before Coding,
                                  Learn Disciplined Engineering  . . . . . 11--13
               Peter J. Denning   The profession of IT: Hastily formed
                                  networks . . . . . . . . . . . . . . . . 15--20
                    Hal Berghel   Digital village: Phishing mongers and
                                  posers . . . . . . . . . . . . . . . . . 21--25
                     CACM Staff   Statewide databases of registered voters 26--28
                 Diane Crawford   Hot links: Top 10 Downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 29--30
             David A. Patterson   President's letter: Seven reasons to
                                  shave your head and three reasons not
                                  to: the bald truth . . . . . . . . . . . 31--32
             Shlomo Argamon and   
                     Mark Olsen   Viewpoint: Toward meaningful computing   33--35
              Ryen W. White and   
                 Bill Kules and   
          Steven M. Drucker and   
                m. c. schraefel   Introduction: Supporting exploratory
                                  search . . . . . . . . . . . . . . . . . 36--39
               Gary Marchionini   Exploratory search: From finding to
                                  understanding  . . . . . . . . . . . . . 41--46
            m. c. schraefel and   
                 Max Wilson and   
           Alistair Russell and   
                Daniel A. Smith   mSpace: Improving information access to
                                  multimedia domains with multimodal
                                  exploratory search . . . . . . . . . . . 47--49
             Edward Cutrell and   
                Susan T. Dumais   Exploring personal information . . . . . 50--51
              Edward A. Fox and   
         Fernando Das Neves and   
                 Xiaoyan Yu and   
                   Rao Shen and   
                 Seonho Kim and   
                     Weiguo Fan   Exploring the computing literature with
                                  visualization and stepping stones &
                                  pathways . . . . . . . . . . . . . . . . 52--58
                Marti A. Hearst   Clustering versus faceted categories for
                                  information exploration  . . . . . . . . 59--61
                 John Gersh and   
               Bessie Lewis and   
           Jaime Montemayor and   
           Christine Piatko and   
                 Russell Turner   Supporting insight-based information
                                  exploration in intelligence analysis . . 63--68
            Ben Shneiderman and   
       Benjamin B. Bederson and   
              Steven M. Drucker   Find that photo!: Interface strategies
                                  to annotate, browse, and share . . . . . 69--71
              Bernard J. Jansen   Using temporal patterns of interactions
                                  to design effective automated searching
                                  assistance . . . . . . . . . . . . . . . 72--74
                  Jiexun Li and   
                 Rong Zheng and   
                  Hsinchun Chen   From fingerprint to writeprint . . . . . 76--82
                    Nenad Jukic   Modeling strategies and alternatives for
                                  data warehousing projects  . . . . . . . 83--88
                Andrea Ordanini   What drives market transactions in B2B
                                  exchanges? . . . . . . . . . . . . . . . 89--93
               Moshe Zviran and   
                 Dov Te'eni and   
                    Yuval Gross   Does color in email make a difference?   94--99
              Rosario Vidal and   
                    Elena Mulet   Thinking about computer systems to
                                  support design synthesis . . . . . . . . 100--104
             Harvey G. Enns and   
          Thomas W. Ferratt and   
                  Jayesh Prasad   Beyond stereotypes of IT professionals:
                                  Implications for IT HR practices . . . . 105--109
                Sang M. Lee and   
                Choong Kwon Lee   Technical opinion: IT managers'
                                  requisite skills . . . . . . . . . . . . 111--114
               Lauren Weinstein   Inside Risks: Fake ID: Batteries not
                                  included . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 49, Number 5, May, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Embedded Risks; Coat of
                                  Silence; Buggy Concept; Net Oversight;
                                  Virtual Visitation; Campus Campaigns . . 9--10
             Diane Crawford and   
                  Bob Elias and   
             Claud D. Price and   
            Bruce Ballengee and   
                  Jack Yang and   
             Heman Robinson and   
               Charles Betz and   
  Ganesan Shankaranarayanan and   
              Adrian Bowyer and   
              Peter Denning and   
              James Horning and   
               David Parnas and   
               Lauren Weinstein   Forum: Don't Fear the Tiger; Give
                                  Metadata its Due; Who Do You Trust?  . . 11--13
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 15--16
             Rebecca T. Mercuri   Security watch: Scoping identity theft   17--21
           Meg McGinity Shannon   Staying connected: Private lives . . . . 23--26
             David A. Patterson   President's letter: Revisiting my
                                  campaign statement . . . . . . . . . . . 27--30
               Thomas A. Easton   Viewpoint: Beyond the algorithmization
                                  of the sciences  . . . . . . . . . . . . 31--33
                   Hans Weigand   Introduction . . . . . . . . . . . . . . 44--46
           Peter J. Denning and   
                  Robert Dunham   Innovation as language action  . . . . . 47--52
            Göran Goldkuhl   Action and media in interorganizational
                                  interaction  . . . . . . . . . . . . . . 53--57
                Jan L. G. Dietz   The deep structure of business processes 58--64
                     Dov Te'eni   The language-action perspective as a
                                  basis for communication support systems  65--70
                 Terry Winograd   Designing a new foundation for design    71--74
             Mareike Schoop and   
               Aldo de Moor and   
                Jan L. G. Dietz   The pragmatic Web: a manifesto . . . . . 75--76
              Dawn G. Gregg and   
                 Steven Walczak   Adaptive Web information extraction  . . 78--84
            Stephen J. Andriole   The collaborate/integrate business
                                  technology strategy  . . . . . . . . . . 85--90
            Brian Whitworth and   
           Jerry Fjermestad and   
                 Edward Mahinda   The web of system performance  . . . . . 92--99
                      Hai Zhuge   Discovery of knowledge flow in science   101--107
               Brian Dobing and   
                Jeffrey Parsons   How UML is used  . . . . . . . . . . . . 109--113
      Pairin Katerattanakul and   
                Bernard Han and   
                       Alan Rea   Is information systems a reference
                                  discipline?  . . . . . . . . . . . . . . 114--118
        William E. Spangler and   
        Kathleen S. Hartzel and   
               Mordechai Gal-Or   Exploring the privacy implications of
                                  addressable advertising and viewer
                                  profiling  . . . . . . . . . . . . . . . 119--123
             Stephen B. Jenkins   Technical opinion: Musings of an
                                  ``old-school'' programmer  . . . . . . . 124--126
           Peter G. Neumann and   
               Lauren Weinstein   Inside risks: Risks of RFID  . . . . . . 136--136

Communications of the ACM
Volume 49, Number 6, June, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Britannica Bristles; Snooze
                                  Headlines; The Geek Factor; Sharper
                                  Image; Riding the Brain Train  . . . . . 9--10
             Diane Crawford and   
           Richard L. Lozes and   
                  Andy Belk and   
                Wayne Huang and   
      Umesh Panchaksharaiah and   
                     Zu Kim and   
                Collin Park and   
                David Evans and   
               Moshe Zviran and   
                 Dov Te'eni and   
                Yuval Gross and   
             David Randolph and   
                Amy S. Bruckman   Forum: To Make CS Relevant, Give It an
                                  Industrial Focus; The Tiger Means
                                  Healthy Competition; Shocked by Email
                                  Color; Pursue Reality as a Competitive
                                  Advantage  . . . . . . . . . . . . . . . 11--13
             David A. Patterson   President's letter: Farewell address:
                                  The growing and graying of ACM . . . . . 15--18
              Phillip G. Armour   The business of software: The learning
                                  edge . . . . . . . . . . . . . . . . . . 19--22
         Ronald F. Boisvert and   
                Mary Jane Irwin   ACM plagiarism policy: Plagiarism on the
                                  rise . . . . . . . . . . . . . . . . . . 23--24
                 Diane Crawford   Hot links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 25--26
               Pamela Samuelson   Legally speaking: Copyrighting standards 27--31
                  Gregory Conti   Introduction: Hacking and innovation . . 32--36
                      Tom Cross   Academic freedom and the hacker ethic    37--40
               Stephen Bono and   
                Aviel Rubin and   
          Adam Stubblefield and   
                  Matthew Green   Security through legality  . . . . . . . 41--43
                      Joe Grand   Research lessons from hardware hacking   44--49
                   Bruce Potter   Wireless hotspots: Petri dish of
                                  wireless security  . . . . . . . . . . . 50--56
            Felix F. X. Lindner   Software security is software
                                  reliability  . . . . . . . . . . . . . . 57--61
                   Dan Kaminsky   Explorations in namespace: White-hat
                                  hacking across the domain name system    62--69
              Kallol Bagchi and   
                Peeter Kirs and   
                 Robert Cerveny   Global software piracy: Can economic
                                  factors alone explain the trend? . . . . 70--76
            Christopher L. Carr   Reciprocity: The golden rule of IS-user
                                  service relationship quality and
                                  cooperation  . . . . . . . . . . . . . . 77--83
        Timothy Paul Cronan and   
             C. Bryan Foltz and   
                Thomas W. Jones   Piracy, computer crime, and IS misuse at
                                  the university . . . . . . . . . . . . . 84--90
                 David Kang and   
                   Roger Chiang   A systematic approach in managing
                                  post-deployment system changes . . . . . 91--96
    Bonnie Brinton Anderson and   
            James V. Hansen and   
        Paul Benjamin Lowry and   
               Scott L. Summers   The application of model checking for
                                  securing e-commerce transactions . . . . 97--101
                    Barry Shore   Enterprise integration across the
                                  globally disbursed service organization  102--106
          Thomas W. Jackson and   
            Anthony Burgess and   
                  Janet Edwards   Technical opinion: A simple approach to
                                  improving email communication  . . . . . 107--109
                Robert Charette   Inside risks: EHRs: Electronic Health
                                  Records or Exceptional Hidden Risks? . . 120--120

Communications of the ACM
Volume 49, Number 7, July, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Weather Cells; Urban
                                  (Ground) Legends; Coralling Bot
                                  Rustlers; Who Do You Trust?; China's
                                  ``Pedia'' Product; The Peak of Devotion  9--10
             Diane Crawford and   
              Richard Veith and   
            Gregory Aicklen and   
                John Knight and   
            Rebecca Mercuri and   
              D. J. Howorth and   
             Mazliza Othman and   
              Rodziah Latih and   
                  Chin-Teng Lin   Forum: Think of Programming as an
                                  Elegant Essay; Nurture the Joy of
                                  Engineering; Don't Equate Bankruptcy and
                                  Identity Theft; Author's Response; What
                                  Malaysia Looks for When Funding CS
                                  Study; Author's Response; We're from
                                  Taiwan, Not from China . . . . . . . . . 11--13
                 Diane Crawford   ACM election results: ACM's 2006 general
                                  elections  . . . . . . . . . . . . . . . 13--13
               Peter J. Denning   The profession of IT: Infoglut . . . . . 15--19
            Michael A. Cusumano   Technology strategy and management: What
                                  road ahead for Microsoft and Windows?    21--23
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 25--26
               Peter Wegner and   
                    Dina Goldin   Viewpoint: Principles of problem solving 27--29
                Jim Spohrer and   
                   Doug Riecken   Introduction: Special issues on services
                                  science  . . . . . . . . . . . . . . . . 30--32
           Henry Chesbrough and   
                    Jim Spohrer   A research manifesto for services
                                  science  . . . . . . . . . . . . . . . . 35--40
                  Jerry Sheehan   Understanding service sector innovation  42--47
                    John Zysman   The algorithmic revolution---the fourth
                                  service transformation . . . . . . . . . 48--48
             Roland T. Rust and   
                      Carol Miu   What academic research tells us about
                                  service  . . . . . . . . . . . . . . . . 49--54
                 Amit Sheth and   
                Kunal Verma and   
                Karthik Gomadam   Semantics to energize the full services
                                  spectrum . . . . . . . . . . . . . . . . 55--61
                Brenda Dietrich   Resource planning for business services  62--64
           William B. Rouse and   
               Marietta L. Baba   Enterprise transformation  . . . . . . . 66--72
             Mary Jo Bitner and   
               Stephen W. Brown   The evolution and discovery of services
                                  science in business schools  . . . . . . 73--78
                    Walter Ganz   Germany: service engineering . . . . . . 79--79
         Christof Weinhardt and   
               Dirk Neumann and   
               Carsten Holtmann   Germany: computer-aided market
                                  engineering  . . . . . . . . . . . . . . 79--79
             Paul P. Maglio and   
         Savitha Srinivasan and   
         Jeffrey T. Kreulen and   
                    Jim Spohrer   Service systems, service scientists,
                                  SSME, and innovation . . . . . . . . . . 81--85
          Stuart I. Feldman and   
          Krishna S. Nathan and   
                  Thomas Li and   
           Kazuyoshi Hidaka and   
                Corinna Schulze   The Clarion Call for modern services:
                                  China, Japan, Europe, and the US . . . . 86--87
               David Avison and   
             Shirley Gregor and   
                   David Wilson   Managerial IT unconsciousness  . . . . . 88--93
           Lance J. Hoffman and   
         Kim Lawson-Jenkins and   
                    Jeremy Blum   Trust beyond security: an expanded trust
                                  model  . . . . . . . . . . . . . . . . . 94--101
            Ernst Bekkering and   
                     J. P. Shim   Trust in videoconferencing . . . . . . . 103--107
          Narasimha Bolloju and   
              Felix S. K. Leung   Assisting novice analysts in developing
                                  quality conceptual models with UML . . . 108--112
                    Fred Martin   Technical opinion: Toy projects
                                  considered harmful . . . . . . . . . . . 113--116
               Peter G. Neumann   Inside risks: Risks relating to system
                                  compositions . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 49, Number 8, August, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Airport Security Afoot; Air
                                  Fare; The Human Touch; Luddite
                                  Politicians Seek Help; Are We There
                                  Yet?; Tunes to Go  . . . . . . . . . . . 9--10
             Diane Crawford and   
      Umesk Panchaksharaiah and   
           L. Peter Deutsch and   
              Kallol Bagchi and   
                Peeter Kirs and   
             Robert Cerveny and   
          Edward J. Ferrara and   
    Frederick G. Volpicelli and   
         Diomidis Spinellis and   
               C. Augusto Casas   Forum: Stress Fundamentals in CS
                                  Education, Simplicity in Production; No
                                  Room For Bias When Covering the
                                  Copyright System; Don't Misuse or
                                  Misteach UML; Cover to Cover; Future CS
                                  Course Already Here; To Attract New
                                  Members, Increase ACM Scope and Mandate  11--13
                Robert L. Glass   Practical programmer: The Standish
                                  report: does it really describe a
                                  software crisis? . . . . . . . . . . . . 15--16
                Hal Berghel and   
                  David Hoelzer   Digital village: Disk wiping by any
                                  other name . . . . . . . . . . . . . . . 17--21
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 23--24
                 Dan B. Goldman   Viewpoint: Blockbusters and blackboards  25--27
                    Bryan Pardo   Introduction: Music Information
                                  Retrieval  . . . . . . . . . . . . . . . 28--31
             Daniel P. W. Ellis   Extracting information from music audio  32--37
        Roger B. Dannenberg and   
            Christopher Raphael   Music score alignment and computer
                                  accompaniment  . . . . . . . . . . . . . 38--43
                     Avery Wang   The Shazam music recognition service . . 44--48
         William Birmingham and   
           Roger Dannenberg and   
                    Bryan Pardo   Query by humming with the VocalSearch
                                  system . . . . . . . . . . . . . . . . . 49--52
                Jon W. Dunn and   
                Donald Byrd and   
                Mark Notess and   
                 Jenn Riley and   
                   Ryan Scherle   Variations2: retrieving and using music
                                  in an academic setting . . . . . . . . . 53--58
              Alexander P. Pons   Biometric marketing: targeting the
                                  online consumer  . . . . . . . . . . . . 60--66
                 Vaclav Rajlich   Changing the paradigm of software
                                  engineering  . . . . . . . . . . . . . . 67--70
              G. Daryl Nord and   
        Tipton F. McCubbins and   
              Jeretta Horn Nord   E-monitoring in the workplace: privacy,
                                  legislation, and surveillance software   72--77
         J. Drew Procaccino and   
             June M. Verner and   
             Steven J. Lorenzet   Defining and contributing to software
                                  development success  . . . . . . . . . . 79--83
               Eugenia Y. Huang   Tightening access policy: the hidden
                                  trade-off  . . . . . . . . . . . . . . . 85--89
           Charlie McDowell and   
               Linda Werner and   
         Heather E. Bullock and   
                 Julian Fernald   Pair programming improves student
                                  retention, confidence, and program
                                  quality  . . . . . . . . . . . . . . . . 90--95
                  Mikko Siponen   Technical opinion: Information security
                                  standards focus on the existence of
                                  process, not its content . . . . . . . . 97--100
        Deirdre K. Mulligan and   
               Ari Schwartz and   
                 Indrani Mondal   Inside risks: Risks of online storage    112--112

Communications of the ACM
Volume 49, Number 9, September, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: HP's Hot Spot [memory spot];
                                  Spare Cycles Against Malaria; The
                                  Caveman's Disconnection [Neanderthal DNA
                                  analysis]; Privacy Policy Advice; Take
                                  Me Home, Country Roads . . . . . . . . . 9--10
             Diane Crawford and   
              William Adams and   
           Peter G. Neumann and   
               John C. Nash and   
                Dru Lavigne and   
           Russell McOrmond and   
           Charles McDonald and   
         Michael Richardson and   
               Raymond Wood and   
              Kallol Bagchi and   
                Peeter Kirs and   
             Robert Cerveny and   
           Berhoooz Parhami and   
              Peter Denning and   
            Rodney M. Bates and   
                Robert L. Glass   Forum: When It Comes to Software, Don't
                                  Just Do It; Author's Response; A Single
                                  Vested Source is Not Data; Author's
                                  Response; How to Welcome Uninvited
                                  Guests; Author's Response; Skip
                                  Toy-Program Thinking in Real-World
                                  Projects; Call it Problem Solving, Not
                                  Computational Thinking . . . . . . . . . 11--13
              Phillip G. Armour   The business of software: Software: hard
                                  data . . . . . . . . . . . . . . . . . . 15--17
           Meg McGinity Shannon   Staying connected: Home turf . . . . . . 19--21
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 23--24
                   Dennis Adams   Viewpoint: Wireless laptops in the
                                  classroom (and the Sesame Street
                                  syndrome)  . . . . . . . . . . . . . . . 25--27
        Günter Müller   Introduction: Privacy and security in
                                  highly dynamic systems . . . . . . . . . 28--31
            Stefan Sackmann and   
          Jens Strüker and   
                 Rafael Accorsi   Personalization in privacy-aware highly
                                  dynamic systems  . . . . . . . . . . . . 32--38
       Alexander Pretschner and   
               Manuel Hilty and   
                    David Basin   Distributed usage control  . . . . . . . 39--44
            Arvind Seshadri and   
                   Mark Luk and   
              Adrian Perrig and   
         Leendert van Doorn and   
                 Pradeep Khosla   Externally verifiable code execution . . 45--49
          Johannes Buchmann and   
              Alexander May and   
                 Ulrich Vollmer   Perspectives for cryptographic long-term
                                  security . . . . . . . . . . . . . . . . 50--55
             Brian Subirana and   
                   Malcolm Bain   Legal programming  . . . . . . . . . . . 57--62
               Mark D. Hill and   
           Jean-Luc Gaudiot and   
                  Mary Hall and   
                  Joe Marks and   
             Paolo Prinetto and   
                   Donna Baglio   A Wiki for discussing and promoting best
                                  practices in research  . . . . . . . . . 63--64
                 Gio Wiederhold   What is your software worth? . . . . . . 65--75
                 Weiguo Fan and   
              Linda Wallace and   
             Stephanie Rich and   
                  Zhongju Zhang   Tapping the power of text mining . . . . 76--82
              Marc Stiegler and   
               Alan H. Karp and   
                Ka-Ping Yee and   
                Tyler Close and   
                 Mark S. Miller   Polaris: virus-safe computing for
                                  Windows XP . . . . . . . . . . . . . . . 83--88
               Se-Joon Hong and   
                Kar Yan Tam and   
                     Jinwoo Kim   Mobile data service fuels the desire for
                                  uniqueness . . . . . . . . . . . . . . . 89--94
       Bongsug (Kevin) Chae and   
                  Roger McHaney   Asian trio's adoption of Linux-based
                                  open source development  . . . . . . . . 95--99
               Peter G. Neumann   Inside risks: The foresight saga . . . . 112--112

Communications of the ACM
Volume 49, Number 10, October, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Outsourcing Twist; Iraq's
                                  Cool Factor; Segway's Segue; A Picture
                                  Is Worth Even More Spam; Blog-Free CEOs;
                                  Sponge Count . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
             Donn B. Parker and   
             Phillip Armour and   
          Bhupinder Singh Anand   Forum: Why Information Security Is Still
                                  a Folk Art;; In Programming, as in Life,
                                  Know the Problem Domain; Measure
                                  Software Success as Delivered Value to
                                  the Customer; How Definitive is the
                                  Classical Church--Turing Thesis? . . . . 11--13
            Michael A. Cusumano   Technology strategy and management:
                                  Envisioning the future of India's
                                  software services business . . . . . . . 15--17
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 19--20
               Pamela Samuelson   Legally speaking: IBM's pragmatic
                                  embrace of open source . . . . . . . . . 21--25
 Pär J. Ågerfalk and   
               Brian Fitzgerald   Introduction: Special Issue: Flexible
                                  and distributed software processes: old
                                  petunias in new bowls? . . . . . . . . . 26--34
                Gwanhoo Lee and   
             William DeLone and   
            J. Alberto Espinosa   Ambidextrous coping strategies in
                                  globally distributed software
                                  development projects . . . . . . . . . . 35--40
     Balasubramaniam Ramesh and   
                    Lan Cao and   
               Kannan Mohan and   
                        Peng Xu   Can distributed software development be
                                  agile? . . . . . . . . . . . . . . . . . 41--46
        One-Ki (Daniel) Lee and   
            Probir Banerjee and   
                 Kai H. Lim and   
              Kuldeep Kumar and   
      Jos van Hillegersberg and   
                   Kwok Kee Wei   Aligning IT components to achieve
                                  agility in globally distributed system
                                  development  . . . . . . . . . . . . . . 48--54
           Patrick Wagstrom and   
                 James Herbsleb   Dependency forecasting in the
                                  distributed agile organization . . . . . 55--56
                   Nick V. Flor   Globally distributed software
                                  development and pair programming . . . . 57--58
                 Jiming Liu and   
                     K. C. Tsui   Toward nature-inspired computing . . . . 59--64
                   Ray Giguette   Building objects out of Plato: applying
                                  philosophy, symbolism, and analogy to
                                  software design  . . . . . . . . . . . . 66--71
         Casey G. Cegielski and   
                 Dianne J. Hall   What makes a good programmer?  . . . . . 73--75
                   Tamara Dinev   Why spoofing is serious Internet fraud   76--82
               Il-Horn Hann and   
               Kai-Lung Hui and   
                Yee-Lin Lai and   
               S. Y. T. Lee and   
                   I. P. L. Png   Who gets spammed?  . . . . . . . . . . . 83--87
           Pratyush Bharati and   
              Abhijit Chaudhury   Studying the current status of
                                  technology adoption  . . . . . . . . . . 88--93
             Steven M. Bellovin   Inside risks: Virtual machines, virtual
                                  security?  . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 49, Number 11, November, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Super Game Plan; E-Learning
                                  Roots Disputed; Chinese History; U.K.
                                  Seeks Popular Science Input; Encryption
                                  Commitment; \em Improve-ment News; Vid
                                  Kid  . . . . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
               Karl Wiegers and   
              Marc Stiegler and   
               Alan H. Karp and   
                Ka-Ping Yee and   
                Tyler Close and   
             Mark S. Miller and   
       Jeffrey A. Rosenwald and   
                  Jim Chorn and   
                  David Dreyfus   Forum: Don't Target Me, Unless I Say You
                                  Can; Avoid the Trap of Unrealistic
                                  Expectations; Fewer Degrees of
                                  Separation Means More Precision in
                                  Software Projects  . . . . . . . . . . . 11--13
                Robert L. Glass   Practical programmer: Looking into the
                                  challenges of complex IT projects  . . . 15--17
           Peter J. Denning and   
                Rick Hayes-Roth   The profession of IT: Decision making in
                                  very large networks  . . . . . . . . . . 19--23
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 25--26
              Christof Teuscher   Viewpoint: Biologically uninspired
                                  computer science . . . . . . . . . . . . 27--29
          Cormac J. Sreenan and   
            Kobus van der Merwe   Introduction to Special Issue on
                                  Entertainment Networking . . . . . . . . 30--33
               Kuan-Ta Chen and   
                Polly Huang and   
                 Chin-Laung Lei   How sensitive are online gamers to
                                  network quality? . . . . . . . . . . . . 34--38
              Mark Claypool and   
                 Kajal Claypool   Latency and player actions in online
                                  games  . . . . . . . . . . . . . . . . . 40--45
                Jeremy Brun and   
              Farzad Safaei and   
                  Paul Boustead   Managing latency and fairness in
                                  networked games  . . . . . . . . . . . . 46--51
              Zefir Kurtisi and   
                Xiaoyuan Gu and   
                      Lars Wolf   Enabling network-centric music
                                  performance in wide-area networks  . . . 52--54
                    Reza Rejaie   Anyone can broadcast video over the
                                  internet . . . . . . . . . . . . . . . . 55--57
             Verena Kahmann and   
                Jens Brandt and   
                      Lars Wolf   Collaborative streaming in heterogeneous
                                  and dynamic scenarios  . . . . . . . . . 58--63
              Dijiang Huang and   
                   Qing Cao and   
                 Amit Sinha and   
      Marc J. Schniederjans and   
                 Cory Beard and   
                  Lein Harn and   
                     Deep Medhi   New architecture for intra-domain
                                  network security issues  . . . . . . . . 64--72
                   Hazel Taylor   Critical risks in outsourced IT
                                  projects: the intractable and the
                                  unforeseen . . . . . . . . . . . . . . . 74--79
                Dinah Payne and   
             Brett J. L. Landry   A uniform code of ethics: business and
                                  IT professional ethics . . . . . . . . . 81--84
                   Arun Sen and   
             Peter A. Dacin and   
             Christos Pattichis   Current trends in web data analysis  . . 85--91
         Rebecca T. Mercuri and   
          Vincent J. Lipsio and   
                    Beth Feehan   Inside risks: COTS and other electronic
                                  voting backdoors . . . . . . . . . . . . 112--112

Communications of the ACM
Volume 49, Number 12, December, 2006

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track: Tech 20/20 on 2020; Patents
                                  Not Pending; A Matter of Style; Nano
                                  Products, Giga Concerns; The Tiny Engine
                                  that Could; ``Houston, We Have a
                                  Problem''  . . . . . . . . . . . . . . . 9--10
             Diane Crawford and   
           Girish Seshagiri and   
    Pär Ågerfalk and   
           Brian Fitzgerald and   
        Trevor R. H. Clarke and   
        Niels J. Bjergstrom and   
             Alex Simonelis and   
           Charlie McDowell and   
               Linda Werner and   
         Heather E. Bullock and   
             Julian Fernald and   
             Melvin Fitting and   
      Bhupinder Singh Anand and   
                   Thorkil Naur   Forum: GSD Benefits Still Not Worth the
                                  Trouble; Let Interactive Genetic
                                  Algorithms Provide Music Accompaniment;
                                  Insist on Risk Management in Software
                                  Engineering; Could One Head Be Better
                                  Than Two?; Would Church or Turing Make
                                  Every Function Computable?; Still No
                                  Proof of the Unsolvability of Turing's
                                  Halting Problem  . . . . . . . . . . . . 11--13
                    Hal Berghel   Digital village: Fungible credentials
                                  and next-generation fraud  . . . . . . . 15--19
                     CACM Staff   ACM honors distinguished members for
                                  contributions to computing . . . . . . . 20--21
                 Diane Crawford   Hot links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 23--24
                  Douglas Blank   Viewpoint: Robots make computer science
                                  personal . . . . . . . . . . . . . . . . 25--27
          Vijayan Sugumaran and   
               Sooyong Park and   
                    Kyo C. Kang   Introduction: Software product line
                                  engineering  . . . . . . . . . . . . . . 28--32
           Paul C. Clements and   
          Lawrence G. Jones and   
           John D. McGregor and   
              Linda M. Northrop   Getting there from here: a roadmap for
                                  software product line adoption . . . . . 33--36
             Charles W. Krueger   New methods in software product line
                                  practice . . . . . . . . . . . . . . . . 37--40
                      Jan Bosch   The challenges of broadening the scope
                                  of software product families . . . . . . 41--44
                 Don Batory and   
            David Benavides and   
            Antonio Ruiz-Cortes   Automated analysis of feature models:
                                  challenges ahead . . . . . . . . . . . . 45--47
            Magnus Eriksson and   
  Jürgen Börstler and   
                     Kjell Borg   Software product line modeling made
                                  practical  . . . . . . . . . . . . . . . 49--54
                Jaejoon Lee and   
                    Dirk Muthig   Feature-oriented variability management
                                  in product line engineering  . . . . . . 55--59
        Krzysztof Czarnecki and   
          Michal Antkiewicz and   
           Chang Hwan Peter Kim   Multi-level customization in application
                                  engineering  . . . . . . . . . . . . . . 60--65
          Andreas Helferich and   
               Klaus Schmid and   
                 Georg Herzwurm   Product management for software product
                                  lines: an unsolved problem?  . . . . . . 66--67
               Kannan Mohan and   
         Balasubramaniam Ramesh   Change management patterns in software
                                  product lines  . . . . . . . . . . . . . 68--72
               Tomoji Kishi and   
                   Natsuko Noda   Formal verification and software product
                                  lines  . . . . . . . . . . . . . . . . . 73--77
                 Klaus Pohl and   
                Andreas Metzger   Software product line testing  . . . . . 78--81
        Joaquin Peña and   
         Michael G. Hinchey and   
     Antonio Ruiz-Cortés   Multi-agent system product lines:
                                  challenges and benefits  . . . . . . . . 82--84
               Hoh Peter In and   
              Jongmoon Baik and   
                Sangsoo Kim and   
                    Ye Yang and   
                    Barry Boehm   A quality-based cost estimation model
                                  for the product line life cycle  . . . . 85--88
                 Ian Angell and   
                  Jan Kietzmann   RFID and the end of cash?  . . . . . . . 90--96
             Zakaria Maamar and   
          Djamal Benslimane and   
          Nanjangud C. Narendra   What can context do for Web services?    98--103
             Martin Bichler and   
           Jayant R. Kalagnanam   Software frameworks for advanced
                                  procurement auction markets  . . . . . . 104--108
             Ali Reza Montazemi   How they manage IT: SMEs in Canada and
                                  the U.S. . . . . . . . . . . . . . . . . 109--112
            France Belanger and   
                 Weiguo Fan and   
       L. Christian Schaupp and   
             Anjala Krishen and   
          Jeannine Everhart and   
               David Poteet and   
                  Kent Nakamoto   Technical opinion: Web site success
                                  metrics: addressing the duality of goals 114--116
        Wilhelm Hasselbring and   
              Matthias Rohr and   
              Jurgen Taeger and   
                Daniel Winteler   Inside risks: Liability risks in reusing
                                  third-party software . . . . . . . . . . 144--144


Communications of the ACM
Volume 50, Number 1, January, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 9--10
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 11--12
              Phillip G. Armour   The business of software: Agile \ldots
                                  and offshore . . . . . . . . . . . . . . 13--16
           Meg McGinity Shannon   Staying connected: Shannon's eleven  . . 17--20
                  Russell Beale   Viewpoint: Slanty design . . . . . . . . 21--24
                     CACM Staff   ACM Annual Report for FY06 . . . . . . . 25--32
          Patricia S. Abril and   
                   Robert Plant   The patent holder's dilemma: buy, sell,
                                  or troll?  . . . . . . . . . . . . . . . 36--44
                    Huimin Zhao   Semantic matching across heterogeneous
                                  data sources . . . . . . . . . . . . . . 45--50
                   Markus Biehl   Success factors for implementing global
                                  information systems  . . . . . . . . . . 52--58
                Nitin Singh and   
               Kee-hung Lai and   
                 T. C. E. Cheng   Intra-organizational perspectives on
                                  IT-enabled supply chains . . . . . . . . 59--65
            Sharon McDonald and   
               Helen M. Edwards   Who should test whom?  . . . . . . . . . 66--71
                   Sami Surakka   What subjects and skills are important
                                  for software developers? . . . . . . . . 73--78
          Jaap-Henk Hoepman and   
                    Bart Jacobs   Increased security through open source   79--83
                     Peter Naur   Computing versus human thinking  . . . . 85--94
                 Diane Crawford   Hot links: Top 10 Downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 95--96
               Lauren Weinstein   Inside risks: Ma Bell's revenge: the
                                  battle for network neutrality  . . . . . 128--128

Communications of the ACM
Volume 50, Number 2, February, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 9--10
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 11--13
                     CACM Staff   Student de-charter notice  . . . . . . . 14--14
            Michael A. Cusumano   Technology strategy and management: What
                                  road ahead for Microsoft the company?    15--18
               Pamela Samuelson   Legally speaking: Patent reform through
                                  the courts . . . . . . . . . . . . . . . 19--23
             Joshua Goodman and   
          Gordon V. Cormack and   
                David Heckerman   Spam and the ongoing battle for the
                                  inbox  . . . . . . . . . . . . . . . . . 24--33
             Rakesh Agrawal and   
           Tyrone Grandison and   
        Christopher Johnson and   
                  Jerry Kiernan   Enabling the 21st century health care
                                  information technology revolution  . . . 34--42
            Grant A. Jacoby and   
                           Luqi   Intranet model and metrics . . . . . . . 43--50
            Bonnie C. Glassberg   Electronic markets hypothesis redux:
                                  where are we now?  . . . . . . . . . . . 51--55
                Galen A. Grimes   Compliance with the CAN-SPAM Act of 2003 56--62
           Ranieri Baraglia and   
             Fabrizio Silvestri   Dynamic personalization of web sites
                                  without user intervention  . . . . . . . 63--67
                   Joon Koh and   
              Young-Gul Kim and   
               Brian Butler and   
                   Gee-Woo Bock   Encouraging participation in virtual
                                  communities  . . . . . . . . . . . . . . 68--73
                 Dongsong Zhang   Web content adaptation for mobile
                                  handheld devices . . . . . . . . . . . . 75--79
                     CACM Staff   SIGs Announce Candidates for Election    80--80
               Rafae Bhatti and   
              Elisa Bertino and   
                   Arif Ghafoor   An integrated approach to federated
                                  identity and privilege management in
                                  open systems . . . . . . . . . . . . . . 81--87
           Benjamin B. Shao and   
              Julie Smith David   The impact of offshore outsourcing on IT
                                  workers in developed countries . . . . . 89--94
                  Rolf Oppliger   Technical opinion: IT security: in
                                  search of the Holy Grail . . . . . . . . 96--98
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 99--100
               Peter G. Neumann   Inside Risks: Widespread network
                                  failures . . . . . . . . . . . . . . . . 112--112

Communications of the ACM
Volume 50, Number 3, March, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 9--10
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 11--13
                     CACM Staff   ACM A. M. Turing Award nominations
                                  solicited  . . . . . . . . . . . . . . . 14--14
              Phillip G. Armour   The business of software: Mortality play 15--18
                  Earl Barr and   
                Matt Bishop and   
                   Mark Gondree   Viewpoint: Fixing federal e-voting
                                  standards  . . . . . . . . . . . . . . . 19--24
                     CACM Staff   SIGs announce candidates for election    25--25
                     CACM Staff   ACM fellows  . . . . . . . . . . . . . . 26--27
        Bartel Van de Walle and   
                  Murray Turoff   Emergency response information systems:
                                  Emerging trends and technologies:
                                  Introduction . . . . . . . . . . . . . . 29--31
                 Liz Carver and   
                  Murray Turoff   Human-computer interaction: the human
                                  and computer as a team in emergency
                                  management information systems . . . . . 33--38
               Simon French and   
                  Murray Turoff   Decision support systems . . . . . . . . 39--40
             Frank Fiedrich and   
                 Paul Burghardt   Agent-based systems for disaster
                                  management . . . . . . . . . . . . . . . 41--42
      David Mendonça and   
          Theresa Jefferson and   
                   John Harrald   Collaborative adhocracies and
                                  mix-and-match technologies in emergency
                                  management . . . . . . . . . . . . . . . 44--49
                B. S. Manoj and   
        Alexandra Hubenko Baker   Communication challenges in emergency
                                  response . . . . . . . . . . . . . . . . 51--53
               Leysia Palen and   
        Starr Roxanne Hiltz and   
                  Sophia B. Liu   Online forums supporting grassroots
                                  participation in emergency preparedness
                                  and response . . . . . . . . . . . . . . 54--58
              Art Botterell and   
            Ronja Addams-Moring   Public warning in the networked age:
                                  open standards to the rescue?  . . . . . 59--60
               Paul Currion and   
         Chamindra de Silva and   
            Bartel Van de Walle   Open source software for disaster
                                  management . . . . . . . . . . . . . . . 61--65
            Stephen J. Andriole   The 7 habits of highly effective
                                  technology leaders . . . . . . . . . . . 66--72
            Thomas A. Horan and   
           Benjamin L. Schooley   Time-critical information services . . . 73--78
              Sridhar Nerur and   
          VenuGopal Balijepally   Theoretical reflections on agile
                                  development methodologies  . . . . . . . 79--83
                Scott McCoy and   
             Andrea Everard and   
                Peter Polak and   
             Dennis F. Galletta   The effects of online advertising  . . . 84--88
                 Ning Zhong and   
                 Jiming Liu and   
                       Yiyu Yao   Envisioning intelligent information
                                  technologies through the prism of web
                                  intelligence . . . . . . . . . . . . . . 89--94
              James A. Hall and   
             Stephen L. Liedtka   The Sarbanes--Oxley Act: implications
                                  for large-scale IT outsourcing . . . . . 95--100
                 Diane Crawford   Hot links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 101--102
                     Nigel Ward   Technical opinion: The
                                  (un)predictability of computer science
                                  graduate school admissions . . . . . . . 104--106
                 Donn B. Parker   Inside risks: Risks of risk-based
                                  security . . . . . . . . . . . . . . . . 120--120

Communications of the ACM
Volume 50, Number 4, April, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                 Diane Crawford   Forum: Stop chasing the AI illusion  . . 7--9
                     CACM Staff   News track . . . . . . . . . . . . . . . 13--14
                    Hal Berghel   Digital Village: Hiding data, forensics,
                                  and anti-forensics . . . . . . . . . . . 15--20
               Peter J. Denning   The profession of IT: Mastering the mess 21--25
                     CACM Staff   ACM honors distinguished members . . . . 26--27
                     CACM Staff   Call for nominations for advanced member
                                  grades in ACM  . . . . . . . . . . . . . 28--29
                     CACM Staff   Proposal to dissolve SIGAPL  . . . . . . 29--29
                    Jenova Chen   Viewpoint: Flow in games (and everything
                                  else)  . . . . . . . . . . . . . . . . . 31--34
                    Jeff Kramer   Is abstraction the key to computing? . . 36--42
                 Dorit Nevo and   
                Michael R. Wade   How to avoid disappointment by design    43--48
                Levent V. Orman   Consumer support systems . . . . . . . . 49--54
               Stefano Ceri and   
          Maristella Matera and   
            Francesca Rizzo and   
            Vera Demaldé   Designing data-intensive web
                                  applications for content accessibility
                                  using web marts  . . . . . . . . . . . . 55--61
                  Ido Green and   
                   Tzvi Raz and   
                   Moshe Zviran   Analysis of active intrusion prevention
                                  data for predicting hostile activity in
                                  computer networks  . . . . . . . . . . . 63--68
                   S. Sakthivel   Managing risk in offshore systems
                                  development  . . . . . . . . . . . . . . 69--75
           Jeffrey A. Stone and   
                 Elinor Madigan   Inconsistencies and disconnects  . . . . 76--79
             Dianne J. Hall and   
                 David Paradice   Investigating value-based decision bias
                                  and mediation: do you do as you think?   81--85
               Michael Chau and   
                  Xiao Fang and   
            Olivia R. Liu Sheng   What are people searching on government
                                  web sites? . . . . . . . . . . . . . . . 87--92
                 Diane Crawford   Hot links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 93--94
            E. Sonny Butler and   
             Cheryl Aasheim and   
                 Susan Williams   Technical opinion: Does telecommuting
                                  improve productivity?  . . . . . . . . . 101--103
                    Jim Horning   Inside Risks: Risks of virtual
                                  professionalism  . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 50, Number 5, May, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 7--7
              Stuart I. Feldman   President's letter: ACM's past helps
                                  steer its future . . . . . . . . . . . . 10--10
                     CACM Staff   News track . . . . . . . . . . . . . . . 11--12
           Meg McGinity Shannon   Staying connected: The pearly gates of
                                  Internet TV  . . . . . . . . . . . . . . 13--15
             Stephen B. Jenkins   Viewpoint: The rime of the ancyent
                                  programmer . . . . . . . . . . . . . . . 17--20
                Robert L. Glass   Practical programmer: One man's quest
                                  for the state of software engineering's
                                  practice . . . . . . . . . . . . . . . . 21--23
                  David S. Wise   ACM at 60: a look back in time:
                                  Introduction . . . . . . . . . . . . . . 24--26
               Bernadette Longo   ACM established to develop communication
                                  about computing  . . . . . . . . . . . . 27--29
                  Atsushi Akera   Edmund Berkeley and the origins of ACM   30--35
               Thomas Haigh and   
           Elisabeth Kaplan and   
                    Carrie Seib   Sources for ACM history: what, where,
                                  why  . . . . . . . . . . . . . . . . . . 36--41
                   Charles Care   Not only digital: a review of ACM's
                                  early involvement with analog computing
                                  technology . . . . . . . . . . . . . . . 42--45
             David Hemmendinger   The ACM and IEEE-CS guidelines for
                                  undergraduate CS education . . . . . . . 46--53
                 Judy Brown and   
               Steve Cunningham   A history of ACM SIGGRAPH  . . . . . . . 54--61
       Chris Edmondson-Yurkanan   SIGCOMM's archaeological journey into
                                  networking's past  . . . . . . . . . . . 63--68
         Thomas J. (Tim) Bergin   A history of the history of programming
                                  languages  . . . . . . . . . . . . . . . 69--74
             Matthew R. McBride   The software architect . . . . . . . . . 75--81
           Zeljko Obrenovic and   
              Julio Abascal and   
                Dusan Starcevic   Universal accessibility as a multimodal
                                  design issue . . . . . . . . . . . . . . 83--88
             Michael Harris and   
             Kris Aebischer and   
                      Tim Klaus   The whitewater process: software product
                                  development in small IT businesses . . . 89--93
                     Bin He and   
               Mitesh Patel and   
                 Zhen Zhang and   
         Kevin Chen-Chuan Chang   Accessing the deep web . . . . . . . . . 94--101
    Viviane Torres da Silva and   
         Carlos J. P. de Lucena   Modeling multi-agent systems . . . . . . 103--108
 Alessandra Devito Da Cunha and   
                David Greathead   Does personality matter?: an analysis of
                                  code-review ability  . . . . . . . . . . 109--112
           Geoffrey Goodell and   
                  Paul Syverson   Technical opinion: The right place at
                                  the right time . . . . . . . . . . . . . 113--117
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 124--125
                 Bruce Schneier   Inside risks: The psychology of security 128--128

Communications of the ACM
Volume 50, Number 6, June, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 7--9
                     CACM Staff   News track . . . . . . . . . . . . . . . 13--14
               Pamela Samuelson   Legally speaking: Software patents and
                                  the metaphysics of Section 271(f)  . . . 15--19
              Phillip G. Armour   The business of software: Twenty percent 21--23
                Ben Shneiderman   Viewpoint: Web science: a provocative
                                  invitation to computer science . . . . . 25--27
              Eric van Heck and   
                  Peter Vervest   Smart business networks: how the network
                                  wins . . . . . . . . . . . . . . . . . . 28--37
              Sasha Dekleva and   
                 J. P. Shim and   
             Upkar Varshney and   
              Geoffrey Knoerzer   Evolution and emerging issues in mobile
                                  wireless networks  . . . . . . . . . . . 38--43
            Amy Friedlander and   
             Allison Mankin and   
         W. Douglas Maughan and   
             Stephen D. Crocker   DNSSEC: a protocol toward securing the
                                  Internet infrastructure  . . . . . . . . 44--50
      Ioanna D. Constantiou and   
              Jan Damsgaard and   
                   Lars Knutsen   The four incremental steps toward
                                  advanced mobile service adoption . . . . 51--55
          Mark J. Cotteleer and   
   Christopher A. Cotteleer and   
                Andrew Prochnow   Cutting checks: challenges and choices
                                  in B2B e-payments  . . . . . . . . . . . 56--61
              Anand Jeyaraj and   
                Vicki L. Sauter   An empirical investigation of the
                                  effectiveness of systems modeling and
                                  verification tools . . . . . . . . . . . 62--67
               David Avison and   
                    Terry Young   Time to rethink health care and ICT? . . 69--74
         Kary Främling and   
             Timo Ala-Risku and   
 Mikko Kärkkäinen and   
             Jan Holmström   Design patterns for managing product
                                  life cycle information . . . . . . . . . 75--79
                    Jie Ren and   
              Richard N. Taylor   Automatic and versatile publications
                                  ranking for research institutions and
                                  scholars . . . . . . . . . . . . . . . . 81--85
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 86--87
            Mihail Cocosila and   
                 Ofir Turel and   
                Norm Archer and   
                     Yufei Yuan   Technical opinion: Perceived health
                                  risks of 3G cell phones: do users care?  89--92
               Peter A. Freeman   Inside risks: Risks are your
                                  responsibility . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 50, Number 7, July, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
               Peter J. Denning   The profession of IT: Computing is a
                                  natural science  . . . . . . . . . . . . 13--18
            Michael A. Cusumano   Technology strategy and management: The
                                  changing labyrinth of software pricing   19--22
            Abbe Mowshowitz and   
                    Nanda Kumar   Viewpoint: Public vs. private interest
                                  on the Internet  . . . . . . . . . . . . 23--25
                   Michael Zyda   Creating a science of games:
                                  Introduction . . . . . . . . . . . . . . 26--29
               Merrilea J. Mayo   Games for science and engineering
                                  education  . . . . . . . . . . . . . . . 30--35
               Ralph E. Chatham   Games for training . . . . . . . . . . . 36--43
                Henry Kelly and   
                 Kay Howell and   
              Eitan Glinert and   
             Loring Holding and   
                Chris Swain and   
          Adam Burrowbridge and   
                 Michelle Roper   How to build serious games . . . . . . . 44--49
               Randy Pausch and   
                  Don Marinelli   Carnegie Mellon's entertainment
                                  technology center: combining the left
                                  and right brain  . . . . . . . . . . . . 50--57
           Caitlin Kelleher and   
                   Randy Pausch   Using storytelling to motivate
                                  programming  . . . . . . . . . . . . . . 58--64
         Nikunj Raghuvanshi and   
       Christian Lauterbach and   
              Anish Chandak and   
             Dinesh Manocha and   
                    Ming C. Lin   Real-time sound synthesis and
                                  propagation for games  . . . . . . . . . 66--73
        Robert P. Schumaker and   
                   Ying Liu and   
              Mark Ginsburg and   
                  Hsinchun Chen   Evaluating the efficacy of a terrorism
                                  question/answer system . . . . . . . . . 74--80
                         In Lee   An architecture for a next-generation
                                  holistic e-recruiting system . . . . . . 81--85
                  Harris Wu and   
                 Michael Gordon   Collaborative structuring: organizing
                                  document repositories effectively and
                                  efficiently  . . . . . . . . . . . . . . 86--91
             Fred Niederman and   
         Richard G. Mathieu and   
               Roger Morley and   
                   Ik-Whan Kwon   Examining RFID applications in supply
                                  chain management . . . . . . . . . . . . 92--101
              Someswar Kesh and   
            Pauline Ratnasingam   A knowledge architecture for IT security 103--108
      Annie I. Antón and   
              Elisa Bertino and   
                 Ninghui Li and   
                        Ting Yu   A roadmap for comprehensive online
                                  privacy policy management  . . . . . . . 109--116
            Waymond Rodgers and   
                 Solomon Negash   The effects of Web-based technologies on
                                  knowledge transfer . . . . . . . . . . . 117--122
               Sabah Al-Fedaghi   Technical opinion: Conferences under
                                  scrutiny . . . . . . . . . . . . . . . . 123--126
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 135--135
                 Charles Perrow   Inside risks: Disasters evermore?  . . . 136--136

Communications of the ACM
Volume 50, Number 8, August, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 13--14
                 Diane Crawford   Call for nominations for ACM general
                                  election . . . . . . . . . . . . . . . . 14--14
                    Hal Berghel   Digital village: Better-than-nothing
                                  security practices . . . . . . . . . . . 15--18
                Amy S. Bruckman   Viewpoint: Software copyright and role
                                  models . . . . . . . . . . . . . . . . . 19--20
                Robert L. Glass   Practical programmer: A deja-vu look at
                                  software engineering researchers who
                                  care about practice  . . . . . . . . . . 21--23
                   Alfred Kobsa   Privacy-enhanced personalization . . . . 24--33
                Ahmed Elfatatry   Dealing with change: components versus
                                  services . . . . . . . . . . . . . . . . 35--39
           Matt E. Thatcher and   
                David E. Pingry   Modeling the IT value paradox  . . . . . 41--45
              John Erickson and   
                      Keng Siau   Theoretical and practical complexity of
                                  modeling methods . . . . . . . . . . . . 46--51
                Jesper Simonsen   Involving top management in IT projects  52--58
           Larry J. LeBlanc and   
            Michael R. Galbreth   Designing large-scale supply chain
                                  linear programs in spreadsheets  . . . . 59--64
                    Yun Wan and   
                Satya Menon and   
            Arkalgud Ramaprasad   A classification of product comparison
                                  agents . . . . . . . . . . . . . . . . . 65--71
           Janice C. Sipior and   
                  Burke T. Ward   Unintended invitation: organizational
                                  wi-fi use by external roaming users  . . 72--77
                  T. H. Tse and   
          Francis C. M. Lau and   
                 W. K. Chan and   
            Peter C. K. Liu and   
                Colin K. F. Luk   Testing object-oriented industrial
                                  software without precise oracles or
                                  results  . . . . . . . . . . . . . . . . 78--85
                Sagnika Sen and   
             Haluk Demirkan and   
                   Michael Goul   Dynamic decision support through
                                  instantiation of UEML representations    87--93
           W. ``RP'' Raghupathi   Corporate governance of IT: a framework
                                  for development  . . . . . . . . . . . . 94--99
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 100--100
        Sakgasit Ramingwong and   
                A. S. M. Sajeev   Technical opinion: Offshore outsourcing:
                                  the risk of keeping mum  . . . . . . . . 101--103
             David Lorge Parnas   Inside risks: Which is riskier: OS
                                  diversity or OS monopoly?  . . . . . . . 112--112

Communications of the ACM
Volume 50, Number 9, September, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 13--14
                 Neil L. Waters   Viewpoint: Why you can't cite Wikipedia
                                  in my class  . . . . . . . . . . . . . . 15--17
         Ronald F. Boisvert and   
            Mary Jane Irwin and   
                Holly Rushmeier   Online first: Evolving the ACM journal
                                  distribution program . . . . . . . . . . 19--20
           Meg McGinity Shannon   Staying connected: Shaking hands,
                                  kissing babies, and \ldots blogging? . . 21--24
              Phillip G. Armour   The business of software: The
                                  conservation of uncertainty  . . . . . . 25--28
             Toshinori Munakata   Beyond silicon: new computing paradigms:
                                  Introduction . . . . . . . . . . . . . . 30--34
            Warren Robinett and   
          Gregory S. Snider and   
           Philip J. Kuekes and   
            R. Stanley Williams   Computing with a trillion crummy
                                  components . . . . . . . . . . . . . . . 35--39
                      Jing Kong   Computation with carbon nanotube devices 40--42
                 Robert Stadler   Molecular, chemical, and organic
                                  computing  . . . . . . . . . . . . . . . 43--45
               John H. Reif and   
               Thomas H. LaBean   Autonomous programmable biomolecular
                                  devices using self-assembled DNA
                                  nanostructures . . . . . . . . . . . . . 46--53
                 Dave Bacon and   
                   Debbie Leung   Toward a world with quantum computers    55--59
          Hossin Abdeldayem and   
              Donald O. Frazier   Optical computing: need and challenge    60--62
           David W. M. Marr and   
             Toshinori Munakata   Micro/nanofluidic computing  . . . . . . 64--68
               Masashi Aono and   
              Masahiko Hara and   
                Kazuyuki Aihara   Amoeba-based neurocomputing with chaotic
                                  dynamics . . . . . . . . . . . . . . . . 69--72
                    Ami Marowka   Parallel computing on any desktop  . . . 74--78
            George Lepouras and   
          Costas Vassilakis and   
        Constantin Halatsis and   
          Panagiotis Georgiadis   Domain expert user development: the
                                  SmartGov approach  . . . . . . . . . . . 79--83
         Joseph S. Valacich and   
        D. Veena Parboteeah and   
                  John D. Wells   The online consumer's hierarchy of needs 84--90
             Susan A. Brown and   
         Norman L. Chervany and   
              Bryan A. Reinicke   What matters when introducing new
                                  information technology . . . . . . . . . 91--96
            Ashley Braganza and   
                 Arnoud Franken   SOX, compliance, and power relationships 97--102
                  Irene Pollach   What's wrong with online privacy
                                  policies?  . . . . . . . . . . . . . . . 103--108
         Thomas F. Stafford and   
                  Dennis Gonier   Technical opinion: The online research
                                  'bubble' . . . . . . . . . . . . . . . . 109--112
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  digital library  . . . . . . . . . . . . 118--118
               Peter G. Neumann   Inside risks: E-migrating risks? . . . . 120--120

Communications of the ACM
Volume 50, Number 10, October, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 13--14
            Michael A. Cusumano   Technology strategy and management:
                                  Extreme programming compared with
                                  Microsoft-style iterative development    15--18
               Pamela Samuelson   Legally speaking: Does copyright law
                                  need to be reformed? . . . . . . . . . . 19--23
            Katia Passerini and   
               Karen Patten and   
      Michael R. Bartolacci and   
               Jerry Fjermestad   Technical opinion: Reflections and
                                  trends in the expansion of cellular
                                  wireless services in the U.S. and China  25--28
                Sebastian Thrun   Viewpoint: Why we compete in DARPA's
                                  Urban Challenge autonomous robot race    29--31
            Michael L. Best and   
                 Kipp Jones and   
              Illenin Kondo and   
            Dhanaraj Thakur and   
                Edem Wornyo and   
                      Calvin Yu   International perspectives:
                                  Post-conflict communications: the case
                                  of Liberia . . . . . . . . . . . . . . . 33--39
               Erran Carmel and   
                  Pamela Abbott   Why 'nearshore' means that distance
                                  matters  . . . . . . . . . . . . . . . . 40--46
               Erran Carmel and   
                  Pamela Abbott   Nearshore locations in three principal
                                  global clusters and their respective
                                  attributes . . . . . . . . . . . . . . . 45--45
           Matt E. Thatcher and   
                David E. Pingry   [Software patents] The good, the bad,
                                  and the messy  . . . . . . . . . . . . . 47--52
           Gregoris Mentzas and   
           Kostas Kafentzis and   
               Panos Georgolios   Knowledge services on the semantic web   53--58
                U. N. Umesh and   
                 Len Jessup and   
                  Minh Q. Huynh   [Getting ideas to market] Current issues
                                  faced by technology entrepreneurs  . . . 60--66
        Asli Yagmur Akbulut and   
           Clayton Arlen Looney   Inspiring students to pursue computing
                                  degrees  . . . . . . . . . . . . . . . . 67--71
           Prabhudev Konana and   
                     Gautam Ray   Physical product reengineering with
                                  embedded information technology  . . . . 72--78
      Michael P. Papazoglou and   
      Willem-Jan van den Heuvel   Business process development life cycle
                                  methodology  . . . . . . . . . . . . . . 79--85
            William L. Kuechler   Business applications of unstructured
                                  text . . . . . . . . . . . . . . . . . . 86--93
             Tom N. Jagatic and   
       Nathaniel A. Johnson and   
           Markus Jakobsson and   
                Filippo Menczer   Social phishing  . . . . . . . . . . . . 94--100
              Wade H. Baker and   
            Loren Paul Rees and   
               Peter S. Tippett   Necessary measures: metric-driven
                                  information security risk assessment and
                                  decision making  . . . . . . . . . . . . 101--106
           Richard J. Goeke and   
                Robert H. Faley   Leveraging the flexibility of your data
                                  warehouse  . . . . . . . . . . . . . . . 107--111
                John D'Arcy and   
                     Anat Hovav   Deterring internal information systems
                                  misuse . . . . . . . . . . . . . . . . . 113--117
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 118--118
             Herbert S. Lin and   
          Alfred Z. Spector and   
           Peter G. Neumann and   
             Seymour E. Goodman   Inside risks: Toward a safer and more
                                  secure cyberspace  . . . . . . . . . . . 128--128

Communications of the ACM
Volume 50, Number 11, November, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
               Peter J. Denning   The profession of IT: The choice
                                  uncertainty principle  . . . . . . . . . 9--14
                Robert L. Glass   Practical programmer: A research project
                                  with important practitioner-oriented
                                  findings . . . . . . . . . . . . . . . . 15--16
              Stuart I. Feldman   President's letter: The rewards of ACM's
                                  awards . . . . . . . . . . . . . . . . . 17--18
             David Lorge Parnas   Viewpoint: Stop the numbers game . . . . 19--21
              Dror G. Feitelson   Experimental computer science:
                                  Introduction . . . . . . . . . . . . . . 24--26
           Catherine C. McGeoch   Experimental algorithmics  . . . . . . . 27--31
           Victor R. Basili and   
            Marvin V. Zelkowitz   Empirical studies to build a science of
                                  computer science . . . . . . . . . . . . 33--37
             Larry Peterson and   
                   Vivek S. Pai   Experience-driven experimental systems
                                  research . . . . . . . . . . . . . . . . 38--44
                 Alan Jay Smith   Workloads (creation and use) . . . . . . 45--50
              Ellen M. Voorhees   TREC: Continuing information retrieval's
                                  tradition of experimentation . . . . . . 51--54
               L. D. Jackel and   
            Douglas Hackett and   
               Eric Krotkov and   
       Michael Perschbacher and   
              James Pippine and   
               Charles Sullivan   How DARPA structures its robotics
                                  programs to improve locomotion and
                                  navigation . . . . . . . . . . . . . . . 55--59
                       Oded Nov   What motivates Wikipedians?  . . . . . . 60--64
             Paul P. Tallon and   
               Richard Scannell   Information life cycle management  . . . 65--69
                Neil Foshay and   
        Avinandan Mukherjee and   
                  Andrew Taylor   Does data warehouse end-user metadata
                                  add value? . . . . . . . . . . . . . . . 70--77
                Chris Sauer and   
              Andrew Gemino and   
            Blaize Horner Reich   The impact of size and volatility on IT
                                  project performance  . . . . . . . . . . 79--84
          Dominic M. Thomas and   
          Robert P. Bostrom and   
                 Marianne Gouge   Making knowledge work in virtual teams   85--90
              Hee-Woong Kim and   
                      Yunjie Xu   Drivers of price Premium in e-markets    91--95
                 Diane Crawford   Hot Links: Top 10 downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 97--97
                Matt Bishop and   
                   David Wagner   Inside risks: Risks of e-voting  . . . . 120--120

Communications of the ACM
Volume 50, Number 12, December, 2007

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 9--10
                    Hal Berghel   Digital village: Credit Card Forensics   11--14
                 Robert Gaskins   Viewpoint: PowerPoint at 20: back to
                                  basics . . . . . . . . . . . . . . . . . 15--17
                Ben Shneiderman   Creativity support tools: accelerating
                                  discovery and innovation . . . . . . . . 20--32
                Dongwon Lee and   
                Jaewoo Kang and   
            Prasenjit Mitra and   
               C. Lee Giles and   
                   Byung-Won On   Are your citations clean?  . . . . . . . 33--38
                     CACM Staff   Nominees for elections and report of the
                                  ACM nominating committee . . . . . . . . 39--39
         Robert J. Aalberts and   
                 Percy Poon and   
                   Paul Thistle   Trespass, nuisance, and spam: 11th
                                  century common law meets the internet    40--45
      Antonio M. Lopez, Jr. and   
         Frederick G. Lopez and   
             Robert W. Lent and   
         Madonna G. Constantine   Multidisciplinary research on the
                                  datapath of the computing disciplines    46--50
            Erica L. Wagner and   
               Gabriele Piccoli   Moving beyond user participation to
                                  achieve successful IS design . . . . . . 51--55
               Wai Fong Boh and   
              Christina Soh and   
                     Steven Yeo   Standards development and diffusion: a
                                  case study of RosettaNet . . . . . . . . 57--62
                 Ilan Oshri and   
                 Sue Newell and   
                    Shan L. Pan   Implementing component reuse strategy in
                                  complex products environments  . . . . . 63--67
               Kannan Mohan and   
         Balasubramaniam Ramesh   Tracing variations in software product
                                  families . . . . . . . . . . . . . . . . 68--73
               Klaus Schild and   
                Stefan Bussmann   Self-organization in manufacturing
                                  operations . . . . . . . . . . . . . . . 74--79
               Varun Grover and   
           Raymond M. Henry and   
              Jason B. Thatcher   Fix IT-business relationships through
                                  better decision rights . . . . . . . . . 80--86
                 Gautam Ray and   
          Waleed A. Muhanna and   
                  Jay B. Barney   Competing with IT: the role of shared
                                  IT-business understanding  . . . . . . . 87--91
                 Diane Crawford   Hot Links: Top 10 Downloads from ACM's
                                  Digital Library  . . . . . . . . . . . . 92--92
         Emmeline de Pillis and   
                Kimberly Furumo   Technical opinion: Counting the cost of
                                  virtual teams  . . . . . . . . . . . . . 93--95
              Chuan-Hoo Tan and   
                   Hock-Hai Teo   Technical opinion: Training future
                                  software developers to acquire agile
                                  development skills . . . . . . . . . . . 97--98
         Steven M. Bellovin and   
                 Matt Blaze and   
           Whitfield Diffie and   
               Susan Landau and   
           Jennifer Rexford and   
               Peter G. Neumann   Inside risks: Internal surveillance,
                                  external risks . . . . . . . . . . . . . 128--128


Communications of the ACM
Volume 51, Number 1, January, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--5
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 7--9
              Phillip G. Armour   The Business of software: Digging CACM   13--15
           Meg McGinity Shannon   Staying connected: Happy anniversary,
                                  CACM . . . . . . . . . . . . . . . . . . 17--19
               Peter A. Freeman   Viewpoint: Back to experimentation . . . 21--22
              Stuart I. Feldman   President's letter: Fifty years and
                                  still growing  . . . . . . . . . . . . . 23--23
                 Diane Crawford   From the editor's desk: Introduction . . 24--26
              Calvin C. Gotlieb   A time to retrospect and prospect  . . . 26--29
                 M. Stuart Lynn   The battle of the covers . . . . . . . . 30--32
           Robert L. Ashenhurst   The battle behind the scenes . . . . . . 33--34
               Peter J. Denning   Déj\`a vu all over again  . . . . . . . . 35--39
                  Jacques Cohen   From academia to the editorship  . . . . 41--43
                 Moshe Y. Vardi   CACM: past, present, and future  . . . . 44--48
              Andrew Rosenbloom   Voices: Introduction . . . . . . . . . . 50--51
                    Jon Bentley   In the realm of insight and creativity   52--54
               Whitfield Diffie   Information security: 50 years behind,
                                  50 years ahead . . . . . . . . . . . . . 55--57
              Jeannette M. Wing   Five deep questions in computing . . . . 58--60
             Eugene H. Spafford   Inspiration and trust  . . . . . . . . . 61--62
                  Rodney Brooks   The next 50 years  . . . . . . . . . . . 63--64
               Pamela Samuelson   Hacking intellectual property law  . . . 65--67
             Stephen B. Jenkins   Ode to code  . . . . . . . . . . . . . . 67--67
                       Gul Agha   Computing in pervasive cyberspace  . . . 68--70
                  Gregory Conti   Could googling take down a president?    71--73
                  Jon Crowcroft   Toward a network architecture that does
                                  everything . . . . . . . . . . . . . . . 74--77
               Peter G. Neumann   Reflections on computer-related risks    78--80
                Jason Leigh and   
                Maxine D. Brown   Cyber-commons: merging real and virtual
                                  worlds . . . . . . . . . . . . . . . . . 82--85
                    Gordon Bell   Bell's law for the birth and death of
                                  computer classes . . . . . . . . . . . . 86--94
           Greta L. Polites and   
              Richard T. Watson   The centrality and prestige of CACM  . . 95--100
                 Diane Crawford   Breakthrough research: a preview of
                                  things to come: Introduction . . . . . . 104--104
             David A. Patterson   Technical perspective: the data center
                                  is the computer  . . . . . . . . . . . . 105--105
               Jeffrey Dean and   
                Sanjay Ghemawat   MapReduce: simplified data processing on
                                  large clusters . . . . . . . . . . . . . 107--113
               Bernard Chazelle   Technical perspective: finding a good
                                  neighbor, near and fast  . . . . . . . . 115--115
            Alexandr Andoni and   
                    Piotr Indyk   Near-optimal hashing algorithms for
                                  approximate nearest neighbor in high
                                  dimensions . . . . . . . . . . . . . . . 117--122
              Leonard S. Zegans   Inside risks: The psychology of risks    152--152

Communications of the ACM
Volume 51, Number 2, February, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 9--11
                 Diane Crawford   SIGs announce candidates for election    14--14
            Michael A. Cusumano   Technology strategy and management:
                                  Managing software development in
                                  globally distributed teams . . . . . . . 15--17
                      Andy Oram   Viewpoint: Peer to patent needs your
                                  expertise  . . . . . . . . . . . . . . . 19--20
           Pamela Samuelson and   
         Jerome H. Reichman and   
               Graeme Dinwoodie   Legally speaking: How to achieve (some)
                                  balance in anti-circumvention laws . . . 21--25
              Stuart I. Feldman   ACM annual report for FY07 . . . . . . . 27--34
             Jeffrey Y. Kim and   
          Jonathan P. Allen and   
                       Elan Lee   Alternate reality gaming . . . . . . . . 36--42
                  Eric Shih and   
         Kenneth L. Kraemer and   
                  Jason Dedrick   IT diffusion in developing countries . . 43--48
              Mark T. Keane and   
              Maeve O'Brien and   
                    Barry Smyth   Are people biased in their use of search
                                  engines? . . . . . . . . . . . . . . . . 49--52
            Nolan J. Taylor and   
        Eleanor T. Loiacono and   
              Richard T. Watson   Alternative scenarios to the 'banner'
                                  years  . . . . . . . . . . . . . . . . . 53--58
                Peter Marks and   
                Peter Polak and   
                Scott McCoy and   
                Dennis Galletta   Sharing knowledge  . . . . . . . . . . . 60--65
                     Alfred Loo   The myths and truths of wireless
                                  security . . . . . . . . . . . . . . . . 66--71
          Munir Mandviwalla and   
               Abhijit Jain and   
           Julie Fesenmaier and   
                 Jeff Smith and   
              Paul Weinberg and   
                    Greg Meyers   Municipal broadband wireless networks    72--80
          Vicki R. McKinney and   
           Darryl D. Wilson and   
                Nita Brooks and   
         Anne O'Leary-Kelly and   
                 Bill Hardgrave   Women and men in the IT profession . . . 81--84
                   Bing Liu and   
             Alexander Tuzhilin   Managing large collections of data
                                  mining models  . . . . . . . . . . . . . 85--89
                Min-Yen Kan and   
                    Yee Fan Tan   Technical opinion: Record matching in
                                  digital library metadata . . . . . . . . 91--94
                 Pascal Meunier   Inside risks: Software transparency and
                                  purity . . . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 51, Number 3, March, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
              Phillip G. Armour   The business of software: The inaccurate
                                  conception . . . . . . . . . . . . . . . 13--16
                Robert L. Glass   Practical programmer: Managing for
                                  innovation . . . . . . . . . . . . . . . 17--18
                    Chenglie Hu   Viewpoint: Just say 'A Class Defines a
                                  Data Type' . . . . . . . . . . . . . . . 19--21
                     CACM Staff   ACM fellows  . . . . . . . . . . . . . . 22--23
                  Dana Cuff and   
                Mark Hansen and   
                     Jerry Kang   Urban sensing: out of the woods  . . . . 24--33
            Jason O. B. Soh and   
              Bernard C. Y. Tan   Mobile gaming  . . . . . . . . . . . . . 35--39
                    Liping Zhao   Patterns, symmetry, and symmetry
                                  breaking . . . . . . . . . . . . . . . . 40--46
             Robert Pinsker and   
                     Shaomin Li   Costs and benefits of XBRL adoption:
                                  early evidence . . . . . . . . . . . . . 47--50
        Bernd Carsten Stahl and   
                  Carole Brooke   The contribution of critical IS research 51--55
               David Wright and   
         Michael Friedewald and   
               Wim Schreurs and   
          Michiel Verlinden and   
             Serge Gutwirth and   
                 Yves Punie and   
           Ioannis Maghiros and   
        Elena Vildjiounaite and   
               Petteri Alahuhta   The illusion of security . . . . . . . . 56--63
            Iris A. Junglas and   
              Richard T. Watson   Location-based services  . . . . . . . . 65--69
              Robert LaRose and   
              Nora J. Rifon and   
                 Richard Enbody   Promoting personal responsibility for
                                  internet safety  . . . . . . . . . . . . 71--76
             Frank Safayeni and   
        P. Robert Duimering and   
            Kimberley Zheng and   
        Natalia Derbentseva and   
          Christopher Poile and   
                       Bing Ran   Requirements engineering in new product
                                  development  . . . . . . . . . . . . . . 77--82
                Kwangsu Cho and   
      Tingting Rachel Chung and   
            William R. King and   
               Christian Schunn   Peer-based computer-supported knowledge
                                  refinement: an empirical investigation   83--88
            Dinesh K. Gauri and   
             Amit Bhatnagar and   
                     Raghav Rao   Technical opinion: Role of word of mouth
                                  in online store loyalty  . . . . . . . . 89--91
                Xiaoming Lu and   
              George Ledin, Jr.   Inside risks: Wireless sensor networks
                                  and the risks of vigilance . . . . . . . 104--104

Communications of the ACM
Volume 51, Number 4, April, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 10--10
                     CACM Staff   News track . . . . . . . . . . . . . . . 11--12
                    Hal Berghel   Digital village: Faith-based security    13--17
           Peter J. Denning and   
              Peter Yaholkovsky   The profession of IT: Getting to 'we'    19--24
                     CACM Staff   Call for nominations for advanced member
                                  grades in the ACM  . . . . . . . . . . . 25--26
                     CACM Staff   ACM honors distinguished and senior
                                  members  . . . . . . . . . . . . . . . . 27--30
              Daniel Kunkle and   
                 Gene Cooperman   Viewpoint: Solving Rubik's Cube: disk is
                                  the new RAM  . . . . . . . . . . . . . . 31--33
                      Ryan West   The psychology of security . . . . . . . 34--40
          Richard T. Watson and   
      Marie-Claude Boudreau and   
               Paul T. York and   
         Martina E. Greiner and   
               Donald Wynn, Jr.   The business of open source  . . . . . . 41--46
                  Ziqi Liao and   
             Michael Tow Cheung   Measuring consumer satisfaction in
                                  internet banking: a core framework . . . 47--51
                 Luc Moreau and   
                 Paul Groth and   
                Simon Miles and   
     Javier Vazquez-Salceda and   
              John Ibbotson and   
                Sheng Jiang and   
               Steve Munroe and   
                  Omer Rana and   
          Andreas Schreiber and   
                 Victor Tan and   
                   Laszlo Varga   The provenance of electronic data  . . . 52--58
             Hsiu-Ping Yueh and   
                   Shihkuan Hsu   Designing a learning management system
                                  to support instruction . . . . . . . . . 59--63
          Lawrence D. Bodin and   
         Lawrence A. Gordon and   
                 Martin P. Loeb   Information security and risk management 64--68
              Dawn G. Gregg and   
                  Judy E. Scott   A typology of complaints about eBay
                                  sellers  . . . . . . . . . . . . . . . . 69--74
                 Ilan Oshri and   
            Julia Kotlarsky and   
               Leslie Willcocks   Missing links: building critical social
                                  ties for global collaborative teamwork   76--81
                   Ivy Chan and   
                Chee-Kwong Chao   Knowledge management in small and
                                  medium-sized enterprises . . . . . . . . 83--88
            Mohamed Khalifa and   
                     Kathy Ning   Demographic changes in IS research
                                  productivity and impact  . . . . . . . . 89--94
             Pamela Whitten and   
              Deirdre Mylod and   
               Goran Gavran and   
                  Howard Sypher   'Most Wired Hospitals' rate patient
                                  satisfaction . . . . . . . . . . . . . . 96--102
              Chuck Litecky and   
            Bipin Prabhakar and   
                    Kirk Arnett   Technical opinion: The size of the IT
                                  job market . . . . . . . . . . . . . . . 107--109
               Lauren Weinstein   Inside risks: A current affair . . . . . 112--112

Communications of the ACM
Volume 51, Number 5, May, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 9--11
                     CACM Staff   ACM A. M. Turing Award nominations
                                  solicited  . . . . . . . . . . . . . . . 14--14
                  Jacques Cohen   Viewpoint: The crucial role of CS in
                                  systems and synthetic biology  . . . . . 15--18
           Meg McGinity Shannon   Staying connected: This menu has changed 19--21
                     CACM Staff   2008 ACM Elections . . . . . . . . . . . 22--31
                  Wingyan Chung   Web searching in a multilingual world    32--40
                 Irit Hadar and   
                      Uri Leron   How intuitive is object-oriented design? 41--46
                       Dov Dori   Words from pictures for dual-channel
                                  processing . . . . . . . . . . . . . . . 47--52
              Silvana Trimi and   
                     Hong Sheng   Emerging trends in M-government  . . . . 53--58
               Kannan Mohan and   
                    Peng Xu and   
         Balasubramaniam Ramesh   Improving the change-management process  59--64
                   Rui Chen and   
                Raj Sharman and   
              H. Raghav Rao and   
           Shambhu J. Upadhyaya   Coordination in emergency response
                                  management . . . . . . . . . . . . . . . 66--73
          Alessandro Garcia and   
                  Carlos Lucena   Taming heterogeneous agent architectures 75--81
                   Oded Nov and   
                     Bharat Rao   Technology-facilitated 'Give According
                                  to Your Abilities, Receive According to
                                  Your Needs'  . . . . . . . . . . . . . . 83--87
             Bezalel Gavish and   
           Christopher L. Tucci   Reducing Internet auction fraud  . . . . 89--97
           Edgar A. Whitley and   
                  Ian R. Hosein   Technical opinion: Departmental
                                  influences on policy design  . . . . . . 98--100
             Steven M. Bellovin   Inside risks: The physical world and the
                                  real world . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 51, Number 6, June, 2008

                 Diane Crawford   Editorial pointers . . . . . . . . . . . 5--6
                     CACM Staff   News track . . . . . . . . . . . . . . . 7--8
                 Diane Crawford   Forum  . . . . . . . . . . . . . . . . . 9--11
                    Hal Berghel   Digital village: BRAP forensics  . . . . 15--20
                Robert L. Glass   Practical programmer: Software design
                                  and the monkey's brain . . . . . . . . . 21--22
              Arik Ragowsky and   
             Paul S. Licker and   
                    David Gefen   Viewpoint: Give me information, not
                                  technology . . . . . . . . . . . . . . . 23--25
             Roel Vertegaal and   
                  Ivan Poupyrev   Organic user interfaces: Introduction    26--30
                  Hiroshi Ishii   The tangible user interface and its
                                  evolution  . . . . . . . . . . . . . . . 32--36
                   Jun Rekimoto   Organic interaction technologies: from
                                  stone to skin  . . . . . . . . . . . . . 38--44
                   Elise Co and   
               Nikita Pashenkov   Emerging display technologies for
                                  organic user interfaces  . . . . . . . . 45--47
               David Holman and   
                 Roel Vertegaal   Organic user interfaces: designing
                                  computers in any way, shape, or form . . 48--55
                     Eli Blevis   Sustainability implications of organic
                                  user interface technologies: an inky
                                  problem  . . . . . . . . . . . . . . . . 56--57
              Amanda Parkes and   
              Ivan Poupyrev and   
                  Hiroshi Ishii   Designing kinetic interactions for
                                  organic user interfaces  . . . . . . . . 58--65
               Carsten Schwesig   What makes an interface feel organic?    67--69
             Kas Oosterhuis and   
                 Nimish Biloria   Interactions with proactive
                                  architectural spaces: the muscle
                                  projects . . . . . . . . . . . . . . . . 70--78
                 Sachiko Kodama   Dynamic ferrofluid sculpture: organic
                                  shape-changing art forms . . . . . . . . 79--81
         Daniel J. Weitzner and   
             Harold Abelson and   
            Tim Berners-Lee and   
            Joan Feigenbaum and   
              James Hendler and   
             Gerald Jay Sussman   Information accountability . . . . . . . 82--87
     Charalambos L. Iacovou and   
                 Robbie Nakatsu   A risk profile of offshore-outsourced
                                  development projects . . . . . . . . . . 89--94
               Chon Abraham and   
          Richard T. Watson and   
          Marie-Claude Boudreau   Ubiquitous access: on the front lines of
                                  patient care and safety  . . . . . . . . 95--99
            Wayne Wei Huang and   
            Jonathon Greene and   
                       John Day   Outsourcing and the decrease of IS
                                  program enrollment . . . . . . . . . . . 101--104
                Jim Horning and   
               Peter G. Neumann   Inside risks: Risks of neglecting
                                  infrastructure . . . . . . . . . . . . . 112--112

Communications of the ACM
Volume 51, Number 7, July, 2008

                 Moshe Y. Vardi   Editor's letter: 'Where do you come
                                  from? and where are you going?'  . . . . 5--5
                Scott E. Delman   Publisher's corner: The art and business
                                  of revitalizing a 50-year-old science
                                  and technology magazine  . . . . . . . . 7--7
                    David Roman   CACM online: Your attention, please  . . 8--8
                    Brian Hayes   Cloud computing  . . . . . . . . . . . . 9--11
               Michael Ross and   
                     Mark Oskin   Quantum computing  . . . . . . . . . . . 12--13
                   Leah Hoffman   In search of dependable design . . . . . 14--16
                  Alok Aggarwal   Emerging Markets: India's role in the
                                  globalization of IT  . . . . . . . . . . 17--19
               Pamela Samuelson   Legally Speaking: Revisiting patentable
                                  subject matter . . . . . . . . . . . . . 20--22
         George V. Neville-Neil   Kode Vicious: Beautiful code exists, if
                                  you know where to look . . . . . . . . . 23--25
        Stephen J. Andriole and   
                   Eric Roberts   Point/Counterpoint: Technology
                                  curriculum for the early 21st Century    27--32
                    Rick Rashid   Image Crisis: Inspiring a new generation
                                  of computer scientists . . . . . . . . . 33--34
                    Len Shustek   Interview: The 'art' of being Donald
                                  Knuth  . . . . . . . . . . . . . . . . . 35--39
                 Erik Wilde and   
              Robert J. Glushko   XML fever  . . . . . . . . . . . . . . . 40--46
                 Adam Leventhal   Flash storage memory . . . . . . . . . . 47--51
                  Margo Seltzer   Beyond relational databases  . . . . . . 52--58
              James Hendler and   
             Nigel Shadbolt and   
                 Wendy Hall and   
            Tim Berners-Lee and   
                Daniel Weitzner   Web science: an interdisciplinary
                                  approach to understanding the Web  . . . 60--69
                     Mark Oskin   The revolution inside the box  . . . . . 70--78
                James Larus and   
             Christos Kozyrakis   Transactional memory . . . . . . . . . . 80--88
                    Bob Colwell   Technical Perspective: Computer science
                                  takes on molecular dynamics  . . . . . . 90--90
              David E. Shaw and   
         Martin M. Deneroff and   
                Ron O. Dror and   
          Jeffrey S. Kuskin and   
          Richard H. Larson and   
             John K. Salmon and   
                Cliff Young and   
             Brannon Batson and   
            Kevin J. Bowers and   
               Jack C. Chao and   
        Michael P. Eastwood and   
           Joseph Gagliardo and   
             J. P. Grossman and   
              C. Richard Ho and   
         Douglas J. Lerardi and   
István Kolossváry and   
            John L. Klepeis and   
             Timothy Layman and   
         Christine McLeavey and   
             Mark A. Moraes and   
               Rolf Mueller and   
           Edward C. Priest and   
                Yibing Shan and   
            Jochen Spengler and   
           Michael Theobald and   
               Brian Towles and   
                Stanley C. Wang   Anton, a special-purpose machine for
                                  molecular dynamics simulation  . . . . . 91--97
                      Feng Zhao   Technical Perspective: The physical side
                                  of computing . . . . . . . . . . . . . . 98--98
               Philip Levis and   
                Eric Brewer and   
               David Culler and   
                  David Gay and   
              Samuel Madden and   
                 Neil Patel and   
               Joe Polastre and   
              Scott Shenker and   
            Robert Szewczyk and   
                       Alec Woo   The emergence of a networking primitive
                                  in wireless sensor networks  . . . . . . 99--106
                   Leah Hoffman   Last byte: Q&A Talking model-checking
                                  technology . . . . . . . . . . . . . . . 112, 1??-1??

Communications of the ACM
Volume 51, Number 8, August, 2008

              Stuart I. Feldman   President's letter: A new beginning, a
                                  fond farewell  . . . . . . . . . . . . . 5--5
                     CACM Staff   Words both kind and contrary . . . . . . 7--7
                    David Roman   Small changes hint at bigger things  . . 8--8
                  Hal R. Varian   Designing the perfect auction  . . . . . 9--11
                 Peggy Aycinena   Access for all . . . . . . . . . . . . . 12--14
                Sarah Underwood   Challenging poverty  . . . . . . . . . . 15--17
                   Michael Ross   Remembering Jim  . . . . . . . . . . . . 18--18
               Peter J. Denning   The profession of IT: Voices of
                                  computing  . . . . . . . . . . . . . . . 19--21
                   Alex E. Bell   From the front lines: Software
                                  development amidst the whiz of silver
                                  bullets  . . . . . . . . . . . . . . . . 22--24
                   Mark Guzdial   Education: Paving the way for
                                  computational thinking . . . . . . . . . 25--27
                    Ed Lazowska   Viewpoint: Envisioning the future of
                                  computing research . . . . . . . . . . . 28--30
                    Len Shustek   Interview: Donald Knuth: A life's work
                                  interrupted  . . . . . . . . . . . . . . 31--35
                      Jim Waldo   Scaling in games and virtual worlds  . . 38--44
                  Mache Creeger   CTO storage roundtable . . . . . . . . . 45--51
                  Michi Henning   The rise and fall of CORBA . . . . . . . 52--57
               Luis von Ahn and   
                  Laura Dabbish   Designing games with a purpose . . . . . 58--67
         Diomidis Spinellis and   
            Panagiotis Louridas   The collaborative organization of
                                  knowledge  . . . . . . . . . . . . . . . 68--73
                    Yoav Shoham   Computer science and game theory . . . . 74--79
                   William Pugh   Technical perspective: A methodology for
                                  evaluating computer system performance   82--82
       Stephen M. Blackburn and   
        Kathryn S. McKinley and   
               Robin Garner and   
             Chris Hoffmann and   
              Asjad M. Khan and   
              Rotem Bentzur and   
                 Amer Diwan and   
            Daniel Feinberg and   
            Daniel Frampton and   
            Samuel Z. Guyer and   
              Martin Hirzel and   
             Antony Hosking and   
                 Maria Jump and   
                    Han Lee and   
           J. Eliot B. Moss and   
         Aashish Phansalkar and   
           Darko Stefanovik and   
           Thomas VanDrunen and   
       Daniel von Dincklage and   
                 Ben Wiedermann   Wake up and smell the coffee: evaluation
                                  methodology for the 21st Century . . . . 83--89
                     Nir Shavit   Technical perspective: Transactions are
                                  tomorrow's loads and stores  . . . . . . 90--90
                 Tim Harris and   
               Simon Marlow and   
         Simon Peyton Jones and   
                Maurice Herlihy   Composable memory transactions . . . . . 91--100
                  Peter Winkler   Last byte: Puzzled Delightful graph
                                  theory . . . . . . . . . . . . . . . . . 104--104

Communications of the ACM
Volume 51, Number 9, September, 2008

                     Wendy Hall   President's letter: ACM's place in the
                                  global picture . . . . . . . . . . . . . 5--5
                Scott E. Delman   Publisher's corner: 50 Years young . . . 7--7
                     CACM Staff   Letters to the editor: Knuth's art of
                                  recovering from errors . . . . . . . . . 9--9
                    David Roman   CACM online: Current features  . . . . . 10--10
                Kirk L. Kroeker   News: Finding diamonds in the rough  . . 11--13
                   Logan Kugler   News: Ubiquitous video . . . . . . . . . 14--16
               Samuel Greengard   News: Privacy matters  . . . . . . . . . 17--18
                  Leah Hoffmann   News: Wisdom from Randy Pausch . . . . . 19--19
               Michael Cusumano   Technology strategy and management: The
                                  puzzle of Apple  . . . . . . . . . . . . 22--24
            George Neville-Neil   Kode vicious: Pride and prejudice (the
                                  \em Vasa)  . . . . . . . . . . . . . . . 25--26
             Cameron Wilson and   
                   Peter Harsha   IT policy: Science policy isn't always
                                  about science  . . . . . . . . . . . . . 27--29
        Richard G. Baraniuk and   
               C. Sidney Burrus   Viewpoint: Global warming toward open
                                  educational resources  . . . . . . . . . 30--32
                 Ian Foster and   
         Savas Parastatidis and   
                Paul Watson and   
                   Mark Mckeown   Practice: How do I model state?: Let me
                                  count the ways . . . . . . . . . . . . . 34--41
                Matthew Garrett   Practice: Powering down  . . . . . . . . 42--46
                  Mache Creeger   Practice: CTO storage roundtable, part
                                  two  . . . . . . . . . . . . . . . . . . 47--52
               Mike Hinchey and   
            Michael Jackson and   
             Patrick Cousot and   
                 Byron Cook and   
          Jonathan P. Bowen and   
               Tiziana Margaria   Practice: Software engineering and
                                  formal methods . . . . . . . . . . . . . 54--59
           Dmitri Roussinov and   
                 Weiguo Fan and   
      José Robles-Flores   Beyond keywords: Automated question
                                  answering on the Web . . . . . . . . . . 60--65
                 Bertrand Meyer   Design and code reviews in the age of
                                  the Internet . . . . . . . . . . . . . . 66--71
        Philip A. Bernstein and   
                  Laura M. Haas   Information integration in the
                                  enterprise . . . . . . . . . . . . . . . 72--79
                      Mark Moir   Technical perspective: Transactional
                                  memory in the operating system . . . . . 82--82
    Christopher J. Rossbach and   
            Hany E. Ramadan and   
            Owen S. Hofmann and   
           Donald E. Porter and   
            Aditya Bhandari and   
                 Emmett Witchel   TxLinux and MetaTM: transactional memory
                                  and the operating system . . . . . . . . 83--91
                   Hagit Attiya   Technical perspective: Distributing your
                                  data and having it, too  . . . . . . . . 92--92
                Fabian Kuhn and   
              Thomas Locher and   
              Roger Wattenhofer   Distributed selection: a missing piece
                                  of data aggregation  . . . . . . . . . . 93--99
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 103--103
        William Sims Bainbridge   Last byte: Future tense: Will  . . . . . 104--104
                Robin S. Poston   Using and fixing biased rating schemes   105--109
               Kannan Mohan and   
                   Radhika Jain   Using traceability to mitigate cognitive
                                  biases in software development . . . . . 110--114
          Alexander P. Pons and   
                    Peter Polak   Understanding user perspectives on
                                  biometric technology . . . . . . . . . . 115--118
                  Lina Zhou and   
                 Dongsong Zhang   Following linguistic footprints:
                                  automatic deception detection in online
                                  communication  . . . . . . . . . . . . . 119--122
            Julia Kotlarsky and   
                 Ilan Oshri and   
              Kuldeep Kumar and   
          Jos van Hillegersberg   Towards agility in design in global
                                  component-based development  . . . . . . 123--127
               Neset Hikmet and   
           Eileen Z. Taylor and   
           Christopher J. Davis   The student productivity paradox:
                                  technology mediated learning in schools  128--131
         Patrick Y. K. Chau and   
                  Fujun Lai and   
                       Dahui Li   What factors drive the assimilation of
                                  Internet technologies in China?  . . . . 132--135

Communications of the ACM
Volume 51, Number 10, October, 2008

                 Moshe Y. Vardi   Editor's letter: Let
                                  us---together---make CACM exciting . . . 5--5
                Scott E. Delman   Publisher's corner: The softer side of
                                  \em Communications . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Prep students for
                                  irreversible software trends . . . . . . 8--9
                    David Roman   CACM online: \em Communications site to
                                  launch in January  . . . . . . . . . . . 10--10
                   Patrick Kurp   News: Green computing  . . . . . . . . . 11--13
                    Alex Wright   News: Searching the Deep Web . . . . . . 14--15
                  Cyrus Farivar   News: Clean elections  . . . . . . . . . 16--18
                  Leah Hoffmann   News: An inspiring legacy  . . . . . . . 19--19
          Martin Campbell-Kelly   Viewpoints: Historical reflections: Will
                                  the future of software be open source?   21--23
             Deborah G. Johnson   Viewpoints: Computing ethics: Computer
                                  experts: guns-for-hire or professionals? 24--26
                   Alex E. Bell   Viewpoints: From the front lines DOA
                                  with SOA . . . . . . . . . . . . . . . . 27--28
              David L. Dill and   
                  Daniel Castro   Viewpoints: Point/counterpoint: The U.S.
                                  should ban paperless electronic voting
                                  machines . . . . . . . . . . . . . . . . 29--33
         George V. Neville-Neil   Practice: Code spelunking redux  . . . . 36--41
                 Erik Wilde and   
              Robert J. Glushko   Practice: Document design matters  . . . 43--49
          Kayvon Fatahalian and   
                   Mike Houston   Practice: A closer look at GPUs  . . . . 50--57
                Jennifer Xu and   
                  Hsinchun Chen   The topology of dark networks  . . . . . 58--65
               Jacob Slonim and   
                 Sam Scully and   
             Michael McAllister   Crossroads for Canadian CS enrollment    66--70
                  Lila Kari and   
             Grzegorz Rozenberg   The many facets of natural computing . . 72--83
                     Marc Levoy   Technical perspective: Computational
                                  photography on large collections of
                                  images . . . . . . . . . . . . . . . . . 86--86
                 James Hays and   
                Alexei A. Efros   Scene completion using millions of
                                  photographs  . . . . . . . . . . . . . . 87--94
              Éva Tardos   Technical perspective: New developments
                                  in graph partitioning  . . . . . . . . . 95--95
              Sanjeev Arora and   
                 Satish Rao and   
                 Umesh Vazirani   Geometry, flows, and graph-partitioning
                                  algorithms . . . . . . . . . . . . . . . 96--105
                  Leah Hoffmann   Last byte: Q&A: A complex thinker . . . . 112--ff
                  Mary C. Jones   Large scale project team building:
                                  beyond the basics  . . . . . . . . . . . 113--116
      Gediminas Adomavicius and   
            Jesse Bockstedt and   
                 Alok Gupta and   
             Robert J. Kauffman   Understanding evolution in technology
                                  ecosystems . . . . . . . . . . . . . . . 117--122
               Seokwoo Song and   
              Sridhar Nerur and   
               James T. C. Teng   Understanding the influence of network
                                  positions and knowledge processing
                                  styles . . . . . . . . . . . . . . . . . 123--126
        Brian L. Dos Santos and   
                  Lars S. Smith   RFID in the supply chain: panacea or
                                  Pandora's box? . . . . . . . . . . . . . 127--131
                    Chen Ye and   
           Kevin C. Desouza and   
Sridhar R. Papagari Sangareddy and   
                    Sanjeev Jha   Switching between consumer technologies  132--136
               Mary Darking and   
           Edgar A. Whitley and   
                     Paolo Dini   Governing diversity in the digital
                                  ecosystem  . . . . . . . . . . . . . . . 137--140
               Amrit Tiwana and   
             Ashley A. Bush and   
              Hiroshi Tsuji and   
            Kenichi Yoshida and   
                  Akito Sakurai   Myths and paradoxes in Japanese IT
                                  offshoring . . . . . . . . . . . . . . . 141--145
       Thilini Ariyachandra and   
                 Hugh J. Watson   Technical opinion: Which data warehouse
                                  architecture is best?  . . . . . . . . . 146--147

Communications of the ACM
Volume 51, Number 11, November, 2008

                  John R. White   CEO's letter: On the 10th anniversary of
                                  ACM's Digital Library  . . . . . . . . . 5--5
                 Diane Crawford   Executive editor's corner: Jim Gray:
                                  humble visionary . . . . . . . . . . . . 7--7
                     CACM Staff   Letters to the editor: Even science
                                  would benefit from auctions  . . . . . . 8--9
                    David Roman   CACM online: A first look at the
                                  redesigned site  . . . . . . . . . . . . 10--10
                  Leah Hoffmann   News: Damage control . . . . . . . . . . 11--13
                    Bill Howard   News: Analyzing online social networks   14--16
                  David Lindley   News: The limits of computability  . . . 17--19
               Avi Goldfarb and   
               Catherine Tucker   Viewpoints: Economic and business
                                  dimensions: Search engine advertising    22--24
                   Susan Landau   Viewpoints: Privacy and security: A
                                  multidimensional problem . . . . . . . . 25--26
               Pamela Samuelson   Viewpoints: Legally speaking: \em
                                  Quantafying the value of patent
                                  exhaustion . . . . . . . . . . . . . . . 27--29
                   Joanna Goode   Viewpoints: Education: Reprogramming:
                                  college preparatory computer science . . 31--33
             Bryan Cantrill and   
                   Jeff Bonwick   Practice: Real-world concurrency . . . . 34--39
             Calin Cascaval and   
             Colin Blundell and   
              Maged Michael and   
             Harold W. Cain and   
                    Peng Wu and   
            Stefanie Chiras and   
          Siddhartha Chatterjee   Practice: Software transactional memory:
                                  why is it only a research toy? . . . . . 40--46
                  Mache Creeger   Practice: CTO roundtable on
                                  virtualization . . . . . . . . . . . . . 47--53
        Michael Stonebraker and   
                David J. DeWitt   A tribute to Jim Gray  . . . . . . . . . 54--57
            Alexander S. Szalay   Jim Gray, astronomer . . . . . . . . . . 58--65
                  Jon Kleinberg   The convergence of social and
                                  technological networks . . . . . . . . . 66--72
                       Jim Gray   Technical perspective: The Polaris
                                  Tableau system . . . . . . . . . . . . . 74--74
               Chris Stolte and   
                 Diane Tang and   
                   Pat Hanrahan   Polaris: a system for query, analysis,
                                  and visualization of multidimensional
                                  databases  . . . . . . . . . . . . . . . 75--84
                 Barbara Liskov   Technical perspective: Safeguarding
                                  online information against failures and
                                  attacks  . . . . . . . . . . . . . . . . 85--85
          Ramakrishna Kotla and   
              Allen Clement and   
                Edmund Wong and   
             Lorenzo Alvisi and   
                    Mike Dahlin   Zyzzyva: speculative Byzantine fault
                                  tolerance  . . . . . . . . . . . . . . . 86--95
                  Peter Winkler   Last byte: Puzzled: Circular food  . . . 112--112
                 DaeSoo Kim and   
              Terence T. Ow and   
                   Minjoon Junc   SME strategies: an assessment of high
                                  vs. low performers . . . . . . . . . . . 113--117
      Claudio Feijóo and   
José Luis Gómez-Barroso and   
              David Rojo-Alonso   A European perspective of VoIP in market
                                  competition  . . . . . . . . . . . . . . 118--120
                  Judy E. Scott   Technology acceptance and ERP
                                  documentation usability  . . . . . . . . 121--124
                Faiz Currim and   
                      Sudha Ram   Conceptually modeling windows and bounds
                                  for space and time in database
                                  constraints  . . . . . . . . . . . . . . 125--129
              Quan Z. Sheng and   
         Boualem Benatallah and   
                 Zakaria Maamar   User-centric services provisioning in
                                  wireless environments  . . . . . . . . . 130--135
               DongBack Seo and   
                Ariel I. La Paz   Exploring the dark side of IS in
                                  achieving organizational agility . . . . 136--139
     Srinivasan Venkatraman and   
                Hillol Bala and   
        Viswanath Venkatesh and   
                     Jack Bates   Six strategies for electronic medical
                                  records systems  . . . . . . . . . . . . 140--144
                     Ping Zhang   Technical opinion: Motivational
                                  affordances: reasons for ICT design and
                                  use  . . . . . . . . . . . . . . . . . . 145--147

Communications of the ACM
Volume 51, Number 12, December, 2008

         Ronald F. Boisvert and   
                Holly Rushmeier   ACM publications: access and
                                  sustainability . . . . . . . . . . . . . 5--5
                Scott E. Delman   Looking back and forward . . . . . . . . 7--7
                     CACM Staff   Apple builds great platforms, too, not
                                  just products  . . . . . . . . . . . . . 8--8
                    David Roman   Previewing the new CACM web site . . . . 10--10
                Kirk L. Kroeker   Living machines  . . . . . . . . . . . . 11--13
                     Ted Selker   Touching the future  . . . . . . . . . . 14--16
               Samuel Greengard   Upwardly mobile  . . . . . . . . . . . . 17--19
                  Leah Hoffmann   Making a difference  . . . . . . . . . . 20--20
                  Alok Aggarwal   Emerging markets: Labor supply in the
                                  Indian IT industry . . . . . . . . . . . 21--23
             Cameron Wilson and   
                   Peter Harsha   IT policy: Advising policymakers is more
                                  than just providing advice . . . . . . . 24--26
         George V. Neville-Neil   Kode vicious: Permanence and change  . . 27--28
           Peter J. Denning and   
            Chris Gunderson and   
                Rick Hayes-Roth   The profession of IT: Evolutionary
                                  system development . . . . . . . . . . . 29--31
                 James Hamilton   Interview: Database dialogue with Pat
                                  Selinger . . . . . . . . . . . . . . . . 32--35
                  Steve Souders   High-performance web sites . . . . . . . 36--41
                  Mache Creeger   CTO virtualization roundtable, part II   43--49
                Francine Berman   Got data?: a guide to data preservation
                                  in the information age . . . . . . . . . 50--56
                   Ian Horrocks   Ontologies and the Semantic Web  . . . . 58--67
               Oren Etzioni and   
              Michele Banko and   
          Stephen Soderland and   
                 Daniel S. Weld   Open information extraction from the web 68--74
            Michael Stonebraker   Technical perspective: One size fits
                                  all: an idea whose time has come and
                                  gone . . . . . . . . . . . . . . . . . . 76--76
             Peter A. Boncz and   
          Martin L. Kersten and   
                Stefan Manegold   Breaking the memory wall in MonetDB  . . 77--85
               Martin C. Rinard   Technical perspective: Patching program
                                  errors . . . . . . . . . . . . . . . . . 86--86
                Gene Novark and   
            Emery D. Berger and   
               Benjamin G. Zorn   Exterminator: Automatically correcting
                                  memory errors with high probability  . . 87--95
                  Peter Winkler   Last Byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 118--118
                  Cory Doctorow   Future tense: Pester power . . . . . . . 120--ff
             Peter Duchessi and   
     Indushobha Chengalur-Smith   Enhancing business performance via
                                  vendor managed inventory applications    121--127
             Chee Wei Phang and   
             Atreyi Kankanhalli   A framework of ICT exploitation for
                                  e-participation initiatives  . . . . . . 128--132
          Michael J. Davern and   
                Carla L. Wilkin   Evolving innovations through design and
                                  use  . . . . . . . . . . . . . . . . . . 133--137
           Michael Näf and   
                    David Basin   Two approaches to an information
                                  security laboratory  . . . . . . . . . . 138--142
             Patrick Stacey and   
                Joe Nandhakumar   Opening up to agile games development    143--146
                 Ross A. Malaga   Worst practices in search engine
                                  optimization . . . . . . . . . . . . . . 147--150
             Pierre Berthon and   
            Leyland F. Pitt and   
              Richard T. Watson   From Genesis to Revelations: the
                                  technology diaspora  . . . . . . . . . . 151--154
           Vivien K. G. Lim and   
         Thompson S. H. Teo and   
                  Jen Yuin Chin   Technical opinion: Bosses and their
                                  e-manners  . . . . . . . . . . . . . . . 155--157


Communications of the ACM
Volume 52, Number 1, January, 2009

                 Moshe Y. Vardi   Editor's letter: How are we doing? . . . 5--5
                     CACM Staff   Letters to the editor: True seeds of
                                  open source software . . . . . . . . . . 6--6
                    David Roman   CACM online: \em Communications preps
                                  Web-enhanced articles  . . . . . . . . . 8--8
                  David Lindley   News: Calculating the future . . . . . . 9--11
                    Jeff Kanipe   News: The universe in your computer  . . 12--14
                    Alex Wright   News: Get smart  . . . . . . . . . . . . 15--16
                   Michael Ross   News: A pioneer woman  . . . . . . . . . 17--17
              Jonathan Zittrain   Viewpoints: Law and technology: The end
                                  of the generative Internet . . . . . . . 18--20
                   Alex E. Bell   Viewpoints: From the front lines: Ground
                                  control to Architect Tom\ldots . . . . . 21--22
              Phillip G. Armour   Viewpoints: The business of software:
                                  The ontology of paper  . . . . . . . . . 23--24
               Michael Cusumano   Viewpoints: Technology strategy and
                                  management: The legacy of Bill Gates . . 25--26
              Jon Crowcroft and   
                  S. Keshav and   
                   Nick McKeown   Viewpoint: Scaling the academic
                                  publication process to Internet scale    27--30
              Stuart I. Feldman   ACM's annual report  . . . . . . . . . . 33--37
                  Werner Vogels   Eventually consistent  . . . . . . . . . 40--44
                    John Mashey   The long road to 64 bits . . . . . . . . 45--53
                Tapan S. Parikh   Engineering rural development  . . . . . 54--63
              Dawn N. Jutla and   
               Dimitri Kanevsky   wisePad services for vision-,
                                  hearing-, and speech-impaired users  . . 64--69
            Joan Feigenbaum and   
            David C. Parkes and   
               David M. Pennock   Computational challenges in e-commerce   70--74
                     Harry Shum   Technical perspective: Customizing media
                                  to displays  . . . . . . . . . . . . . . 76--76
               Ariel Shamir and   
                    Shai Avidan   Seam carving for media retargeting . . . 77--85
              Jock D. Mackinlay   Technical perspective: Finding and
                                  telling stories with data  . . . . . . . 86--86
               Jeffrey Heer and   
  Fernanda B. Viégas and   
              Martin Wattenberg   Voyagers and voyeurs: Supporting
                                  asynchronous collaborative visualization 87--97
                  Leah Hoffmann   Last byte: Q&A: The upper limit . . . . . 112ff
                Erik T. Mueller   Automating commonsense reasoning using
                                  the event calculus . . . . . . . . . . . 113--117
                Nanda Kumar and   
                  Roumen Vragov   Active citizen participation using ICT
                                  tools  . . . . . . . . . . . . . . . . . 118--121
             Yogesh Dwivedi and   
                    Zahir Irani   Understanding the adopters and
                                  non-adopters of broadband  . . . . . . . 122--125
          Allen C. Johnston and   
                       Ron Hale   Improved security through information
                                  security governance  . . . . . . . . . . 126--129
             Judith Gebauer and   
                  Mark Ginsburg   Exploring the black box of
                                  task-technology fit  . . . . . . . . . . 130--135
                Hillol Bala and   
        Viswanath Venkatesh and   
     Srinivasan Venkatraman and   
                 Jack Bates and   
                Steven H. Brown   Disaster response in health care: A
                                  design extension for enterprise data
                                  warehouse  . . . . . . . . . . . . . . . 136--140
        Parag C. Pendharkar and   
                James A. Rodger   The relationship between software
                                  development team size and software
                                  development cost . . . . . . . . . . . . 141--144
          Carol Xiaojuan Ou and   
              Robert M. Davison   Technical opinion: Why eBay lost to
                                  TaoBao in China: the global advantage    145--148

Communications of the ACM
Volume 52, Number 2, February, 2009

             Eugene H. Spafford   USACM's policy role  . . . . . . . . . . 5--5
                     CACM Staff   Seven principles for secure e-voting . . 8--9
                    David Roman   The dot-org difference . . . . . . . . . 10--10
                Kirk L. Kroeker   Photography's bright future  . . . . . . 11--13
                    Alex Wright   Making sense of sensors  . . . . . . . . 14--15
               Samuel Greengard   The first Internet President . . . . . . 16--18
                Kirk L. Kroeker   SIGGRAPH debuts in Asia  . . . . . . . . 19--19
               Ashish Arora and   
                 Matej Drev and   
                   Chris Forman   Economic and business dimensions: The
                                  extent of globalization of software
                                  innovation . . . . . . . . . . . . . . . 20--22
      George H. L. Fletcher and   
                    James J. Lu   Education Human: computing skills:
                                  rethinking the K-12 experience . . . . . 23--25
                 Kristina Irion   Privacy and security: International
                                  communications surveillance  . . . . . . 26--28
               Peter G. Neumann   Inside risks: U.S. election after-math   29--29
       Barbara van Schewick and   
                   David Farber   Point/Counterpoint: Network neutrality
                                  nuances  . . . . . . . . . . . . . . . . 31--37
                 Ulrich Drepper   Parallel programming with transactional
                                  memory . . . . . . . . . . . . . . . . . 38--43
                   Tom Leighton   Improving performance on the Internet    44--51
                    T. V. Raman   Toward $2^W$, beyond Web 2.0 . . . . . . 52--59
                  Mary Hall and   
                David Padua and   
                 Keshav Pingali   Compiler research: the next 50 years . . 60--67
                Maria Klawe and   
              Telle Whitney and   
                Caroline Simard   Women in computing---take 2  . . . . . . 68--76
                    Dan Wallach   Technical perspective: Tools for
                                  information to flow securely and
                                  Swift-ly . . . . . . . . . . . . . . . . 78--78
              Stephen Chong and   
                    Jed Liu and   
            Andrew C. Myers and   
                     Xin Qi and   
                  K. Vikram and   
              Lantian Zheng and   
                      Xin Zheng   Building secure Web applications with
                                  automatic partitioning . . . . . . . . . 79--87
                     Ehud Kalai   Technical perspective: The complexity of
                                  computing Nash equilibrium . . . . . . . 88--88
    Constantinos Daskalakis and   
           Paul W. Goldberg and   
      Christos H. Papadimitriou   The complexity of computing a Nash
                                  equilibrium  . . . . . . . . . . . . . . 89--97
                  Peter Winkler   Last Byte: Puzzled: Will my algorithm
                                  terminate? . . . . . . . . . . . . . . . 104--104
           Pamela E. Carter and   
                     Gina Green   Networks of contextualized data: a
                                  framework for cyberinfrastructure data
                                  management . . . . . . . . . . . . . . . 105--109
                Xiao-Bai Li and   
                Luvai Motiwalla   For sale by owner online: who gets the
                                  saved commission?  . . . . . . . . . . . 110--114
           Ergin Elmacioglu and   
                    Dongwon Lee   Oracle, where shall I submit my papers?  115--118
             Shlomo Argamon and   
               Moshe Koppel and   
        James W. Pennebaker and   
                Jonathan Schler   Automatically profiling the author of an
                                  anonymous text . . . . . . . . . . . . . 119--123
                  Sandy Behrens   Shadow systems: the good, the bad and
                                  the ugly . . . . . . . . . . . . . . . . 124--129
              Arik Ragowsky and   
                    David Gefen   Why IS management is in trouble and how
                                  to save it: lessons learned in the
                                  automotive industry  . . . . . . . . . . 130--133
            M. Eric Johnson and   
                Dan McGuire and   
             Nicholas D. Willey   Why file sharing networks are dangerous? 134--138
       Raquel Benbunan-Fich and   
              Gregory E. Truman   Technical opinion: Multitasking with
                                  laptops during meetings  . . . . . . . . 139--141

Communications of the ACM
Volume 52, Number 3, March, 2009

                 Moshe Y. Vardi   Editor's letter: 'Yes, it can be done'   5--5
                Scott E. Delman   Publisher's corner: Communications'
                                  Web site to launch in March  . . . . . . 7--7
                     CACM Staff   Children's magic won't deliver the
                                  Semantic Web . . . . . . . . . . . . . . 8--9
                    David Roman   Prepare for launch . . . . . . . . . . . 12--12
                   Gregory Goth   Betting on ideas . . . . . . . . . . . . 13--15
                  Leah Hoffmann   Crowd control  . . . . . . . . . . . . . 16--17
                Kirk L. Kroeker   The evolution of virtualization  . . . . 18--20
               Karen A. Frenkel   A difficult, unforgettable idea  . . . . 21--21
                     CACM Staff   ACM Fellows honored  . . . . . . . . . . 22--22
           Peter J. Denning and   
              Richard D. Riehle   The profession of IT: Is software
                                  engineering engineering? . . . . . . . . 24--26
               Pamela Samuelson   Legally speaking: When is a 'license'
                                  really a sale? . . . . . . . . . . . . . 27--29
             David A. Patterson   Viewpoint: Your students are your legacy 30--33
              Jeffrey D. Ullman   Viewpoint: Advising students for success 34--37
                    Len Shustek   Interview: An interview with C. A. R.
                                  Hoare  . . . . . . . . . . . . . . . . . 38--41
               Walker White and   
             Christoph Koch and   
            Johannes Gehrke and   
                    Alan Demers   Better scripts, better games . . . . . . 42--47
                     Jim Larson   Erlang for concurrent programming  . . . 48--56
             Abigail Sellen and   
              Yvonne Rogers and   
             Richard Harper and   
                     Tom Rodden   Reflecting human values in the digital
                                  age  . . . . . . . . . . . . . . . . . . 58--66
                    David Harel   Statecharts in the making: a personal
                                  account  . . . . . . . . . . . . . . . . 67--75
                    Madhu Sudan   Probabilistically checkable proofs . . . 76--84
             Daniel A. Spielman   Technical perspective: The beauty of
                                  error-correcting codes . . . . . . . . . 86--86
       Venkatesan Guruswami and   
                     Atri Rudra   Error correction up to the
                                  information-theoretic limit  . . . . . . 87--95
                     Bud Mishra   Technical perspective: Where biology
                                  meets computing  . . . . . . . . . . . . 96--96
                 Radu Grosu and   
            Scott A. Smolka and   
           Flavio Corradini and   
           Anita Wasilewska and   
            Emilia Entcheva and   
                  Ezio Bartocci   Learning and detecting emergent behavior
                                  in networks of cardiac myocytes  . . . . 97--105
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 111--111
                   Joel Garreau   Last byte: Future Tense: Radical
                                  evolution  . . . . . . . . . . . . . . . 112--ff
           Alexandre Sacchi and   
           Emerson Giannini and   
             Regiane Bochic and   
           Nicolau Reinhard and   
             Alexandre B. Lopes   Digital inclusion with the McInternet:
                                  would you like fries with that?  . . . . 113--116
             Clyde W. Holsapple   A new map for knowledge dissemination
                                  channels . . . . . . . . . . . . . . . . 117--125
             Mary J. Culnan and   
               Thomas J. Carlin   Online privacy practices in higher
                                  education: making the grade? . . . . . . 126--130
     Kenneth R. Fleischmann and   
             William A. Wallace   Ensuring transparency in computational
                                  modeling . . . . . . . . . . . . . . . . 131--134
               Florian Mann and   
        Benedikt von Walter and   
                Thomas Hess and   
                 Rolf T. Wigand   Open access publishing in science  . . . 135--139
                Greg Linden and   
         Kenneth L. Kraemer and   
                  Jason Dedrick   Who captures value in a global
                                  innovation network?: the case of Apple's
                                  iPod . . . . . . . . . . . . . . . . . . 140--144
                   Anna Formica   Concept similarity by evaluating
                                  information contents and feature
                                  vectors: a combined approach . . . . . . 145--149
                     Alfred Loo   Technical opinion: Security threats of
                                  smart phones and Bluetooth . . . . . . . 150--152

Communications of the ACM
Volume 52, Number 4, April, 2009

              Andrew McGettrick   Education letter: Computing education
                                  matters  . . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: What role for
                                  computer science in the war on terror?   9--9
                    David Roman   CACM online: An ongoing study in
                                  usability  . . . . . . . . . . . . . . . 10--10
           Graeme Stemp-Morlock   News: Learning more about active
                                  learning . . . . . . . . . . . . . . . . 11--13
                    Alex Wright   News: Our sentiments, exactly  . . . . . 14--15
                    David Essex   News: Did somebody say virtual
                                  colonoscopy? . . . . . . . . . . . . . . 16--18
                    Bob Violino   News: Time to reboot . . . . . . . . . . 19--19
                      Alan Joch   News: IT ecosystem in peril  . . . . . . 20--20
                      Anonymous   Emerging markets IT and the world's
                                  'bottom billion' . . . . . . . . . . . . 22--24
             System changes and   
                   side effects   Kode Vicious: System changes and side
                                  effects  . . . . . . . . . . . . . . . . 25--26
               Michael Cusumano   Technology strategy and management:
                                  Strategies for difficult (and Darwinian)
                                  economic times . . . . . . . . . . . . . 27--28
                Michael Buckley   Viewpoint: Computing as social science   29--30
             Bertrand Meyer and   
           Christine Choppy and   
   Jòrgen Staunstrup and   
                Jan van Leeuwen   Viewpoint: Research evaluation for
                                  computer science . . . . . . . . . . . . 31--34
                   Mike Shapiro   Purpose-built languages  . . . . . . . . 36--41
               Niels Provos and   
           Moheeb Abu Rajab and   
         Panayiotis Mavrommatis   Cybercrime 2.0: when the cloud turns
                                  dark . . . . . . . . . . . . . . . . . . 42--47
               Chris Richardson   ORM in dynamic languages . . . . . . . . 48--55
             Gerhard Weikum and   
            Gjergji Kasneci and   
              Maya Ramanath and   
                Fabian Suchanek   Database and information-retrieval
                                  methods for knowledge discovery  . . . . 56--64
            Samuel Williams and   
            Andrew Waterman and   
                David Patterson   Roofline: an insightful visual
                                  performance model for multicore
                                  architectures  . . . . . . . . . . . . . 65--76
                 Daniel Jackson   A direct path to dependable software . . 78--88
                   Arif Merchan   Technical perspective: Disk array models
                                  for automating storage management  . . . 90--90
         Michael P. Mesnier and   
              Matthew Wachs and   
         Raja R. Sambasivan and   
             Alice X. Zheng and   
              Gregory R. Ganger   Relative fitness modeling  . . . . . . . 91--96
                   Goetz Graefe   Technical perspective: Integrating flash
                                  devices  . . . . . . . . . . . . . . . . 97--97
              David Roberts and   
                 Taeho Kgil and   
                   Trevor Mudge   Integrating NAND flash devices onto
                                  servers  . . . . . . . . . . . . . . . . 98--103
                   Leah Hofmann   Last byte: Q&A: Our dame commander  . . . 112--ff
      Jay F. Nunamaker, Jr. and   
            Bruce A. Reinig and   
               Robert O. Briggs   Principles for effective virtual
                                  teamwork . . . . . . . . . . . . . . . . 113--117
        Maris G. Martinsons and   
          Robert M. Davison and   
              Valdis Martinsons   How culture influences IT-enabled
                                  organizational change and information
                                  systems  . . . . . . . . . . . . . . . . 118--123
               Gee-Woo Bock and   
                   Swee Ling Ho   Non-work related computing (NWRC)  . . . 124--128
           Kevin P. Scheibe and   
           James C. McElroy and   
                Paula C. Morrow   Object language and impression
                                  management . . . . . . . . . . . . . . . 129--131
     France Bélanger and   
                 Lemuria Carter   The impact of the digital divide on
                                  e-government use . . . . . . . . . . . . 132--135
         Zeinab Karake Shalhoub   Analysis of industry-specific
                                  concentration of CPOs in Fortune 500
                                  companies  . . . . . . . . . . . . . . . 136--141
        Eusebio Scornavacca and   
                   Sid Huff and   
               Stephen Marshall   Mobile phones in the classroom: if you
                                  can't beat them, join them . . . . . . . 142--146
                 Paulo Goes and   
                  Yanbin Tu and   
                   Y. Alex Tung   Technical opinion: Online auctions
                                  hidden metrics . . . . . . . . . . . . . 147--149

Communications of the ACM
Volume 52, Number 5, May, 2009

                 Moshe Y. Vardi   Editor's letter: Conferences vs.
                                  journals in computing research . . . . . 5--5
                     CACM Staff   Letters to the Editor: Logic of lemmings
                                  in compiler innovation . . . . . . . . . 7--9
                     CACM Staff   blog@CACM: Recommendation algorithms,
                                  online privacy, and more . . . . . . . . 10--11
                    David Roman   CACM online: The print-Web partnership
                                  turns the page . . . . . . . . . . . . . 12--12
                Kirk L. Kroeker   News: Rethinking signal processing . . . 13--15
                    David Essex   News: Matchmaker, matchmaker . . . . . . 16--17
               Samuel Greengard   News: Learning goes global . . . . . . . 18--19
                     CACM Staff   News: Liskov wins Turing Award . . . . . 21--21
                Pierre Larouche   Law and technology: The network
                                  neutrality debate hits Europe  . . . . . 22--24
               LeAnne Coder and   
       Joshua L. Rosenbloom and   
              Ronald A. Ash and   
              Brandon R. Dupont   Economic and business dimensions:
                                  Increasing gender diversity in the IT
                                  work force . . . . . . . . . . . . . . . 25--27
          Martin Campbell-Kelly   Historical reflections: The rise, fall,
                                  and resurrection of software as a
                                  service  . . . . . . . . . . . . . . . . 28--30
                   Mark Guzdial   Education: Teaching computing to
                                  everyone . . . . . . . . . . . . . . . . 31--33
                 Ken Birman and   
              Fred B. Schneider   Viewpoint: Program committee overload in
                                  systems  . . . . . . . . . . . . . . . . 34--37
              Thomas Wadlow and   
                   Vlad Gorelik   Security in the browser  . . . . . . . . 40--45
                  Michi Henning   API design matters . . . . . . . . . . . 46--56
                   Eric Schrock   Debugging AJAX in production . . . . . . 57--60
                    James Larus   Spending Moore's dividend  . . . . . . . 62--69
                  Edward A. Lee   Computing needs time . . . . . . . . . . 70--79
                 Corrado Priami   Algorithmic systems biology  . . . . . . 80--88
                  Ross Anderson   Technical perspective: A chilly sense of
                                  security . . . . . . . . . . . . . . . . 90--90
          J. Alex Halderman and   
             Seth D. Schoen and   
             Nadia Heninger and   
           William Clarkson and   
               William Paul and   
       Joseph A. Calandrino and   
           Ariel J. Feldman and   
            Jacob Appelbaum and   
               Edward W. Felten   Lest we remember: cold-boot attacks on
                                  encryption keys  . . . . . . . . . . . . 91--98
                Maurice Herlihy   Technical perspective: Highly concurrent
                                  data structures  . . . . . . . . . . . . 99--99
    William N. Scherer, III and   
                   Doug Lea and   
               Michael L. Scott   Scalable synchronous queues  . . . . . . 100--111
                  Peter Winkler   Last byte: Puzzled: Understanding
                                  relationships among numbers  . . . . . . 112--112
         J. Drew Procaccino and   
                 June M. Verner   Software developers' views of end-users
                                  and project success  . . . . . . . . . . 113--116
         Karlene C. Cousins and   
                 Upkar Varshney   Designing ubiquitous computing
                                  environments to support work life
                                  balance  . . . . . . . . . . . . . . . . 117--123
            Stuart D. Galup and   
             Ronald Dattero and   
                Jim J. Quan and   
                     Sue Conger   An overview of IT service management . . 124--127
            Robert K. Plice and   
          Nigel P. Melville and   
                 Oleg V. Pavlov   Toward an information-compatible
                                  anti-spam strategy . . . . . . . . . . . 128--130
            James A. McCart and   
            Varol O. Kayhan and   
             Anol Bhattacherjee   Cross-bidding in simultaneous online
                                  auctions . . . . . . . . . . . . . . . . 131--134
          Carol Xiaojuan Ou and   
                 Choon Ling Sia   To trust or to distrust, that is the
                                  question: investigating the
                                  trust-distrust paradox . . . . . . . . . 135--139
              Gary W. Brock and   
          Denise J. McManus and   
                 Joanne E. Hale   Reflections today prevent failures
                                  tomorrow . . . . . . . . . . . . . . . . 140--144
               Michael Rebstock   Technical opinion: Semantic ambiguity:
                                  Babylon, Rosetta or beyond?  . . . . . . 145--146

Communications of the ACM
Volume 52, Number 6, June, 2009

                 Elaine Weyuker   ACM-W letter: ACM-W celebrates women in
                                  computing  . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the Editor: Share the threats 9--9
                  Tessa Lau and   
                    Daniel Reed   blog@CACM: Speech-activated user
                                  interfaces and climbing Mt. Exascale . . 10--11
                    David Roman   CACM online: Making that connection  . . 12--12
                     Don Monroe   News: Micromedicine to the rescue  . . . 13--15
                  Leah Hoffmann   News: Content control  . . . . . . . . . 16--17
                   Gregory Goth   News: Autonomous helicopters . . . . . . 18--20
                    Bob Violino   News: Looking backward and forward . . . 21--21
             Eugene H. Spafford   Privacy and security: Answering the
                                  wrong questions is no answer . . . . . . 22--24
                       Kevin Fu   Inside risks: Reducing risks of
                                  implantable medical devices  . . . . . . 25--27
               Peter J. Denning   The profession of IT: Beyond
                                  computational thinking . . . . . . . . . 28--30
               Richard Stallman   Viewpoint: Why `open source' misses the
                                  point of free software . . . . . . . . . 31--33
         George V. Neville-Neil   Kode vicious: Obvious truths . . . . . . 34--35
                    Jon Elerath   Hard-disk drives: the good, the bad, and
                                  the ugly . . . . . . . . . . . . . . . . 38--45
                    Mike O'Dell   Network front-end processors, yet again  46--50
         George V. Neville-Neil   Whither sockets? . . . . . . . . . . . . 51--55
             Rakesh Agrawal and   
         Anastasia Ailamaki and   
        Philip A. Bernstein and   
             Eric A. Brewer and   
           Michael J. Carey and   
          Surajit Chaudhuri and   
                 Anhai Doan and   
           Daniela Florescu and   
        Michael J. Franklin and   
       Hector Garcia-Molina and   
            Johannes Gehrke and   
               Le Gruenwald and   
              Laura M. Haas and   
             Alon Y. Halevy and   
      Joseph M. Hellerstein and   
        Yannis E. Ioannidis and   
              Hank F. Korth and   
            Donald Kossmann and   
              Samuel Madden and   
             Roger Magoulas and   
              Beng Chin Ooi and   
               Tim O'Reilly and   
         Raghu Ramakrishnan and   
            Sunita Sarawagi and   
        Michael Stonebraker and   
        Alexander S. Szalay and   
                 Gerhard Weikum   The Claremont Report on Database
                                  Research . . . . . . . . . . . . . . . . 56--65
         Kenneth L. Kraemer and   
              Jason Dedrick and   
                  Prakul Sharma   One laptop per child: vision vs. reality 66--73
         M. Bernardine Dias and   
                    Eric Brewer   How computer science serves the
                                  developing world . . . . . . . . . . . . 74--80
                   Andrew Myers   Technical perspective: Reframing
                                  security for the Web . . . . . . . . . . 82--82
                 Adam Barth and   
             Collin Jackson and   
               John C. Mitchell   Securing frame communication in browsers 83--91
               Norman P. Jouppi   Technical perspective: Software and
                                  hardware support for deterministic
                                  replay of parallel programs  . . . . . . 92--92
             Derek R. Hower and   
           Pablo Montesinos and   
                  Luis Ceze and   
               Mark D. Hill and   
                Josep Torrellas   Two hardware-based approaches for
                                  deterministic multiprocessor replay  . . 93--100
                  Peter Winkler   Puzzled: Solutions and sources . . . . . 103--103
               Robert J. Sawyer   Future tense: Webmind says hello . . . . 104--104
               Jonghun Park and   
                     Kwanho Kim   Hyperlinking the work for
                                  self-management of flexible workflows    113--117
         Steven M. Thompson and   
                Matthew D. Dean   Advancing information technology in
                                  health care  . . . . . . . . . . . . . . 118--121
                     Amar Gupta   Deriving mutual benefits from offshore
                                  outsourcing  . . . . . . . . . . . . . . 122--126
                Mark Lycett and   
                Chris Partridge   The challenge of epistemic divergence in
                                  IS development . . . . . . . . . . . . . 127--131
                   Nena Lim and   
                      Anne Khoo   Forensics of computers and handheld
                                  devices: identical or fraternal twins?   132--135
        Sudip Bhattacharjee and   
               Ram D. Gopal and   
           James R. Marsden and   
        Ramesh Sankaranarayanan   Re-tuning the music industry: can they
                                  re-attain business resonance?  . . . . . 136--140
               Dursun Delen and   
            Suliman Al-Hawamdeh   A holistic framework for knowledge
                                  discovery and management . . . . . . . . 141--145
                T. P. Liang and   
       Andrew J. Czaplewski and   
                 Gary Klein and   
                 James J. Jiang   Technical opinion: Leveraging
                                  first-mover advantages in Internet-based
                                  consumer services  . . . . . . . . . . . 146--148

Communications of the ACM
Volume 52, Number 7, July, 2009

                 Moshe Y. Vardi   Editor's letter: Open, closed, or clopen
                                  access?  . . . . . . . . . . . . . . . . 5--5
                Scott E. Delman   Publisher's corner: \em Communications'
                                  annual report card . . . . . . . . . . . 6--7
                     CACM Staff   Letters to the editor: Inspire with
                                  introductory computer science  . . . . . 8--9
               Mark Guzdial and   
                Greg Linden and   
                      Tessa Lau   blog@CACM: Sharing ideas, writing apps,
                                  and creating a professional Web presence 10--11
                    David Roman   CACM online: Moving forward and backward 12--12
                    Alex Wright   News: Contemporary approaches to fault
                                  tolerance  . . . . . . . . . . . . . . . 13--15
                Kirk L. Kroeker   News: Toward native Web execution  . . . 16--17
               Samuel Greengard   News: Are we losing our ability to think
                                  critically?  . . . . . . . . . . . . . . 18--19
               Karen A. Frenkel   News: Liskov's creative joy  . . . . . . 20--22
                      Alan Joch   News: Master of connections  . . . . . . 23--23
                     CACM Staff   News: ACM award winners  . . . . . . . . 25--25
               Pamela Samuelson   Legally speaking: The dead souls of the
                                  Google book search settlement  . . . . . 28--30
                      Mari Sako   Technology strategy and management:
                                  Globalization of knowledge-intensive
                                  professional services  . . . . . . . . . 31--33
              Phillip G. Armour   The business of software: The cliché
                                  defense  . . . . . . . . . . . . . . . . 34--36
         Matthias Felleisen and   
          Shriram Krishnamurthi   Viewpoint: Why computer science doesn't
                                  matter . . . . . . . . . . . . . . . . . 37--40
               Robert Dewar and   
                 Owen Astrachan   Point/counterpoint: CS education in the
                                  U.S.: heading in the wrong direction?    41--45
                   Goetz Graefe   The five-minute rule 20 years later (and
                                  how flash memory changes the rules)  . . 48--59
              Jonathan M. Smith   Fighting physics: a tough battle . . . . 60--65
                   Erol Gelenbe   Steps toward self-aware networks . . . . 66--75
                Rick Kazman and   
                  Hong-Mei Chen   The Metropolis Model: a new logic for
                                  development of crowdsourced systems  . . 76--84
               Nilesh Dalvi and   
      Christopher Ré and   
                      Dan Suciu   Probabilistic databases: diamonds in the
                                  dirt . . . . . . . . . . . . . . . . . . 86--94
             Stuart Russell and   
                  Lawrence Saul   Technical perspective: The ultimate
                                  pilot program  . . . . . . . . . . . . . 96--96
                Adam Coates and   
              Pieter Abbeel and   
                   Andrew Y. Ng   Apprenticeship learning for helicopter
                                  control  . . . . . . . . . . . . . . . . 97--105
                 Greg Morrisett   Technical perspective: A compiler's
                                  story  . . . . . . . . . . . . . . . . . 106--106
                   Xavier Leroy   Formal verification of a realistic
                                  compiler . . . . . . . . . . . . . . . . 107--115
                  Leah Hoffmann   Last byte: Q&A: Liskov on Liskov  . . . . 120--ff
            Benjamin Fabian and   
            Oliver Günther   Virtual extension: Security challenges
                                  of the EPCglobal network . . . . . . . . 121--125
      James L. Parrish, Jr. and   
         James F. Courtney, Jr.   Virtual extension: Churchman's inquirers
                                  as design templates for knowledge
                                  management systems . . . . . . . . . . . 126--129
            Arvind Malhotra and   
      Claudia Kubowicz Malhotra   Virtual extension: A relevancy-based
                                  services view for driving adoption of
                                  wireless Web services in the U.S.  . . . 130--134
                Johann Rost and   
                Robert L. Glass   Virtual extension: The impact of
                                  subversive stakeholders on software
                                  projects . . . . . . . . . . . . . . . . 135--138
            Sandip C. Patel and   
            Ganesh D. Bhatt and   
                James H. Graham   Virtual extension: Improving the cyber
                                  security of SCADA communication networks 139--142
                 Anat Hovav and   
              Ciprian Popoviciu   Virtual extension: Adoption leadership
                                  and early planners: Comcast's IP upgrade
                                  strategy . . . . . . . . . . . . . . . . 143--146
       Richard W. Woolridge and   
              David P. Hale and   
             Joanne E. Hale and   
                R. Shane Sharpe   Virtual extension: Software project
                                  scope alignment: an outcome-based
                                  approach . . . . . . . . . . . . . . . . 147--152
          Robert M. Davison and   
        Maris G. Martinsons and   
             Henry W. H. Lo and   
                        Yuan Li   Virtual extension: Technical opinion:
                                  The ethics of IT professionals in China  153--155

Communications of the ACM
Volume 52, Number 8, August, 2009

               Steve Bourne and   
                 Bryan Cantrill   \em Communications and the practitioner  5--5
                Scott E. Delman   Responding to the blogosphere  . . . . . 7--7
                     CACM Staff   Why invention and innovation diverge . . 8--9
                     CACM Staff   In the virtual extension . . . . . . . . 10--10
          Jeannette M. Wing and   
                Daniel Reed and   
                   Mark Guzdial   An ICT research agenda, HPC and
                                  innovation, and why only the developed
                                  world lacks women in computing . . . . . 12--13
                    David Roman   The new searchers  . . . . . . . . . . . 14--14
                     Don Monroe   Just for you . . . . . . . . . . . . . . 15--17
                Kirk L. Kroeker   Face recognition breakthrough  . . . . . 18--19
                     Tom Geller   IT drives policy---and vice versa  . . . 20--20
                  Leah Hoffmann   Learning through games . . . . . . . . . 21--22
                   Gregory Goth   U.S. unveils cybersecurity plan  . . . . 23--23
                     Tim Draper   Economic and business dimensions:
                                  Entrepreneurship during a slump  . . . . 24--26
                 Wanda Dann and   
                 Stephen Cooper   Education Alice 3: concrete to abstract  27--29
                 Brian Snow and   
                 Clinton Brooks   Privacy and security: An ethics code for
                                  U.S. intelligence officers . . . . . . . 30--32
                  Lance Fortnow   Viewpoint: Time for computer science to
                                  grow up  . . . . . . . . . . . . . . . . 33--35
                    Adam Jacobs   The pathologies of big data  . . . . . . 36--44
               Charles Reis and   
                 Adam Barth and   
                  Carlos Pizano   Browser security: lessons from Google
                                  Chrome . . . . . . . . . . . . . . . . . 45--49
                  Mache Creeger   CTO roundtable: cloud computing  . . . . 50--56
          Kristen Shinohara and   
                 Josh Tenenberg   A blind person's interactions with
                                  technology . . . . . . . . . . . . . . . 58--66
              Ralph Morelli and   
               Allen Tucker and   
              Norman Danner and   
    Trishan R. De Lanerolle and   
          Heidi J. C. Ellis and   
              Ozgur Izmirli and   
              Danny Krizanc and   
                    Gary Parker   Revitalizing computing education through
                                  free and open source software for
                                  humanity . . . . . . . . . . . . . . . . 67--75
               Sharad Malik and   
                   Lintao Zhang   Boolean satisfiability from theoretical
                                  hardness to practical success  . . . . . 76--82
                 James Herbsleb   Technical perspective: Maintaining
                                  quality in the face of distributed
                                  development  . . . . . . . . . . . . . . 84--84
             Christian Bird and   
        Nachiappan Nagappan and   
          Premkumar Devanbu and   
                Harald Gall and   
                 Brendan Murphy   Does distributed development affect
                                  software quality?: an empirical case
                                  study of Windows Vista . . . . . . . . . 85--93
           Sachin S. Sapatnekar   Technical perspective: Where the chips
                                  may fall . . . . . . . . . . . . . . . . 94--94
          Michael Orshansky and   
                  Wei-Shen Wang   Statistical analysis of circuit timing
                                  using majorization . . . . . . . . . . . 95--100
                  Peter Winkler   Puzzled: Probability and intuition . . . 104--104
                Hoon S. Cha and   
            David E. Pingry and   
               Matt E. Thatcher   What determines IT spending priorities?  105--110
                 Andrew Lim and   
                    Hong Ma and   
                     Qi Wen and   
                    Zhou Xu and   
                  Brenda Cheang   Distinguishing citation quality for
                                  journal impact assessment  . . . . . . . 111--116
              Thomas Gerace and   
              Huseyin Cavusoglu   The critical elements of the patch
                                  management process . . . . . . . . . . . 117--121
                Rajiv Kohli and   
              Nigel P. Melville   Learning to build an IT innovation
                                  platform . . . . . . . . . . . . . . . . 122--126
Eoin Ó Conchúir and   
 Pär J. Ågerfalk and   
           Helena H. Olsson and   
               Brian Fitzgerald   Global software development: where are
                                  the benefits?  . . . . . . . . . . . . . 127--131
                 Rohit Kaul and   
                Yeogirl Yun and   
                  Seong-Gon Kim   Ranking billions of Web pages using
                                  diodes . . . . . . . . . . . . . . . . . 132--136
                     Roli Varma   Attracting Native Americans to computing 137--140
              Indranil Bose and   
          Alvin Chung Man Leung   Technical opinion: What drives the
                                  adoption of antiphishing measures by
                                  Hong Kong banks? . . . . . . . . . . . . 141--143

Communications of the ACM
Volume 52, Number 9, September, 2009

                 Moshe Y. Vardi   The financial meltdown and computing . . 5--5
                     CACM Staff   Computer Science does matter . . . . . . 8--9
                     CACM Staff   In the Virtual Extension . . . . . . . . 10--10
        Michael Stonebraker and   
                     Jason Hong   Saying good-bye to DBMSs, designing
                                  effective interfaces . . . . . . . . . . 12--13
                    David Roman   What you read on your summer vacation    14--14
                   Gregory Goth   Entering a parallel universe . . . . . . 15--17
                Kirk L. Kroeker   Medical nanobots . . . . . . . . . . . . 18--19
               Samuel Greengard   Facing an age-old problem  . . . . . . . 20--22
               Karen A. Frenkel   Computer Science meets environmental
                                  science  . . . . . . . . . . . . . . . . 23--23
               Paul M. Schwartz   Law and technology: Keeping track of
                                  telecommunications surveillance  . . . . 24--26
           Peter J. Denning and   
             Paul S. Rosenbloom   The profession of IT: Computing: the
                                  fourth great domain of science . . . . . 27--29
                 Mark Cleverley   Emerging markets: How ICT advances might
                                  help developing nations  . . . . . . . . 30--32
             Cameron Wilson and   
                   Peter Harsha   IT policy: The long road to Computer
                                  Science education reform . . . . . . . . 33--35
                  Anwar Ghuloum   Viewpoint: Face the inevitable, embrace
                                  parallelism  . . . . . . . . . . . . . . 36--38
              David P. Anderson   Interview: An interview with Maurice
                                  Wilkes . . . . . . . . . . . . . . . . . 39--42
                  Bruce Johnson   Reveling in constraints  . . . . . . . . 44--48
              Iosif Legrand and   
               Ramiro Voicu and   
           Catalin Cirstoiu and   
            Costin Grigoras and   
            Latchezar Betev and   
               Alexandru Costan   Monitoring and control of large systems
                                  with MonALISA  . . . . . . . . . . . . . 49--55
               Bryan O'Sullivan   Making sense of revision-control systems 56--62
              Varun Bhagwan and   
           Tyrone Grandison and   
                   Daniel Gruhl   Sound index: charts for the people, by
                                  the people . . . . . . . . . . . . . . . 64--70
                    James Boyle   What intellectual property law should
                                  learn from software  . . . . . . . . . . 71--76
                  Lance Fortnow   The status of the P versus NP problem    78--86
               Katherine Yelick   Technical perspective: Abstraction for
                                  parallelism  . . . . . . . . . . . . . . 88--88
            Milind Kulkarni and   
             Keshav Pingali and   
               Bruce Walter and   
       Ganesh Ramanarayanan and   
                Kavita Bala and   
                   L. Paul Chew   Optimistic parallelism requires
                                  abstractions . . . . . . . . . . . . . . 89--97
                    Marc Dacier   Technical perspective: They do click,
                                  don't they?  . . . . . . . . . . . . . . 98--98
               Chris Kanich and   
         Christian Kreibich and   
           Kirill Levchenko and   
            Brandon Enright and   
        Geoffrey M. Voelker and   
                Vern Paxson and   
                  Stefan Savage   Spamalytics: an empirical analysis of
                                  spam marketing conversion  . . . . . . . 99--107
                  Peter Winkler   Puzzled: Solutions and sources . . . . . 110--110
                   Jaron Lanier   Future tense: Confusions of the hive
                                  mind . . . . . . . . . . . . . . . . . . 112--ff
 Achita (Mi) Muthitacharoen and   
               Khawaja A. Saeed   Examining user involvement in continuous
                                  software development: (a case of error
                                  reporting system)  . . . . . . . . . . . 113--117
            Alexander Pasko and   
                 Valery Adzhiev   Constructive function-based modeling in
                                  multilevel education . . . . . . . . . . 118--122
                Hongwei Zhu and   
              Stuart E. Madnick   One size does not fit all: legal
                                  protection for non-copyrightable data    123--128
        Eleanor T. Loiacono and   
    Nicholas C. Romano, Jr. and   
                    Scott McCoy   The state of corporate website
                                  accessibility  . . . . . . . . . . . . . 128--132
            Robert Willison and   
                  Mikko Siponen   Overcoming the insider: reducing
                                  employee computer crime through
                                  Situational Crime Prevention . . . . . . 133--137
                     Mu Xia and   
                  Yun Huang and   
               Wenjing Duan and   
             Andrew B. Whinston   Ballot box communication in online
                                  communities  . . . . . . . . . . . . . . 138--142
                   Dinesh Batra   Modified agile practices for outsourced
                                  software projects  . . . . . . . . . . . 143--148
                 James Katz and   
                 Ronald E. Rice   Technical opinion: Falling into the net:
                                  Main Street America playing games and
                                  making friends online  . . . . . . . . . 149--150

Communications of the ACM
Volume 52, Number 10, October, 2009

                     Wendy Hall   President's letter: ACM Europe . . . . . 5--5
                     CACM Staff   Letters to the editor: Time and
                                  computing  . . . . . . . . . . . . . . . 6--6
                     CACM Staff   In the Virtual Extension . . . . . . . . 7--7
                Greg Linden and   
            Michael Conover and   
                 Judy Robertson   blog@CACM: The Netflix prize, computer
                                  science outreach, and Japanese mobile
                                  phones . . . . . . . . . . . . . . . . . 8--9
                     CACM Staff   CACM online: Following the leaders . . . 10--10
                  David Lindley   News: Managing data  . . . . . . . . . . 11--13
                      Alan Joch   News: Debating net neutrality  . . . . . 14--15
                     Tom Geller   News: Shaping the future . . . . . . . . 16--18
              Phillip G. Armour   The business of software: Contagious
                                  craziness, spreading sanity  . . . . . . 19--20
          Martin Campbell-Kelly   Historical reflections: Computing in the
                                  depression era . . . . . . . . . . . . . 21--22
                 Phillip Porras   Inside risks: Reflections on Conficker   23--24
               Michael Cusumano   Technology strategy and management:
                                  Dealing with the venture capital crisis  25--27
         George V. Neville-Neil   Kode Vicious: Kode reviews 101 . . . . . 28--29
                 C. A. R. Hoare   Viewpoint: Retrospective: an axiomatic
                                  basis for computer programming . . . . . 30--32
          James C. Phillips and   
                  John E. Stone   Probing biomolecular machines with
                                  graphics processors  . . . . . . . . . . 34--41
       Matthew T. Dougherty and   
            Michael J. Folk and   
                 Erez Zadok and   
       Herbert J. Bernstein and   
       Frances C. Bernstein and   
          Kevin W. Eliceiri and   
              Werner Benger and   
                 Christoph Best   Unifying biological image formats with
                                  HDF5 . . . . . . . . . . . . . . . . . . 42--47
                     CACM Staff   A conversation with David E. Shaw  . . . 48--54
             Krste Asanovic and   
            Rastislav Bodik and   
               James Demmel and   
               Tony Keaveny and   
               Kurt Keutzer and   
           John Kubiatowicz and   
              Nelson Morgan and   
            David Patterson and   
                Koushik Sen and   
             John Wawrzynek and   
               David Wessel and   
               Katherine Yelick   A view of the parallel computing
                                  landscape  . . . . . . . . . . . . . . . 56--67
         Jane Cleland-Huang and   
            Horatiu Dumitru and   
                 Chuan Duan and   
          Carlos Castro-Herrera   Automated support for managing feature
                                  requests in open forums  . . . . . . . . 68--74
         Daniel A. Spielman and   
                 Shang-Hua Teng   Smoothed analysis: an attempt to explain
                                  the behavior of algorithms in practice   76--84
              Surajit Chaudhuri   Technical perspective: Relational query
                                  optimization: data management meets
                                  statistical estimation . . . . . . . . . 86--86
                Kevin Beyer and   
             Rainer Gemulla and   
              Peter J. Haas and   
          Berthold Reinwald and   
                Yannis Sismanis   Distinct-value synopses for multiset
                                  operations . . . . . . . . . . . . . . . 87--95
                Johannes Gehrke   Technical perspective: Data stream
                                  processing: when you only get one look   96--96
             Graham Cormode and   
        Marios Hadjieleftheriou   Finding the frequent items in streams of
                                  data . . . . . . . . . . . . . . . . . . 97--105
                  Leah Hoffmann   Q&A: The networker  . . . . . . . . . . . 112--ff
           Richard J. Goeke and   
                Robert H. Faley   Technical opinion: Do SAP successes
                                  outperform themselves and their
                                  competitors? . . . . . . . . . . . . . . 113--117
      Girish H. Subramanian and   
                 Gary Klein and   
             James J. Jiang and   
                Chien-Lung Chan   Balancing four factors in system
                                  development projects . . . . . . . . . . 118--121
Sridhar R. Papagari Sangareddy and   
                Sanjeev Jha and   
                    Chen Ye and   
               Kevin C. Desouza   Attaining superior complaint resolution  122--126
            Vivienne Waller and   
             Robert B. Johnston   Making ubiquitous computing available    127--130
                Donal Flynn and   
                   Gary Pan and   
                  Mark Keil and   
            Magnus Mähring   De-escalating IT projects: the DMM model 131--134
      Francisco Casacuberta and   
               Jorge Civera and   
                 Elsa Cubel and   
         Antonio L. Lagarda and   
                Guy Lapalme and   
        Elliott Macklovitch and   
                  Enrique Vidal   Human interaction for high-quality
                                  machine translation  . . . . . . . . . . 135--138
              Jacques Savoy and   
               Ljiljana Dolamic   How effective is Google's translation
                                  service in search? . . . . . . . . . . . 139--143
                     Nan Hu and   
                  Jie Zhang and   
                 Paul A. Pavlou   Overcoming the J-shaped distribution of
                                  product reviews  . . . . . . . . . . . . 144--147

Communications of the ACM
Volume 52, Number 11, November, 2009

                 Moshe Y. Vardi   Editor's letter: Is the image crisis
                                  over?  . . . . . . . . . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: Pay for editorial
                                  independence . . . . . . . . . . . . . . 6--7
                     CACM Staff   In the virtual extension . . . . . . . . 9--9
                 Ramana Rao and   
                    Greg Linden   blog@CACM: Computer science curriculum,
                                  deceptive advertising  . . . . . . . . . 10--11
                    David Roman   CACM online: Internet addiction: it's
                                  spreading, but is it real? . . . . . . . 12--12
                    Gary Anthes   News: Deep data dives discover natural
                                  laws . . . . . . . . . . . . . . . . . . 13--14
                Kirk L. Kroeker   News: Electronic paper's next chapter    15--17
                  Leah Hoffmann   News: Implementing electronic medical
                                  records  . . . . . . . . . . . . . . . . 18--20
                   Gregory Goth   News: Exploring new frontiers  . . . . . 21--23
                 Butler Lampson   Privacy and security: Usable security:
                                  how to get it  . . . . . . . . . . . . . 25--27
               Pamela Samuelson   Legally speaking: Are business methods
                                  patentable?  . . . . . . . . . . . . . . 28--30
               Shane Greenstein   Economic and business dimensions: The
                                  broadband price is not right . . . . . . 31--33
              Jonathan M. Smith   Viewpoint: On public service and
                                  computer science . . . . . . . . . . . . 34--35
                  Bob Cramblitt   Interview: An interview with Ping Fu . . 36--39
           Whitfield Diffie and   
                   Susan Landau   Communications surveillance: privacy and
                                  security at risk . . . . . . . . . . . . 42--47
                  Katie Shilton   Four billion little brothers?: privacy,
                                  mobile phones, and ubiquitous data
                                  collection . . . . . . . . . . . . . . . 48--53
              Paul Stachour and   
            David Collier-Brown   You don't know jack about software
                                  maintenance  . . . . . . . . . . . . . . 54--58
            Mitchel Resnick and   
               John Maloney and   
Andrés Monroy-Hernández and   
               Natalie Rusk and   
            Evelyn Eastmond and   
              Karen Brennan and   
               Amon Millner and   
             Eric Rosenbaum and   
                 Jay Silver and   
            Brian Silverman and   
                   Yasmin Kafai   Scratch: programming for all . . . . . . 60--67
       Tridib Bandyopadhyay and   
         Vijay S. Mookerjee and   
                     Ram C. Rao   Why IT managers don't go for
                                  cyber-insurance products . . . . . . . . 68--73
           Edmund M. Clarke and   
           E. Allen Emerson and   
                 Joseph Sifakis   Model checking: algorithmic verification
                                  and debugging  . . . . . . . . . . . . . 74--84
                 Peter Druschel   Technical perspective: Narrowing the
                                  semantic gap in distributed programming  86--86
              Boon Thau Loo and   
               Tyson Condie and   
          Minos Garofalakis and   
               David E. Gay and   
      Joseph M. Hellerstein and   
            Petros Maniatis and   
         Raghu Ramakrishnan and   
             Timothy Roscoe and   
                     Ion Stoica   Declarative networking . . . . . . . . . 87--95
              John Shawe-Taylor   Technical perspective: Machine learning
                                  for complex predictions  . . . . . . . . 96--96
          Thorsten Joachims and   
             Thomas Hofmann and   
                 Yisong Yue and   
                    Chun-Nam Yu   Predicting structured objects with
                                  support vector machines  . . . . . . . . 97--104
                  Peter Winkler   Last byte: Puzzled: Covering the plane   112--112
                Lara Khansa and   
             Divakaran Liginlal   Quantifying the benefits of investing in
                                  information security . . . . . . . . . . 113--117
              Wei-Lun Chang and   
              Soe-Tsyr Yuan and   
                    Eldon Y. Li   iCare home portal: an extended model of
                                  quality aging e-services . . . . . . . . 118--124
              Aakash Taneja and   
                 Anil Singh and   
                     M. K. Raja   Computing journals and their emerging
                                  roles in knowledge exchange  . . . . . . 125--131
                Rudy Hirschheim   Offshoring and the new world order . . . 132--135
                C. Bolchini and   
               C. A. Curino and   
                    G. Orsi and   
             E. Quintarelli and   
                 R. Rossato and   
            F. A. Schreiber and   
                       L. Tanca   And what can context do for data?  . . . 136--140
               Frank McCown and   
      Catherine C. Marshall and   
              Michael L. Nelson   Why Web sites are lost (and how they're
                                  sometimes found) . . . . . . . . . . . . 141--145
                 Ralph Westfall   If your pearls of wisdom fall in a
                                  forest\ldots . . . . . . . . . . . . . . 146--149
                  Frank Nielsen   Technical opinion: Steering
                                  self-learning distance algorithms  . . . 150--152

Communications of the ACM
Volume 52, Number 12, December, 2009

               Chris Stephenson   CSTA letter: It is a pivotal time for
                                  K--12 computer science . . . . . . . . . 5--5
                     CACM Staff   Letters to the editor: In CS education,
                                  educate the educators first  . . . . . . 6--7
          Jeannette M. Wing and   
                   Mark Guzdial   blog@CACM: CS woes: deadline-driven
                                  research, academic inequality  . . . . . 8--9
                     CACM Staff   In the virtual extension . . . . . . . . 11--11
                    David Roman   CACM online: Crowdsourcing and the
                                  question of expertise  . . . . . . . . . 12--12
                    Gary Anthes   News: Blueprints for self-assembly . . . 13--15
                    Alex Wright   News: Ready for a Web OS?  . . . . . . . 16--17
               Samuel Greengard   News: Making automation work . . . . . . 18--19
                  Leah Hoffmann   News: Problem solvers  . . . . . . . . . 20--20
              Richard E. Ladner   Viewpoints: Broadening participation:
                                  Opening remarks  . . . . . . . . . . . . 22--24
                 Orna Berry and   
                  Yigal Grayeff   Viewpoints: Emerging markets Israel's
                                  technology industry as an economic
                                  growth engine  . . . . . . . . . . . . . 25--27
           Peter J. Denning and   
               Peter A. Freeman   Viewpoints: The profession of IT:
                                  Computing's paradigm . . . . . . . . . . 28--30
         George V. Neville-Neil   Viewpoints: Kode Vicious: Broken builds  31--32
         Savas Parastatidis and   
             Evelyne Viegas and   
                       Tony Hey   Viewpoint: A 'smart' cyberinfrastructure
                                  for research . . . . . . . . . . . . . . 33--37
                 Alan Ramos and   
                Weina Scott and   
              William Scott and   
                 Doug Lloyd and   
          Katherine O'Leary and   
                      Jim Waldo   Practice: A threat analysis of RFID
                                  passports  . . . . . . . . . . . . . . . 38--42
                     Paul Vixie   Practice: What DNS is not  . . . . . . . 43--47
         Alexandra Fedorova and   
           Juan Carlos Saez and   
            Daniel Shelepov and   
                  Manuel Prieto   Practice: Maximizing power efficiency
                                  with asymmetric multicore systems  . . . 48--57
            Josep Torrellas and   
                  Luis Ceze and   
                 James Tuck and   
             Calin Cascaval and   
           Pablo Montesinos and   
                 Wonsun Ahn and   
                Milos Prvulovic   The Bulk Multicore architecture for
                                  improved programmability . . . . . . . . 58--65
                   Michael Zyda   Computer science in the conceptual age   66--72
                    Kelvin Sung   Computer games and traditional CS
                                  courses  . . . . . . . . . . . . . . . . 74--78
                James A. Landay   Technical perspective: Design tools for
                                  the rest of us . . . . . . . . . . . . . 80--80
              Yuki Igarashi and   
                 Takeo Igarashi   Designing plush toys with a computer . . 81--88
                   Pat Hanrahan   Technical perspective: A graphical sense
                                  of touch . . . . . . . . . . . . . . . . 89--89
              Shahram Izadi and   
               Steve Hodges and   
                Alex Butler and   
                Darren West and   
             Alban Rrustemi and   
                Mike Molloy and   
                 William Buxton   ThinSight: a thin form-factor
                                  interactive surface technology . . . . . 90--98
                  Peter Winkler   Last byte: Puzzled: Solutions and
                                  sources  . . . . . . . . . . . . . . . . 111--111
                   Joe Haldeman   Last byte: Future tense: Mightier than
                                  the pen  . . . . . . . . . . . . . . . . 112--112
               Niki Panteli and   
                  Robert Tucker   Power and trust in global virtual teams  113--115
                Sun Sun Lim and   
                Hichang Cho and   
        Milagros Rivera Sanchez   Online privacy, government surveillance
                                  and national ID cards  . . . . . . . . . 116--120
        Ganesh Vaidyanathan and   
                 Steven Mautone   Security in dynamic Web Content
                                  Management Systems applications  . . . . 121--125
                  Lou Hafer and   
          Arthur E. Kirkpatrick   Assessing open source software as a
                                  scholarly contribution . . . . . . . . . 126--129
              Narciso Cerpa and   
                 June M. Verner   Why did your project fail? . . . . . . . 130--134
               Karen Renaud and   
            Antonella De Angeli   Visual passwords: cure-all or snake-oil? 135--140
                    Nir Kshetri   Positive externality, increasing
                                  returns, and the rise in cybercrimes . . 141--144
              Mikko Siponen and   
            M. Adam Mahmood and   
                  Seppo Pahnila   Technical opinion: Are employees putting
                                  your company at risk by not following
                                  information security policies? . . . . . 145--147